Welcome!

Java Authors: Trevor Parsons, Peter Silva, Elizabeth White, Rex Morrow, Datical, Hovhannes Avoyan

Related Topics: Cloud Expo, Java, SOA & WOA, Linux, Security, Big Data Journal

Cloud Expo: Article

A Business Continuity Plan Plus the Right Cloud Solution

The Perfect Equation for Disaster Proofing

It's an oft-cited FEMA statistic that 40 percent of small businesses never reopen after a disaster. Almost certainly contributing to this eye-popping failure rate is the fact that an estimated 74 percent of small to mid-sized businesses (SMBs) lack a disaster recovery plan, while 84 percent haven't bothered to obtain disaster insurance.

On an annual basis, flooding ranks as the most common and costly type of natural disaster in America. This hurricane season alone is expected to boast 10 named tropical storms and five hurricanes. Those SMBs that don't want their data to wash away with the rest of their possessions should consider revisiting the planning process, strategies, and cloud technologies that help businesses stay afloat in the event of a disaster.

Be Proactive - Planning Improves Reaction Time and Outcomes
Most businesses naively believe that they won't experience a true disaster, or that they'll just cross that bridge when in happens. However, according to the Aberdeen Group, disaster is arguably inevitable with the average business experiencing 2.26 downtime events per year, at an average cost of $163,674. Since all businesses aren't created equal, and many are constrained by dollars and cents, businesses must carefully calibrate their strategy for response to be commensurate with their risk. A well thought out business continuity and disaster recovery plan that takes into account the following six steps can make all the difference between a business that is poised for continued success, and one that is done in by something going awry:

Step 1: Identify mission-critical applications and data by performing a risk assessment and business impact analysis (BIA) as well as taking an asset inventory. This analysis will allow the business to calculate the potential impact of its most likely threats and prioritize their response accordingly.

Step 2: Estimate when operations should/will resume by measuring success against established RTO/RPO through frequent testing to ensure flexibility in the disaster recovery technology solution(s) the business chooses. Companies should keep in mind that, while accurate RTO/RPOs are easy to attain with specific systems, they are very hard to meet when data becomes more agnostic and distributed across more systems.

Step 3: Identify a backup worksite in the event the business becomes unsafe.

Step 4: Design and publish the business continuity plan/disaster recovery plan (BCP/DRP), making sure it is accessible to everyone from anywhere.

Step 5: Make sure employees know about the plan and are familiar with it. When disaster strikes, businesses with a clearly defined plan and consistent communication can more quickly cut through the chaos and get back on track.

Step 6: Businesses should regularly put their BCP/DRP to the test to ensure it meets current and future needs, and to expose areas that can be updated for improvement. With the maturity of cloud solutions, you also have to take into account migrating and living with a more diverse private/public cloud portfolio. Ensure you have a go-to plan for the future to expand into new things like high availability, and archiving within clouds.

Disaster-Proofing Strategies & Technologies for Every Situation and Budget
First, let's get one thing out of the way: tape is not a recovery solution. With the dizzying pace of innovation, today's modern business continuity and disaster recovery solutions available in the cloud have proliferated almost beyond count. This is making it challenging for a business to hone in on the right solutions, so let's take a quick look at some solutions that can fit various needs and budgets.

Community Cloud
In the SMB market, one strategy we are increasingly seeing is "community cloud" initiatives, which allow businesses to share risk and pool resources to stretch their dollars. For instance, through a mutual agreement, two companies in the same region could house one of their servers in the other's data center. Thus, rather than having to set up, manage, and pay for a duplicate data center, the companies are each afforded off-site protection. However, in event of a regional disaster, such as a storm, each of the sites might be subject to identical threats.  Therefore, this option should be reserved for businesses with shoestring budgets, in areas that face low regional threat risk.

Cloud-Based Disaster Recovery as a Service (DRaaS)
The emergence of cloud-based DRaaS over the past few years has been a game-changer for businesses of all sizes and budgets. DRaaS solutions can enable complete recovery of data and entire production environments in minutes - not hours or days. On a predetermined basis, a company's physical and/or virtual servers send images of their environments to the cloud of a DRaaS provider. In the event of an adverse event at the company's site, such as a storm or fire, a virtualized (and fully-operational) version of the physical server can be rapidly spun-up in the DRaaS cloud. Additionally, the affordability of DRaaS is attractive as it doesn't require capital investment and even some appliance-based solutions are offered as Hardware as a Service.

Despite its abundant benefits, though, DRaaS still doesn't solve the age-old problem of "what" a business needs to protect unless it's set up manually by default. Moreover, while advances in WAN Optimization equate to more rapid transfer of data to the cloud, there are still some bandwidth issues.

Hybrid Cloud Solutions
Hybrid cloud solutions are bursting onto the market and freeing applications from the need to be tied to a physical piece of hardware. They enable applications to live both locally, as well as in a cloud environment, at the same time. These hybrid solutions mean businesses don't have to DIY for their own disaster recovery sites and can instead designate a cloud provider to provide the infrastructure

In turn, these cloud vendors can achieve efficacies of scale and performance rarely seen with individual operators. For a small number of application-centric situations, such as finance institutions, this won't be the best solution. But for almost any other business, it leaves no reason not to move disaster recovery to the cloud.

Multi-Cloud Solutions
The disaster recovery landscape continues to evolve at a breakneck pace and very soon businesses will have the ability to operate between many clouds and avoid being locked down by just one. For instance, companies can now choose solutions that enable virtual and physical loads to be recovered inside multiple cloud providers and even orchestrate cascading failovers between different providers. This freedom essentially enables businesses to place their recovery eggs in multiple baskets. In the distant future, we can logically surmise that businesses will one day be able to move between cloud providers on a whim by simply pushing a button and failing over on top of another cloud platform.

Choosing the Right Solution
Businesses can narrow their search a bit further by choosing universal products that address their basic need around recovery (failover/failback) while being as agnostic to hardware and software as possible. At the same time, they should expand their horizons and look for application-centric solutions that enable them to focus on what matters: the actual data that drives their business. Any company that maintains a business continuity plan and implements the right cloud technology to meet their needs is well on the path to saving itself from becoming another morbid statistic the next time disaster strikes.

More Stories By Fredrik Schmidt

Fredrik Schmidt serves as the Head of Product and Innovation at Accelerite where he specializes in high performance computing, virtualization, security, storage management, business continuity management, datacenter transformation practices, and the cloud.

Fredrik joined Accelerite after serving as Technical Director at Symantec where he held a superior record of delivering simultaneous large-scale, mission-critical projects on time and under budget. Prior to Symantec, he’s operated as a Senior IT/IS Director at Thompson Multimedia and CIO and Co-Founder of Kryptonite Security, an LLC company engaged in Fortune 500 company security consulting. During his career, he's worked on several Big Data initiatives, revamped “code as a service' with the State of California, and executed the first state level Cloud-based initiative in the country which laid foundation for several high profile efforts currently underway.

Fredrik has strong knowledge of all components of IT operations and industry-standard technologies as well as service delivery. His is also fluent in Swedish, Norwegian, Danish, French, German and Japanese.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation and integration; and visibility through intelligent business operations and big data.
There will be 50 billion Internet connected devices by 2020. Today, every manufacturer has a propriety protocol and an app. How do we securely integrate these "things" into our lives and businesses in a way that we can easily control and manage? Even better, how do we integrate these "things" so that they control and manage each other so our lives become more convenient or our businesses become more profitable and/or safe? We have heard that the best interface is no interface. In his session at Internet of @ThingsExpo, Chris Matthieu, Co-Founder & CTO at Octoblu, Inc., will discuss how these devices generate enough data to learn our behaviors and simplify/improve our lives. What if we could connect everything to everything? I'm not only talking about connecting things to things but also systems, cloud services, and people. Add in a little machine learning and artificial intelligence and now we have something interesting...
Last week, while in San Francisco, I used the Uber app and service four times. All four experiences were great, although one of the drivers stopped for 30 seconds and then left as I was walking up to the car. He must have realized I was a blogger. None the less, the next car was just a minute away and I suffered no pain. In this article, my colleague, Ved Sen, Global Head, Advisory Services Social, Mobile and Sensors at Cognizant shares his experiences and insights.
We are reaching the end of the beginning with WebRTC and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) irreversibly encoded. In his session at Internet of @ThingsExpo, Peter Dunkley, Technical Director at Acision, will look at how this identity problem can be solved and discuss ways to use existing web identities for real-time communication.
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT. Attendees will learn real-world benefits of WebRTC and explore future possibilities, as WebRTC and IoT intersect to improve customer service.
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at Internet of @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, will share some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder of TeleStax, an Open Source Cloud Communications company that helps the shift from legacy IN/SS7 telco networks to IP-based cloud comms. An early investor in multiple start-ups, he still finds time to code for his companies and contribute to open source projects.
The Internet of Things (IoT) promises to create new business models as significant as those that were inspired by the Internet and the smartphone 20 and 10 years ago. What business, social and practical implications will this phenomenon bring? That's the subject of "Monetizing the Internet of Things: Perspectives from the Front Lines," an e-book released today and available free of charge from Aria Systems, the leading innovator in recurring revenue management.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges.
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other machines.
All major researchers estimate there will be tens of billions devices – computers, smartphones, tablets, and sensors – connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at Internet of @ThingsExpo, Erik Lagerway, Co-founder of Hookflash, will walk through the shifting landscape of traditional telephone and voice services to the modern P2P RTC era of OTT cloud assisted services.
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehension and conference efficiency.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, will discuss single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example to explain some of these concepts including when to use different storage models.
SYS-CON Events announced today that Gridstore™, the leader in software-defined storage (SDS) purpose-built for Windows Servers and Hyper-V, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Gridstore™ is the leader in software-defined storage purpose built for virtualization that is designed to accelerate applications in virtualized environments. Using its patented Server-Side Virtual Controller™ Technology (SVCT) to eliminate the I/O blender effect and accelerate applications Gridstore delivers vmOptimized™ Storage that self-optimizes to each application or VM across both virtual and physical environments. Leveraging a grid architecture, Gridstore delivers the first end-to-end storage QoS to ensure the most important App or VM performance is never compromised. The storage grid, that uses Gridstore’s performance optimized nodes or capacity optimized nodes, starts with as few a...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace. These technological reforms have not only changed computers and smartphones, but are also changing the data processing model for all information devices. In particular, in the area known as M2M (Machine-To-Machine), there are great expectations that information with a new type of value can be produced using a variety of devices and sensors saving/sharing data via the network and through large-scale cloud-type data processing. This consortium believes that attaching a huge number of devic...
Innodisk is a service-driven provider of industrial embedded flash and DRAM storage products and technologies, with a focus on the enterprise, industrial, aerospace, and defense industries. Innodisk is dedicated to serving their customers and business partners. Quality is vitally important when it comes to industrial embedded flash and DRAM storage products. That’s why Innodisk manufactures all of their products in their own purpose-built memory production facility. In fact, they designed and built their production center to maximize manufacturing efficiency and guarantee the highest quality of our products.
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. Over the summer Gartner released its much anticipated annual Hype Cycle report and the big news is that Internet of Things has now replaced Big Data as the most hyped technology. Indeed, we're hearing more and more about this fascinating new technological paradigm. Every other IT news item seems to be about IoT and its implications on the future of digital business.
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. Download Slide Deck: ▸ Here
BSQUARE is a global leader of embedded software solutions. We enable smart connected systems at the device level and beyond that millions use every day and provide actionable data solutions for the growing Internet of Things (IoT) market. We empower our world-class customers with our products, services and solutions to achieve innovation and success. For more information, visit www.bsquare.com.
With the iCloud scandal seemingly in its past, Apple announced new iPhones, updates to iPad and MacBook as well as news on OSX Yosemite. Although consumers will have to wait to get their hands on some of that new stuff, what they can get is the latest release of iOS 8 that Apple made available for most in-market iPhones and iPads. Originally announced at WWDC (Apple’s annual developers conference) in June, iOS 8 seems to spearhead Apple’s newfound focus upon greater integration of their products into everyday tasks, cross-platform mobility and self-monitoring. Before you update your device, here is a look at some of the new features and things you may want to consider from a mobile security perspective.