Jenny Chen, Senior Certified Expert IT Consultant for IBM, discusses her experience at the 2015 Continuity Insights Management Conference, including her takeaways about the state of cyber security and the good, bad and ugly ways in which BC pros deal with it.
Joe Starzyk, Senior Business Development Executive for IBM Resiliency Services, discusses the...
Michael Puldy, Service and Solution Executive for IBM Resiliency Services North America,...
The presenters will discuss the many “oops and gotchas” of Disaster Recovery, along with several...
Starbucks was back in business after a computer outage forced thousands of its stores to close early last week. The glitch affected registers at 7,400 company-operated stores in the U.S. and 1,000 in Canada, and prompted some stores to give away drinks.
Managing critical equipment and avoiding unplanned down time is key for any organization to remain profitable and conduct business effectively. Some larger companies, like GE, are turning to data based solutions to help keep their own infrastructure, as well as that of their customers, running smoothly.
Cloud computing is an increasingly important IT option for organizations of all sizes. There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture
Chinese access to Google Inc.'s email service has been blocked amid government efforts to limit or possibly ban access to the U.S. company's services, which are popular among Chinese who seek to avoid government monitoring. Data from Google's Transparency Report show online traffic from China to Gmail fell precipitously on Friday and dropped to nearly zero on Saturday, although there was a tiny pickup on Monday.
South Korea's monopoly nuclear power company said it began drills against possible cyberattacks after online threats of attack against its plants. State-owned Korea Hydro & Nuclear Power Co. said the two-day drills are meant to prepare workers in the event of hacking attacks aimed at disabling the plants' controlling systems.
Sony's online PlayStation store was inaccessible to users for part of Monday in the latest possible cyberattack on the electronics and entertainment company. Sony Computer Entertainment in Tokyo said Monday the problem lasted two hours but has been fixed globally. It said the cause is under investigation, but there is no sign of any material being stolen.
Hybrid clouds are making it possible for enterprises to take advantage of the mobility and convenience of managing some resources via the public cloud without sacrificing the security of managing critical applications and sensitive data within an on-premise private cloud. If you’re considering joining the ranks of hybrid cloud adopters, take the time to ask yourself some key questions to decide if hybrid cloud is right for you.
Continuity Insights and Dell hosted their webinar, “Dealing with Disasters at Dell,” which discussed lessons learned and disaster recovery at the computer company, on Thursday, Oct. 30. The free webinar is available here for those who were unable to attend.
Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization. This is part two ina a two part series on DDoS attacks.
Dell and Continuity Insights' webinar "Dealing With Disasters at Dell: Lessons Learned and Solutions Found," will take place Thursday, Oct. 30. The webinar was originally scheduled for Tuesday, Oct. 28. Those interested in signing up for the free webinar may do so here.
Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization. This is part one of a two part series on DDoS attacks.
Compuware Corp. today announced the results of a global survey measuring the financial impact on businesses when technology fails. The results quantify the significant long- and short-term costs to businesses when an IT failure occurs and identify secondary costs in productivity, production waste, customer satisfaction and more.
Cybercrime is on the rise, but will grow even faster if organizations ignore an emerging group of cybersecurity game changers: always-on connectivity, an increasingly IT-centric society, and a new class system that separates people by technology skills. ISACA’s latest guide examines the impact of these game changers and how to manage and transform security.
In this video, J P Morgenthal from EMC Consulting explains how much of the risk concerns for cloud computing have focused on operational risk — the risk of an outage or security breach — while little thought has been given to the organizational risks, how cloud computing changes IT roles, skills and career paths.
iTERA Availability 6.1 provides businesses with the ability to virtually eliminate both planned and unplanned downtime by maintaining a secondary system that is kept up to date in real time. The updated version of iTERA Availability delivers enterprise-level audit technology and simplified installation for both small and mid-size markets.
Ipanema Technologies, the leading provider of Application Performance Guarantee solutions for business efficiency, today launched a powerful partnership with Polycom, Inc. This partnership will enable companies to have full visibility and control of their business critical applications over their networks.
Netflix service has been fully restored after a Christmas Eve outage denied many the opportunity to stream video on TVs, tablets and PCs. The company, which is based in Los Gatos, California, blames problems with Amazon Web Services, and says it is investigating further.
The social networking site with over 1 billion users worldwide says on Monday it made a change to its domain name system setup. The change resulted in some users temporarily not being able to reach the site. The problem was detected and the site is now fully back.
Pravail APS protects enterprises that rely on Internet availability, securing business continuity and availability by automatically neutralizing application-layer DDoS attacks before they impact critical services. Arbor's Peakflow SP Threat Management System provides up to 40Gbps mitigation capacity.
A computer outage at United Airlines delayed thousands of travelers on Thursday and embarrassed the airline at a time when it's trying to win back customers after glitches earlier this year. The two-hour outage held up a total of 636 of the 5,679 United flights scheduled for Thursday, the airline said.
Flooded data centers in downtown Manhattan brought down Gawker, Huffington Post and many popular New York-based blogs Tuesday while phone and cable companies were scrambling to assess damage and restore service in the aftermath of Hurricane Sandy.
Google's infrastructure czar gives a rare tour of the company's highly secure data center in North Carolina. With 55,200 servers the facility consumes huge amounts of energy, prompting a shift to a more efficient water-based cooling system and a dramatic increase in the server floor temperature from 68°F to 80°F.
The problems started shortly before 8 a.m. Monday when computers the airline uses to check in passengers went down, forcing employees to board travelers manually — in some instances sticking handwritten flight numbers to computer monitors. The problem was caused by a combination of two cut cables in Sprint's fiber-optic network.
This highly available approach has two redundant paths (2N) from the utility power to the server rack and a collection of interconnected bus network topologies that provide dynamic access to a pool of generators, uninterruptible power supplies (UPSs), and batteries.
Continuity Insights speaks with Walt Thomasson, Managing Director at Rentsys Recovery Services, about how business continuity professionals can streamline their organizations’ disaster recovery solutions, mobile recovery trends, the importance of testing, and recovering multiple locations.
- Page 1