THE WHATIS.COM WORD-OF-THE-DAY   
September 14, 2001

disaster recovery plan 
______________
TODAY'S SPONSOR: **STORAGE DECISIONS**

Storage Decisions brings together top storage analysts like Gartner's
VP Nick Allen and Steve Duplessie of ESG and expert technologists
like best-selling author Jon William Toigo. This exclusive conference
is FREE to members who qualify. Apply today.
http://ad.doubleclick.net/clk;3177364;5058249;p?http://www.StorageDecisions2001.com 
_____________   
TODAY'S WORD: disaster recovery plan 

See our definition with hyperlinks at
http://searchsystemsmanagement.techtarget.com/sDefinition/0,,sid20_gci752089,00.html

A disaster recovery plan (DRP) - sometimes referred to as a business
continuity plan (BCP) or business process contingency plan (BPCP) -
describes how an organization is to deal with potential disasters.
Just as a disaster is an event that makes the continuation of normal
functions impossible, a disaster recovery plan consists of the
precautions taken so that the effects of a disaster will be
minimized, and the organization will be able to either maintain or
quickly resume mission-critical functions. Typically, disaster
recovery planning involves an analysis of business processes and
continuity needs; it may also include a significant focus on disaster
prevention. 

Disaster recovery is becoming an increasingly important aspect of
enterprise computing. As devices, systems, and networks become ever
more complex, there are simply more things that can go wrong. As a
consequence, recovery plans have also become more complex. According
to Jon William Toigo (the author of Disaster Recovery Planning),
fifteen years ago a disaster recovery plan might consist of powering
down a mainframe and other computers in advance of a threat (such as
a fire, for example, or the sprinkler system), disassembling
components, and subsequently drying circuit boards in the parking lot
with a hair dryer. Current enterprise systems tend to be too
complicated for such simple and hands-on approaches, however, and
interruption of service or loss of data can have serious financial
impact, whether directly or through loss of customer confidence. 

Appropriate plans vary a great from one enterprise to another,
depending on variables such as the type of business, the processes
involved, and the level of security needed. Disaster recovery
planning may be developed within an organization or purchased as a
software application or a service. It is not unusual for an
enterprise to spend 25% of its information technology budget on
disaster recovery. 
___________________   
SELECTED LINKS  

[1] In the wake of the World Trade Center tragedy, Edward Hurley's
story, "US has much to learn about disaster recovery," mentions how
companies in Israel and the UK have prepared for the worst. 
http://www.searchebusiness.com/originalContent/0,289142,sid19_gci769568,00.html

[2] SearchStorage.com provides a list of best Web links to
information about disaster recovery. 
http://searchstorage.techtarget.com/bestWebLinks/0,289521,sid5_tax3f9,00.html

[3] The Disaster Recovery Journal has a Web site. 
http://www.drj.com/

[4] John William Toigo maintains a site about disaster recovery
planning. 
http://www.drplanning.org/

_________________________
KNOW-IT-ALL QUESTION 

Just for fun, answer today's question and see how much you really
know!

This is a collection of small programs, any of which can be called
when needed by a larger program that is running in the computer. 
a. digizine 
b. legacy application 
c. crosstalk 
d. servlet 
e. dynamic link library 

See correct answer: 
http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci769843,00.html

_________________________
TECHTARGET SKILL-BUILDER

Cisco Starter Kit

This four course training kit will provide you with the basics of
Cisco networking.  Learn about the most current networking
technologies, the fundamentals of IP routing, Cisco router
configuration, and TCP/IP addressing. 

http://whatis.gofcs.com/products/by_category/LIBS/WTL003/index.html

_________________________   
RECENT ADDITIONS  

[1] vi 
http://searchsolaris.techtarget.com/sDefinition/0,,sid12_gci768734,00.html 

[2] transparent computing 
http://whatis.techtarget.com/definition/0,,sid9_gci765426,00.html 

[3] transparent 
http://whatis.techtarget.com/definition/0,,sid9_gci765434,00.html 

[4] alphanumeric 
http://whatis.techtarget.com/definition/0,,sid9_gci763592,00.html 

[5] magnetic field strength 
http://whatis.techtarget.com/definition/0,,sid9_gci763586,00.html 

======================================================== 
If you would like to sponsor this or any techtarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]
========================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://WhatIs.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to