Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-s2hrs Total loading time: 0 Render date: 2024-11-09T16:39:52.365Z Has data issue: false hasContentIssue false

B - Backup to Business process re-engineering

Published online by Cambridge University Press:  17 May 2010

Robert Plant
Affiliation:
University of Miami
Stephen Murrell
Affiliation:
University of Miami
Get access

Summary

Foundation concepts: Storage, Information lifecycle management, Power protection.

Definition: Secondary copies of data and applications kept to guard against catastrophic loss in the event of a system failure.

Not to be confused with:BackUPS, the trade name of a variety of uninterruptible power supply.

Overview

Hardware failures do occur. They can be made less common by using only the most reliable hardware components, employing all available power protection technologies, and regularly monitoring system performance to catch problems before they occur, but nothing can prevent unexpected failure.

When a computer system suffers a hardware failure, it will sometimes leave data stored on disks undamaged, but some failures can destroy a disk drive, and some will result in damage to files: if an application is actively modifying a data file when the computer suddenly stops working, the file can be left in an intermediate state with just half of the change made (perhaps a balance transfer had credited one account but not yet debited the other), leaving the file's state invalid.

Sadly, amongst the most common forms of hardware failures are failures of the disk system itself. Damage may range anywhere from a slight degradation in performance to a complete loss of all data and the disk itself becoming unusable.

Additionally, software problems are very likely to cause loss of data. The presence of Bugs in applications is extremely wide-spread, and, if an application is “buggy,” it could do anything from occasionally failing to update files completely to accidentally deleting everything stored on the disk.

Type
Chapter
Information
An Executive's Guide to Information Technology
Principles, Business Models, and Terminology
, pp. 24 - 45
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Cougias, D., Heiberger, E. L., and Koop, K. (eds.) (2003). The Backup Book: Disaster Recovery from Desktop to Data Center, 3rd edn. (Lecanto, FL, Schaser-Vartan Books).Google Scholar
Associated terminology: Bug, RAID, Information lifecycle management.
Lu, C. (1998). The Race for Bandwidth: Understanding Data Transmission (Redmond, WA, Microsoft Press).Google Scholar
Associated terminology: Compression, Bit, Binary, Digital.
R. Palmer (2001). The Bar Code Book: Comprehensive Guide to Reading, Printing, Specifying, and Applying Bar Code and Other Machine-Readable Symbols (Petersborough, NH, Helmers).
S. Pearce and R. Bushnell (1997). The Bar Code Implementation Guide: Using Bar Codes in Distribution (Philadelphia, PA, Tower Hill Press).
Associated terminology: RFID, Optical character recognition.
http://www.bcs.org/BCS/.
The British Computer Society, 1 Sanford Street, Swindon, Wiltshire SN1 1HJ, UK.
Associated terminology: ACM, AIS, IEEE, W3C.
Lilja, D. (2000). Measuring Computer Performance: A Practitioner's Guide (Cambridge, Cambridge University Press).CrossRefGoogle Scholar
Associated terminology: Software metrics, Efficiency.
Woodward, J., Orlands, M., and Higgins, P. (2002). Identity Assurance in the Information Age: Biometrics (New York, McGraw-Hill).Google Scholar
Associated terminology: Encryption, Security.
http://www.bluetooth.com
Morrow, R. (2002). Bluetooth: Operation and Use (New York, McGraw-Hill Professional).Google Scholar
Associated terminology: OSI seven layer-model, TCP/IP.
http://www.itu.int/.
http://www.dslforum.org/.
Associated terminology: Bandwidth, Network.
Murrell, S. and Plant, R. (1977). “A survey of tools for validation and verification 1985–1995,”Decision Support Systems, Volume 21, No. 4.Google Scholar
Associated terminology: Formal methods, Reliability, Programming language.
Wang, H. (2004). “Contingency planning: emergency preparedness for terrorist attacks,”IEEE Aerospace and Electronic Systems Magazine, Volume 19, Issue 3.Google Scholar
Associated terminology: Hosting, Backup, Information Technology Infrastructure Library.
Vitt, E., Luckevich, M., and Misner, S. (2002). Business Intelligence (Redmond, WA, Microsoft Press).Google Scholar
Associated terminology: Database, Data warehouse.
Hammer, M. (1990). “Re-engineering work: don't automate, obliterate,” Harvard Business Review, July–August.Google Scholar
Associated terminology: UML, ERP, Data-flow diagram.

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×