Showing posts with label Backup and Recovery. Show all posts
Showing posts with label Backup and Recovery. Show all posts

December 10, 2016

{Saving Us From DC Ground Zero}

One well-placed nuclear suitcase bomb or nuclear ballistic missile strike on DC and say goodbye to virtually the entire hub of the Federal government. 

As of 2014, there are over 4.2 million federal employees (2.7M in the civilian agencies and 1.5M in the military). 

Over 500K are located in the DC, MD, VA tristate area. 

But it's not just the numbers, it's that the headquarters of all the major government agencies are located here. 

While, of course, there are backup sites, and emergency doomsday sites like Mount Weather (48 miles from DC), there is no telling how much advance notice, if any we would have, and who would escape and survive a deadly blow to our capital region. 

And it could be a radiological, chemical, biological, or nuclear (RCBN) attack that does us in...whether from Russia, China, Iran, North Korea or other diabolical enemy out there. 

The point is that by concentrating all our federal headquarters and senior leadership and key resources here we are in fact, giving the enemy an easy shot to decapitate the entire country?

While others (like Paul Kupiec in the WSJ) have questioned whether some of the federal agencies can be moved out to other needy cities and communities across the country for economic reasons (to bring jobs and investment) especially those agencies that are actively looking to build new HQS buildings already (e.g. FBI and Department of Labor), to me the far more potent question is one of national security. 

The main advantage of having the crux of the federal government in the DC area is surely one of coordination--the President wants his Cabinet near him and the Cabinet Secretaries want their senior staff near them, and so on and so on. 

So, you get this mass concentration of a who's who of the federal government in and around Washington, DC. 

But what about the advances of technology? 

Surely, through networks and telecommunications and teleworking, we can support a geographically diverse workforce and do no significant harm to our operating as one.

We're talking a very big cultural change here!

It's one thing to have nuclear missiles roaming the seas on attack submarines waiting for orders from Washington, DC and it's quite another to move the actual government intelligentsia and leadership out from the central hub. 

Let's face it, in a real crisis situation, with the chaos and panic and transportation overflow and perhaps simultaneous cyberattacks, no one is really going to be going anywhere--especially in a surprise attack. 

If Pearl Harbor (of which we just celebrated the 75th anniversary) and 9/11 teach us anything is that when the sh*t hits the fan, it hits hard and sticks solid. 

Working in the Metro DC area, selfishly, I'd like to say keep the investment, jobs, and great opportunities here.

For the good of the nation and our survival against true existential threats, we'd be much smarter to spread the federal wealth as far and wide across this great nation that we can. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

February 14, 2016

Your Computer Is All Wet

So I was at my first synagogue men's club event last week.

A guy at the door was checking people in with a laptop lent by my friend, who is the head of the men's club.

Sitting at the desk, the check-in guy had a cup of soda and at one point, it got knocked over and spilled on top of the MacAir. 

I raced over with some napkins to try and wipe it off quickly, and my friend grabbed his laptop and held it upside down to try and get the spill out.

For a while, the computer stayed on, but as I feared all the sugary stuff in the soda would do it in so it wouldn't turn on again. 

I emailed my friend a number of times during the week to find out how his laptop was doing. 

He had made an appointment with AppleCare and they said they could fix it, but he said it would cost almost as much as a new computer. 

Also, they gave him a contact somewhere else that specializes in recovering the data/contents on the computer. 

The saga with the computer isn't over, but on Shabbat my friend in synagogue said to me, "You know, you were the only one who contacted me to inquire how I was doing with the laptop."

And he gave me a warm smile that said thank you for actually giving a damn. 

I thought to myself perhaps we only have a few real friends in the world and it's not just about who gives us that old ada-boy at the fun events. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

November 10, 2013

Green Data Center Cooling

I read with great interest this week in BBC about 2 mysterious barges off the East and West coasts of the U.S.

One barge is by San Francisco and the other by Maine. 

The 4-story barges belong to Google. 

There is speculation about these being, maybe, floating data centers.  

I think that is more likely than showrooms for Google Glass.

These barges would potentially avail themselves of the ocean water for cooling the IT equipment. 

I would imagine that there could be some backup and recovery strategy here as well associated with their terrestrial data centers.

But how you protect these floating data behemoths is another story. 

A white paper by Emerson has data center energy consumption in the 25% range for cooling systems and another 12% for air movement, totaling 37%.

Other interesting new ideas for reducing energy consumption for data center cooling include submersion cooling. 

For example, Green Revolution (GR) Cooling is one of the pioneers in this area.

They turn the server rack on its back and the servers are inserted vertically into a dielectric (an electrical insulator--yes, I had to look that up) cooling mineral oil. 

In this video, the founder of GR identifies the potential cost-savings including eliminating chillers and raised floors as well as a overall 45% reduction in energy consumption, (although I am not clear how that jives with the 37% energy consumption of cooling to begin with).

Intuitively, one of the trickiest aspect to this would be the maintenance of the equipment, but there is a GR video that shows how to do this as well--and the instructions even states in good jest that the "gloves are optional."

One of my favorite aspects of submersion cooling aside from the environmental aspects and cost-savings is the very cool green tint in the server racks that looks so alien and futuristic. 

Turn down the lights and imagine you are on a ship traveling the universe, or maybe just on the Google ship not that far away. ;-)

(Source Photo: Green Revolution)
Share/Save/Bookmark

November 27, 2011

Running IT as an Ecosystem

The New York Times (27 November 2011) has an interesting article under "bright ideas" called Turn on the Server. It's Cold Outside.
The idea in the age of cloud and distributed computing, where physical location of infrastructure is besides the point, is to place (racks of) servers in people's homes to warm them from the cold.
The idea is really pretty cool and quite intuitive: Rather than use expensive HVAC systems to cool the environment where servers heat up and are housed, instead we can use the heat-generating servers to warm cold houses and save money and resources on buying and running furnaces to heat them.
While some may criticize this idea on security implications--since the servers need to be secured--I think you can easily counter that such a strategy under the right security conditions (some of which are identified in the article--encrypting the data, alarming the racks, and so on) could actually add a level of security by distributing your infrastructure thereby making it less prone to physical disruption by natural disaster or physical attack.
In fact, the whole movement towards consolidation of data centers, should be reevaluated based on such security implications. Would you rather have a primary and backup data center that can be taken out by a targeted missile or other attack for example, or more distributed data centers that can more easily recover. In fact, the move to cloud computing with data housed sort of everywhere and anywhere globally offers the possibility of just such protection and is in a sense the polar opposite of data center consolidation--two opposing tracks, currently being pursued simultaneously.
One major drawback to the idea of distributing servers and using them to heat homes--while offering cost-saings in term of HVAC, it would be very expensive in terms of maintaining those servers at all the homes they reside in.
In general, while it's not practical to house government data servers in people's homes, we can learn to run our data centers more environmentally friendly way. For example, the article mentions that Europe is using centralized "district heating" whereby more centralized data center heat is distributed by insulated pipes to neighboring homes and businesses, rather than actually locating the servers in the homes.
Of course, if you can't heat your homes with data servers, there is another option that gets you away from having to cool down all those hot servers, and that is to locate them in places with cooler year-round temperatures and using the areas natural air temperature for climate control. So if you can't bring the servers to heat the homes, you can at least house them in cold climates to be cooled naturally. Either way, there is the potential to increase our green footprint and cost-savings.
Running information technology operations with a greater view toward environmental impact and seeing IT in terms of the larger ecosystem that it operates in, necessitates a careful balancing of the mission needs for IT, security, manageability, and recovery as well as potential benefits for greater energy independence, environmental sustainability, and cost savings, and is the type of innovative bigger picture thinking that we can benefit from to break the cycle of inertia and inefficiency that too often confronts us.
(Source Photo: here)

Share/Save/Bookmark

November 15, 2009

Cloud Computing, The Next Evolution

On November 4-5 2009, I attended a good CSC Leading Edge Forum on Cloud Computing.

The kickoff by W. Brain Arthur was a highlight for me (he is the author of The Nature of Technology). He provided an excellent conceptualization of cloud and it’s place in overall technology advancement and body of world innovation. Essentially, he sees cloud in the 2000’s as the next evolution from the Internet in the 1990s. As such, the cloud is computational power in the “virtual world,” providing a host of benefits including easy access, connectivity, and cost efficiency. He sees the cloud coming out of the initial frenzy and into a industry sort-out that will result in a stable build out.

Another great speaker was David Moschelle from CSC who talked about the myriad benefits of moving to cloud such as scalability, self-service, pay as you go, agility, and ability to assemble and disassemble needed components virtually on the fly. With the cloud, we no longer have to own the computing means of production.

Of course, we also talked about the challenges, particularly security. Another speaker also spoke about the latency issues on the WAN with cloud, which currently limits some usability for transactional processing.

Over the course of the forum numerous examples of success were given including Bechtel achieving a 90% cost advantage by moving storage to the cloud. Others, such as Amazon were able to put up new web sites in 3 weeks versus 4-6 months previously. Also, Educational Testing Service as another example is using cloud bursting, since they tend to run data center at known cyclical peaks.

Others connected cloud with social computing: “the future of business is collaboration, the future of collaboration is in the cloud.”

In terms of the major types of cloud, I thought the relationship between responsibility and control was interesting. For example:

  • Software as a Service -- more “freedom” from responsibility for service, but less freedom to change service (i.e. less control)
  • Platform as a Service – (Hybrid)
  • Infrastructure as a Service – less freedom from responsibility for actual end-user services, more freedom to change service provision (i.e. more control)

In all cases, the examples demonstrated that organizations do not have a lot of leeway with SLAs with cloud providers. It’s pretty much a take it or leave it proposition. With liability to the vendor for an outage being limited to basically the cost of the service, not the cost of lost business or organizational downtime. However, it was noted that these mega-vendors providing cloud services probably have a better availability and security than it’s customers could have on their own. In other words, an outage or security breach will either way cost, and where is there a greater chance of this happening?

Sort of a good summary was this: “Leading companies are moving development/test and disaster recovery to the cloud,” but then this will reverse and companies will actually move their production in the cloud and provide mainly a back up and recovery capability in house. This is similar to how we handle energy now, were we get our electricity from the utilities, but have a back-up generator should the lights go dark.


Share/Save/Bookmark

August 23, 2009

E-memory and Meat Memory

As we move towards a “paperless society” and migrate our data to the computer and the Internet, we can find personal profiles, resumes, photos, videos, emails, documents, presentations, news items, scanned copies of diplomas and awards, contact lists, and even financial, tax, and property records.

People have so much information on the web (and their hard drive) these days that they fear one of two things happening:

  1. Their hard drive will crash and they will lose all their valuable information.
  2. Someone will steal their data and their identity (identity theft)

For each of these, people are taking various precautions to protect themselves such as backing up their data and regularly and carefully checking financial and credit reports.

Despite some risks of putting “too much information” out there, the ease of putting it there, and the convenience of having it there—readily available—is driving us to make the Internet our personal storage device.

One man is taking this to an extreme. According to Wired Magazine (September 2009), Gordon Bell is chronicling his life—warts and all—online. He is documenting his online memory project—MyLifeBits—in a book, called Total Recall.

“Since 2001, Bell has been compulsively scanning, capturing and logging each and every bit of personal data he generates in his daily life. The trove includes Web Sites he’s visited (22,173), photos taken (56,282), docs written and read (18,883), phone conversations had (2,000), photos snapped by SenseCam hanging around his neck (66,000), songs listened to (7,139) and videos taken by (2,164). To collect all this information, he uses a staggering assortment of hardware: desktop scanner, digicam, heart rate monitor, voice recorder, GPS logger, pedometer, Smartphone, e-reader.”

Mr. Bell’s thesis is that “by using e-memory as a surrogate for meat-based memory, we free our minds to engage in more creativity, learning, and innovation.”

Honestly, with all the time that Bell spends capturing and storing his memories, I don’t know how he has any time left over for anything creative or otherwise.

Some may say that Gordon Bell has sort of an obsessive-compulsive disorder (OCD)—you think? Others that he is some sort of genius that is teaching the world to be free and open to remembering—everything!

Personally, I don’t think that I want to remember “everything”. I can dimly remember some embarrassing moments in elementary school and high school that I most sure as heck want to forget. And then there are some nasty people that would be better off buried in the sands of time. Also, some painful times of challenge and loss—that while may be considered growth experiences—are not something that I really want on the tip of my memory or in a file folder on my hard drive or a record in a database.

It’s good to remember. It’s also sometimes good to forget. In my opinion, what we put online should be things that we want or need to remember or access down the road. I for one like to go online every now and then and do some data cleanup (and in fact there are now some programs that will do this automatically). What I thought was worthwhile, meaningful, or important 6 months or a year ago, may not evoke the same feelings today. Sometimes, like with purchases I made way back when, I think to myself, what was I thinking when I did that? And I quickly hit the delete key (wishing I could do the same with those dumb impulse purchases!). Most of the time, I am not sorry that I did delete something old and I am actually happy it is gone. Occasionally, when I delete something by accident, then I start to pull my hair out and run for the backup—hoping that it really worked and the files are still there.

In the end, managing the hard drive takes more work then managing one’s memories, which we have little conscious control over. Between the e-memory and the meat memory, perhaps we can have more of what we need and want to remember and can let go and delete the old and undesired one—and let bygones be bygones.
Share/Save/Bookmark

June 21, 2009

Making More Out of Less

One thing we all really like to hear about is how we can do more with less. This is especially the case when we have valuable assets that are underutilized or potentially even idle. This is “low hanging fruit” for executives to repurpose and achieve efficiencies for the organization.

In this regard, there was a nifty little article in Federal Computer Week, 15 Jun 2009, called “Double-duty COOP” about how we can take continuity of operations (COOP) failover facilities and use them for much more than just backup and business recovery purposes in the case of emergencies. 

“The time-tested approach is to support an active production facility with a back-up failover site dedicated to COOP and activated only during an emergency. Now organizations can vary that theme”—here are some examples:

Load balancing—“distribute everyday workloads between the two sites.”

Reduced downtime—“avoid scheduled outages” for maintenance, upgrades, patches and so forth.

Cost effective systems development—“one facility runs the main production environment while the other acts as the primary development and testing resource.”

Reduced risk data migration—when moving facilities, rather than physically transporting data and risk some sort of data loss, you can instead mirror the data to the COOP facility and upload the data from there once “the new site is 100 percent operational.”

It’s not that any of these ideas are so innovatively earth shattering, but rather it is their sheer simplicity and intuitiveness that I really like.

COOP is almost the perfect example of resources that can be dual purposed, since they are there “just in case.” While the COOP site must ready for the looming contingency, it can also be used prudently for assisting day-to-day operational needs.

As IT leaders, we must always look for improvements in the effectiveness and efficiency of what we do. There is no resting on our laurels. Whether we can do more with less, or more with more, either way we are going to advance the organization and keep driving it to the next level of optimization. 


Share/Save/Bookmark

January 17, 2009

Decentralization, Technology, and Anti-Terror Planning

Given that 9/11 represented an attack on geographically concentrated seats of U.S. financial and government power, is it a good enterprise architecture decision to centralize many or all government headquarters in one single geographic area?

Read about Decentralization, Technology, and Anti-Terror Planning in The Total CIO.


Share/Save/Bookmark

Decentralization, Technology, and Anti-Terror Planning

Even though there hasn’t been a successful terrorist attack against the United States since 9/11, we are all aware that terrorists continue to seek ways to harm us. Of course, we have assets deployed nationally as well as internationally to protect our interests. However, there is always more that can be done. And one thing that immediately comes to my mind is decentralization.

The concept of decentralization is very simple. Rather than concentrating all your vital assets in one place, you spread them out so that if one is destroyed, the others remain functional. The terrorists already do this by operating in dispersed “cells.” Not only that, but we know that very often one “cell” doesn’t know what the other one is doing or even who they are. All this to keep the core organization intact in case one part of it is compromised.

Both the public and private sectors understand this and often strategically decentralize and have backup and recovery plans. However, we still physically concentrate the seat of our federal government in a geographically close space. Given that 9/11 represented an attack on geographically concentrated seats of U.S. financial and government power, is it a good enterprise architecture decision to centralize many or all government headquarters in one single geographic area?

On the one hand the rationale for co-locating federal agencies is clear: The physical proximity promotes information-sharing, collaboration, productivity, a concentrated talent pool, and so on. Further, it is a signal to the world that we are a free and proud nation and will not cower before those who threaten us.

Yet on the other hand, technology has advanced to a point where physical proximity, while a nice-to-have, is no longer an imperative to efficient government. With modern telecommunications and the Internet, far more is possible today than ever before in this area. Furthermore, while we have field offices dispersed throughout the country, perhaps having some headquarters outside DC would bring us closer to the citizens we serve.

On balance, I believe that both centralization and decentralization have their merits, but that we need to more fully balance these. To do this, we should explore the potential of decentralization before automatically reverting to the former.

It seems to me that decentralization carries some urgency given the recent report “World At Risk,” by The Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism—it states that “terrorists are determined to attack us again—with weapons of mass destruction if they can. Osama bin Laden has said that obtaining these weapons is a ‘religious duty’ and is reported to have sought to perpetuate another ‘Hiroshima.’

Moreover, the report goes on to state that the commission “believes that unless the world community acts decisively and with great urgency, it is more likely than not that a weapon of mass destruction will be used in a terrorist attack somewhere in the world by the end of 2013.”

Ominously the report states “we know the threat we face. We know our margin of safety is shrinking, not growing. And we know what we must do to counter the risk.”

Enterprise architecture teaches us to carefully vet and make sound investment decisions. Where should we be investing our federal assets—centrally or decentralized and how much in each category?

Obviously, changing the status quo is not cheap and would be especially difficult in the current global economic realty. But it is still something we should carefully consider.


Share/Save/Bookmark

May 27, 2008

Backup and Recovery and Enterprise Architecture

Anyone who has lost information on their computer knows how important backing up your computer work is, and organizations spend large sums of money to back up corporate information assets.

ComputerWorld, 4 February 2008, reports that “Corporate IT Warms Up to Online Backup Services.”

It used to be everyone backed up their own data, but now things are changing with major storage vendors entering the online backup market.

Now the benefits are beginning to outweigh the costs:

  • Cost savings on specially skilled personnel and equipment for backup and storage administration function
  • Productivity gains from outsourcing the systems administration and backup
  • Unlimited corporate storage capacity

The information security officer at the University of San Francisco states: “If you asked me three or four years ago [about backup], the economics would say, ‘build it yourself.’ However, as storage vendors enter the online storage business and work to address IT concerns [such as pricing and security], ‘I can’t imagine anyone doing it themselves.’”

Gartner says “the technology is slowly becoming more attractive to large companies, thanks to move into the hosted storage business by EMC and storage and backup rivals such as IBM, Iron Mountain Inc, Symantec Corp., and Seagate Technology LLC.”

IDC predicts that sales of hosted backup storage services will reach $715 million in 2011, up from $235 million in 2007.”

Vendors are moving quickly to address the following issues:

  • Acceptable pricing
  • Security including encryption and authentication
  • Bandwidth

So are hosted backup services worth the cost?

The vice president of operations and compliance officer of Lisle Savings Bank says “I’m not going to say it cheap; it’s not. [But] we felt what are paying for is really insurance against losing data. I used to cringe when anybody deleted a file and I had to find the tape.”

The IT director of a Fort Worth, Texas law firm noted that “the move to the hosted service quickly blunted management concerns about disaster recovery in the tornado-prone area. The online option also ensures that backup tapes will not have to be stored by a vendor that could carelessly allow them to be lost or stolen…It’s the wave of the future, if it’s not already here.”

From a User-centric Enterprise Architecture perspective, we must ensure the security of business and technical assets. This includes the confidentiality, availability, integrity, and privacy of corporate information. One way to protect vital information assets is through robust information backup and recovery services.


Share/Save/Bookmark

February 8, 2008

Internet Apocalypse and Enterprise Architecture

It is the 21st century and we are a nation dependent on everything internet. We rely on the internet for communications, like email, text messaging, and even voice over IP. We also use the internet for getting news and information, social networking, storing and sharing blogs, videos, music, and photos, accessing various applications, shopping, and conducting financial transactions.

What happens if the internet is attacked or otherwise fails us?

This is the question asked in ComputerWorld, 21 January 2008: “If the internet goes down will you be ready?”

ComputerWorld states: “It’s likely that the internet will soon experience a catastrophic failure, a multiday outage that will cost the U.S. economy billions of dollars. Or maybe it isn’t likely. In any case, companies are not prepared for such a possibility.”

The Business Roundtable says: “The threat is ‘urgent and real.’ There is a 10% to 20% chance of a ‘breakdown of the critical information infrastructure’ in the next 1o years brought on by ‘malicious code, coding error, natural disaster, [or] attacks by terrorists and other adversaries.’”

What will be the effect of a major internet interruption?

An internet meltdown would result in reduced productivity and profits, falling stock prices, erosion of consumer spending, and potentially a liquidity crisis.” It would disrupt our everyday ability to communicate, get and share information, work and conduct transactions. And let’s not forget the effect on the human psyche—there would be chaos.

Why have we not prepared ourselves adequately?

The Business Roundtable says that “business executives often fail to realize how dependent they have become on the public network—for email, collaboration, e-commerce, public-facing and internal Web sites, and information retrieval by employees.”

Where are we most vulnerable?

The Internet Corporation for Assigned Names and Numbers (ICANN) says that “the Internet is pretty robust at the physical layer. There are just too many alternate paths available. But the Internet is not so robust at other layers.” Hence, the risk of operating system failures, penetration by worms, and denial of service attacks.

Is there any reason for optimism?

The CIO of Yuma County, Arizona, reminds us that the Internet “having been based on the Arpanet [from DoD] and designed to keep functioning when pieces are broken, it seems less likely that the entire Internet would stop working.”

What can enterprises do to prepare for the worst?

Of course, all organizations need to fully address security concerns in terms of managerial, operational, and technical controls.

They need the best and brightest security personnel.

Additionally, they need to perform regular risk assessments, vulnerability testing, intrusion detection and prevention, back-up and recovery.

They need to have strict access controls, security awareness training of employees and contractors, and an IT security policy.

Our organizations need a comittment to continuity of operations planning (COOP).

ComputerWorld points out that the financial services sector is out in front in making preparations Here’s some of the architectural preparations that financial companies have undertaken:

  • Dedicated networks—“set up dedicated networks independent of phone companies.”
  • Guaranteed diverse routing—“negotiate more aggressively with communications companies to guarantee diverse routing.”
  • Geographic dispersal—“separate data centers and communications centers more widely geographically.”

In general, enterprises need “diversity and redundancy” of communications.

Most importantly, we need to recognize the risks out there and prepare, prepare, prepare.


Share/Save/Bookmark