In-depth

Real disaster recovery

IT Pro Guide: Steve Cassidy takes a pragmatic look at DR and asks: Is your plan ready to take on a real-life catastrophe?

The traditional model for the disaster recovery business is beginning to look a bit like a cosy piece of childhood animated television. Have you nipped in to the office to find a smoking ruin, attended by Pew, Pew, Barney, McGrew and co? Have no fear, jump in your square-wheeled plasticene Morris Minor and wobble off to your out-of-town Disaster Recovery centre, where cheery factotums will whip the covers off your ready-to-roll duplicated network, and everyone can pop along and pick up where they left off...

Advertisement - Article continues below

Except that this business model for the DR services sector is being rapidly outmoded by three factors: bitter experience, the stealthy arrival of Thin Client Computing, and a discomfiting spread in the types of disaster we might reasonably be facing.

The technical stuff is easiest to contemplate; possibly Bill Gates' most useful thought is the observation that technology's impact is overestimated in the short term, and underestimated in the longer term - and thin client computing is definitely a case in point.

Very large corporates are increasingly using Terminal Services, Citrix, or the other alternatives to keep their Desktop PCs rolling along for minimal costs and putting all their horsepower into computing centres which can be anywhere with a big enough pipeline leading to it.

Advertisement
Advertisement - Article continues below

Reaching those computing centres from a high-profile city-centre target building is no harder or easier than doing it from a web-caf, a spare university campus Computer Science lecture theatre, or (in one case I saw recently) from the sun-deck of a liner in the middle of the South China Sea. Why bother with a contract for expensive duplicated set of servers and workstations when in fact your whole environment is sitting in a few racks in a sleepy town off the M42, and can be run from a pile of MacMinis anywhere in the first world?

Advertisement - Article continues below

One answer to this came to a client of mine last year, when their giant distributed computing centre turned out to be within a couple of miles of the bomb factory of the 7/7 London bombers. Nobody's perfect.

Heads in the sand

The non-technical issues are rather harder to feel like you should be planning for, sitting peacefully in an IT department office. Bitter experience is easy to encounter, but quite difficult to turn into a usable plan. Like every other Londoner I have my tales of struggling to go anywhere or do anything on July 7, 2005 - but when I translate that into the complete impossibility of actually reaching a disaster recovery site, or indeed of even reaching the people who needed to be sent to the disaster site to get them moving, I am often ignored.

It's as if the traditional "one fire" disaster recovery model is enshrined in the procedural bibles of corporates and smaller businesses across the land, and nothing can shake it loose; having a disaster which takes away the ability to travel for a couple of days is just too bizarre to contemplate - let's just think about the old and comfortable disasters, and not the stuff that's really happening.

Advertisement - Article continues below

If a few days of travel chaos and half-day of cell phone lockdown give you the willies and make you want to hide the DR procedures file, have a look at some of the material on planning for Bird Flu. How's about six weeks of complete blanket travel ban? No deliveries, no meetings, no nipping back in late at night to reboot anything, and major companies planning how to shuffle the organogram in response to losing 20 per cent of their staff - not to the hottest competitor but to the grim reaper instead.

Planning for this Disaster isn't about taking a wobbly guess on the reload quality of your tape restores at a disaster recovery specialist site, it's about being confident that your systems can run for six weeks without a break, and that your site is proof against looters not traditional fare for disaster recovery meetings (or documentation, for that matter).

Advertisement - Article continues below

Every eventuality

Then there's the nightmare stuff. Nuclear weapons, "dirty bombs", bio-weapons - anything that could cause a large chunk of an entire economy to fall right over. It seems a fair bet that old school disaster recovery suite providers, who take on their books large numbers of clients each on the "small fire" model, are going to be swamped when the dark day dawns.

Those small guys with an old server in the back of the wood-shed and a stack of DVDs under the stairs could well get the chance to jump ahead, while the bigger and less flexibly-planned operations wave useless contracts and stand in a queue with no sensible prospect of resolution.

Seems to me that the mistake of not preparing for the widest variety of disasters could well be represent a new category itself.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement
Advertisement

Recommended

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020
Visit/security/hacking/355382/whatsapps-flaw-shoulder-surfing
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020
Visit/security/cyber-security/355368/microsoft-builds-ai-to-detect-security-flaws-with-99-accuracy
cyber security

Microsoft AI can detect security flaws with 99% accuracy

20 Apr 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/infrastructure/server-storage/355785/dell-emc-poweredge-r7525-review-an-epyc-core-density-to-make
Server & storage

Dell EMC PowerEdge R7525 review: An EPYC core density to make Intel weep

26 May 2020
Visit/infrastructure/network-internet/355792/intel-releases-wi-fi-and-bluetooth-driver-updates-for
Network & Internet

Intel releases Wi-Fi and Bluetooth driver updates for Windows 10

26 May 2020