Databases Reference
In-Depth Information
Purchase Mass Storage Equipment and Install it In-House
This arrangement is useful in organizations with several local area net-
works that generate sufficient amounts of data. Off-site disaster recovery is
provided by placing the storage devices in a location different than the one
that houses network hubs and servers. This solution is reasonable for large
users with large amounts of data. The basic technology employed in Sure-
find was developed initially in this type of setting.
Funnel Data through an In-House Network for Storage by a Mainframe
and Peripherals
This approach provides reliable data storage and retrieval and, often,
prompt data access. However, unless an organization has excess storage
capability in the data center housing the mainframe, using this mainframe
and its peripherals to store and retrieve microcomputer data is relatively
costly. Organizations using this approach must also put their network
administrators under the control of the their information services depart-
ments with respect to matters of scheduling and systems development.
BACKUP SYSTEM EVALUATION
When evaluating a backup system, the EUC manager should ask these
questions:
• Does the system daily and automatically back up all necessary data
that the organization produces?
• Does it maintain duplicate, verified, and separately stored data and ap-
plications that cannot be erased or destroyed by such catastrophes as
fire, theft, or computer viruses? Can the content of data files be
changed or manipulated once recorded?
• Does the backup system limit access to files to only authorized per-
sons, and does it routinely encrypt all data flowing to and from the
storage array?
• Does the backup system permit round-the-clock access to files, ac-
cording to various search criteria, and can files be restored, if neces-
sary, within minutes?
• Does the system restore files and support software, including binder-
ies, after computer equipment malfunctions, is destroyed, or becomes
inaccessible to users? Can the system return lost files and software to
the repaired equipment or send them to another authorized location?
• Can the system write all versions of all files as they are received from
each local area network so that other files and software already stored
remain separate and isolated, thus eliminating the spread of any com-
puter viruses? Does the system permit these files to be restored to
their original state before a virus occurred?
Search WWH ::




Custom Search