Information Technology Reference
In-Depth Information
Storage Where local resources may be maintained on limited
hardware, centralized storage can make use of more efficient and
fault-tolerant RAID (redundant array of independent disks) storage
solutions capable of automatic de-duplication, single-instance stor-
age, and a wide range of other storage management options that can
allow existing storage to enjoy an extended lifetime before needing
replacement or expansion.
Load —High-demand user interfaces and SOA module connectivity
can create high levels of demand on user-facing systems. By mirror-
ing information and service available across multiple systems, user
experience can be maintained even during periods of peak use.
Network Backup network connectivity and caching servers can
reduce the load on centralized services when accessed from remote
locations. Authentication services, name resolution, and even file
and Web caching can all improve user access while reducing the
load on the central network and data center systems.
Site A backup data center may be considered mission-critical for
some organizations. When widespread disaster or extended power
outages isolate an organization's data center, a backup site outside
the affected area can take over operations and provide a means for
communication and organization during recovery efforts.
Automation
Automated solutions for deployment, backup, update, and patch control
should be implemented whenever possible. These solutions act as a force
multiplier for the available IT support staff, alleviating repetitive and
cumbersome chores and allowing attention to be directed to less easily
addressed issues. Standardization is absolutely vital here, to reduce com-
plexity in system configuration across the enterprise and make automated
management possible. When consolidating services into a single environ-
ment, automation strategies can reduce human administrative require-
ments significantly and free up resources for additional projects.
Automating Updates
Thousands of new viruses are released each year, requiring almost hourly
updates to defensive applications protecting key data stores, e-mail gateways,
Search WWH ::




Custom Search