A Shopping List For Cloud Recovery Services

cloud recovery services

Why look at a cloud services provider for backup and recovery? Simple: it’s highly complex and very expensive to handle cloud recovery in-house. As businesses evolve and change, backup and recovery solutions have to evolve and change, too, to ensure smooth business continuity in case of disaster. Managing backup and recovery can swiftly become a full-time job that most companies aren’t prepared to fund. This is why outsourcing backup and recovery – using a service provider with deep expertise and up-to-date knowledge of these solutions – makes good business sense. Cloud providers who handle both physical and virtual networks, computing, and storage environments are an ideal choice. The … Read more

The Best IT Blogs Of The Week: 10-15-14

IT blogs

Bob Dylan said it best: “The times they are a-changin." With a new company falling victim to a breach nearly every week, combined with the advent of cloud technologies, it all leads to a ripple effect throughout the IT industry. In response, organizations are switching things up internally and with their offerings as they try to keep pace with the fast-evolving market. Let’s take a look at some of those changes in this week’s roundup! Quick News: JPMorgan, Russian Cybercriminals, and Consumers After all signs point to Russian cybercriminals for the JPMorgan hack, the folks at Bloomberg Businessweek are connecting the dots. In a recently published article they speculate that the large-scale … Read more

3 Questions That Should Drive Your Enterprise Cloud Architecture Strategy

enterprise cloud architecture

It seems like everywhere I look these days, there’s a new cloud technology solution promising to deliver all the benefits of hosting applications, data, platforms and even infrastructure in the cloud. Interest and demand for cloud-based solutions has never been higher, and the marketplace has responded with an abundance of solutions that offer every possible permutation of cloud computing architecture: public, private, hybrid, multi-tenant, single-tenant, SAAS (software as a service), PAAS (platform as a service), IAAS (infrastructure as a service)…the possibilities are seemingly endless. With all of these solutions, how can you possibly determine which enterprise cloud architecture approach … Read more

The Surprising “Weakest Link” In Disaster Recovery Success

Are your external communications threatening otherwise sound disaster recovery plans?

Your company is prepared. You have your disaster recovery (DR) plan written and available on an externally-hosted website. Your contracts are in place; your backups are verified and off-site. Your critical data is replicated to your DR provider. You have plans for all your people if the disaster impacts them and your facility. Bring on the zombie apocalypse: you are ready! Umm … maybe you’d better hope those zombies stay in their graves a little while longer. You see, when I consult with clients, I always ask a certain question … and it usually punctures their self-congratulatory bubble. Ready? Here it is: “Have you tested your external connections under disaster recovery conditi … Read more

Cybercrime Takes Center Stage This Holiday Season


The news that a major retailer had possibly compromised millions of customers’ credit card data during the holiday season was a wake-up call for cyber security. At home, we received two letters from credit card companies warning us that our accounts might have been compromised. Knowing that cybercrime puts data in danger is a scary thought for the average consumer, not to mention one of the largest retailers in the country. Cyber resilience is no small matter; today, it is a necessity. With the holiday season in full swing, millions of shoppers will purchase gifts online during the month of December. On “Cyber Monday” alone, the National Retail Federation predicted that more than 131 mil … Read more

The Art Of Holiday Conversation Avoidance

Secret #1 to avoiding awkward holiday small talk at home.

Holiday conversation is treacherous ground, isn't it? There are the people you don’t want to talk to (like Aunt Susie, whose flighty conversation takes more dips and turns than an extreme snowboarder, or Cousin Jim, who drones on and on and on and on …) and the topics you don’t want to talk about (your job, your love life, your bad habits). If you prefer computers who respond as programmed and who only speak when spoken to, the flood of talk can be overwhelming. But never fear – IT professionals are infinitely resourceful, as demonstrated in this humorous video. You’ll chuckle over four enterprising and entertaining methods of avoiding the verbal barrage! However, a warning is in orde … Read more

IT And LOB Execs Don’t Speak The Same Language When It Comes To Operational Resilience

operational resilience

Ever read the book Men are from Mars, Women are from Venus by John Gray, or the classic He Said, She Said by Deborah Tannen? Big shock: men and women don’t communicate the same way, even when they’re talking about the same things. Can you handle another shock? IT executives and line-of-business (LOB) executives don’t mean the same things when they use the same words, either. In the IDC white paper Lack of Operational Resilience Will Undermine Enterprise Competitiveness: A Strategy for Availability, David Tapper focuses on the key term “operational resilience.” He notes that, “The best definition of operational resilience is ‘an emergent property of an organization that can continue to car … Read more

IT Resilience – What Do Organizations Really Want, Anyway?


Every morning I wake up, have a few cups of coffee, and spend the rest of my work day talking to organizations about three aspects of IT Resilience – Business Continuity & Disaster Recovery, Information Security, and IT Operations. What do organizations want in this arena? Well, I can tell you what they ask for. I can tell you what I think they really need. And then I’ll speculate on what they really want. What They Ask For Most of the time, conversations go like this. We spend 10 minutes introducing each person on the call or in the room or both, 15 minutes defining their requirements, and 30 minutes ‘solutioning’ (my word for ad hoc solution design). As part of this conversation, t … Read more