Fall World 2014

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 27, Issue 3

Full Contents Now Available!

DRJ Blogs

DRJ Community Blogs
Dec 14
2012

Using Desktop as a Service to Increase Business Continuity

Posted by Adnan Raja in Cloud Hosting , Business Continuity

Adnan Raja

Desktop as a Service is a relatively new concept in the cloud computing industry.  It is similar to Software as a Service, except it’s not only the software, but the entire desktop environment that is provided as a service.  In essence, the desktop is made available as a service to users, regardless of location or environment.  For example, an employee could work on a client database using his desktop computer and then later, access this same information through his laptop, tablet, or smartphone when he leaves the office.

Desktop as a Service, also known as desktop virtualization, lets users sync their data using a client-server model with all of the computing power coming from the cloud server.  The monitor, laptop, phone, or tablet is simply there to display the information resulting from the processing and to relay information to the server regarding simple control signals, such as the click of a mouse or typing on a keyboard.

Dec 10
2012

DRJ Introduces - DRJ Live Learning Center

Posted by Patti Fitzgerald in Untagged 

Patti Fitzgerald

Introducing DRJ’s Newest Educational Resource: The DRJ Live Learning Center

Dec 10
2012

Tackling a Few Cloud Computing Concerns

Posted by Adnan Raja in Cloud Hosting , Cloud Computing

Adnan Raja

By far, the biggest concerns surrounding cloud computing are issues regarding security and privacy in the cloud.  The notion of giving up total control of important, sensitive data scares people, as it is no longer “safe” behind the corporate wall.

A lot of people fear that moving their data to be stored offsite will expose it to various risks and security breaches.  However, the cloud is actually a very safe place to store and share data.  Cloud providers offer varying levels of security, but you can also “beef up” your security by various measures such as integrating your encryption key management solution with your cloud management solution.

Dec 10
2012

BCI North America 2013 Awards Will Be Back at DRJ Spring World!

Posted by Patti Fitzgerald in Untagged 

Patti Fitzgerald

The BCI North America Awards 2013 are heading back to DRJ Spring World

Dec 09
2012

FEMA Stresses Partnerships Following Sandy

Posted by Dr Tom Phelan in Untagged 

Dr Tom Phelan

Yesterday's bulletin from FEMA was for New Jersey resident victims of Hurricane Sandy to assist them in rebuilding their homes.

"TRENTON, N.J. -- Your home was damaged by Hurricane Sandy and you want to build back better. Or, maybe you have to rebuild your home completely and are looking for smart ideas to make it stronger and safer. For knowledgeable and reliable advice, look no farther than your local home improvement store.

Dec 03
2012

Using the Cloud to Ensure Business Continuity

Posted by Adnan Raja in Disaster Recovery Hosting , Cloud Hosting , Business Continuity

Adnan Raja

In today's fast-paced society, companies of all sizes need affordable ways to deliver quality IT services reliably and continuously.  One of the key benefits of cloud computing, one that is also often overlooked, is how cloud computing can help ensure business continuity, as well as speedy disaster recovery.  Cloud hosting offers a low-cost disaster recovery and business continuity solution for small to midsize businesses and a more cost-effective DR alternative to larger, cost-conscious corporations.

With the cloud as your disaster recovery solution, you can use your in-house systems to run your core business and work with a cloud hosting provider for your business continuity and disaster protection.  With cloud hosting, your data and software are replicated automatically in the cloud, creating increased redundancy.  You don't have to buy extra hardware or software to mirror your data center environment.  Instead, cloud servers can be easily partitioned to create multiple environments in the cloud, and these cloud servers can be spun up and configured in a matter of minutes.  In addition, with cloud computing and cloud storage, you only pay for the resources you use, so the cost is minimal.

Nov 30
2012

How Do Data Centers Support Private Clouds?

Posted by Adnan Raja in Private Cloud , Cloud Servers , Cloud Hosting

Adnan Raja

A private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.  Put simply, it is a layer of cloud applications running on private, dedicated hardware.  By addressing any special privacy and/or security concerns, private clouds offer all the benefits of cloud technologies to your business, along with an infrastructure dedicated entirely to your use.

If desired, private cloud services offer the ability to host applications on your company’s own infrastructure, thus providing more control for enterprises that require it.  Since many companies may have compliance or regulatory issues preventing them from jumping into public cloud, the cloud service tiers are replicated within a private cloud environment, behind the firewall, and maintained within the parameters of the host organization, allowing them to keep their existing infrastructure if desired.

Nov 26
2012

Thinking About Risk

Posted by Vicki Thomas in Untagged 

Vicki Thomas

Most organizations and companies want to mitigate risk. Limit risk by making smart business decisions that enable the company to be on the leading-edge of their niche but still not in the "risk" danger zone. A fine line indeed. 

What is interesting is that so many executives, managers, team leaders, and boards of directors often tend to overlook all facets of risk. The one type of risk that most folks are focused on is financial risk: what impact on the bottom line will the decision, new product, or switch in focus have?

Nov 15
2012

Data Can Be Just as Secure (If Not More So) in the Cloud

Posted by Adnan Raja in Untagged 

Adnan Raja

According to a survey performed earlier this year by CIO.com, 54% of all IT security professionals cite cloud computing security as their top priority.  Another 32% cite security as a middle priority for them.  However, 85% of IT professionals are confident in their cloud provider’s ability to provide a secure environment for their data. 

Security has always been a concern when sensitive data is involved and this concern is heightened when it comes to cloud services outside of the corporate wall because no longer is it under the company’s direct supervision.  It is human nature to be afraid of the unknown, but the risks of cloud computing come with a plethora of benefits as well.  For example, the cloud offers greater flexibility, scalability, and agility, allowing IT staff to complete tasks in hours rather than weeks or months.

Nov 15
2012

Applying Root Cause Analysis (RCA) to Business Continuity

Posted by Courtney Bowers in Business Continuity , Avalution Blogs

Courtney Bowers

By Stacy Gardner, Avalution Consulting
Article originally posted on Avalution Consulting’s Blog

Though many business continuity standards emphasize the importance of tracking corrective actions to address identified issues, the recently published ISO 22301 (and previously BS 25999-2) also requires conducting a root cause analysis – looking not just at an issue, but its cause and how it can be prevented in the future.   Root cause analysis (RCA) is an approach that seeks to proactively prevent reoccurrences of the same adverse event or systems failure by tracing causal relationships of a failure to its most likely impactful origin, then putting measures in place to mitigate underlying causes to ultimately help prevent recurrence of the adverse event in the future.  While common in disciplines that deal with extreme precision and protection of life (e.g. quality and environmental health and safety), there’s no reason the business continuity discipline cannot benefit from a similar approach, particularly for practitioners looking to fully implement ISO 22301.  This article explains root cause analysis and identifies how organizations can benefit from implementing the concept in a business continuity context.