Recovery from the earthquake Takashi Sasaki. Disaster recovery “Disaster” comes from human error or hardware failure was considered before We were preparing.

Slides:



Advertisements
Similar presentations
Practical Preparations Planning for Safety and Emergencies.
Advertisements

Intermediate 2 Computing
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
TELECOMMUNICATION AT THE TIME OF DISASTER HIROAKI TAKEICHI Executive Vice President Communications and Information network Association of Japan (CIAJ)
Information Technology Disaster Recovery Awareness Program.
Presented at the 2006 CLEAR Annual Conference September Alexandria, Virginia Disaster Preparedness II: Planning for the Future By Deidre Gish-Panjada.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Disaster Recovery Plan By Chanrithy Pol ESA Regional Information System Analyst ITIL Certified / Certified Microsoft Solution Expert Share Point / Infrastructure.
P3, M2,M3,M4.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Preparing for Power Outages Like any other part of the infrastructure, electrical power to the campus can fail, either as an isolated incident (e.g., tripped.
DATA CENTER OUTAGE BRIEFING JANUARY 10–11, 2014 INFORMATION AND EDUCATIONAL TECHNOLOGY.
#PACnet15 “A Really, Really Bad Day”. #PACnet15 Presenters  Steve Geib » Paciolan  Jacquelyn Holowaty » Global Spectrum.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Accelerate Your Business RP IaaS (Infrastructure as a Service) IaaS.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Data Lost. What’s the cost? How to get your data back: Disaster Planning and Recovery Prevent losing data in the first place : Data Protection Go Virtual.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Disaster Recovery Plan: Do you have one? Neal Cross, Assistant Director of Instructional Technology Shelly Brown, Director of Web Services Southwest Baptist.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Backing up data By Alicia stewart.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
2008© COPYRIGHT 1 1 ATHN DATA SUMMIT DISASTER PREPAREDNESS JULY 31, 2008 PANEL MEMBER - JOY MAHURIN COMPREHENSIVE BLEEDING DISORDERS CENTER CONTINUITY.
Protecting ICT Systems
For more notes and topics visit:
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
SACRAO ON 911: H OW D O Y OU H ANDLE AN E MERGENCY Disaster Planning Janet L Davis.
WiFi Haiku Missing Apps Google Docs Missing Equipment Broken iPad Printer Issue.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
What is Ubiquity™? ubiquity (noun): the state of being, or seeming to be, everywhere at once Ubiquity™ is a powerful building management system that.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
PPD Computing “Business Continuity” David Kelsey 3 May 2012.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
By Nick Paige.  Identify problems that can occur if hardware is not properly maintained  Identify routine maintenance that can be performed by users.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Plan for the Best, Prepare for the Worst Thank you for attending.
The Ultimate Backup Solution.
Lesson learned after our recent cooling problem Michele Onofri, Stefano Zani, Andrea Chierici HEPiX Spring 2014.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Install, configure and test ICT Networks
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Cloud Computing Shannon McManus Michael Weihert. What is Cloud Computing?
High Availability Environments cs5493/7493. High Availability Requirements Achieving high availability Redundancy of systems Maintenance Backup & Restore.
Physical Security Concerns for LAN Management By: Derek McQuillen.
ICT Disaster Recovery Plan Monitoring & Audit Committee 23 rd November 2010.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Cloud system.
Design Unit 26 Design a small or home office network
Business Contingency Planning
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Presentation transcript:

Recovery from the earthquake Takashi Sasaki

Disaster recovery “Disaster” comes from human error or hardware failure was considered before We were preparing for such “disasters” – Regular disk backup – System design with high availability – UPS How we could prepare for the big natural disaster?

What happened on 3.11 The scale of the earthquake at Tsukuba was 6- in Japanese scale(0,1,2,3,4,5-,5+,6-,6+,7-,and 7+) at 2:46P.M. on March 11 th, 2011 JST The electric power facility of KEK was damaged and no power was supplied until March 13 – Sudden power cut-off was happened – In city center, only a few minutes interruption of electricity happened All of the employee except some staffs are ordered to stay at home and stand by

KEK

Electric power supplies On March 13rd, electric power supply recovered partly – Only 2MW(727KVA) for all of KEK – 275KW(100KVA) for Computing Research Center From March 22 nd, gradually the breakers were turned on at building by building From March 28 th, all of the employee are ordered to come back to the normal business Because of the nuclear plant accident, usage of electricity was restricted until the end of September – We are expecting to increase the costs of electric power from the next Apri – All of the nuclear plan in Japan had been shut down

Damages on computer systems Super computer – No damage because the system had been shutdown for the system replacement Belle Computing system – Many disks were broken Central computer – GPFS MDS had inconsistency because of sudden power outage and some files were lost – No hardware damage Networking – No hardware trouble

Central computer The racks were not bolted on the floor – Each racks equips skirts to prevent

Telecommunication Infrastructures were not damaged Phones were not useful – Because of congestion Internet works w/o problems – Everybody accessed the information from web sites using their mobile/smart phones s worked fine also

Recovery of services Efforts to recover services begun on March 14 th – The first priority was communication services Internet web – Temporally, with minimum configuration

A natural disaster strikes when people lose their memory of the previous one.

How we prepare for the next one? Off-site backup is important Stand-by servers on a cloud service Web service is rather easier – Always we may hold the link to the stand-by server on the top page Search engines like google will guide the people Mail service – Out sourcing ? Everywhere in Japan have a chance for a big earthquake Mail contents are too sensitive to store off-site

Discussion How we over come the security issues? – Offsite backup should be encrypted Off site backup – We want to backup the VM and disk images outside of KEK for major services