Disaster Recovery and Corporate Survival Strategies FT Prentice Hall FINANCIAL TIMES

Total Page:16

File Type:pdf, Size:1020Kb

Disaster Recovery and Corporate Survival Strategies FT Prentice Hall FINANCIAL TIMES Disaster Recovery and Corporate Survival Strategies FT Prentice Hall FINANCIAL TIMES In an increasingly competitive world, we believe it’s quality of thinking that will give you the edge – an idea that opens new doors, a technique that solves a problem, or an insight that simply makes sense of it all. The more you know, the smarter and faster you can go. That’s why we work with the best minds in business and finance to bring cutting-edge thinking and best learning practice to a global market. Under a range of leading imprints, including Financial Times Prentice Hall, we create world-class print publications and electronic products bringing our readers knowledge, skills and understanding which can be applied whether studying or at work. To find out more about our business publications, or tell us about the books you’d like to find, you can visit us at www.business-minds.com For other Pearson Education publications, visit www.pearsoned-ema.com Disaster Recovery and Corporate Survival Strategies Pre-emptive procedures and countermeasures LOUISE BROBY FT Prentice Hall FINANCIAL TIMES An imprint of Pearson Education London ■ New York ■ Toronto ■ Sydney ■ Tokyo ■ Singapore ■ Hong Kong ■ Cape Town New Delhi ■ Madrid ■ Paris ■ Amsterdam ■ Munich ■ Milan ■ Stockholm PEARSON EDUCATION LIMITED Head Office: Edinburgh Gate Harlow CM20 2JE Tel: +44 (0)1279 623623 Fax: +44 (0)1279 431059 London Office: 128 Long Acre London WC2E 9AN Tel: +44 (0)20 7447 2000 Fax: +44 (0)20 7447 2170 Website: www.briefingzone.com First published in Great Britain in 2002 © Pearson Education Limited 2002 The right of Louise Broby to be identified as author of this work has been asserted by her in accordance with the Copyright, Designs and Patents Act 1988. ISBN 0 273 66162 0 British Library Cataloguing in Publication Data A CIP catalogue record for this book can be obtained from the British Library. All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without either the prior written permission of the Publishers or a licence permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1P 0LP. This book may not be lent, resold, hired out or otherwise disposed of by way of trade in any form of binding or cover other than that in which it is published, without the prior consent of the Publishers. 10 987654321 Typeset by Monolith – www.monolith.uk.com Printed and bound in Great Britain by Ashford Colour Press Ltd, Gosport, Hants. The Publishers’ policy is to use paper manufactured from sustainable forests. About the author Louise Broby is a financial writer who has writen extensively on a wide range of topics. Her publications include Investment Regulation in Europe, Global Stock Markets, Pan-European Financial Regulations and Stock Market Globalisation. She has worked in investment banking and as a business school academic. Louise may be contacted at: Stratos Multimedia LLC 6th Floor 175 Piccadilly London W1J 9TB Tel: 07802 882 554 E-mail: [email protected] v Contents List of figures xi List of tables xii Executive summary xiii Acknowledgements xvi Introduction xvii 1 Backup and storage: potential disasters 1 Introduction 3 Terrorist attacks – single and multiple strikes 3 Natural disasters 4 Power failure 7 Lightning 10 Attacks caused by human intervention 11 Vulnerability to malicious attacks 12 Systems failures, disruptions 13 Effects of disasters 14 First line of disaster recovery 15 Conclusion 15 2 Corporate state of readiness 17 Introduction 19 Recent survey 19 How to cope with economic fluctuations 22 McKinsey findings 22 Data availability 23 Factors affecting corporate state of readiness 23 Precautionary steps 23 Mobile phones prove their worth 24 Conclusion 25 3 Information security 27 Introduction 29 DTI surveys 29 Protective measures 34 vii Contents General control procedures 35 Conclusion 37 4 Corporate disaster recovery/business continuity plans 39 Introduction 41 Definitions 41 Factors affecting the administration of plans 42 Terrorist attacks – should they be given priority? 43 Global business continuity 44 The BCM process 44 Insurance against disasters 46 Frequency of risks 46 Review of the business continuity plan 48 The disaster recovery plan 48 BAM (business activity monitoring) 50 Conclusion 50 5 Data backup and storage solutions 53 Introduction 55 Tape backup and restoration of data 55 Advantages of tape backup 55 Tape formats 56 Backup products: service and maintenance 57 New backup technologies 58 Retrieval – primary and secondary storage 60 Backup architectures 62 Types of network 64 SAN management software 65 Benefits of fibre channel storage networking 65 Environments 67 The fibre channel market 67 Interoperability standards 67 Wireless LANs 68 Conclusion 68 6 Spreading of risk: remote backup and storage facilities 69 Introduction 71 viii Contents The command centre 71 The recovery centre 71 Colocation facilities 72 Duplicate facilities 72 Emergency facilities 73 Colocation providers 74 Online backup: Netstore 76 Advanced security centres: Ernst & Young 76 Business continuity datacentres: IBM/Telefonica 77 The role of broadband 77 Conclusion 78 7 Outsourcing/insourcing/ASP/MSP/SSP/WASP 79 Introduction 81 Trends in outsourcing 81 Major drivers of outsourcing 83 Insourcing 85 Insourcing or outsourcing? 85 Application service providers (ASPs) 86 Managed service providers (MSPs) 87 Storage service providers (SSPs) 87 Wireless application service providers (WASPs) 87 Choice of provider 88 Managed services – survey findings 88 Conclusion 89 8 Backup and storage costs/disaster costs 91 Introduction 93 Backup and storage costs 93 ROI and TCO models 94 Cost of downtime 96 Cost of security incidents 97 Under-investment in IT security by UK companies 98 The role of business impact analysis 98 Costs associated with major disasters 99 Cost estimate surveys 101 Insurance 101 Conclusion 102 ix Contents 9 Backup and restoration in financial services 103 Introduction 105 Pioneers 105 Competitive advantage 105 Exposure of banks 106 Watchdogs 106 Compliance 107 Misuse of financial systems 109 Vulnerability 110 Technology leaders 111 Dealer room recovery service 111 Conclusion 112 10 The backup and storage industry players and their products/services 113 Introduction 115 Industry trends – vendor alliances 115 September 11 – vendor assistance 115 Major players 116 Industry associations 125 Conclusion 126 11 Summary of conclusions 127 Chapter 1 129 Chapter 2 129 Chapter 3 129 Chapter 4 129 Chapter 5 130 Chapter 6 130 Chapter 7 130 Chapter 8 131 Chapter 9 131 Chapter 10 131 Overall conclusion 132 Glossary 133 x Figures 1.1 Transient surge with 10 microsecond rise time 8 1.2 Transient surge generation 10 2.1 Response to the question: When did you last review your organization’s disaster recovery plan? 20 2.2 Sector variation in companies’ reviews of disaster recovery plans 21 3.1 What proportion of UK businesses have suffered security incidents (arising from premeditated or malicious intent) in the last year? 29 3.2 What proportion of UK businesses have suffered a serious security incident in the last year? 30 3.3 What proportion of UK businesses have suffered security incidents in the last 12 months? 30 3.4 What proportion of UK businesses have incident response procedures in place? 31 3.5 Which of the following objectives are very important to UK businesses in the event of a security incident? 32 3.6 After the security breach, what changes were made to prevent future incidents? 32 4.1 BCM – an ongoing process 45 4.2 Risks measuring/probability 47 5.1 Secondary storage migration 61 5.2 Local backup 63 5.3 SAN example 63 5.4 Traditional storage vs fibre channel-enabled SAN 64 5.5 Storage area network 66 7.1 Which of the following significant systems or security processes are outsourced? 81 7.2 Which UK businesses are outsourcing security policies and standards development? 82 8.1 Storage growth industry estimates 94 xi Tables 1.1 Main causes of IT data loss in the US 3 3.1 The percentage of companies using technology 33 4.1 The different areas of crisis in the BCM process 46 8.1 Total cost of ownership model 95 8.2 Return on investment model 95 8.3 Impact to businesses of computer downtime and data loss in the US 97 8.4 Estimates of the insured loss (all lines of business) from the terrorist attacks of September 11 100 8.5 Most costly insurance losses in 2001 in property and business interruption 100 xii Executive summary The focus on disaster recovery and corporate survival strategy has heightened in recent months, following September 11 as well as deepening recessionary trends. Mission-critical data are the life-blood of many organizations, especially in the financial sector, and transport and communications. The ‘it never happens to us’ attitude has been badly shaken by the wide impact of the World Trade Centre attacks, with a roster of finance companies reading like a ‘who’s who’ in finance, all affected, some seriously with loss of life, IT systems and offices. Companies are now revising their disaster recovery and business continuity plans and examining whether new hardware and software solutions, a repositioning of remote backup facilities or the creating of replicate facilities are the answer. This Executive Briefing sets out to examine the state of the disaster recovery and backup market in the UK and the US, and the solutions that are being recommended by software vendors and implemented by industry. CHAPTER CONTENT ■ In Chapter 1, an overview is given of the potential disasters that can cause damage to equipment and backup data. With the fading of the impact of the bombings in the City of London in the 1990s, terrorist attacks were on the backburner for a while, but with the devastating attacks on the World Trade Centre, terrorism is right back on the agenda for backup strategies and disaster recovery plans.
Recommended publications
  • Implementing IBM Tape in UNIX Systems
    Front cover Implementing IBM Tape in UNIX Systems How to set up tape drives and libraries in multiple UNIX environments New: Ultrium3 and WORM features Integration with popular backup products Charlotte Brooks Alv Jon Hovda Reena Master Abbe Woodcock ibm.com/redbooks International Technical Support Organization Implementing IBM Tape in UNIX Systems October 2005 SG24-6502-03 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Fourth Edition (October 2005) This edition applies to IBM TotalStorage 3580 Tape Drive, IBM TotalStorage 3581 Tape Autoloader, IBM TotalStorage 3581 2U Tape Autoloader, IBM TotalStorage 3582 Tape Library, IBM TotalStorage 3583 Tape Library, IBM TotalStorage 3584 Tape Library, and IBM TotalStorage 3592 Tape Drive. © Copyright International Business Machines Corporation 2002, 2003, 2004, 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . ix Notices . xiii Trademarks . xiv Preface . .xv The team that wrote this redbook. .xv Become a published author . xvi Comments welcome. xvii Summary of changes. xix October 2005, Fourth Edition . xix July 2004, Third Edition . xix Part 1. Setting up IBM tape in UNIX. 1 Chapter 1. Introduction to LTO Ultrium with UNIX . 3 1.1 LTO overview . 4 1.1.1 IBM TotalStorage LTO Ultrium models . 5 1.1.2 IBM TotalStorage 3580 Tape Drive. 7 1.1.3 IBM TotalStorage 3581 Tape Autoloader . 9 1.1.4 IBM TotalStorage 3581 2U Tape Autoloader . 10 1.1.5 IBM TotalStorage 3582 Tape Library . 11 1.1.6 IBM TotalStorage 3583 Tape Library .
    [Show full text]
  • Pubtex Output 1999.06.17:0330
    Solstice Backup 5.1 Installation and Release Notes Sun Microsystems, Inc. 901 N. San Anotnio Ro fad Palo Alto, CA 94303–4900 U.S.A. Part No: 805-3794 May 22 1998 Copyright 1998 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, SunSoft, SunDocs, SunExpress, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Moving Media Storage Technologies Applications & Workflows for Video and Media Server Platforms
    Moving Media Storage Technologies Applications & Workflows for Video and Media Server Platforms Karl Paulsen CONTENTS Acknowledgments xv Introduction xvii Chapter 1 Information, Data, and Video 1 Data Structure 1 Information 2 Storing the Moving Image 3 Digital Video Recording 4 Analog Component Video 5 Colorimetry and Conversion 11 A Digital Media World: Going Forward 12 Further Readings 13 Chapter 2 Digital Disk Recording 15 Recording Moving Images 16 Dawn of the Video Disk 17 Fundamentals of Digital Disk Recording 18 Core Technologies for Digital Disk Recording 21 DDR, DVR, or VideoServer 28 Comparing DDRs to VideoServers 31 Clip Servers 32 DVR Marketplaces 35 Home Media Network Disk Recorders 36 Audio 37 Further Readings 38 Chapter 3 Video Media Servers 39 Carrying Over from the DDR 39 Universal Server Approach 41 VideoServers as Media Servers 46 The Future of VideoServers 66 Communications Protocols Used in Video Serving Platforms 66 Further Readings 71 Chapter 4 Hard Drive Anatomy 73 Magnetic Recording History 74 Drive Components 77 Disk Performance Optimization 85 Disk Scheduling 85 Access Time Components 87 Servicing and Scheduling Criteria 88 Capacity Factors, Transfer Time and Obstacles 95 Read-Write Heads 97 Advanced Format Sector Technology 102 Superparamagnetic Limit 106 Heat-Assisted Magnetic Recording. 107 Further Reading 108 Chapter 5 Buses, Ports, and Interfaces 109 Carrying and Transferring Data 110 Bus Types 110 Storage Bus Standards 112 Storage Module Device 112 Serial Storage Architecture 114 High-Performance Parallel
    [Show full text]
  • Digital Archiving for Film-Makers
    PRESENTS Sponsored by Digital Archiving for Filmmakers Best practices for safely backing up, storing and managing your footage—from independent, nonprofit and corporate to broadcast and feature production PRESENTS Digital Archiving for Filmmakers Editor Beth Marchant © 2010 Access Intelligence, LLC Digital Archiving for Filmmakers EDitor’s LETTER Why Archive? www.studiodaily.com he digital revolution has brought many Guidebook Editor things to filmmakers and content creators, Beth Marchant (212) 621-4645 among them better, faster workflows, higher-resolution images and sound, and Graphic Designer access, via file-based formats, to infinitely more data Christina Barnard T at any given time throughout the production and Film & Video post-production process. And therein lies the prob- EDITOR-IN-CHIEF Bryant Frazer lem: With so much content being created by so many, (212) 621-4647 how it is stored, managed and saved for posterity is Studio/Monthly no longer a task limited to archivists in some dusty, EDITOR-IN-CHIEF climate-controlled warehouse. It is the responsibility Beth Marchant of every filmmaker who creates an audiovisual record of what engages and enter- (212) 621-4645 tains us, from news, historical events and the natural world, to popular culture and BUSINESS OPERATIONS/SALES our collective imaginations. But for too many archiving is an afterthought or, in the VICE PRESIDENT/GROUP PUBLISHER Diane Schwartz very least, an acknowledged but far-too-confusing process their current budgets, storage infrastructures and project loads just can’t address right now. That is, until DIRECTOR OF EVENTS LOGISTICS & MARKETING it’s too late. When incorrectly stored and protected originals are accidentally erased Kate Schaeffer through human error, neglect, system failure or natural disaster, everyone loses out.
    [Show full text]
  • Tektronix: Glossary Video Terms and Acronyms
    Glossaryvideo terms and acronyms This Glossary of Video Terms and Acronyms is a compilation of material gathered over time from numer- ous sources. It is provided "as-is" and in good faith, without any warranty as to the accuracy or currency of any definition or other information contained herein. Please contact Tektronix if you believe that any of the included material violates any proprietary rights of other parties. Video Terms and Acronyms Glossary 1-9 0H – The reference point of horizontal sync. Synchronization at a video 0.5 interface is achieved by associating a line sync datum, 0H, with every 1 scan line. In analog video, sync is conveyed by voltage levels “blacker- LUMINANCE D COMPONENT E A than-black”. 0H is defined by the 50% point of the leading (or falling) D HAD D A 1.56 µs edge of sync. In component digital video, sync is conveyed using digital 0 S codes 0 and 255 outside the range of the picture information. 0.5 T N E 0V – The reference point of vertical (field) sync. In both NTSC and PAL CHROMINANCE N COMPONENT O systems the normal sync pulse for a horizontal line is 4.7 µs. Vertical sync P M is identified by broad pulses, which are serrated in order for a receiver to O 0 0 C maintain horizontal sync even during the vertical sync interval. The start H T 3.12 µs of the first broad pulse identifies the field sync datum, 0 . O V B MOD 12.5T PULSE 1/4” Phone – A connector used in audio production that is characterized -0.5 by its single shaft with locking tip.
    [Show full text]
  • Preservation Technologies for European Broadcast Archives IST-1999-20013
    PRESTO – Preservation Technologies for European Broadcast Archives IST-1999-20013 EXISTING AND EMERGING TECHNOLOGIES DOCUMENT IDENTIFIER: PRESTO-WP3-INA-001218 DATE: 3/05/2001 ABSTRACT - This document is a survey and a state of the art of existing and emerging preservation technologies: - Old technology, current status of old analogue media and their associated playback devices - Current and emerging digital techniques that can be used for preservation - Examples of current processes using these techniques - Elements of costs AUTHORS: ACS: Stefano Grego, Massimo Sarachino e-vod: David Clemenceau, Patrice Fournier INA: Frederic Dumas, Denis Frambourt, Jean-Noel Gouyet, Alain Perrier, Jean Varra ITC/IRST: Roberto Brunelli, Mauro Cettolo JRS: Kurt Majcen NTEC: Robert Noll RAI: Daniele Airola, Salvatore Cangialosi, Gorgio Dimino VectraCom: Gerard Letienne EDITORS: Jean-Noel Gouyet, Jean Varra (INA) PUBLISHING: Marie-Therese Debray (INA) WORKPACKAGE / WP3 TASK: STATUS: Final DISTRIBUTION: Public CONTENTS List of Figures 4 1 Introduction 6 2 Managing Old Film Media 7 2.1 Introduction 7 2.2 List and status of old film media 7 2.3 Major problems related to film 8 2.4 Preservation of original films 9 3 Technologies for film archives preservation 14 3.1 Introduction 14 3.2 State of the art about TELECINE and scanners 16 3.3 Specific playback problems of film archives 16 3.4 New media for film preservation 17 4 Management of film archives preservation 19 4.1 Processes for film archive preservation 19 4.2 Comparison of costs of different processes
    [Show full text]
  • Nestor-Handbuch
    nestor Handbuch: Eine kleine Enzyklopädie der digitalen Langzeitarchivierung hg. v. H. Neuroth, A. Oßwald, R. Scheffel, S. Strathmann, K. Huth im Rahmen des Projektes: nestor – Kompetenznetzwerk Langzeitarchivierung und Langzeitverfügbarkeit digitaler Ressourcen für Deutschland nestor – Network of Expertise in Long-Term Storage of Digital Resources http://www.langzeitarchivierung.de/ Kontakt: [email protected] c/o Niedersächsische Staats- und Universitätsbibliothek Göttingen, Dr. Heike Neuroth, Forschung und Entwicklung, Papendiek 14, 37073 Göttingen Bibliografische Information der Deutschen Nationalbibliothek Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliografie; detaillierte bibliografische Daten sind im Internet unter http://www.d-nb.de/ abrufbar. Neben der Online Version 2.3 ist eine Printversion 2.0 beim Verlag Werner Hülsbusch, Boizenburg erschienen. Die digitale Version 2.3 steht unter folgender Creative-Commons-Lizenz: „Namensnennung-Keine kommerzielle Nutzung-Weitergabe unter gleichen Bedingungen 3.0 Deutschland“ http://creativecommons.org/licenses/by-nc-sa/3.0/de/ Markenerklärung: Die in diesem Werk wiedergegebenen Gebrauchsnamen, Handelsnamen, Warenzeichen usw. können auch ohne besondere Kennzeichnung geschützte Marken sein und als solche den gesetzlichen Bestimmungen unterliegen. URL für nestor Handbuch (Version 2.3): urn:nbn:de:0008-2010071949 http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:0008-2010071949 # Kapitelname [ Version 2.0 ] 5 Gewidmet der Erinnerung
    [Show full text]
  • 10.3.1 Magnetbänder
    Kap.10:10 Eine kleine Enzyklopädie der digitalen Langzeitarchivierung 10.3.1 Magnetbänder Dagmar Ullrich Magnetbänder speichern Daten auf einem entsprechend beschichteten Kunststoffband. Dabei können zwei unterschiedliche Verfahren eingesetzt werden, das Linear-Verfahren oder das Schrägspur-Verfahren. Gängige Bandtechnologien verfügen über Funktionen zur Datenkom- pression und Kontrollverfahren zur Sicherung der Datenintegrität. Die wichtigsten aktuellen Bandtechnologien werden im Überblick vorgestellt. Als Lesegeräte können Einzellaufwerke, automatische Bandwechsler oder umfangreiche Magnetband-Bibliotheken dienen. Verschleiß der Magnetbänder und damit ihrer Lebensdauer hängen von der Nutzungsweise und Lauf- werksbeschaffenheit ab und fallen daher unterschiedlich aus. Die Haltbarkeit hängt darüber hinaus von der sachgerechten Lagerung ab. Regelmäßige Fehlerkontrollen und -korrekturen sind für einen zuverlässigen Betrieb erforderlich. Magnetbänder eignen sich für die langfristige Speicherung von Datenobjekten, auf die kein schneller oder häufiger Zugriff erfolgt, oder für zusätzliche Sicherungskopien. Funktionsweise von Magnetbändern Die Datenspeicherung erfolgt durch Magnetisierung eines entsprechend be- schichteten Kunststoffbandes. Dabei können zwei unterschiedliche Verfahren eingesetzt werden: das Linear-Verfahren und das Schrägspur-Verfahren. Beim Linear-Verfahren wird auf parallel über die gesamte Bandlänge verlaufende Spuren nacheinander geschrieben. Dabei wird das Band bis zum Ende einer Spur in eine Richtung unter dem Magnetkopf
    [Show full text]
  • La Perdurabilidad De Las Publicaciones Documentales Digitales Ante Los Cambios Tecnológicos
    DIVISIÓN DE CIENCIAS Y ARTES PARA EL DISEÑO Especialización, Maestría y Doctorado en Diseño La perdurabilidad de las publicaciones documentales digitales ante los cambios tecnológicos Martín Lucas Flores Carapia Tesis para optar por el grado de Maestría en Diseño y Visualización de la Información Miembros del jurado: Dr. Jorge Gabriel Ortiz Leroux Director de la tesis Mtro. Roberto Adrián García Madrid Mtro. Pablo Daniel López Álvarez Mtra. María Elvia Vásquez Velásquez Mtro. Manuel Martín Clavé Almeida Mtro. Saúl Vargas González Ciudad de México Julio de 2018 Esta investigación busca Analizar los factores que deter- minan los cambios tecnológicos, sus consecuencias en la perdurabilidad de las publicaciones documentales digitales, para su planeación, diseño y manejo. Las publicaciones documentales serán más útiles si logran sobrevivir a los cambios tecnológicos, al deterioro y a la pérdida, para así aportar y conservar el conocimiento colectivo de la humanidad. Palabras clave: Obsolescencia, publicaciones digitales, documentos, conocimiento. patrimonio digital Retirado en la paz de estos desiertos, con pocos, pero doctos, libros juntos vivo en conversación con los difuntos y escucho con mis ojos a los muertos. QUEVEDO Contenido 10 Introducción 14 Antecedentes 29 Problema 29 Hipótesis 29 Objetivo General 29 Objetivos particulares 30 Metodología 34 Capítulo 1 Las publicaciones documentales y su importancia 35 1.1.- Las publicaciones documentales 36 1.2.- De su importancia social 43 1.3.- De su importancia en el desarrollo del conocimiento
    [Show full text]
  • Copias De Seguridad : Estudio Y Metodología
    Trabajo Final de Carrera Copias de seguridad: Estudio y metodologı́a. Memoria Autor: Rafael Santamaría Carmona Consultor: Juan José Cuadrado Gallego 1 CONTENIDO 1 INTRODUCCIÓN 9 1.1 OBJETIVOS 11 1.2 METODOLOGÍA 12 2 LAS COPIAS DE SEGURIDAD A LO LARGO DE LA HISTORIA 13 2.1 TARJETAS PERFORADAS 14 2.2 CINTAS MAGNÉTICAS 20 2.3 DISCOS DUROS 22 2.3.1 LOS DISCOS DUROS EN EL SENO DE HOGARES Y PEQUEÑAS O MEDIANAS EMPRESAS 23 2.4 DISCOS FLEXIBLES 25 2.5 DISPOSITIVOS ÓPTICOS 26 2.6 MEMORIAS FLASH USB (USB FLASH DRIVES ) 28 2.7 INTERNET Y “LA NUBE ” 30 3 DISPOSITIVOS DE ALMACENAMIENTO 33 3.1 CINTAS MAGNÉTICAS 33 3.1.1 INTRODUCCIÓN 33 3.1.2 ESTRUCTURA FÍSICA 33 3.1.3 ESTRUCTURA LÓGICA 34 3.1.4 MÉTODOS DE GRABACIÓN DIGITAL 35 3.1.4.1 Grabación lineal 35 3.1.4.2 Grabación transversal 36 3.1.5 FORMATOS DE CINTAS MAGNÉTICAS 38 3.2 DISCOS DUROS 41 3.2.1 INTRODUCCIÓN 41 3.2.2 ESTRUCTURA FÍSICA 41 3.2.3 ESTRUCTURA LÓGICA 44 3.2.4 FUNCIONAMIENTO BÁSICO 45 3.2.5 TIPOS DE DISCOS DUROS 46 3.2.5.1 Discos duros externos portátiles 46 3.2.5.2 Discos duros externos de sobremesa 46 3.2.5.3 Mini discos duros externos 47 3.3 DISCOS ÓPTICOS 48 3.3.1 INTRODUCCIÓN 48 3.3.2 ESTRUCTURA 48 3.3.3 PROCESO DE LECTURA 49 3.3.4 PROCESO DE GRABACIÓN 49 3.4 DISPOSITIVOS DE MEMORIA FLASH 50 COPIAS DE SEGURIDAD : ESTUDIO Y METODOLOGÍA 3.4.1 INTRODUCCIÓN 50 3.4.2 ESTRUCTURA 50 3.4.3 MÉTODO DE GRABACIÓN 51 4 LAS COPIAS DE SEGURIDAD Y EL ESTÁNDAR ISO 53 4.1 INTRODUCCIÓN 53 4.2 EL ESTÁNDAR ISO/IEC 27002 55 5 MODELOS DE COPIAS DE SEGURIDAD 59 5.1 INTRODUCCIÓN 59 5.2 COPIA TOTAL O COMPLETA
    [Show full text]
  • Magnetbänder
    Herausgeber Heike Neuroth Hans Liegmann (†) Achim Oßwald Regine Scheffel Mathias Jehn Stefan Strathmann Im Auftrag von nestor – Kompetenznetzwerk Langzeitarchivierung und Langzeitverfügbarkeit digitaler Ressourcen für Deutschland nestor – Network of Expertise in Long-Term Storage of Digital Resources http://www.langzeitarchivierung.de Kontakt [email protected] c/o Niedersächsische Staats- und Universitätsbibliothek Göttingen Heike Neuroth Forschung und Entwicklung Papendiek 14 37073 Göttingen Tel. +49 (0) 55 1 39 38 66 Der Inhalt steht unter folgender Creative Commons Lizenz: http://creativecommons.org/licenses/by-nc-sa/2.0/de/ 11 Hardware [ Version 1.5 ] 11-9 11.2.1 Magnetbänder Dagmar Ullrich Abstract Magnetbänder speichern Daten auf einem entsprechend beschichteten Kunst- stoffband. Dabei können zwei unterschiedliche Verfahren eingesetzt werden, das Linear-Verfahren oder das Schrägspur-Verfahren. Gängige Bandtechnolo- gien verfügen über Funktionen zur Datenkompression und Kontrollverfahren zur Sicherung der Datenintegrität. Die wichtigsten aktuellen Bandtechnologien werden im Überblick vorgestellt. Als Lesegeräte können Einzellaufwerke, auto- matische Bandwechsler oder umfangreiche Magnetband-Bibliotheken dienen. Verschleiß der Magnetbänder und damit ihre Lebensdauer hängen von der Nut- zungsweise und Laufwerksbeschaffenheit ab und fallen daher unterschiedlich aus. Die Haltbarkeit hängt darüber hinaus von der sachgerechten Lagerung ab. Regelmäßige Fehlerkontrollen und -korrekturen sind für einen zuverlässigen Betrieb erforderlich.
    [Show full text]
  • Nestor Handbuch Eine Kleine Enzyklopädie Der Digitalen Langzeitarchivierung Version 1.2 Juni 2008
    nestor Handbuch Eine kleine Enzyklopädie der digitalen Langzeitarchivierung Version 1.2 Juni 2008 Herausgeber Heike Neuroth Hans Liegmann † Achim Oßwald Regine Scheffel Mathias Jehn Stefan Strathmann Im Auftrag von nestor – Kompetenznetzwerk Langzeitarchivierung und Langzeitverfügbarkeit digitaler Ressourcen für Deutschland nestor – Network of Expertise in Long-Term Storage of Digital Resources http://www.langzeitarchivierung.de Kontakt [email protected] c/o Niedersächsische Staats- und Universitätsbibliothek Göttingen Dr. Heike Neuroth Forschung und Entwicklung Papendiek 14 37073 Göttingen Tel. +49 (0) 55 1 39 38 66 Der Inhalt steht unter folgender Creative Commons Lizenz: http://creativecommons.org/licenses/by-nc-sa/2.0/de/ Inhalt Version 1.2, Vorwort 9 1 Einführung 1-1 2 Rechtliche Aspekte 2-1 3 State of the Art 3-1 LZA-Aktivitäten in Deutschland aus dem Blickwinkel von nestor �������������������3-1 3.1 Bibliotheken ����������������������������������������������������������������������������������������������������������3-8 3.2 Archive �����������������������������������������������������������������������������������������������������������������3-11 3.3 Museen �����������������������������������������������������������������������������������������������������������������3-14 4 Rahmenbedingungen für die Langzeitarchivierung digitaler Objekte 4-1 4.1 Nationale Preservation Policy ����������������������������������������������������������������������������4-3 4.2 Institutionelle Preservation Policy ���������������������������������������������������������������������4-6
    [Show full text]