scispace - formally typeset
Search or ask a question

Showing papers on "Disaster recovery published in 2004"


01 Jan 2004
TL;DR: In this article, the role of social capital in the post-disaster rehabilitation and reconstruction programs in two cases: Kobe, Japan and Gujarat, India was examined, and it was observed that the community with social capital records the highest satisfaction rate for the new town planning and has the speediest recovery rate.
Abstract: Post-disaster recovery processes should be considered as opportunities for development, by revitalizing the local economy and upgrading livelihoods and living conditions. Social capital, which is defined as a function of trust, social norms, participation, and network, can play an important role in recovery. This paper examines the role of social capital in the post earthquake rehabilitation and reconstruction programs in two cases: Kobe, Japan and Gujarat, India. The Kobe case study shows that the community with social capital and with a tradition of community activities can pro-actively participate in the reconstruction program, and thereby can make a successful and speedy recovery. A model for bonding, bridging and linking social capital was developed from the Kobe experience, and was applied to Gujarat in four different communities. It was observed that the community with social capital records the highest satisfaction rate for the new town planning and has the speediest recovery rate. The role of community leaders has been prominent in utilizing social capital in the recovery process, and facilitating collective decision-making. Thus, although the two case studies differ in socio-economic and cultural contexts, the community’s social capital and leadership are found to be the most effective elements in both cases in enhancing collective actions and disaster recovery.

690 citations


Patent
04 Feb 2004
TL;DR: In this article, the files that define the user environment of the file server are replicated to a virtual server at a disaster recovery site for disaster recovery of a file server at an active site.
Abstract: For disaster recovery of a file server at an active site, the files that define the user environment of the file server are replicated to a virtual server at a disaster recovery site. To switch over user access from the active site to the disaster recovery site, the disaster recovery system determines whether there are sufficient network interfaces and file system mounts at the disaster recovery site. If so, the required resources are reserved, and user access is switched over. If not, an operator is given a list of missing resources or discrepancies, and a choice of termination or forced failover. Interruptions during the failover can be avoided by maintaining a copy of user mappings and a copy of session information at the disaster recovery site, and keeping alive client-server connections and re-directing client requests from the active site to the disaster recovery site.

285 citations


Journal Article
TL;DR: In this article, the role of social capital in the post-disaster rehabilitation and reconstruction programs in two cases: Kobe, Japan and Gujarat, India was examined, and it was observed that the community with social capital records the highest satisfaction rate for the new town planning and has the speediest recovery rate.
Abstract: Post-disaster recovery processes should be considered as opportunities for development, by revitalizing the local economy and upgrading livelihoods and living conditions. Social capital, which is defined as a function of trust, social norms, participation, and network, can play an important role in recovery. This paper examines the role of social capital in the post earthquake rehabilitation and reconstruction programs in two cases: Kobe, Japan and Gujarat, India. The Kobe case study shows that the community with social capital and with a tradition of community activities can pro-actively participate in the reconstruction program, and thereby can make a successful and speedy recovery. A model for bonding, bridging, and linking social capital was developed from the Kobe experience and was applied to Gujarat in four different communities. It was observed that the community with social capital records the highest satisfaction rate for the new town planning and has the speediest recovery rate. The role of community leaders has been prominent in utilizing social capital in the recovery process and facilitating collective decision-making. Thus, although the two case studies differ in socioeconomic and cultural contexts, the communities' social capital and leadership are found to be the most effective elements in both cases in enhancing collective actions and disaster recovery.

230 citations


Journal Article
TL;DR: In this article, the authors focus on four particular areas: 1. The changing risk landscape where new types of risks are emerging that are not amenable to the traditional command and control management model. 2. The limited capacity of emergency services to deal with the protracted and multifarious demands of comprehensive recovery.
Abstract: Recent research into community resilience, both in Australia and the United Kingdom (UK), indicates that resilience is a multi-dimensional attribute that in its different forms contributes in various but equally important ways to disaster recovery. The author starts with the premise that effective recovery can be achieved only where the affected community participates fully in the recovery process and where it has the capacity, skills and knowledge to make its participation meaningful. Resilience addresses the second of these qualities; in fact it may be defined as the total of the individual elements, but is ineffectual without the means of engagement through participation with the wider social, economic and political communities. The research focuses on four particular areas: 1. The changing risk landscape where new types of risks are emerging that are not amenable to the traditional command and control management model. 2. The changing policy agenda of governments since the attacks of 911 1, in particular the UK's Resilience Agenda. 3. The engagement of local people, whether planned or not, in the recovery process. 4. The limited capacity of emergency services to deal with the protracted and multifarious demands of comprehensive recovery. This research is derived from a variety of sources including direct experience in recovery management and the investigation of community and emergency service responses to different types of disasters. Community resilience is largely neglected in planning and in operations, though in practice community engagement in recovery, a measure of resilience tends to happen spontaneously. In this sense resilience may be inherent or at least developed in situ after a disaster. However, resilience can also be planned for and developed before a disaster strikes. The author indicates that there are a variety of capacity building methods, and especially linkages with other capacity building programmes, that can materially increase community resilience.

176 citations


Journal ArticleDOI
TL;DR: Comparisons between the city of Los Angeles, California and Taichung county in Taiwan suggest that having a pre-impact recovery plan facilitates housing reconstruction and allows local officials to make more effective use of the window of opportunity after disaster to integrate hazard mitigation into the recovery process.
Abstract: The idea of pre-impact recovery planning has recently been promoted by researchers and practitioners, but very little research has been done to evaluate its effects on disaster recovery This study compared two jurisdictions--the city of Los Angeles, California and Taichung county in Taiwan--in their recovery from earthquakes Although the two cases also differ with respect to variables other than the presence of pre-impact recovery plans, the available data suggest that having a pre-impact recovery plan facilitates housing reconstruction and allows local officials to make more effective use of the window of opportunity after disaster to integrate hazard mitigation into the recovery process

160 citations


Journal ArticleDOI
TL;DR: In April 1997, Grand Forks, North Dakota, and East Grand forks, Minnesota experienced a disastrous flood as mentioned in this paper, and both cities have been textbook examples of success according to the Federal Emergency Mana...
Abstract: In April 1997, Grand Forks, North Dakota, and East Grand Forks, Minnesota, experienced a disastrous flood. Both cities have been textbook examples of success according to the Federal Emergency Mana...

144 citations


Patent
Eric P. Traut1
15 Oct 2004
TL;DR: In this article, an inexpensive and minimally intrusive way to provide disaster recovery services including recovery of the state of computer processors and devices using virtual machines is presented. But, the system is not suitable for disaster recovery.
Abstract: The present invention is directed to systems and methods for providing disaster recovery services using virtual machines. The invention provides an inexpensive and minimally intrusive way to provide disaster recovery services including recovery of the state of computer processors and devices. The system includes a production host and a backup host that communicate via a communications link. The state of the processor and devices on the production host are periodically stored onto backup host and can be restored in the event of an emergency. Additionally, the invention includes two business methods for utilizing the system and methods for providing disaster recovery services.

99 citations


Patent
05 Apr 2004
TL;DR: In this paper, the authors present computer systems, methods, and software products enabling the creation and maintenance of disaster recovery volumes having a reduced impact with regard to network traffic over a communications network.
Abstract: The present invention provides computer systems, methods, and software products enabling the creation and maintenance of disaster recovery volumes having a reduced impact with regard to network traffic over a communications network. A disaster recovery volume is generally created at a local archival storage unit including therein at least one storage medium constituting the disaster recovery volume (124). The medium constituting the disaster recovery volume is associated with the primary volume thereby allowing the storage medium constituting the disaster recovery volume to be relocated to a remote archival storage unit at a remote location (126) without compromising the association between the primary volume and the disaster recovery volume. Incremental changes to the primary volume (114) may then be communicated and incorporated in to the disaster recovery relocated to the remote location.

94 citations


Patent
29 Apr 2004
TL;DR: In this article, a system and method for disaster recovery for processing resources using configurable deployment platform is presented, where a specification of the configuration of processing resources of the primary site is generated, provided to a failover site that has a configurable processing platform capable of deploying processing area networks in response to software commands.
Abstract: A system and method for disaster recovery for processing resources using configurable deployment platform. A primary site has a configuration of processing resources. A specification of the configuration of processing resources of the primary site is generated. The specification is provided to a fail-over site that has a configurable processing platform capable of deploying processing area networks in response to software commands. Using the specification, software commands are generated to the configurable platform to deploy processing area network corresponding to the specifications.

77 citations


Journal ArticleDOI
TL;DR: The concept of community policing and what community policing incorporates is discussed in this paper, where experts from overseas countries brought into the disaster arena, are able to communicate fully and openly with community leaders in order to gain the support of the community.
Abstract: Although it is possible to prevent and contain both man made and natural disasters, it has to be said that the increase in the world's population is likely to increase further the frequency of a major disaster occurring. Disaster management and planning needs to be placed in a holistic setting, and new initiatives found in order to ensure that a disaster is viewed as a shared responsibility. One area that needs further attention is the concept of community policing and what community policing incorporates. Often, a disaster is on such a scale that local community leaders need to be consulted during the disaster limitation and containment stage. It is essential, therefore, that experts from overseas countries brought into the disaster arena, are able to communicate fully and openly with community leaders in order to gain the support of the community.

75 citations


Journal ArticleDOI
TL;DR: Two important topics in disaster recovery, risk management and disaster recovery planning are covered, which can play a major role in a company's survival/success.
Abstract: In today's world, where fears of "what if" grow daily, information technology (IT) professionals are planning for those possible disasters. According to a 2003 article found on ComputerWorld's web site, nine out of ten IT leaders surveyed had already cemented a disaster recovery plan or will have one in place within the year. Planning for a disaster may seem odd at first. But it is a smart choice for anyone who wants to protect a valuable asset. For instance, just as you would not carelessly store paper money next to the fireplace, the same intelligence applies to data and computers. A catastrophe is anything that threatens the function or existence of a business, ranging from a computer virus to a huge earthquake. A well thought out disaster recovery plan can play a major role in a company's survival/success. Disaster recovery covers a broad range of topics and includes practically everyone in an organization. Every employee - manager and janitor - must be on the same page when a disaster occurs. The support of all the management teams is also necessary. This article covers two important topics in disaster recovery, risk management and disaster recovery planning.

Journal ArticleDOI
TL;DR: In this article, the authors describe various coping strategies reportedly used by survivors after a disaster using unstructured interviews, 27 Mexicans (16 women, 11 men) were asked to recount how they coped with a specific disaster and its aftermath.
Abstract: This study describes the various coping strategies reportedly used by survivors after a disaster. Using unstructured interviews, 27 Mexicans (16 women, 11 men) were asked to recount how they coped with a specific disaster and its aftermath. Interviews were carried out in three cities: Guadalajara, Jalisco (n=10), Homestead, Florida (n=6) and Puerto Angel, Oaxaca (n=11). Guadalajara experienced a neighbourhood sewer explosion, whereas Homestead and Puerto Angel experienced Hurricane Andrew and Hurricane Paulina, respectively. Analysis of common themes revealed seeking support, seeking meaning, problem solving, and avoidance as primary coping strategies in all three cities. Seeking support was the most commonly cited coping strategy. Seeking support may be a universal coping strategy for disaster survivors, whereas other coping strategies varied by context-specific factors such as type of disaster, resource availability, and stage of disaster recovery. Implications for future coping research and interventio...

Patent
Peter Byrne1
27 Feb 2004
TL;DR: In this paper, the creation of multiple recoverable units within a database allows a database partition to be reconstructed during maintenance and disaster recovery operations, and a method of creating a recovery unit includes partitioning a database into at least two recovery units.
Abstract: The creation of multiple recoverable units within a database allows a database partition to be reconstructed during maintenance and disaster recovery operations A method of creating a recovery unit includes partitioning a database into at least two recovery units A primary catalog of metadata relating to the logical elements of a database such as tables, indexes, and file groups is created A secondary catalog of metadata relating to the physical elements of a database such as pages, files, B-Trees, and log streams is created for each recovery unit The primary and secondary metadata catalogs are linked such that only one log stream is associated with any one recovery unit A single recovery unit may then be exercised to perform recovery or maintenance operations while the remaining recovery units of the database remain online

Book
01 Jul 2004
TL;DR: The "Disaster Recovery Handbook" as discussed by the authors gives readers proven processes and techniques to develop a disaster recovery plan and protect their organization in the face of extraordinary circumstances, including a CD-ROM with templates for a project plan, contact database, risk assessment scoresheets, and more.
Abstract: Without careful planning, organizations often do not survive major interruptions in the operation of their business. The "Disaster Recovery Handbook" gives readers proven processes and techniques to develop a disaster recovery plan and protect their organization in the face of extraordinary circumstances. Featuring a CD-ROM with templates for a project plan, contact database, risk assessment scoresheets, and more, the book gives detailed instructions for assembling a recovery team, building an interim plan, setting up an emergency operations center and recovering vital records.

Book
01 Jan 2004
TL;DR: The impact of geo-political instability on country risk and global investment strategy is discussed in this paper, with a focus on the legacy of the September 11 terrorist attacks on the international economy.
Abstract: Contents: Preface 1 Introduction Part I: The Geopolitical and Geo-economic Environment 2 The Legacy of September 11 3 Historical Forces in International Affairs and Commerce: Prospects for the International Economy 4 Terrorism and International Business: Conceptual Foundations 5 The Complexity of the Geopolitics Dimension in Risk Assessment for International Business Part II: The Trade and Investment Environment 6 The Impact of Geopolitical Turmoil on Country Risk and Global Investment Strategy 7 The Digital Divide 8 Global Investment and Trade Flows: A Framework for Understanding Part III: Business Operation Studies 9 The Tourism Sector 10 The Bank Sector 11 The Evolution of Contingency Planning: From Disaster Recovery to Operational Resilience Part IV: Implications of Crisis in a Synergetic World 12 Disaster Management after September 11: A 'Normal Accident' or a 'Man-made Disaster?' What Did We Know, What Have We Learned? 13 A New Challenge for Security Policy 14 Conclusions Index

Patent
31 Mar 2004
TL;DR: A workload policy engine is a method, system, computer system, and computer program product that uses application requirements, business priorities, and compatibility and dependency among applications to allocate resources among those applications in a clustering environment as discussed by the authors.
Abstract: A method, system, computer system, and computer program product that use application requirements, business priorities, and compatibility and dependency among applications to allocate resources among those applications in a clustering environment. A workload policy engine is aware of the resources available within each cluster, as well as the capacities of those resources. Multiple instances of the workload policy engine can be run in different clusters. The workload policy engine can be used in conjunction with disaster recovery products as well as with provisioning software so that new machines can be provisioned in and out of a cluster dynamically, such as in a blade environment. Furthermore, the workload policy engine can be used in conjunction with dynamic repartitioning capabilities provided by different hardware platforms for large computer systems, as well as with performance monitoring software.

Patent
13 Aug 2004
TL;DR: In this article, a network of shared end-user computers periodically back up each individual enduser computer to a central instrumentality, in a novel manner to reduce storage and time requirements, and redundancies for the enduser computers backup files are eliminated or greatly reduced by only making reference to but not storing components that are generic to the system, and further for each previously stored component, only storing differential or incremental information, unless predefined conditions are met.
Abstract: Computer tools and methods novelly combine periodic backup and restore features with migration features to transfer the components of a failed system to a new system, which new system may be dissimilar to the old system. As well as backing up and transferring critical data files during the disaster recovery operation, the present invention also transfers, inter alia, applications, user states, hardware settings, software settings, user preferences and other user settings, menus, and directories. In another aspect of the present invention, a network of shared end-user computers periodically backs up each individual end-user computer to a central instrumentality, in a novel manner to reduce storage and time requirements. That is, redundancies for the end-user computer backup files are eliminated or greatly reduced by only making reference to but not storing components that are generic to the system, and further for each previously stored component, only storing differential or incremental information, unless predefined conditions are met. In yet another aspect of the present invention, remote end-users upload, via a wide area network such as the Internet, backup information to a central location. In the case of end-user computer failure, backup and migration information can be delivered to a new machine by means such as mailing a storage medium (e.g., compact disc), and downloading from the Internet.

Book ChapterDOI
TL;DR: This article showed that the economic impact of a disaster is strongly influenced by the multitude of decisions made in the days and months following, such as whether to relocate an office to New Jersey and for how long, whether to lay off workers and how many, and whether to inject stimulus spending into the New York City economy and how much.
Abstract: Each disaster reminds us that, from an economic standpoint, losses do not occur instantaneously, but are accumulated over the course of a sometimes long and complex recovery process. Moreover, disasters are spatial events that impact some places and some groups within those places more heavily than others. These effects can be observed in both natural disasters and human-induced events. Thus in the September 11th tragedy of 2001, the loss of the World Trade Center towers and the thousands of human lives do not in themselves constitute the economic impact of the disaster. Neither does the loss of gross regional product (GRP) on the 11th itself. Rather, the economic impact of the disaster is strongly influenced by the multitude of decisions made in the days and months following — decisions regarding whether to relocate an office to New Jersey and for how long, whether to lay off workers and how many, and whether to inject stimulus spending into the New York City economy and how much. Similar post-event decisions strongly influence recovery in natural disasters such as floods or earthquakes. In other words, the process of disaster recovery is critical to understanding the spatial economic impacts of disasters, yet the recovery process itself is extremely complex and uncertain.

Patent
10 Nov 2004
TL;DR: In this article, a disaster recovery method in mobile soft exchange network, using redundant mechanism to backup MSC Server network cells in PLMN network system, to make position and function of a network cell in the network no more only, so as to achieve the purpose of enhancing stability of network cells and further stability of the whole network.
Abstract: The invention discloses a disaster recovery method in mobile soft-exchange network, using redundant mechanism to backup MSC Server network cells in PLMN network system, to make position and function of a network cell in the network no more only, so as to achieve the purpose of enhancing stability of network cells and further stability of the whole network. When heavy failure occurs to MSC Server and MSC Server can not recover from it for a short time, the backuped MSC Server takes over all the users and processes user service, continuously, achieving the purpose of disaster recovery.

01 Jun 2004
TL;DR: The first review of recovery in Honduras that examines all sectors was conducted during September and October 2002 as part of the lessons learned after major natural disasters review of five countries, carried out by the ProVention Consortium.
Abstract: The Honduras study was conducted during September and October 2002 as part of the lessons learned after major natural disasters review of five countries, carried out by the ProVention Consortium. It comprised a field mission and a community survey. This is the first review of recovery in Honduras that examines all sectors. Hurricane Mitch was an exceptional event. It hit Honduras (and other areas of Central America, especially Nicaragua) from 25 October to 1 November, 1998. The hurricane remained static over the isthmus for days, resulting in the largest natural disaster experienced in Honduras in recent memory. Economic losses were estimated at some US$4 billion. The country was vulnerable and unprepared in terms of policy, systems, and resources for rapid recovery. The principal lesson from this study is that recovery is essentially a development issue. Recovery is inextricably intertwined with poverty and the vulnerability of the affected state and communities before, during, and after the disaster. Rather than pumping resources frantically once disaster hits, governments and donors should work to remove the constraints to development, thus reducing the risk of a disaster in the first place, and in the event of a disaster, accelerating appropriate recovery.

Patent
06 Dec 2004
TL;DR: In this paper, the authors present a system for planning and verifying off-site disaster recovery plans as well as implementing alternate fall back operations in the event of a disaster, where a disaster recovery administrator using remote management tools maintains user and resource profiles and controls configuration of the primary emulated device controller and the primary virtual tape system.
Abstract: A system for planning and verifying off-site disaster recovery plans as well as implementing alternate fall back operations in the event of a disaster. The system includes at least one primary mainframe computer having an inboard catalog component, a primary emulated device controller connected to the primary computer, and a primary virtual tape system connected to the primary computer. A primary virtual tape system catalog is connected to the primary virtual tape system. A disaster recovery administrator using remote management tools maintains user and resource profiles and controls configuration of the primary emulated device controller and the primary virtual tape system. A disaster recovery facility includes at least one customer virtual tape system including a virtual tape system catalog component, a terminal emulator in communication with a disaster recovery mainframe computer and a disaster recovery virtual tape system having a virtual tape system catalog in communication with the disaster recovery mainframe wherein customer virtual tape system images are mirrored on the disaster recovery virtual tape system and catalog information from the customer virtual tape catalog is mirrored on the disaster recovery tape system of the disaster recovery facility.

Patent
13 Aug 2004
TL;DR: In this paper, a network of shared end-user computers periodically back up each individual enduser computer to a central instrumentality, in a novel manner to reduce storage and time requirements.
Abstract: Computer tools and methods novelly combine periodic backup and restore features with migration features to transfer the components of a failed system to a new system. As well as backing up and transferring critical data files during the disaster recovery operation, an aspect of the present invention also transfers, inter alia, applications, user states, hardware settings, software settings, user preferences and other user settings, menus, and directories. In another aspect of the present invention, a network of shared end-user computers periodically backs up each individual end-user computer to a central instrumentality, in a novel manner to reduce storage and time requirements. That is, redundancies for the end-user computer backup files are eliminated or greatly reduced by only making reference to but not storing components that are generic to the system, and further for each previously stored component, only storing differential or incremental information, unless predefined conditions are met.

Patent
13 Aug 2004
TL;DR: In this article, a network of shared end-user computers periodically back up each individual enduser computer to a central instrumentality, in a novel manner to reduce storage and time requirements, and redundancies for the enduser computers backup files are eliminated or greatly reduced by only making reference to but not storing components that are generic to the system, and further for each previously stored component, only storing differential or incremental information, unless predefined conditions are met.
Abstract: Computer tools and methods novelly combine periodic backup and restore features with migration features to transfer the components of a failed system to a new system, which new system may be dissimilar to the old system. As well as backing up and transferring critical data files during the disaster recovery operation, the present invention also transfers, inter alia, applications, user states, hardware settings, software settings, user preferences and other user settings, menus, and directories. In another aspect of the present invention, a network of shared end-user computers periodically backs up each individual end-user computer to a central instrumentality, in a novel manner to reduce storage and time requirements. That is, redundancies for the end-user computer backup files are eliminated or greatly reduced by only making reference to but not storing components that are generic to the system, and further for each previously stored component, only storing differential or incremental information, unless predefined conditions are met. In yet another aspect of the present invention, remote end-users upload, via a wide area network such as the Internet, backup information to a central location. In the case of end-user computer failure, backup and migration information can be delivered to a new machine by means such as mailing a storage medium (e.g., compact disc), and downloading from the Internet.

Patent
01 Jun 2004
TL;DR: In this paper, the authors present a system and method for disaster recovery split of a node from a cluster to enable cluster management operations using quorum-based data replication services to continue.
Abstract: The present invention provides a system and method for disaster recovery split of a node from a cluster to enable cluster management operations using quorum-based data replication services to continue. A split command is executed on a selected node and a new site list data structure describing the cluster is generated. The site list data structure marks all nodes other than the selected node as ineligible, thereby placing the selected node in quorum.

Patent
09 Sep 2004
TL;DR: In this article, the authors propose a network independent solution for computer replication and/or recovery system and process comprising a recovery machine which rebuilds operating system (OS) disks for damaged computers from their backup images.
Abstract: A computer replication and/or recovery system and process comprising a recovery machine which rebuilds operating system (“OS”) disks for damaged computers from their backup images. The recovery processes are performed within the recovery machine, which is a separate machine from both the damaged and replacement machines. Rebuilt OS disks are then adapted to the replacement computers with different hardware. The recovery method of the present invention is a network independent solution.

Book
01 Apr 2004
TL;DR: The new edition of a bestseller book as mentioned in this paper addresses the complexities of disaster preparedness and business continuity and highlights the importance of prevention as well as controlling the effects of a disaster on a company's operations.
Abstract: This new edition of a bestseller book addresses the complexities of disaster preparedness and business continuity. Updated with the latest statistics, the new edition includes an overview of natural disasters, coverage of computer and data protection expanded to include cyber-attacks on the private sector, and information on managing data privacy. It also includes the latest information on dirty bombs, chemical and biological agents and weapons, disaster planning and recovery issues, regulatory influences and emergency preparedness. This reference highlights the importance of prevention as well as controlling the effects of a disaster on a company’s operations.

Patent
Eric P. Traut1
15 Oct 2004
TL;DR: In this paper, an inexpensive and minimally intrusive way to provide disaster recovery services including recovery of the state of computer processors and devices using virtual machines is presented. But, the system is not suitable for disaster recovery.
Abstract: The present invention is directed to systems and methods for providing disaster recovery services using virtual machines. The invention provides an inexpensive and minimally intrusive way to provide disaster recovery services including recovery of the state of computer processors and devices. The system includes a production host and a backup host that communicate via a communications link. The state of the processor and devices on the production host are periodically stored onto backup host and can be restored in the event of an emergency. Additionally, the invention includes two business methods for utilizing the system and methods for providing disaster recovery services.

Journal ArticleDOI
TL;DR: A new model for business continuity preparedness (BCP) planning for telecommunications networks and a taxonomy for the quantification of the BCP readiness compared to similar businesses and industry practices are presented.
Abstract: In the wake of recent events, a sense of awareness has emerged among businesses and government agencies of the need to continue their operations and provide critical services after a disastrous strike. The need for disaster recovery has always existed. However, the emphasis is shifting from reactive (recovery) to proactive (preparedness) to minimize damage from disasters and limit disaster impact through proper planning. We present a new model for business continuity preparedness (BCP) planning for telecommunications networks and a taxonomy for the quantification of the BCP readiness compared to similar businesses and industry practices. We categorize disasters as natural events, technical failures, and human threats. We discuss how each type of disaster is modeled and show how these models are used to quantify risks and potential impacts. We also show how the model is used to make specific recommendations to minimize exposure while maximizing the return on the investment in the BCP planning.

Journal ArticleDOI
TL;DR: The planning, execution, and feedback stages of a disaster recovery process are described and a case study from the September 11 events will be used to demonstrate how Lucent, having planned a cohesive disaster recovery strategy, executed upon the plan to quickly and effectively respond to, restore, and repair network damage.
Abstract: When the news of the attacks on the World Trade Center and the Pentagon came in on September 11, 2001, Lucent Technologies program managers for each of the major telecom customers in the New York/Washington, D.C., area were in contact, beginning the arduous process of support and recovery for one of the worst disasters in the history of the world. The advanced disaster recovery planning that had been put in place for such an unthinkable event gave the customer emergency center teams, led by a certified program management staff, a map to guide them through the days ahead. Subsequently, that map has been expanded. Added to it are brand-new avenues of preparedness that were inconceivable at the time the original planning took place. This paper describes the planning, execution, and feedback stages of a disaster recovery process. A case study from the September 11 events will be used to demonstrate how Lucent, having planned a cohesive disaster recovery strategy, executed upon the plan to quickly and effectively respond to, restore, and repair network damage. Finally, the paper discusses the last step in the disaster recovery process, which is the communication or feedback on what was learned from the experience, and the impact the learnings had on the current processes, culture, and organizational model.