TECHNICAL SPECIFICATIONS For DISASTER RECOVERY SERVICES TKG /09/2015
|
|
|
- Mitchell Kelly
- 10 years ago
- Views:
Transcription
1 TECHNICAL SPECIFICATIONS For DISASTER RECOVERY SERVICES TKG /09/2015 Index I. General Requirements II. Central Computer Recovery Requirements III. Network Recovery Requirements 1
2 TECHNICAL SPECIFICATIONS For DISASTER RECOVERY SERVICE SEPTA requires the ability to recover the functions and information of the mainframe computer in the event of any situation, which would render it incapacitated for an extended duration. Prospective bidders must provide written description detailing how their solution meets each of the following requirements. I. General Requirements A. The Vendor must possess sufficient experience in provision of disaster recovery services for clients of similar size and complexity. A minimum of twenty five (25) recoveries of equal or larger configurations than SEPTA must be documented, including references. B. The Vendor must provide immediate and exclusive access to center-based computer systems (Hot Site), which can attach to SEPTA's data communication network -with a reasonable expectation of resuming mainframe-computing services within an eight-hour elapsed time from declaration of the disaster. In the special case of a multiple-disaster situation in which multiple subscribers require use of the same resources, SEPTA shall be granted equal rights of access to recovery resources as the other affected subscribers. SEPTA shall cooperate with the Vendor and other affected subscribers to implement a workable multiple-disaster plan for sharing of recovery resources. C. The Vendor must guarantee the use of this Hot Site for a minimum of six weeks from the disaster declaration. D. The Vendor must provide a ready computer room (Cold Site) with sufficient electrical, air conditioning, and fire detection/suppression systems to accommodate installation and operation of SEPTA's hardware configuration following the initial recovery. E. The Vendor must guarantee the use of this Cold Site for a minimum of six months from the migration out of the Hot Site. F. The Vendor must provide a Recovery Operations Site (ROS) to be used by SEPTA personnel during testing or during a declared disaster. This facility must be located within approximately twenty-five (25) miles of SEPTA's computing facility in center city Philadelphia. The Hot/Cold Site can be located outside this area so long as the Vendor provides sufficient capabilities at the ROS to fully control testing. Network connectivity from the ROS to the Hot/Cold Site shall be included in the Vendor's cost. G. In addition to the annual contract costs, Bidder must disclose all costs associated with the proposed services, to include declaration fees, Hot Site charges, Cold Site charges, office space charges, additional test time rates and any additional charges or fees that may apply. H. The duration of this service shall be three years, with option for two (2) additional one (1) 2
3 year extensions. I. The Vendor must guarantee use of said equipment for testing at least six (6) eight-hour periods per contract year. All costs related to testing must be included in the bid price. J. The Vendor must provide technical support during tests and for the duration of SEPTA's recovery at the Vendor site. K. The Vendor must notify SEPTA in writing at least sixty days in advance of its intention to initiate significant changes to the equipment configuration described in the contract. SEPTA shall be granted a reasonable amount of additional free test time after every significant change. If in SEPTA s judgement following testing, the equipment is deemed substantially unusable by SEPTA, SEPTA may terminate the affected service. L. The Vendor must provide for the possibility that SEPTA may request the contractor to make special modifications to the equipment configuration specified in the contract to satisfy changing requirements. On these occasions the contractor will be given thirty (30) days of written notice as to the desired changes. The contractor must then advise SEPTA of any financial impact, and the time required to implement the change. M. The Vendor must provide continuous power for the ROS and Hot/Cold Sites. N. The Vendor must provide physical security for the ROS and Hot/Cold Sites to include at least internal and external emergency alarms, fire protection system and 24-hour security guards. 3
4 II Central Computer Recovery Requirements The Hot site computer system must provide capacity to recover SEPTA s hardware configuration as described below: 1 IBM zseries Process (IBM 2818-D01) 1 LPAR 40 IBM MIPS 2 GB Memory 1 OSA Express4S GbE SX 2 ports 3 OSA-Express 3-2P 1000BASET-EN 2 ports Mod 9 Format Disk Volumes (reside on DS8800) Mod 27 (reside on DS8800) 1 1 IBM 3490 Cartridge Drive 3 IBM 3592-J1A Cartridge Drives 3 IBM 3592-E05 Cartridge Drives 1 IBM 4248 Line Printer 1 Point-to-Point T1 with access to an ASN router to connect to an ARN router at 200 W. Wyoming Avenue, Philadelphia, PA. 1 CICSO ASA 5520 Adaptive Security Appliance (Firewall). 1 Internet connection at 5MB. SEPTA utilizes IBM z/os Operating System, and z/vm to host multiple Linux Virtual Machines on a single Integrated Facility for Linux (IFL). The TCP/IP network is attached via the IBM zseries 114 OSA Adapter using QDIO. SEPTA uses IBM DF/DSS to prepare the backup tape cartridges on the IBM 3592 Model J1A/E05 Tape Drives. 4
5 III Network Recovery Requirements Single Point-To-Point T1 The vendor shall provide an ASN router/switch, DSU/CSU, etc., required to connect a Point-to-Point T1 to an ARN router at 200 W. Wyoming Avenue, Philadelphia, PA. 5
Big Data Storage in the Cloud
Big Data Storage in the Cloud Russell Witt Scott Arnett CA Technologies Tuesday, March 11 Session Number 15288 Tuesday, March 11Tuesday, March 11 Abstract Need to reduce the cost of managing storage while
Response to Bidder Questions and Amendment 2 to Request for Proposal 11 01 Disaster Recovery Services
STATE OF NEW YORK DEPARTMENT OF TAXATION AND FINANCE Office of Budget & Management Analysis Bureau of Fiscal Services Building 9, Room 234 W.A. Harriman Campus Albany, NY 12227 Eric Mostert, Chief Financial
z/vm and Linux Disaster Recovery A Customer Experience Lee Stewart Sirius Computer Solutions (DSP)
z/vm and Disaster Recovery A Customer Experience Lee Stewart Sirius Computer Solutions (DSP) Date Thursday, August 14 th, 2008 Session 9210 2008 Sirius Computer Solutions The Business Partner Sirius Computer
Scope Statement for DST IT Disaster Recovery Services
Scope Statement Administrative Services Division Information Technology Section AUTHORIZATION TO AWARD 3/23/01 VENDOR: IBM BUSINESS CONTINUITY AND RECOVERY SERVICES Scope Statement for DST IT Disaster
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
Open Source Mainframe Backup with Hercules
Open Source Mainframe Backup with Hercules An Overview of the Hercules Disaster Recovery Solution 1 Issue: Mainframe Computer Backup Why? Business Need stay in business 60% of all organizations that have
Module 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
Using Virtualization to Help Move a Data Center
Using Virtualization to Help Move a Data Center Jim Moling US Treasury, Financial Management Service Session 7879 Tuesday, August 3, 2010 Disclaimers The opinions & ideas expressed herein are those of
CA s Cloud Storage for System z
CA s Cloud Storage for System z Michael Melillo Sr. User Experience Architect Cloud Solutions for System z April 15 th, 2014 2013 CA. All rights reserved. Disclaimer Certain information in this presentation
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant [email protected] Applied Expert Systems, Inc. 2011 1 Background
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Oracle Networking and High Availability Options (with Linux on System z) & Red Hat/SUSE Oracle Update
Oracle Networking and High Availability Options (with Linux on System z) & Red Hat/SUSE Oracle Update Speaker Names: David Simpson & Kathryn Arrell Speakers Company: IBM Date of Presentation: Wednesday,
Improving disaster recovery with Virtual Tape Libraries in Mainframe Environments By Deni Connor Principal Analyst, Storage Strategies NOW
Improving disaster recovery with Virtual Tape Libraries in Mainframe Environments By Deni Connor Principal Analyst, Storage Strategies NOW Recovering from disasters is an arduous process for mainframe
DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
FDR/UPSTREAM and INNOVATION s other z/os Solutions for Managing BIG DATA. Protection for Linux on System z.
FDR/UPSTREAM and INNOVATION s other z/os Solutions for Managing BIG DATA. Protection for Linux on System z. Patrick Fitzsimmons [email protected] INNOVATION Data Processing August 6, 2014 Insert
Virtual Linux Server Disaster Recovery Planning
Virtual Linux Server Disaster Recovery Planning Rick Barlow Nationwide Insurance August 2013 Session 13726 Agenda Definitions Our Environment Business Recovery Philosophy at Nationwide Planning Execution
Virtual Networking with z/vm 5.1.0 Guest LAN and Virtual Switch
Virtual Networking with z/vm 5.1.0 Guest LAN and Virtual Switch HILLGANG March 2005 Dennis Musselwhite, IBM z/vm Development, Endicott, NY Note References to IBM products, programs, or services do not
UPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
PNNL-19266 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems SV Singh AI Thronas January
Virtual Networking with z/vm Guest LANs and the z/vm Virtual Switch
Virtual Networking with z/vm Guest LANs and the z/vm Virtual Switch Alan Altmark, IBM z/vm Development, Endicott, NY Note References to IBM products, programs, or services do not imply that IBM intends
NOTICE ADDENDUM NO. TWO (2) JULY 8, 2011 CITY OF RIVIERA BEACH BID NO 308-11 SERVER VIRTULIZATION/SAN PROJECT
NOTICE ADDENDUM NO. TWO (2) JULY 8, 2011 CITY OF RIVIERA BEACH BID NO 308-11 SERVER VIRTULIZATION/SAN PROJECT TO ALL PROPOSERS ON THE ABOVE PROJECT: PLEASE NOTE CONTENTS HEREIN AND AFFIX (PASTE OR STAPLE)
Cross-Platform Access
Virtualize Cross-Platform Access to Protect Linux on System z Data Copyright 2010 INNOVATION Data Processing. All rights reserved. 1 Purpose This session will offer through interactive discussion the opportunity
zframe: a technical overview for
ES : A Bottom Up View of High Tech Mainframe Options zframe: a technical overview for Mike Hammock Cornerstone Systems Inc. IBM zseries Enablement Solutions [email protected] Cornerstone's zframe Objectives:
How To Write An Ets Request For Proposal (Rfp)
Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment
Replicating Mainframe Tape Data for DR Best Practices Session #10929
Replicating Mainframe Tape Data for DR Best Practices Session #10929 Lee Reiersgord Systems Engineer Luminex Software, Inc. Scott James VP Global Alliances & Marketing Luminex Software, Inc Steve Schwietz
CATS+ TORFP # Maryland Department of Transportation (MDOT)
Consulting and Technical Services Plus (CATS+) Task Order Request for Proposals (TORFP) IBM Mainframe and Network Disaster Recovery Site and Support Services CATS+ TORFP # J01B3400036 Maryland Department
Department of Technology Services UNIX SERVICE OFFERING
Department of Technology Services UNIX SERVICE OFFERING BACKGROUND The Department of Technology Services (DTS) operates dozens of UNIX-based systems to meet the business needs of its customers. The services
IBM Mainframe Services. 10 April 2014. G-Cloud. service definitions
IBM Mainframe Services 10 April 2014 G-Cloud service definitions TABLE OF CONTENTS Definitions and Interpretation... 4 The Services... 6 Core Services... 6 Optional Services... 8 Additional Services...
Ancero Backup & Disaster Recovery (BDR) Service Guide
Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware
CLOUD SERVICE SCHEDULE Newcastle
CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,
Data Protection History, Evolution, Best Practices By Global Data Vault
Data Protection History, Evolution, Best Practices By Global Data Vault Introduction As business data processing has evolved, so have the methods and best practices for data protection. This white paper
Understanding the New Enterprise Cloud System
Understanding the New Enterprise Cloud System September 24, 2014 Kershaw Mehta [email protected] Cloud on System z yields the Lowest Cost 35 very light workloads Public Cloud 48 reserved instances $3.9M
Implementing Tivoli Storage Manager on Linux on System z
IBM Software Group Implementing Tivoli Storage Manager on Linux on System z Laura Knapp [email protected] 2006 Tivoli Software 2006 IBM Corporation Agenda Why use Linux on System z for TSM TSM Some basics
BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY.
NSA Cloud Suite Powered by BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY. In this age of information, this means you need your servers, desktops and applications up
IBM Systems and Technology Group Technical Conference
IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster
Scope Statement for Business Recovery Services. BCRS Contract Attachment #1 #ITS-000317
Scope Statement State of North Carolina Office of Information Technology Services AWARDED VENDOR: SUNGARD RECOVERY SERVICES, INC. 6/18/2001 Scope Statement for Business Recovery Services BCRS Contract
Mainframe. Large Computing Systems. Supercomputer Systems. Mainframe
1 Large Computing Systems Server Farm Networked cluster of interchangeable file/application servers Provides load balancing for availability and reliability Blade Server Server farm in a single cabinet
Scope Statement for North Carolina State University. Administrative Computing Services. Disaster Recovery Services
Authorization to Award to Vendor: Inflow Group, Inc. February 18, 2002 Scope Statement for North Carolina State University Disaster Recovery Services BCRS Contract Attachment #3 #ITS-000826 December 14,
Application Backup and Restore using Fast Replication Services. Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973
Application Backup and Restore using Fast Replication Services Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973 Session Agenda What is IBM Tivoli Advanced Backup and Recovery
z/vm built on IBM Virtualization Technology
z/vm built on IBM Virtualization Technology General Information version 5 release 3 GC24-6095-07 z/vm built on IBM Virtualization Technology General Information version 5 release 3 GC24-6095-07 Note:
VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER
VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)
SCHEDULE 25. Business Continuity
SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or which TfL considers likely to render, it necessary or desirable
IBM Communications Server for Linux - Network Optimization for On Demand business
Optimizing your network infrastructure for on demand business IBM Communications Server for Linux - Network Optimization for On Demand business IBM Communications Server for Linux provides a cost-effective
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
Axcient Data Protection Platform. Axcient Data Protection Platform
Axcient Data Protection Platform Axcient Data Protection Platform 2 Axcient Overview Summary: Axcient provides a complete data protection platform, delivered as a service, for the small to mid-size business
CA Cloud Storage for System z
CA Cloud Storage for System z Release Notes Release 1.1.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Disaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
How To Install A Virtual Image Facility On Linux (Amd64) On A 3390 Dasd 3390 (Amd32) Dasda (Amd86) (Amd66) (Dasd) (Virtual Image Facility) (For
S/390 Virtual Image Facility for Linux (VIF) WAVV 2000 Colorado Springs October, 2000 Agenda Introduction Product Overview Planning Installation Positioning Availability Introduction S/390 Virtual Image
SHARE Lunch & Learn #15372
SHARE Lunch & Learn #15372 Data Deduplication Makes It Practical to Replicate Your Tape Data for Disaster Recovery Scott James VP Global Alliances Luminex Software, Inc. Randy Fleenor Worldwide Data Protection
CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES
Page 1 of 5 ELECTRONIC FILE ARCHIVAL AND BACKUP PROCEDURES EFFECTIVITY AND APPROVAL Revision 1 of this procedure became effective on July 6, 2004. This procedure consists of the pages and changes listed
CA Products for z/vm Old Dogs with New Tricks
CA Products for z/vm Old Dogs with New Tricks Yvonne DeMeritt Sr. Sustaining Engineer CA Objective -Provide information on CA s z/vm product offerings that are available to assist you in meeting your z/vm
IBM Software Group. Lotus Domino 6.5 Server Enablement
IBM Software Group Lotus Domino 6.5 Server Enablement Agenda Delivery Strategy Themes Domino 6.5 Server Domino 6.0 SmartUpgrade Questions IBM Lotus Notes/Domino Delivery Strategy 6.0.x MRs every 4 months
Solution Brief: Creating Avid Project Archives
Solution Brief: Creating Avid Project Archives Marquis Project Parking running on a XenData Archive Server provides Fast and Reliable Archiving to LTO or Sony Optical Disc Archive Cartridges Summary Avid
PROMAPP TECHNICAL INFORMATION
Promapp Software Architecture Promapp is designed in accordance with Microsoft best practices, developed with the Microsoft.net framework and uses a Microsoft SQL database. The software architecture is
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
BME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei
Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database
INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia
INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:
Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer
Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical
RELEASE NOTES. StoneGate Firewall/VPN v2.2.11 for IBM zseries
RELEASE NOTES StoneGate Firewall/VPN v2.2.11 for IBM zseries Copyright 2006 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners. Disclaimer:
Virtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
The Modern Mainframe Data Center Sharing a Tape Infrastructure Session #10932
The Modern Mainframe Data Center Sharing a Tape Infrastructure Session #10932 Art Tolsma CEO Luminex Software, Inc. Tom Schwartz Systems Engineer Luminex Software, Inc. Steve Schwietz Senior Systems Programmer
CommuniGate Pro SIP Performance Test on IBM System z9. Technical Summary Report Version V03
CommuniGate Pro SIP Performance Test on IBM System z9 Technical Summary Report Version V03 Version : 03 Status : final Updated : 16 March 2007. PSSC IBM Customer Centre Montpellier March 16, 2007 Page
Understand the New Enterprise Cloud System
Understand the New Enterprise Cloud System August 4, 2014 Kershaw Mehta [email protected] Introduction to IBM Enterprise Cloud System Converged Infrastructure-as-a-Service solution, providing a highly
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429
JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 ADDENDUM #1 September 21, 2015 REQUEST FOR PROPOSALS #16-033 FOR CLOUD BASED BACKUP & RECOVERY
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
CONTINGENCY PLANNING -- THE AUDIT PROCESS Leslie A. Virgilio OFF-SITE, Inc. 32 Ellicott Street Batavia, New York 14020
CONTINGENCY PLANNING -- THE AUDIT PROCESS Leslie A. Virgilio OFF-SITE, Inc. 32 Ellicott Street Batavia, New York 14020 Di~aster Recovery is the ability to continue your information processing when your
SAN TECHNICAL - DETAILS/ SPECIFICATIONS
SAN TECHNICAL - DETAILS/ SPECIFICATIONS Technical Details / Specifications for 25 -TB Usable capacity SAN Solution Item 1) SAN STORAGE HARDWARE : One No. S.N. Features Description Technical Compliance
CONTINUITY AND RECOVERY PLANNING GUIDE
CONTINUITY AND RECOVERY PLANNING GUIDE The Continuity Planning process is designed to assist an organization in determining action plans for disaster recovery or incident response. The process also aids
