1. 7. Techniques That Address Multiple Availability Requirements
    1. Redundancy
      1. Hardware Redundancy Examples
      2. Software Redundancy Examples
      3. Environmental Redundancy Example
      4. Critical Success Factors
    2. Backup of Critical Resources
      1. Methods of Backup
      2. Hardware Backup Examples
      3. Software Backup Examples
      4. IT Operations Backup Examples
      5. Critical Success Factors
        1. Currency of backup
        2. Automated updating of backups
        3. Isolation of backup from primary
        4. Backup and restore procedure review and testing
        5. Generations of backups
        6. Integrity verification
    3. Clustering
      1. Comparing Clustering and Redundancy
      2. Hardware and Software Clustering Examples
      3. IT Operations Clustering Examples
      4. Environmental Clustering Examples
      5. Critical Success Factors
        1. Automatic load-sharing
        2. Physical separation of clustered components
    4. Fault Tolerance
      1. Hardware Fault Tolerance Examples
      2. Software Fault Tolerance Examples
      3. Environmental Fault Tolerance Examples
      4. Critical Success Factors
    5. Isolation or Partitioning
      1. Hardware Isolation Examples
      2. Software Isolation Examples
      3. Other Benefits of Isolation
        1. Minimize risk of changes
        2. Reduce resource contention
        3. Maximize resources
        4. Simpler systems management procedures
      4. Critical Success Factors
    6. Automated Operations
      1. Console and Network Operations Examples
      2. Workload Management Examples
      3. System Resource Monitoring Examples
      4. Problem Management Applications
      5. Distribution of Resources Example
      6. Backup and Restore Examples
      7. Critical Success Factors
    7. Access Security Mechanisms
      1. Steps to Secure Access
        1. Step 1: Identify the person requesting access
        2. Step 2: Verify the identity
        3. Step 3: Control access
        4. Step 4: Monitor all activities
      2. Types of Security
        1. Physical security
        2. Network security
        3. Application security
        4. Computer resource security
      3. Password Management
        1. Step 1: Enforce password selection guidelines
        2. Step 2: Expire passwords regularly
        3. Step 3: Expire assigned passwords on first use
        4. Step 4: Disable user accounts after successive invalid password attempts
        5. Step 5: Educate users on how to protect their password information
      4. Critical Success Factors
    8. Standardization
      1. Hardware Standardization Examples
      2. Software Standardization Examples
      3. Network Standardization Examples
      4. Processes and Procedures Standardization Examples
      5. Naming Standardization Examples
      6. Critical Success Factors
      7. Transitioning to Standardization
    9. Summary
  2.  

    8. Special Techniques for System Reliability

    1. The Use of Reliable Components
      1. Techniques for Maximizing Hardware Component Reliability
        1. Choose components with low failure rates
        2. Choose components that have high MTBF
        3. Purchase from reputable suppliers
        4. Use technical specifications as a gauge
        5. Choose products with fewer parts or greater integration
        6. Avoid newly developed products whenever possible
        7. Follow maintenance schedules diligently
      2. Techniques for Maximizing Software Component Reliability
        1. Avoid using "Version 1" and "Beta" software
        2. Don't use shareware or freeware
        3. Buy industry-standard software from reliable vendors
        4. Prior to installation, test for viruses
        5. Provide menus and other ways to control user inputs
        6. Reuse bug-free components or modules
        7. Test programs thoroughly
        8. Run "beta tests" with a controlled set of users
        9. Install the latest application software fixes judiciously
        10. Install the latest device drivers when available
        11. Upgrade to newer operating systems with caution
        12. Minimize the use of system utilities
      3. Personnel-Related Techniques for Maximizing Reliability
        1. Ensure high-quality user training
        2. Ensure quality training of support staff members
        3. Be wary of contractual hires
      4. Environment-Related Techniques for Maximizing Reliability
        1. Install Automatic Voltage Regulators (AVRs)
        2. Use adequate air-conditioning equipment
      5. Some Reliability Indicators for Suppliers
        1. Time in business
        2. Quality certification
        3. Industry awards
        4. Peer recommendation
        5. Warranty and support
    2. Programming to Minimize Failures
      1. Correctness
        1. Ensure user requirements are adequately determined
        2. Prototype the application prior to detailed coding
        3. Revalidate user requirements midway through the project
        4. Beta test prior to wide-scale deployment
      2. Robustness
        1. Test against out-of-bounds values
        2. Trap errors and prevent them from propagating
        3. Anticipate external changes
      3. Extensibility
        1. User changes
        2. System platform changes
        3. Regulatory changes
        4. Budgetary changes
        5. Business volume changes
        6. Business demand changes
        7. Generous database field sizes
        8. Design with overcapacity
        9. Place constant values in a look-up table
      4. Reusability
    3. Implement Environmental Independence Measures
      1. Use Power Generators
      2. Use Independent Air-Conditioning Units
      3. Use Fire Protection Systems
      4. Use Raised Flooring
      5. Install Equipment Wheel Locks
      6. Locate Computer Room on the Second Floor
    4. Utilize Fault Avoidance Measures
      1. Analyzing Problem Trends and Statistics
      2. Use of Advanced Hardware Technologies
      3. Use of Software Maintenance Tools
    5. Summary
  3.  

    9. Special Techniques for System Recoverability

    1. Automatic Fault Recognition
      1. Parity Checking Memory
      2. ECC Memory
      3. Data Validation Routines
    2. Fast Recovery Techniques
    3. Minimizing Use of Volatile Storage Media
      1. Regular Database Updates to Central Storage
      2. Automatic File-Save Features
    4. Summary
  4.  

    10. Special Techniques for System Serviceability

    1. Online System Redefinition
      1. Add or Remove I/O Devices
      2. Selectively Power Down Subsystems
      3. Commit or Reject Changes
    2. Informative Error Messages
      1. Use Standard Corporate Terminology
      2. Adopt Terms Already Used by Common Applications
      3. Tell What, Why, Impact, and How
      4. Implement Context-Sensitive Help
      5. Give Options for Viewing More Detailed Error Information
      6. Make Error Information Available After the Error Has Been Cleared
    3. Complete Documentation
      1. Have a Manual of Operations On Hand
      2. Write Basic Problem Isolation and Recovery Guides
      3. Provide System Configuration Diagrams
      4. Label Resources
      5. Provide a Complete Technical Library
    4. Installation of Latest Fixes and Patches
    5. Summary
  5.  

    11. Special Techniques for System Manageability

    1. Use Manageable Components
      1. Simple Network Management Protocol (SNMP)
      2. Common Management Information Protocol (CMIP)
      3. Desktop Management Interface (DMI)
      4. Common Information Management Format (CIM)
      5. Wired for Management (WfM)
    2. Management Applications
      1. Systems Management Issues
        1. Deployment
        2. Operations
        3. Security
      2. Automated Systems Management Capabilities
      3. System Management Applications and Frameworks
        1. Unicenter TNG (Computer Associates)
        2. Tivoli (IBM)
    3. Educate IS Personnel on Systems Management Disciplines
      1. Business Value of the Information System
      2. Value of Systems Management Disciplines
      3. Principles of Management
      4. Basic Numerical Analysis Skills
    4. Summary
  6.  

    12. All Together Now

    1. The Value of Systems Management Disciplines
    2. Which One First?
    3. Analyze Outages
    4. Identify Single Points of Failure
    5. Exploit What You Have
    6. An Implementation Strategy
    7. Summary

Techniques for HA IT Management的更多相关文章

  1. R语言书籍的学习路线图

    现在对R感兴趣的人越来越多,很多人都想快速的掌握R语言,然而,由于目前大部分高校都没有开设R语言课程,这就导致很多人不知道如何着手学习R语言. 对于初学R语言的人,最常见的方式是:遇到不会的地方,就跑 ...

  2. juce中的内存泄漏检测

    非常值得借鉴的做法,基于引用计数和局部静态变量,代码比较简单不加详解. //============================================================== ...

  3. R语言学习路线和常用数据挖掘包(转)

    对于初学R语言的人,最常见的方式是:遇到不会的地方,就跑到论坛上吼一嗓子,然后欣然or悲伤的离去,一直到遇到下一个问题再回来.当然,这不是最好的学习方式,最好的方式是——看书.目前,市面上介绍R语言的 ...

  4. Apache Hadoop 2.9.2 的HDFS High Available模式部署

    Apache Hadoop 2.9.2 的HDFS High Available 模式部署 作者:尹正杰 版权声明:原创作品,谢绝转载!否则将追究法律责任. 我们知道,当NameNode进程挂掉后,可 ...

  5. High Performance Networking in Google Chrome

    小结: 1. 小文件存储于一个文件中: 在内部,磁盘缓存(disk cache)实现了它自己的一组数据结构, 它们被存储在一个单独的缓存目录里.其中有索引文件(在浏览器启动时加载到内存中),数据文件( ...

  6. R语言 一套内容 从入门 到放弃

    [怪毛匠子整理] 1.下载 wget http://mirror.bjtu.edu.cn/cran/src/base/R-3/R-3.0.1.tar.gz 2.解压: tar -zxvf R-3.0. ...

  7. R语言学习路线图-转帖

    本文分为6个部分,分别介绍初级入门,高级入门,绘图与可视化,计量经济学,时间序列分析,金融等. 1.初级入门 <An Introduction to R>,这是官方的入门小册子.其有中文版 ...

  8. VCAP5-DCA – What’s new?

    see also: 韩国人的教材:http://ddii.pe.kr/ Section 1.1 – Implement and Manage complex storage Determine use ...

  9. Gartner 2018 年WAF魔力象限报告:云WAF持续增长,Bot管理与API安全拥有未来

    Gartner 2018 年WAF魔力象限报告:云WAF持续增长,Bot管理与API安全拥有未来 来源 https://www.freebuf.com/articles/paper/184903.ht ...

随机推荐

  1. Linux和windows下内核socket优化项 (转)

    问题: No buffer space available Linux: vi /etc/sysctl.conf net.core.netdev_max_backlog = 30000  每个网络接口 ...

  2. Quartz.NET开源作业调度框架系列(四):Plugin Job-转

    如果在Quartz.NET作业运行时我们想动态修改Job和Trigger的绑定关系,同时修改一些参数那么该怎么办呢?Quartz.NET提供了插件技术,可以通过在XML文件中对Job和Trigger的 ...

  3. Docker安装和常用命令

    Docker安装 Docker的安装可以参考 https://docs.docker.com/ 下面的 Get Docker / Docker CE / Linux, 需要关注的主要是CentOS和U ...

  4. Spring 3整合Quartz 2实现定时任务三:动态暂停 恢复 修改和删除任务

    前面我们已经完成了spring 3和quartz 2的整合以及动态添加定时任务,我们接着来完善它,使之能支持更多的操作,例如暂停.恢复.修改等. 在动态添加定时任务中其实已经涉及到了其中的一些代码,这 ...

  5. Linux下的二进制兼容性的检测

    都知道Linux的二进制兼容与windows相比简直是天差地别,windows的二进制兼容做得特别好,很老的游戏都能在windows 10上跑,写的好的程序,在XP上也不是不可以.但是Linux就不一 ...

  6. Activity四种启动模式之singleTask应用

    Activity启动模式设置:         <activity android:name=".MainActivity" android:launchMode=" ...

  7. Git: fatal: Pathspec is in submodule

    出现是问题: git提交代码是出现fatal: Path 'directory/file' is in submodule 'directory''错误 Removing the directory ...

  8. coreData详解

    1.初识CoreData CoreData的结构构成: NSManagedObjectModel的构成: 可以通过Entity创建继承自NSManagedObject类的文件,这个文件就是开发中使用的 ...

  9. strace命令解析

    strace常用于跟踪和分析进程执行时中系统调用和耗时以及占用cpu的比例,常用的格式如下: 1.sudo /usr/bin/strace -Ttt -p pid 2>pid.log 跟进pid ...

  10. 自由是有代价的:聊聊这几年尝试的道路 要想生活好,别看哲学书和思想书。简单看看可以,看多了问题就大了。还是要去研究研究些具体的问题。别jb坐在屋子里,嘴里念着海子的诗,脑袋里想康德想的事情,兜里屁都没有,幻想自己是大国总理,去想影帝是怎么炼成的。

    自由是有代价的:聊聊这几年尝试的道路 现在不愿意写过多的技术文章了,一点是现在做的技术比较偏,写出来看的人也不多,二来是家庭事务比较繁多,没以前那么有时间写了.最近,园子里多了一些写经历的文章,我也将 ...