1. 7. Techniques That Address Multiple Availability Requirements
    1. Redundancy
      1. Hardware Redundancy Examples
      2. Software Redundancy Examples
      3. Environmental Redundancy Example
      4. Critical Success Factors
    2. Backup of Critical Resources
      1. Methods of Backup
      2. Hardware Backup Examples
      3. Software Backup Examples
      4. IT Operations Backup Examples
      5. Critical Success Factors
        1. Currency of backup
        2. Automated updating of backups
        3. Isolation of backup from primary
        4. Backup and restore procedure review and testing
        5. Generations of backups
        6. Integrity verification
    3. Clustering
      1. Comparing Clustering and Redundancy
      2. Hardware and Software Clustering Examples
      3. IT Operations Clustering Examples
      4. Environmental Clustering Examples
      5. Critical Success Factors
        1. Automatic load-sharing
        2. Physical separation of clustered components
    4. Fault Tolerance
      1. Hardware Fault Tolerance Examples
      2. Software Fault Tolerance Examples
      3. Environmental Fault Tolerance Examples
      4. Critical Success Factors
    5. Isolation or Partitioning
      1. Hardware Isolation Examples
      2. Software Isolation Examples
      3. Other Benefits of Isolation
        1. Minimize risk of changes
        2. Reduce resource contention
        3. Maximize resources
        4. Simpler systems management procedures
      4. Critical Success Factors
    6. Automated Operations
      1. Console and Network Operations Examples
      2. Workload Management Examples
      3. System Resource Monitoring Examples
      4. Problem Management Applications
      5. Distribution of Resources Example
      6. Backup and Restore Examples
      7. Critical Success Factors
    7. Access Security Mechanisms
      1. Steps to Secure Access
        1. Step 1: Identify the person requesting access
        2. Step 2: Verify the identity
        3. Step 3: Control access
        4. Step 4: Monitor all activities
      2. Types of Security
        1. Physical security
        2. Network security
        3. Application security
        4. Computer resource security
      3. Password Management
        1. Step 1: Enforce password selection guidelines
        2. Step 2: Expire passwords regularly
        3. Step 3: Expire assigned passwords on first use
        4. Step 4: Disable user accounts after successive invalid password attempts
        5. Step 5: Educate users on how to protect their password information
      4. Critical Success Factors
    8. Standardization
      1. Hardware Standardization Examples
      2. Software Standardization Examples
      3. Network Standardization Examples
      4. Processes and Procedures Standardization Examples
      5. Naming Standardization Examples
      6. Critical Success Factors
      7. Transitioning to Standardization
    9. Summary
  2.  

    8. Special Techniques for System Reliability

    1. The Use of Reliable Components
      1. Techniques for Maximizing Hardware Component Reliability
        1. Choose components with low failure rates
        2. Choose components that have high MTBF
        3. Purchase from reputable suppliers
        4. Use technical specifications as a gauge
        5. Choose products with fewer parts or greater integration
        6. Avoid newly developed products whenever possible
        7. Follow maintenance schedules diligently
      2. Techniques for Maximizing Software Component Reliability
        1. Avoid using "Version 1" and "Beta" software
        2. Don't use shareware or freeware
        3. Buy industry-standard software from reliable vendors
        4. Prior to installation, test for viruses
        5. Provide menus and other ways to control user inputs
        6. Reuse bug-free components or modules
        7. Test programs thoroughly
        8. Run "beta tests" with a controlled set of users
        9. Install the latest application software fixes judiciously
        10. Install the latest device drivers when available
        11. Upgrade to newer operating systems with caution
        12. Minimize the use of system utilities
      3. Personnel-Related Techniques for Maximizing Reliability
        1. Ensure high-quality user training
        2. Ensure quality training of support staff members
        3. Be wary of contractual hires
      4. Environment-Related Techniques for Maximizing Reliability
        1. Install Automatic Voltage Regulators (AVRs)
        2. Use adequate air-conditioning equipment
      5. Some Reliability Indicators for Suppliers
        1. Time in business
        2. Quality certification
        3. Industry awards
        4. Peer recommendation
        5. Warranty and support
    2. Programming to Minimize Failures
      1. Correctness
        1. Ensure user requirements are adequately determined
        2. Prototype the application prior to detailed coding
        3. Revalidate user requirements midway through the project
        4. Beta test prior to wide-scale deployment
      2. Robustness
        1. Test against out-of-bounds values
        2. Trap errors and prevent them from propagating
        3. Anticipate external changes
      3. Extensibility
        1. User changes
        2. System platform changes
        3. Regulatory changes
        4. Budgetary changes
        5. Business volume changes
        6. Business demand changes
        7. Generous database field sizes
        8. Design with overcapacity
        9. Place constant values in a look-up table
      4. Reusability
    3. Implement Environmental Independence Measures
      1. Use Power Generators
      2. Use Independent Air-Conditioning Units
      3. Use Fire Protection Systems
      4. Use Raised Flooring
      5. Install Equipment Wheel Locks
      6. Locate Computer Room on the Second Floor
    4. Utilize Fault Avoidance Measures
      1. Analyzing Problem Trends and Statistics
      2. Use of Advanced Hardware Technologies
      3. Use of Software Maintenance Tools
    5. Summary
  3.  

    9. Special Techniques for System Recoverability

    1. Automatic Fault Recognition
      1. Parity Checking Memory
      2. ECC Memory
      3. Data Validation Routines
    2. Fast Recovery Techniques
    3. Minimizing Use of Volatile Storage Media
      1. Regular Database Updates to Central Storage
      2. Automatic File-Save Features
    4. Summary
  4.  

    10. Special Techniques for System Serviceability

    1. Online System Redefinition
      1. Add or Remove I/O Devices
      2. Selectively Power Down Subsystems
      3. Commit or Reject Changes
    2. Informative Error Messages
      1. Use Standard Corporate Terminology
      2. Adopt Terms Already Used by Common Applications
      3. Tell What, Why, Impact, and How
      4. Implement Context-Sensitive Help
      5. Give Options for Viewing More Detailed Error Information
      6. Make Error Information Available After the Error Has Been Cleared
    3. Complete Documentation
      1. Have a Manual of Operations On Hand
      2. Write Basic Problem Isolation and Recovery Guides
      3. Provide System Configuration Diagrams
      4. Label Resources
      5. Provide a Complete Technical Library
    4. Installation of Latest Fixes and Patches
    5. Summary
  5.  

    11. Special Techniques for System Manageability

    1. Use Manageable Components
      1. Simple Network Management Protocol (SNMP)
      2. Common Management Information Protocol (CMIP)
      3. Desktop Management Interface (DMI)
      4. Common Information Management Format (CIM)
      5. Wired for Management (WfM)
    2. Management Applications
      1. Systems Management Issues
        1. Deployment
        2. Operations
        3. Security
      2. Automated Systems Management Capabilities
      3. System Management Applications and Frameworks
        1. Unicenter TNG (Computer Associates)
        2. Tivoli (IBM)
    3. Educate IS Personnel on Systems Management Disciplines
      1. Business Value of the Information System
      2. Value of Systems Management Disciplines
      3. Principles of Management
      4. Basic Numerical Analysis Skills
    4. Summary
  6.  

    12. All Together Now

    1. The Value of Systems Management Disciplines
    2. Which One First?
    3. Analyze Outages
    4. Identify Single Points of Failure
    5. Exploit What You Have
    6. An Implementation Strategy
    7. Summary

Techniques for HA IT Management的更多相关文章

  1. R语言书籍的学习路线图

    现在对R感兴趣的人越来越多,很多人都想快速的掌握R语言,然而,由于目前大部分高校都没有开设R语言课程,这就导致很多人不知道如何着手学习R语言. 对于初学R语言的人,最常见的方式是:遇到不会的地方,就跑 ...

  2. juce中的内存泄漏检测

    非常值得借鉴的做法,基于引用计数和局部静态变量,代码比较简单不加详解. //============================================================== ...

  3. R语言学习路线和常用数据挖掘包(转)

    对于初学R语言的人,最常见的方式是:遇到不会的地方,就跑到论坛上吼一嗓子,然后欣然or悲伤的离去,一直到遇到下一个问题再回来.当然,这不是最好的学习方式,最好的方式是——看书.目前,市面上介绍R语言的 ...

  4. Apache Hadoop 2.9.2 的HDFS High Available模式部署

    Apache Hadoop 2.9.2 的HDFS High Available 模式部署 作者:尹正杰 版权声明:原创作品,谢绝转载!否则将追究法律责任. 我们知道,当NameNode进程挂掉后,可 ...

  5. High Performance Networking in Google Chrome

    小结: 1. 小文件存储于一个文件中: 在内部,磁盘缓存(disk cache)实现了它自己的一组数据结构, 它们被存储在一个单独的缓存目录里.其中有索引文件(在浏览器启动时加载到内存中),数据文件( ...

  6. R语言 一套内容 从入门 到放弃

    [怪毛匠子整理] 1.下载 wget http://mirror.bjtu.edu.cn/cran/src/base/R-3/R-3.0.1.tar.gz 2.解压: tar -zxvf R-3.0. ...

  7. R语言学习路线图-转帖

    本文分为6个部分,分别介绍初级入门,高级入门,绘图与可视化,计量经济学,时间序列分析,金融等. 1.初级入门 <An Introduction to R>,这是官方的入门小册子.其有中文版 ...

  8. VCAP5-DCA – What’s new?

    see also: 韩国人的教材:http://ddii.pe.kr/ Section 1.1 – Implement and Manage complex storage Determine use ...

  9. Gartner 2018 年WAF魔力象限报告:云WAF持续增长,Bot管理与API安全拥有未来

    Gartner 2018 年WAF魔力象限报告:云WAF持续增长,Bot管理与API安全拥有未来 来源 https://www.freebuf.com/articles/paper/184903.ht ...

随机推荐

  1. Linux 安全密钥验证

    [root@rhel7 ~]# ssh-keygen --在客户端主机中生成“密钥对” Generating public/private rsa key pair. Enter file in wh ...

  2. 通过socks tunnel设置http代理

    1. 在服务器上使用ssh创建tunnel -f -C -q -N milton@112.34.113.35 # -D: 让ssh在指定的端口(-)上建立一个 SOCKS tunnel # -f: 让 ...

  3. oracle加密-des 简单举例.

    Declare  v_seed Raw(128);  v_key_1 Raw(64);  v_key_2 Raw(64);    v_Text_for_encrypted Raw(64);  v_mw ...

  4. 使用extract-text-webpack-plugin提取css文件

    一.css之上的语言 js之上的语言有jsx.tyepscript.coffescript. html之上的语言有jade. css之上的语言有sass.scss.less.stylus,这几种语言区 ...

  5. 给你出道题---N个数字的静态决策区分问题

    决策,是世界上最重要的事情. 走路分两步:看准方向,大步前进.看准方向的过程就是决策. 任何一个问题,都对应两个空间:解空间和决策空间.我们所要做的就是使用决策空间去划分解空间. 决策可以分成两类:单 ...

  6. 使用Anemometer分析MySQL慢查询记录

    数据库管理员一般是用percona的toolkit工具来分析MySQL慢查询记录,但是不够直观. 下面介绍一款比较直观的工具来统计分析MySQL慢查询记录anemometer. 在使用之前需要安装pe ...

  7. 树莓派进阶之路 (028) - 树莓派SQLite3的安装

    MySQL占用内存太大,而SQLite是一款轻量级零配置数据库,非常适合在树莓派和其他嵌入式系统中使用.SQLite文档详细资料丰富,本文不会详细解释SQLite数据库操作的方方面面,只能结合具体场景 ...

  8. 微信多客服插件获取openid

    <!doctype html> <html> <head> <meta http-equiv="Content-Type" content ...

  9. elk之elasticsearch 入门

    一.概述: 1.查看elasticsearch集群的健康状况: [root@node115 kibana]# curl -X GET http://192.168.39.115:9200/_cat/h ...

  10. 【Android】Android动态加载Jar、APK的实现

    本文介绍Android中动态加载Jar.APK的实现.而主要用到的就是DexClassLoader这个类.大家都知道Android和普通的Java虚拟机有差别,它只能加载经过处理的dex文件.而加载这 ...