Verified Document

Personal Technology Contingency Plan With Nearly Every Essay

Personal Technology Contingency Plan With nearly every aspect of modern life dependent on electronic devices, there has never been a more important time to have a personal technology contingency plan. Smartphones and their many contacts, applications and customized options often represent hundreds of hours of time invested in getting them configured to a person's specific preferences. Multiply this by the number of devices and laptops that many people are relying on in their lives and to do their jobs, and the impact of losing all this data can readily be seen. It would bring anyone's life to a screeching halt and lead to days of chaos as the information, applications and specific settings were regenerated from memory. Too often human memory and effort is the default technology contingency plan (Young-Jai, 2001).

The most common scenarios that lead to lost data include lost or stolen devices, corrupted data and disk storage on systems, or the application and operating system corruption (Young-Jai, 2001). Large scale disasters including earthquakes, tornados, hurricanes and tornados often destroy tens of thousands of devices and lead to billions of dollars in information assets being...

While the risk of these larger-scale events are not as great as a device being stolen or failing over time, the common denominator to solve this problem is to have automated backups of personal data to cloud-based storage systems. Over a decade ago Web-based storage systems were considered ideal for contingency plans (Young-Jai, 2001) and today they include advanced authentication and security features (Tang, Lee, Lui, Perlman, 2012). Using a cloud-based platform to create a more device-independent strategy of data protection and backup makes more economic sense than local storage, as cloud-based systems can propagate backup and recovery options across a multiple of personal devices (Tang, Lee, Lui, Perlman, 2012). A personal technology recovery plan needs to be based on a solid foundation of automated backup, data verification and authentication options to get data assets completely independent of their hardware dependencies that are often the downfall of data recovery efforts (Young-Jai, 2001). Focusing on how devices and their data can be backed up transparently and with no added steps can assure both data and configuration options are successfully captured for later retrieval in…

Sources used in this document:
Bibliography

Spinellis, D. (2009). Basic etiquette of technical communication. IEEE Software, 26(6), 86-87.

Tang, Y., Lee, P., Lui, J., & Perlman, R. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9(6), 903.

Young-Jai, L. (2001). A case study on developing a web-based contingency plan for business crises. International Journal of Risk Assessment and Management, 2(3), 330-339.
Cite this Document:
Copy Bibliography Citation

Related Documents

Impact of Information Technology on Disaster Recovery and Contingency...
Words: 2616 Length: 9 Document Type: Term Paper

New York State firefighting history is a microcosm of early and modern disaster preparedness. Definition of disaster in the historic era and modern era. Early historical facts. The need for uninterrupted communication. Response to needs. Advent of the Internet. New needs, new responses. Worthiness of Disaster Recovery and Contingency Plans for keeping communications flowing smoothly. The overall importance of communication. The firefighting department of New York City, generally considered to be the first of organized efforts to combat community

Marketing Planning This Marketing Plan Details Itcorp's
Words: 8175 Length: 25 Document Type: Term Paper

Marketing Planning This marketing plan details Itcorp's business model. It addresses the company's mission, policies, strategies and objectives to achieve profitability. Itcorp's integrated software and hardware solutions for healthcare providers are described at length, as well as objectives for the long-term. Our company Itcorp plans to begin operations starting in January 2006. One thing that is unique about Itcorp is how it got its start. In 1988, two partners, Max Renfield and C.L.

Reasons Information Technology System Projects Fail
Words: 3750 Length: 10 Document Type: Research Paper

Information Technology System Projects Fail Information system projects mostly end up in a failure. Along with inherent factors such as technical issues delaying implementation and indefinable expectations of customers, inappropriate budgeting and opposition to business process reengineering also makes the project go up in smoke. (Scott and Vessey, 2002) The first step towards a project's success is its objectives which should be specific, measurable and realistic. Researchers have previously emphasized

ERP and Information Security
Words: 8373 Length: 26 Document Type: Term Paper

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

Spotlighting Samplings 4 Qualitative Research Choices 6
Words: 16532 Length: 60 Document Type: Research Paper

Spotlighting Samplings 4 Qualitative Research Research Choices 6 the Phenomenology Method The Ethnography Method DEPTH Four Qualitative Approach Comparison Strengths and Critiques of Case Studies "A research design indicates the full research process from conceptualization of the research problem, generation of data, analysis and interpretation of findings, and dissemination of results" (Magilvy & Thomas, 2009, What and Why… Section, ¶ 4). The Question of Interest What type of research design should the researcher use? To answer the study's critical research

Human Resource Department: Strengths and
Words: 5153 Length: 15 Document Type: Thesis

Things run relatively smoothly overall, but they could be vastly improved if there were more communication channels and if more people in the company felt like HR personnel were more approachable and easier to talk to. The Creation of Strategic Plans So many things go into the creation of a strategic plan, that it is often very difficult to know where to even begin to make one, but this is one

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now