skip to main content
research-article
Open access

Weathering the Unexpected: Failures happen, and resilience drills help organizations prepare for them.

Published: 16 September 2012 Publication History

Abstract

Whether it is a hurricane blowing down power lines, a volcanic-ash cloud grounding all flights for a continent, or a humble rodent gnawing through underground fibers -- the unexpected happens. We cannot do much to prevent it, but there is a lot we can do to be prepared for it. To this end, Google runs an annual, company-wide, multi-day Disaster Recovery Testing event -- DiRT -- the objective of which is to ensure that Google’s services and internal business operations continue to run following a disaster.

Cited By

View all
  • (2024)Enabling Storage Business Continuity and Disaster Recovery with Ceph distributed storageEPJ Web of Conferences10.1051/epjconf/202429501021295(01021)Online publication date: 6-May-2024
  • (2016)Evolve or DieProceedings of the 2016 ACM SIGCOMM Conference10.1145/2934872.2934891(58-72)Online publication date: 22-Aug-2016
  • (2014)Finding trojan message vulnerabilities in distributed systemsACM SIGARCH Computer Architecture News10.1145/2654822.254198442:1(113-126)Online publication date: 24-Feb-2014
  • Show More Cited By

Comments

Information & Contributors

Information

Published In

cover image Queue
Queue  Volume 10, Issue 9
File Systems
September 2012
20 pages
ISSN:1542-7730
EISSN:1542-7749
DOI:10.1145/2367376
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 September 2012
Published in QUEUE Volume 10, Issue 9

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Editor picked

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9,517
  • Downloads (Last 6 weeks)907
Reflects downloads up to 16 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enabling Storage Business Continuity and Disaster Recovery with Ceph distributed storageEPJ Web of Conferences10.1051/epjconf/202429501021295(01021)Online publication date: 6-May-2024
  • (2016)Evolve or DieProceedings of the 2016 ACM SIGCOMM Conference10.1145/2934872.2934891(58-72)Online publication date: 22-Aug-2016
  • (2014)Finding trojan message vulnerabilities in distributed systemsACM SIGARCH Computer Architecture News10.1145/2654822.254198442:1(113-126)Online publication date: 24-Feb-2014
  • (2014)Finding trojan message vulnerabilities in distributed systemsACM SIGPLAN Notices10.1145/2644865.254198449:4(113-126)Online publication date: 24-Feb-2014
  • (2014)Finding trojan message vulnerabilities in distributed systemsProceedings of the 19th international conference on Architectural support for programming languages and operating systems10.1145/2541940.2541984(113-126)Online publication date: 24-Feb-2014

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media

References

References