Premium Content

Access "Katrina data management snafus compound chaos"

Jo Maitland, News Director Published: 19 Oct 2012

In the weeks that followed Hurricane Katrina, IT professionals and volunteers scrambled to assemble technology to reunite evacuees with their loved ones. But while technology eventually prevailed, many reunions were delayed as IT and bureaucracy clashed in the face of the unprecedented disaster. On arrival at Houston's Astrodome shortly after the hurricane, approximately 25,000 evacuees filled out a form with their personal information and gave it to the American Red Cross. Volunteers then entered the data into a pilot database program called the Coordinated Assistance Network (CAN), run by a group of nonprofit organizations, including the American Red Cross and the Federal Emergency Management Agency (FEMA). Related articles Katrina-affected business gets back Ontrack How to survive a hurricane Preparing for the worst: Effective DR in five stepsHow to create a business continuity plan "CAN is an Internet-based database in which many agencies post information for the purpose of sharing data," said Andrew Adams, an IT production analyst at First Data Corp., ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

    • Tape library scales up and down

    • Katrina data management snafus compound chaos by Jo Maitland, News Director

      A lack of planning and IT skills leaves the Red Cross scrambling to organize data into a system for refugees to search for missing loved ones.

    • Process frameworks and storage

      Process frameworks provide guidelines for improving storage practices and procedures. But understanding the differences between process, procedure and policy is essential. Here are 10 ways to ensure a successful process framework implementation.

    • Hidden threats to data

      Inadequacies in storage governance and weaknesses in data management may pose far less-visible risks to a company's data. To mitigate these threats, you must be aware of the impact and probability of these risks to reduce or eliminate them.

    • Keep remote offices in sync

      With regulatory compliance, data protection requirements and the need to share data, remote office data can no longer be ignored. Wide-area file system products can rein in and protect remote data.

    • Better capacity forecasting

      There are two methods for devising storage capacity forecasts: quantitative and qualitative. By combining the two, you can develop practical metrics that will make more accurate forecasts.

More Premium Content Accessible For Free