Presentation is loading. Please wait.

Presentation is loading. Please wait.

Group 3 Tsui Ho Man, Man 10020225 Zhangyuyao, Claire11051493 Chiu Chun Kit, Toby11002565.

Similar presentations


Presentation on theme: "Group 3 Tsui Ho Man, Man 10020225 Zhangyuyao, Claire11051493 Chiu Chun Kit, Toby11002565."— Presentation transcript:

1 Group 3 Tsui Ho Man, Man Zhangyuyao, Claire Chiu Chun Kit, Toby

2 I want to start my own business after this president term !

3 So I need server service…. Where to find it????

4

5 XXXX ! There are so many advertisements, so sad.

6

7 Free hosting Shared(virtual) hosting Collocated Hosting Dedicated Hosting Type of Hosting service

8 Free Hosting

9 Shared (Virtual) Hosting

10 Dedicated Hosting

11 Collocated Hosting Unlimited Physical limitation

12 Free hosting Shared(virtual) hosting Collocated Hosting Dedicated Hosting

13

14 to host a private server, one of many virtual machines running on a single computer

15 As the provider: -High turnover rate rate -High return -Low investment cost As the clients -Lower cost -Adapt to different system and software -Own domain name and i.p. -sufficient support service

16 As the provider: -Difficult to manage -Low security As the clients: -restricted traffic volume -affect by other users -not have the full right -limited topic

17 a type of Internet hosting in which the client leases an entire server not shared with anyone else.

18 As the provider: -no need to provide the management, upgrade, security service As the clients -no need to share server with other users -have full control -more domain name and i.p.

19 As the provider: -Low security -Low return rate As the clients: -high management cost -Software upgrade problem -Limited topic

20 DOS Data Loss Hacking Disaster Political restrict Price Low speed Security Privacy

21 Consumption of computational resources Disruption of configuration information Disruption of physical network components make a machine or network resource unavailable to its intended users

22 Disaster recovery (DR) is the process, policies and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a Natural or Human-induced disaster

23 A natural disaster is a major adverse event resulting from natural processes of the Earth; examples include floods, volcanic eruptions, earthquakes, tsunamis, and other geologic processes.

24 an element of human intent, negligence, or error; or involving a failure of a human-made system. It results in huge loss of life and property. It further affects a person's mental, physical and social well-being. e.g. Crime, Hacking, Arson, Civil disorder, Terrorism, War, unfix of plug…

25 If company host their web by themselves, any disaster occur, such as flooding, fire and etc. Servers kept in the office maybe damaged or out of control. The web will down The business will stop until the server has fixed The data store inside may lost The reputation will lost from clients

26 Disaster recovery is a subset of business continuity While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.

27 Users want their systems to be ready to serve them at all times. Availability refers to the ability of the user community to access the system to submit new work, update or alter existing work, collect the results of previous work. If a user cannot access the system, it is said to be unavailable. Generally, the term downtime is used to refer to periods when a system is unavailable.

28 Maintain the availability of IT assets and data as well as the ongoing business operation with real time replication of data to active and stand-by servers in the data center. When a system goes down Recovery time: within an hour 1 Hour

29 Backup servers will be prepared for web content and database application High Availability solution captures changes to data and applications in real time and replicate to standby servers, which enables controlled, non-intrusive switching and fast, reliable failover to meet any contingency.

30 By synchronizing the database to alternative servers in different data center, your critical business information will be safeguarded.

31 Secure protection of your critical business systems and data with secure transportation of data to offsite location Rapid recovery solution by leveraging WAN for high performance data replication Optimized WAN traffic by replicating only modified content Outages are identified and diagnose root problems for quicker recovery Servers are protected by NCSA Labs certified firewalls and monitored 24×7

32 Hong Kong is an international Financial Trading logistics hub and home to many regional offices and headquarters of global corporations.

33  Robust Telecommunications Infrastructure;  Reliable Power Supply with Comparatively Low Tariff;  Pro-business Environment;  Proximity to the Mainland of China;  Free Flow of Information;  Effective Protection of Data Privacy and Information Security;  Tech-savvy Professionals.

34 Hong Kong's telecommunications infrastructure is one of the world's most sophisticated and advanced  wide range of innovative services available at low cost;  fully liberalised regime brings a vibrant market of Internet transit, exchange, hosting and content providers;  high speed fibre connectivity is available to data centres throughout the territory with ample choices of providers. (As at November 2012, there were 186 Internet service providers licensed to provide broadband services. Our household broadband penetration rate of 87% and mobile penetration rate of over 223% are among the highest in the world.)

35  Highly stable, with reliability. two power companies use various fuels for power generation with extra capacity and robustness of supply, as well as emergency support to each other during generator failure.  Continues to enjoy a relatively low electricity tariff in comparison with other cities in the Asia Pacific Region.  Power supply meets the Uptime Institute Data Centre Site Infrastructure Tier Standard and TIA Telecommunications Infrastructure Standard for Data Centres (TIA-942).

36

37 Hong Kong is one of the world’s freest economies, characterised by free trade, a free market system, free flow of capital, simple and predictable tax regime and low tax rate.

38 Twelfth Five-Year Plan (12-5 Plan) The Mainland is a significant market as well as a provider of information and communications technology (ICT) products and services. With our proximity to the Mainland of China, Hong Kong is an ideal location for businesses to seize the growing demand for secure data centre services both in Hong Kong and China.

39 Hong Kong enjoys free flow of information. There is no law or administrative arrangement allowing the Government to interfere with data centre operations or exercise content censorship.

40 Effective data protection provides a conducive and trustworthy environment for regional data centres.  In Hong Kong the Personal Data (Privacy) Ordinance, which has been in force since 1996, provides the legislative framework for the protection of personal data in terms of collection, use and transfer.  Changed in recent days.

41  large pool of mobile, agile, skilled and multi-lingual professionals.  local immigration policies.


Download ppt "Group 3 Tsui Ho Man, Man 10020225 Zhangyuyao, Claire11051493 Chiu Chun Kit, Toby11002565."

Similar presentations


Ads by Google