{"id":50,"date":"2015-12-11T15:10:59","date_gmt":"2015-12-11T15:10:59","guid":{"rendered":"http:\/\/it-toolkits.org\/blog\/?p=50"},"modified":"2016-07-11T09:35:59","modified_gmt":"2016-07-11T09:35:59","slug":"what-is-technology-downtime","status":"publish","type":"post","link":"https:\/\/it-toolkits.org\/Blog\/what-is-technology-downtime.html","title":{"rendered":"What is Technology &#8220;Downtime&#8221;?"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkit_downtime1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-105\" src=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkit_downtime1.png\" alt=\"IT-Toolkit_downtime\" width=\"950\" height=\"350\" srcset=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkit_downtime1.png 950w, https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkit_downtime1-300x111.png 300w\" sizes=\"(max-width: 950px) 100vw, 950px\" \/><\/a><\/p>\n<p>&#8220;Downtime&#8221; is hard to define. The meaning will vary by organization, person, system and event. On a big picture level, downtime occurs whenever a given system (application, server, network) cannot be accessed or used for its intended purpose. Obviously, there are &#8220;shades&#8221; of downtime based on the degree of impact (intermittent interruptions or full-blown outage), duration, frequency, visibility (internal systems versus external systems for customer usage), and extent (the number of end-users and locations involved). These &#8220;shades&#8221; drive related costs and the need for effective management solutions.\u00a0 (Also Read:\u00a0 Offering Apologies for Service Problems)<\/p>\n<p>All that said, a strategic approach to managing IT in business demands a &#8220;practical, big picture view&#8221;.\u00a0 Technology outages happen.\u00a0 These events must be prevented to the extent possible (through quality service and operational management).\u00a0 But, since downtime is largely inevitable despite the best practices, IT managers must consider all the &#8220;costs&#8221; and take appropriate action to mitigate negative consequences.<\/p>\n<h3>Understanding the Costs of Downtime<\/h3>\n<p>They say that everything has a &#8220;cost&#8221;, and of course <em>downtime in IT<\/em> is no exception.\u00a0 Of course, there are the hard costs, encompassing the financial expenditures needed to recover from downtime events, as well as the related financial losses directly attributable to downtime events (i.e. lost revenue due to an inability to process purchase requests or lost salaries due to an inability of staff to perform expected functions).<\/p>\n<p>Then you have the other side of the downtime cost equation &#8212; <em>the &#8220;soft cost&#8221;<\/em>.\u00a0 These costs may be more difficult to quantify in terms of a specific downtime event, but they are no less real or damaging.<\/p>\n<h4>How to Define the Hard Costs of Downtime<\/h4>\n<p>The first step is to identify all of the elements posing &#8220;downtime risks&#8221;, including any infrastructure devices, servers, desktops, applications and productivity systems (phone, email, video-conferencing, internet access). The goal is to determine the level of exposure for downtime, and to quantify related cost factors &#8211; i.e. what are the potential costs associated with systems repair, replacement and related operational losses?\u00a0 To complete this analysis, you must understand how a given system is used, and its value within the organization considering the following parameters:<\/p>\n<ul>\n<li><strong>Revenue<\/strong> &#8211; Is the system directly involved in revenue generation, i.e. ecommerce?<\/li>\n<li><strong>Operations<\/strong> &#8211;\u00a0 What internal operations does this system support?<\/li>\n<li><strong>Productivity<\/strong> &#8211; How is this system used to increase internal productivity?<\/li>\n<li><strong>Customer Relationships<\/strong> &#8211; What role does this system play in the service of external customers?<\/li>\n<li><strong>Regulatory Requirements<\/strong> &#8211; How does this system help us to meet regulatory requirements?<\/li>\n<\/ul>\n<h4>How to Define the Soft Costs of Downtime<\/h4>\n<p>When it comes to IT related downtime, soft costs are all about productivity consequences and &#8220;lost opportunity&#8221;.\u00a0 Downtime costs extend beyond <em>dollars and cents<\/em>, into the intangible realm of workplace productivity. Considering the potential sensitivities involved, downtime can become quite personal (&#8220;I can\u2019t get my work done because of you and your systems&#8221;, or &#8220;My customer is mad at me because of you and your systems&#8221;).\u00a0 As such, downtime can have a serious and negative impact on one or more of the following:<\/p>\n<ul>\n<li>Downtime can diminish the level of credibility and trust in the IT department.<\/li>\n<li>Downtime can damage the viability of the long term IT\/end-user relationship.<\/li>\n<li>Downtime can lead to lost productivity and create a need to re-do work already performed.<\/li>\n<li>Downtime can cause IT staff to lose confidence in themselves, their organizational mission and will lead to diminished organizational morale.<\/li>\n<li>Downtime can lead to ineffective work procedures believed necessary due to a lack of confidence in existing systems.<\/li>\n<li>Downtime can make it more difficult to realize the\u00a0strategic IT management vision.<\/li>\n<\/ul>\n<h3>Downtime Costs and IT Strategic Planning<\/h3>\n<p>Once you can identify the costs of downtime, contrasted with the costs of downtime management, you will be in a position to weigh overall costs and benefits. The driving force is the assumption that downtime is costly and unproductive and should be avoided to the extent possible and practical.\u00a0 The question is&#8230; what is &#8220;possible and practical&#8221;?<\/p>\n<p>The answer will vary by organization, circumstance, and even by individual system. To find your &#8220;possible and practical&#8221; solutions you will need to weigh individual downtime consequences against viable management solutions, looking to find the right balance between cost and benefit. Obviously, IT must take advantage of all available &#8220;best practices&#8221; to ensure that technology is properly installed and maintained. But, fully redundant hardware systems, while theoretically desirable, may not be cost justified under all situations.<\/p>\n<p>Steps and strategies taken to prevent and mitigate downtime must be sufficiently <strong>targeted<\/strong> (relevant to business needs and downtime costs), <strong>realistic<\/strong> (you must have the staff and the resources to make it happen), and <strong>effective<\/strong> (it has to get the job done). As costly as downtime may be, the costs of false expectations and unfulfilled promises may go beyond actual measurement. That said, downtime should be prevented to the extent possible and practical, and all related management practices, including <em>disaster recovery planning<\/em> and <em>proactive problem management<\/em>, should be made an regular part of your <strong>IT management program<\/strong> and related strategic vision.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Downtime&#8221; is hard to define. The meaning will vary by organization, person, system and event. On a big picture level,<\/p>\n","protected":false},"author":1,"featured_media":105,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-50","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-risk-management"],"_links":{"self":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts\/50"}],"collection":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":0,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts\/50\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/media\/105"}],"wp:attachment":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/media?parent=50"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/categories?post=50"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/tags?post=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}