ADSM-L

Re: OT? TSM in a hospital environment

2006-06-21 10:04:49
Subject: Re: OT? TSM in a hospital environment
From: "Johnson, Milton" <milton.johnson AT CITIGROUP DOT COM>
To: ADSM-L AT VM.MARIST DOT EDU
Date: Wed, 21 Jun 2006 10:04:16 -0400
 This is an issue with "turn-key systems".  If you buy an application
from a vendor and plan to hold them responsible for the application's
uptime/availability and data restoration, it is reasonable that the
vendor can dictate the hardware/os used, the ability to run other
software on the system and the backup methodology implemented.  You end
up with some systems being outside the TSM back-up environment but that
is part of the price paid when you must have a critical, third party
vendor application.  You still have to perform due diligence such as a
demonstration of restoration at the time of implementation.

Milton
-----Original Message-----
From: ADSM: Dist Stor Manager [mailto:ADSM-L AT VM.MARIST DOT EDU] On Behalf Of
Tyree, David
Sent: Monday, June 19, 2006 12:29 PM
To: ADSM-L AT VM.MARIST DOT EDU
Subject: [ADSM-L] OT? TSM in a hospital environment

            Are there any folks on the list that are using TSM in a
hospital? 

            Sometimes we have to battle with some of our software
venders to allow us to backup their system using TSM. Sometimes they
will tell us that the system is FDA approved as is and must be backed up
using a built-in tape drive and we can't touch the system. Some times
that might be believable but not always. It seems that GE appears to be
especially hard headed in this regard. 

            We bought into TSM because you back up anything (well most
anything) and not have to worry about having assorted different tape
drives scattered everywhere. 

            I would like to compare notes with other TSM people if
possible.

            thanks

 

David Tyree
Enterprise Backup Administrator
South Georgia Medical Center
229.333.1155

text pager 1569 AT tais.sgmc DOT org

 

Confidential Notice:  This e-mail message, including any attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure or distribution is prohibited.  If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message.