All Episodes

October 16, 2025 24 mins

professorjrod@gmail.com

What keeps a business alive when the lights flicker, a server drops, or an ISP blinks? We pull back the curtain on practical resilience—how continuity planning, capacity, and clear runbooks turn chaos into a minor hiccup—then pressure-test the plan with drills, documentation, and ruthless honesty.

We start by grounding COOP in the messy reality of people and places: cross-training gaps, pandemic downsizing, and the strain of return-to-office on infrastructure that never fully grew back. From there, we break down high availability without fluff—hot, warm, and cold sites, plus cloud recovery that scales on demand. Testing gets real with load and failover exercises, because hope is not a strategy. We go deep on clustering choices (active-active vs. active-passive), health checks, and the power stack that actually carries you through outages: dual PSUs, smart PDUs, UPS coverage, and generators that are not just installed but tested.

Security on paper fails at the door, so we layer physical controls that work in the real world: lighting, sight lines, bollards, access vestibules, badges, biometrics, CCTV, alarms, and trained guards who can respond when seconds matter. We add deception technologies to slow attackers and capture valuable telemetry. A blunt backup story drives the point home—retention policies, daily verification, and restoration drills aren’t optional. Snapshots enable quick rollback; off-site copies protect against building-level incidents; simple file naming saves hours under pressure. We even share personal lessons on NAS setups, cloud sync, and the small frictions that derail good intentions.

If you care about uptime, user trust, and sleeping at night, this conversation gives you a blueprint: map critical services, set real RPO/RTO goals, diversify dependencies, practice failover, and verify backups every day. Subscribe, share with a teammate who owns “the pager,” and leave a review with your best resilience win—or the failure that taught you most.

Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.

Listen on: Apple Podcasts   Spotify

Support the show


Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions

Juan Rodriguez can be reached at
TikTok @ProfessorJrod
ProfessorJRod@gmail.com
@Prof_JRod
Instagram ProfessorJRod

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
SPEAKER_00 (00:00):
First, continuing continuity of operations
planning or COOP ensures thecentral functions continue
during disruption.
This includes backup,communication plans, alternate
work locations, and even remoteaccess strategy.
Capacity planning is vital too.
Assessing your people, systems,and infrastructure to ensure

(00:21):
resources meet demands.
Don't overlook people, peoplerisk, layoffs, rapid hiring, or
lack of cross-training cancripple this.
And this is happening, you seethis a lot with return to work,
where people, some companies areasking you to come in three or
four days a week just to start.
I just think a lot of them don'thave the infrastructure.

(00:44):
They downsize so much duringCOVID that I don't think they
have the infrastructure to haveeverybody in.
So they I think they want themto stagger people.
Unless you're Chase, right?
Chase is building a hugebuilding in I think it's 48th
Street and Park Avenue.
Everybody's going back to workwhen that opens up.
Next on high availability, it'sthe holy grail of uptime.

(01:07):
System designed to keep runningeven when components fail.
We achieve this through ascalability, elasticity, full
tolerance, and redundancy.
Let's break this down.
Hot sites, fully operationalduplicates, ready to take over
instantly.
This is expensive though.
Warm sites, partially equipped,requiring some figuration some

(01:28):
configurations, and cold sites,just space and power, slow to
activate.
Cloud sites are flexible, costefficient, and globally
accessible.
Testing matters.
Low testing, failover testing,and monitoring validation
ensures alerts work beforedisaster strikes.
Then there's clustering.

(01:48):
Multiple processing nodes,sharing workloads through
virtual IPs.
Active passive, one node runs,the other waits.
Active active, both handletraffic, boosting performance
and fault tolerance.
Power redundancy keepseverything running.
Do PSUs, manage PDUs, UPSsystems, and generators for

(02:08):
extended outages.
Finally, diversity and defensein depth.
Avoid single points of failure.
Mix platform vendors and clouds.
This not only boosts resistancebut encourages innovation and
reduces dependency on onesupplier.
Yeah, even something simple ashaving two different ISPs for

(02:29):
your internet access, right?
One is the regular one and theother one is the backup.
And usually the backup is at alower speed, so you know, since
then you're not really using it,you're not paying as much.
So I, you know, the it might notbe as fast if you don't need it
to be as fast, but it would itwould still let the people have
email, which is the mostcritical nowadays.

(02:51):
Uh don't forget deceptiontechnologies, honey pots, honey
nets, honey flies, and faketelemetry telemetry lure
attackers away from the realsystems.
They can provide valuableforensic insight.
To wrap up this segment,resistance is a one-time setup.
It's tested through tabletopexercise, bail award drills, and

(03:11):
simulations.
Documentation ensures lessonslearned are captured and
improvements made.
Now let's talk about physicalsecurity.
Cybersecurity and physicalsecurity go hand in hand.
Our firewall won't stop someonewith bolt cutters.
Physical security is your firstline of defense.
It protects people, hardware,and infrastructure.

(03:33):
Start with site layout, fencing,and lighting.
Well-designed environments deterintruders through visibility and
barriers.
A principle known as crimeprevention through environment
design.
Bowlers, those are those thingsthat they put in the front of
the buildings, right?
They're like metal poles.
So they put, I don't know ifthey're metal, but concrete,

(03:54):
they're concrete.
That way you can't drive a carinto the building.
Those are bollards.
Protect from vehicle attacks,fencing defines boundaries,
lighting eliminates hidingspots.
Next, gateway and locks, bothphysical and electronic.
Man trap or access vestibulesprevent tailgating and cable

(04:17):
locks to ensure to securelaptops.
Access badges and biometricscanners provide accountability.
Surveillance plays a criticalrole.
CCTV, motion detector, and evendrones now monitor sensitive
areas.
Pair that with an alarm system,motion, noise, proximity, or
duress, using infrared,pressure, microwave, or

(04:40):
ultrasonic sensors.
Finally, trained armed guardsact as both for deterrent and
rapid responders, reinforcingyour technical controls with
human presence.
And it's weird because, youknow, there's only so much the
camera can do, right?
A lot of this stuff can do, andthen at the end you always need
a human because a human is gonnabe able to do what?

(05:03):
Basically taste the guy out,right?
If you if you're having anissue, you know, if somebody's
there, you can taste them, youcan taste them out.
Where if you are, you know, justthe camera, the camera can't do
anything.
You know, the camera is thecamera.
Um but one of the things I'llsay about crime prevention
through environmental design isyou can have all of these things

(05:25):
there, right?
But if they if you havesomething of value, something
that they want, something thatyou know it is that they need,
they're gonna they're gonna trytheir yardness to get in.
Even after all these things thatyou have.
You may have all these thingsthere, but if there's something
that they want, they're gonnaget there.

(05:47):
It's just like a home.
Right?
Protecting your your work, youknow, physical security is just
like physical security in yourhome.
It's the same concept, right?
You want lights, right?
You want cameras, you want afence at home, you have a dog,
right?
And and then you have you haveyourself.

(06:08):
But if if you have somethingthat somebody wants, right, if
they know that you have a lot ofmoney, they're gonna try to go
into your house and take it.
So yes, these things are goodand they'll slow down the
person, and you can get to seewho they are and what they are
right and what they look like,and you may be able to prevent
some stuff, but if you havesomething of value, people are

(06:29):
gonna want to get in.
That's just you know, that's thereality of it.
All right.
Now onto the questions.
The way we do it is I ask fourquestions.
I'll read the first one, readthe four choices, give you and
read it again, and then give youfive seconds, and then you
answer the question.
All right, question number one.

(06:51):
Which of the following bestdescribes a warm site?
a a fully operational duplicatesite ready to take over
immediately?
B a facility with minimalinfrastructure that requires
setup before use.
C a site with partial equipmentand data requiring some
configuration, or D.

(07:12):
A cloud-based failoverenvironment that scales
automatically.
I'll read the question again.
Which of the following bestdescribes a warm site?
A.
A fully operational duplicatesite ready to take over
immediately, B.
A facility with minimalinfrastructure that requires
setup before use.
C a site with partial equipmentand data requiring some

(07:34):
configuration, or D.
A cloud-based failoverenvironment that scales
automatically.
I'll give you five seconds toanswer this question.
Five, four, three, two, one.
And the answer is C.
Warm sites have partialequipment and backup but need a
digital configuration beforebecoming operational.

(07:55):
Alright, hope you got thatright.
Question number two.
What is the main purpose ofsnapshots and data protection?
A.
Encrypting files in transit.
B capturing the state of thesystem for quick restoration.
C copying data to a remote site,or D.
Compressing backup data.

(08:15):
I'll read it again.
What is the main purpose ofsnapshot in data protection?
A.
Encrypting files in transit.
B capturing the state of asystem for quick restoration.
C copying data to a remote siteor D compressing backup data.

(08:36):
Give me five seconds to answerit.
Five, four, three, two, one.
And the answer is B.
Snapshots record the state or VMat a specific time, allowing
quick rollback after corruptionor failure.
Alright, did you go for two fortwo?
Let's hope so.
Now, number three, what physicalcontrol helps prevent

(08:58):
tailgating?
A security guard, B.
Access control vestibule, Cmotion sensor, D cable lock.
I'll read it again.
Which physical control helpsprevent tailgating?
A security camera, B accesscontrol vestibule, C motion
sensor or D cable lock.

(09:18):
I'll give you five seconds tothink about it.
Five, four, three, two, one.
And the answer is B.

(09:54):
Access control vestibues or mantraps ensure only one person
passing through at a time,preventing unauthorized entry
via tailgating.
Alright, last one, let's go fourfor four.
In a clustering configuration,what is the key difference
between active active and activepassive setups?
A.
Active active requires morestorage.

(10:15):
B active passive has no failovercapabilities.
C active active sharesworkloads.
Active passive keeps a standbynode.
Or D Active Passive needs manualintervention to switch nodes.
I'll read the question again.
In clustering configuration,what is the key difference
between active active and activepassive setups?

(10:37):
A active active requires morestorage.
B active passage has no failovercapability.
C active active sharesworkloads, active passive key to
standby node.
Or D Active Passive needs amanual intervention to switch
nodes.
Alright, I'll give you fiveseconds.
Five, four, three, two, one.

(10:59):
And the answer is C.
Active Active Clustersdistribute workloads among
nodes, while Active Passivekeeps one node in standby for
failover.
Alright, before we wrap it uptoday, I just one thing I want
to talk about, and it's backups.
Guys, if you are in charge ofthe backups, it is very, very

(11:20):
important to make sure that youcheck your backup every day.
Here's a story for you.
I knew this one person who wasin charge of the backup in his
office.
And this is a this is really amiscommunication between you
know the him and the and thecompany.
And when your company goescheapo or cheap, this is the

(11:45):
result that happens.
He was in charge of backing upthe mail server, the email
server.
And one day he came in and theemail server was asking him for
tape two.
So this was the physical, it wasconnected, the backup drive was
connected to a server, so he wasdoing tape drive.
It wasn't, it was before cloudbackup.

(12:05):
I'm pretty sure now they docloud.
Wait, so he came in and says,hey, put in tape two.
So he saw this as a problembecause in this company it did
not have an email retentionpolicy.
So people were having theiremails from the 90s.
This is I'm talking about backin 2014, 2015, right?

(12:26):
And people were were had youknow 9-11 folders in their in
their email systems, right?
About everything that happenedon that day.
There was no email retention.
People were keeping emailsforever.
So it's part, you know, it'spart not having a policy, an
email policy, was part of theproblem.

(12:48):
So anyway, he writes in theemail and says, hey guys, we
need to buy a bigger tape drivewith more capacity, because this
tape drive is not backing up allthe emails.
They come back and they tell himthat there's no money for a new
tape drive.
He's gonna have when he comes inin the morning, he's gonna have
to put in tape two.

(13:10):
The problem with putting in thetape two is if you are in the
office at that time at seven inthe morning and it hasn't backed
up your stuff, while it'sbacking up your stuff, it will
lock your email.

unknown (13:24):
Right?

SPEAKER_00 (13:25):
Your email's locked.
You won't be able to do anythingwith your email while it's
backing up.
Depending on how long, how muchemail that you have, it could be
a while before the tape backupbacks up everything that you
have, and then it releases itreleases the file, right?

(13:45):
Or the files.
So, and to be honest, sometimeshe will forget.

unknown (13:51):
Right?

SPEAKER_00 (13:52):
He comes in at 10, something else is at seven,
something else is going on,right?
He forgets to swap the tape, andthen in you know, sometime
during the middle of the day, hewould realize and he would have
to hit, you know, insert tapetwo, yes or no, he would have to
hint no.
Unfortunately, he would have tohint no.
But like I always tell people,you never know when the backup

(14:17):
when you're gonna need it.
So apparently, this was going onfor a while that he wasn't
putting in tape two, and that'shis fault, right?
Anyway, one day he comes in, theserver had crashed, he has to
restore from tape.
He only has tape one, he doesn'thave a tape two tape.

(14:40):
So 25% of the people in thatoffice lost their entire email
system, right?
They wanted to fire him, theywanted to fire him, but since he
wrote an email, and this is youknow comes back to covering your
own your own back, right?
Since he wrote an email sayingthat he needed a tape drive, and

(15:04):
they told him no, you kinda youkinda you cannot just blame him,
you have to blame the companyalso for deciding to go cheap.
Right?
So it's partially their fault,partially his fault.
They gave him an alternative.
When you come in at 7 o'clock,put in tape too.

(15:26):
Apparently he wasn't doing it.
So he didn't get fired, but hedid get moved out of his group
and put in with a differentgroup.
Don't know if he got written up.
I wouldn't be surprised if hegot written up, because that has
happened before.
Not this exact situation, butwhen the employees do something

(15:48):
that's a little bit egregious,they get written up.
And he probably was put onprobation, probably, you know,
not given a raise that year,probably not given a bonus.
You know, this this but luckilylike this was like employee
number five.
Like this company has beenaround 40 years, maybe now.
And he was like employee numberfive.
Like he's he's been with themsince the beginning.

(16:12):
So I think that that alsoaffected whether they were gonna
fire him or not.
Because he, you know, he was hewas there for a while.
But, you know, again, there'sconsequences when you don't take
care of the backup.
The backup is the mostimportant, one of the most
important things that you haveto look out for.
And if you are responsible forbackups, make sure that that

(16:34):
backup backs up every day.
That was one of my things that Iwould do when I was working in
tech.
My job was to make sure myassigned servers had their
backup.
And that's the first thing Iwould do in the morning.
I would come in in the morning,check my email, nothing else is
going on.
I would check the backup, makesure all the backups ran the
night before.
And if they didn't, fix it, seewhy, right?

(16:57):
Take a note, check it the nextday, right?
And we'll check it every day.
This is a Monday through Friday.
This was an everyday procedure.
Something went wrong.
Maybe they needed to clean thetape head.
You asked somebody off-site, alot of the servers were remote.
Hey, can you clean the tapedrive?
And they would clean it, andthen we would try it again the
next day, see if that if itworked.
If it didn't, after a while, Isay, hey, sound the alarm.

(17:20):
Tape backup tape is not working.
Let's get it fixed.
You never know.
You never know.
So if you're responsible for thebackups, pay attention.
Make sure that your tapes aregood.
You know, nowadays most peopleare doing cloud, right?
But if you're listening to thisand you work for a small
company, probably not doingcloud, probably too expensive

(17:42):
for you.
So if if that's you, listen tothis.
I'm telling you, take it fromme.
You never know when that serveris gonna crash.
And you're gonna need those tapebackups.
So make sure that you're doingit every day.
And another story I want to tellyou about backup is my own
personal story.
Almost, almost a disaster.

(18:03):
I was backing up, I just back upnowadays.
You just need to back up reallyyour documents, right?
So I have a documents folder anda downloads folder, and I have
Google Drive.
But the problem, you know, I payfor extra storage.
The problem with Google Drive isGoogle, you know, if you don't
name your files right, like me,like I put word file, and I know

(18:28):
that I've written it by thedate.
So I usually search for it bydate.
So I backed up my stuff to myGoogle Drive.
About a month later, my harddrive crashed, and I had all my
papers for my doctoral classesin there, and I needed to repost

(18:49):
them on my website.
I was supposed to upload themafter each class.
I was supposed to upload theprimary paper that I written,
and I didn't never got a chanceto do it.
So we were at the last the lastyear of the program, they were
going to check to see if you didit.
I haven't done it.
My hard drive crashed.

(19:12):
I was like, geez.
But luckily, I had backed up amonth prior.
I had all of the stuff saved.
The only thing I don't save,like, oh, you know, semester
one, paper two, right?
Which is, you know, and then theyear.
I don't do that.
I just sometimes I just put inlike gibberish, you know, like

(19:33):
part one paper.
So when I downloaded everythingout of Google Drive and I put it
into the new hard drive,everything was the same date.
And you know, most people theysearch by day.
Oh, let me see the day I wroteit.
Like I know I wrote it inJanuary, right?
Or I know I wrote it in in thefall semester, so it has to be

(19:54):
between September and December.
Well, now that it was gone,everything was the same date.
And I had, and I looked at howmany documents I had in total, I
had like 5,000 Word documents,right?
So I was like, wow, I'm gonnahave to go through these, you
know, open up one by one, which,you know, until I find out,

(20:17):
yeah, there's some that were,you know, it was fine because
some of them I can tell by bythe title, but it's the ones
that I didn't write a proper,you know, file name, which is
what I was having the troublewith.
Luckily, though, right?
I would I was going maybe I wasthrough like 200 of them
already, with this daunting taskof having to go through at least

(20:39):
5,000 of them.
I realized that I put everythingthrough Grammarly to check my
grammar, of course.
And at Grammarly Premium and itstores it, it saves the file.
So, and I just went up there andand all the files were there.
So I just had to down, you know,re-download them from Grammarly.

(21:02):
I made sure that I put thecorrect file name.
So that's you know, that's theother thing.
You know, when you back up yourpersonal backups, right?
We talked about the companybackup, and somebody might think
about company backup.
You could also back up on yourpersonal stuff.
And I find out, I find mostpeople, and I do a poll in my
classes, who who backs up.
Most people don't.
You know, you have a 20 20students, you get maybe one or

(21:24):
two of them that back upregularly.
So, you know, it's it's aproblem.
We we still don't have thatbackup mentality in in cyber and
in this country, right?
We don't we don't really wedon't do a good job of backing
up, at least our personaldevices.
And even even I'm guilty ofthat.
You know, I let a couple ofmonths go by before I back up

(21:44):
myself.
Not that you should be backingup every day.
That's for for home computers.
No, that's impossible.
But you should make an effort.
So I I ended up getting a NASdrive, a network attached
storage drive, and that's what Iback up to.
That keeps everything, you know,that's that's more than enough
to do it.
The only thing is it's a Buffaloone.
The only thing is every timeWindows does an update, I lose

(22:07):
the I lose it.
I have to re-enable theconnection again.
And it happens every time thatWindows does an update.
And the the guy at Buffalo, hetold me that it Windows kind of
does it on purpose, or theychange, they're trying to lock
down on certain stuff as far assecurity concerned.
And, you know, I I come, I if Ihave an update for Windows, I

(22:28):
know I'm gonna lose a connectionto my NAS drive and I have to do
all the setup, the whole thingagain.
It doesn't take that long, butstill, it's I wish it was, you
know, something.
But the guy told me, he goes,you'll notice it.
He goes, notice it again everytime you do a Windows update.
You're gonna have to do thisagain because it Windows does
something to it that disconnectsit.

(22:50):
So, but listen, I have there'smany ways to back up.
You know, network attachedstorage, there's the cloud,
right?
There's tape.
There should be no excuse foranybody backing, not backing up
their stuff, either home or atwork.
All right, we covered a lottoday.
We covered asset management andprotection, backup and recovery,

(23:12):
redundancy and highavailability, and physical
security fundamentals.
All of these come together tocreate a resistant organization
capable of survivingdisruptions, digital or
physical.
Remember, true security isn'tjust firewalls and passwords,
it's the ability to keepoperating no matter what

(23:34):
happens.
Thanks for tuning in toTechnology Tap.
Uh Professor J-Rod reminding youto keep tapping into technology.
This has been a presentation ofLittle Tatcha Productions art by

(23:57):
Sabra, music by Joe Kim.
We're now part of the Pod MatchNetwork.
You can follow me at TikTok atProfessor J Roll at J R O D, or
you can email me atprofessorjroll at j r at gmail.
Advertise With Us

Popular Podcasts

Las Culturistas with Matt Rogers and Bowen Yang

Las Culturistas with Matt Rogers and Bowen Yang

Ding dong! Join your culture consultants, Matt Rogers and Bowen Yang, on an unforgettable journey into the beating heart of CULTURE. Alongside sizzling special guests, they GET INTO the hottest pop-culture moments of the day and the formative cultural experiences that turned them into Culturistas. Produced by the Big Money Players Network and iHeartRadio.

Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.