Feeds

National Grid computers locked-down in outage cock-up

'Country was safe' during 24 hour lie-down

Remote control for virtualized desktops

National Grid suffered a major computer system outage last week, leaving many of its staff twiddling their fingers while services supplier Computer Sciences Corporation (CSC) scurried to provide a fix.

The electricity and gas operator, which supplies energy to homes and businesses throughout England and Wales, confirmed the blunder to El Reg this morning.

A spokeswoman said: “National Grid experienced problems with its office IT systems last week.” She added that the cock-up did not “affect the separate operational systems and energy supplies were not affected".

Customers will be relieved to learn that “the country was safe” during the computer system outage.

“The problem caused inconvenient [sic] to office staff and had no impact on supply or distribution of energy,” said the National Grid spokeswoman.

One source claimed that Active Directory (AD) clusters on the energy giant’s Windows 2003-based server were deleted late last Tuesday. This would have locked office staff out of the Grid's computer network.

The source told us that a restore job kicked in shortly after the problem occurred, but claimed it took more than 24 hours for CSC, which earlier this week reported global annual revenues that topped $16bn, to bring the National Grid’s computer network back up and running.

Email was out for longer, though, with mail servers finally being recovered last Friday, according to the source.

The Register asked CSC, which, in January 2004 bagged an outsourcing contract – worth $470m over seven years – to support the National Grid’s IT infrastructure, if the energy provider’s AD had indeed been deleted.

We also wanted to find out why the IT services firm didn’t have a back-up or redundancy system in place to keep operations at the National Grid running smoothly for its 18,000 or so users while the company worked on a fix.

However, at time of writing, CSC is yet to provide us with any comment. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.