Building(a(( Fault(Tolerant(Network(

Size: px
Start display at page:

Download "Building(a(( Fault(Tolerant(Network("

Transcription

1 Building(a(( Fault(Tolerant(Network( Donnie&Grimes,(Vice(President(of(Information(Services( Justin&Hensley,(Support(Administrator,(Department(of(Information(Technology(

2 Diagnosing(the(Problem(! University(of(the(Cumberlands(Department(of(Information( Technology(implemented(a(risk(analysis(to(review(potential( risks(to(technology(! The(results(of(the(analysis(revealed(that(our(datacenter(did( not(contain(enough(redundant(equipment(to(mitigate(the( high(risk(of(downtime(! The(results(also(pointed(out(several(key(areas(in(which(our( datacenter(needed(the(most(attention(

3 A( B( C( Risk(Analysis(Plot(Graph( Two(factor(analysis(that(includes(frequency(of(issues(and(severity((risk)(of(outage(

4 Key(Areas(of(Risk( ISP(Failure( Datacenter( Failure( Risk( Power/ HVAC( Failure( Core( Network( Equipment( Failure(

5 Project(Goals(! Although(we(realized(this(project(would(take(multiple(years,( we(created(the(following(goals(for(completion:(! ISP(redundancy(! Full(power(and(HVAC(redundancy(! Ability(to(quickly(rectify(core(network(hardware(failures(! Offsite(backups(to(cloud(! Offsite(replication(to(site(at(least(2(hours(away(! C0mpliance(with(industry(standard(disaster(recovery(procedures(

6 Mitigation( ISP(Failure(! The(BGP((Border(Gateway(Protoc0l)(solution(was(chosen(to( mitigate(isp(failures(! The(solution(included(the(following(acquisitions:(! Additional(100Mbps(circuit(from(Windstream(to(supplement(the( existing(100mbps(circuit(from(at&t(! Two(Cisco(2900(Series(routers(! Two(Cisco(5500(Series(ASA(firewalls(! Bandwidth(upgrade(for(Exinda(packet(shaping(device(

7 UC(ISP(Infrastructure( UC(utilizes(two(separate(ISP s(with(diverse(paths(for(bgp(routing.(

8 Mitigation( Power/HVAC(Failure(! High(power(UPS(units,(an(enterprise(backup(generator,(and( redundant(hvac(units(were(implemented(to(mitigate(power( and(hvac(failures(! The(solution(included(the(following(acquisitions:(! Enterprise(class(Generac(generator(! All(Datacenter(and(IT(facility(power(on(generator(! APC(220(volt(UPS(backup(systems(for(all(racks(! Datacenter(class(HVAC(unit(with(separate(redundant(unit(

9 Mitigation( Core(Network(Equipment(Failure(! Redundant(core(network(equipment(and(additional(stock( replacement(devices(were(implemented(to(mitigate(core( network(equipment(failures(! The(solution(included(the(following(acquisitions:(! Cisco(Catalyst(4510(with(redundant(supervisor(engines(! Additional(Cisco(Catalyst(backup(chassis(and(line(cards(in(stock(! Two(Cisco(5500(Series(ASA(firewalls(! Two(Exinda(packet(shaping(devices(

10 Mitigation( Datacenter(Failure( (Backups(! Historically,(backups(have(moved(from(diskatoatape(to(diska toadisk(due(to(increasing(backup(file(sizes(! In(order(to(comply(with(disaster(recovery(standards,(the(need( to(store(backups(in(the(cloud(was(realized(! The(solution(included(the(following(acquisitions:(! VEEAM(Backup(and(Replication(with(Cloud(Edition(! BlazePod(storage(units(! Amazon(Glacier(cloud(storage(

11 Cloud(Architecture(in(Veeam( Veeam(utilizes(Amazon(Glacier(to(store(onsite(backups(in(the(cloud(for(further( redundancy.(

12 Mitigation( Datacenter(Failure( (Disaster(Recovery(! University(of(the(Cumberlands(recently(expanded(to(a( remote(campus(in(florence,(ky(! This(campus(and(its(network(meet(our(criteria(for(a(disaster( recovery(site,(therefore(offsite(replication(will(target(the( Florence(location(! The(solution(included(the(following(technology(appropriated( from(main(campus:(! 3(Dell(ESXi(hosts(! HP(Lefthand(storage(units(

13 Dual(Site(Deployment(of(Veeam( Site(A((Main(Campus)(and(Site(B((Florence(KY(Campus)(each(have(their(own( replication(management(server(to(facilitate(full(site(replication.(

14 Conclusion( Issues(and(Results( Issues&! BGP(did(not(function(correctly( the(first(time(due(to(isp(routing( issue(! BGP(is(not(50/50(balanced(due( to(difference(in(tiers(of(isp s(! Generator(was(switched(off( during(a(maintenance(test(and( not(brought(back(online(before( a(power(outage( Results&! BGP(functioned((perfectly( when(an(outage(occurred(! Generator(alarm(panel(was( installed(to(notify(our(staff(of( issues(! Power(blackout(occurred(and( our(it(facility(served(teachers( as(they(accessed(online(class( sessions(

Aktion Managed Services and Application Hosting. Chris Elekonich

Aktion Managed Services and Application Hosting. Chris Elekonich Aktion Managed Services and Application Hosting Chris Elekonich Introduction What is Managed Services Managed Services is a technology buzzword which refers to the manner in which computer related services

More information

USC ITS Business-Continuity (BC) and Disaster-Recovery (DR) Planning. Prepared for the Association of Pacific Rim Universities March 2010

USC ITS Business-Continuity (BC) and Disaster-Recovery (DR) Planning. Prepared for the Association of Pacific Rim Universities March 2010 USC ITS Business-Continuity (BC) and Disaster-Recovery (DR) Planning Prepared for the Association of Pacific Rim Universities March 2010 1 Why Business Continuity and Disaster Recovery? We want to provide

More information

Fiscal Year 2015-16 Information Technology Request

Fiscal Year 2015-16 Information Technology Request PROGRAM PLAN STATUS and OIT BEST PRACTICES 2016-016 Approved Program Plan? N/A Date Approved: The university says that the project design follows best practices set forth by the datacenter equipment manufacturers

More information

Business Continuity and the Cloud. Aaron Shaver US Signal, Solution Architect

Business Continuity and the Cloud. Aaron Shaver US Signal, Solution Architect Business Continuity and the Cloud Aaron Shaver US Signal, Solution Architect Overview What is BC/DR? Why should businesses have a strategy? Why do many business choose not to? How does the cloud change

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

Datacenter Assessment

Datacenter Assessment The Netmagic team has compiled this Checklist to help you evaluate, compare and select datacenter facilities to meet your hosting, business continuity and disaster recovery needs. Based on industry best

More information

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control

More information

Request for Proposals Datacenter & Colocation September 2015

Request for Proposals Datacenter & Colocation September 2015 For further information contact: Hernan Vides Children s Oncology Group 222 E. Huntington Drive, Suite 100 Monrovia, CA 91016 Request for Proposals Datacenter & Colocation September 2015 Issue Date: 9/24/2015

More information

The goal in creating a comprehensive disaster recovery plan is simple: limit the

The goal in creating a comprehensive disaster recovery plan is simple: limit the Abstract Hopefully you have taken the necessary steps to protect data access from unauthorized users with firewalls and other HIPAA security measures but are you protected in the event of a disaster? The

More information

Data Center Design & Enterprise Networking

Data Center Design & Enterprise Networking Data Center Design & Enterprise Networking By Christian Mahood Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Networking & Systems Administration Rochester

More information

Advantages and Disadvantages of Hybrid Cloud Computing in Business. Mario Rodriguez. University of North Texas

Advantages and Disadvantages of Hybrid Cloud Computing in Business. Mario Rodriguez. University of North Texas Running Head: Advantages and Disadvantages of Hybrid Cloud Computing in Business Advantages and Disadvantages of Hybrid Cloud Computing in Business Mario Rodriguez University of North Texas There has been

More information

7/20/2013 Motorola ECU 1

7/20/2013 Motorola ECU 1 July 20, 2013 Network Infrastructure Enhanced for Business Continuity Executive Summary: A business continuity risk was identified that, if encountered, would have a high impact to CU members and operations.

More information

Leveraging Virtualization in Data Centers

Leveraging Virtualization in Data Centers the Availability Digest Leveraging Virtualization for Availability December 2010 Virtualized environments are becoming commonplace in today s data centers. Since many virtual servers can be hosted on a

More information

Data Center Audit April 2015

Data Center Audit April 2015 Data Center Audit April 2015 Table of Contents Executive Summary 2 5 Highlights and Accomplishments 6 7 Summary Observations 8 This report provides management with information about the condition of risks

More information

NY-1 DATACENTER AT A GLANCE. NY-1 is a Tier III-rated, SAS SSAE16 and HIPAA-certified data center

NY-1 DATACENTER AT A GLANCE. NY-1 is a Tier III-rated, SAS SSAE16 and HIPAA-certified data center NY-1 1.866.WEBAIR.1 WWW.NY1.WEBAIR.COM NY-1 LONG ISLAND S MOST SECURE, FULLY-REDUNDANT DATA CENTER ENTERPRISE COLOCATION, PRIVATE AND HYBRID CLOUD SOLUTIONS, AND MANAGED SERVICES. DATACENTER Enjoy the

More information

Disaster Recovery Plan

Disaster Recovery Plan Disaster Recovery Plan Purpose [ENTER COMPANY] is dedicated to the protection of its employees, facilities, and resources and to ensuring that our company can continue all aspects of its core business

More information

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

Disaster Recovery Checklist Disaster Recovery Plan for <System One> Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner

More information

Disaster Recovery and Business Continuity Planning Workshop. Jane Drews University IT Security Officer June 30, 2009

Disaster Recovery and Business Continuity Planning Workshop. Jane Drews University IT Security Officer June 30, 2009 Disaster Recovery and Business Continuity Planning Workshop Jane Drews University IT Security Officer June 30, 2009 2 Learning Objectives 1. Identify the components of effective Disaster Recovery & Business

More information

The Other Half of the Problem Server Closets and Small Server Rooms

The Other Half of the Problem Server Closets and Small Server Rooms The Other Half of the Problem Server Closets and Small Server Rooms Bill Tschudi Lawrence Berkeley National Laboratory October 24, 2012 wftschudi@lbl.gov SVLG Data Center Summit NEED TO CONVERT OT NON-STANFORD

More information

Developing a Comprehensive Disaster-Recovery Plan. Prepared for CENIC by USC Information Technology Services March 2010

Developing a Comprehensive Disaster-Recovery Plan. Prepared for CENIC by USC Information Technology Services March 2010 Developing a Comprehensive Disaster-Recovery Plan Prepared for CENIC by USC Information Technology Services March 2010 1 Why Business Continuity and Disaster Recovery? We want to provide continuous service

More information

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the

More information

Resource Management Group

Resource Management Group Managing the Operational Risks of Outsourcing November 21, 2003 Agenda External IT Sourcing: Risk Complexity Morgan Stanley Background Risk Framework Country Risk Vendor Risk Consultant Risk Review Discussion

More information

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,

More information

At Cavern Technologies, our goal is to meet and exceed our clients diverse requirements for IT infrastructure services.

At Cavern Technologies, our goal is to meet and exceed our clients diverse requirements for IT infrastructure services. A whole new world of Data Center security, reliability and efficiency At Cavern Technologies, our goal is to meet and exceed our clients diverse requirements for IT infrastructure services. Peter F. Clune,

More information

Protecting Virtual Servers with Acronis True Image Echo

Protecting Virtual Servers with Acronis True Image Echo Protecting Virtual Servers with Acronis True Image Echo IT organizations have discovered that virtualization technology can simplify server management and reduce total operating costs. Despite the technical

More information

Protecting Virtual Servers with Acronis True Image

Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image In This Paper Protecting Virtual Servers with Acronis True Image...3 Virtual Machines: The Data Protection

More information

Introduction to Datacenters & the Cloud

Introduction to Datacenters & the Cloud Introduction to Datacenters & the Cloud Datacenter Design Alex M. Hurd Clarkson Open Source Institute March 24, 2015 Alex M. Hurd (COSI) Introduction to Datacenters & the Cloud March 24, 2015 1 / 14 Overview

More information

Disaster Recovery (DR) Planning with the Cloud Desktop

Disaster Recovery (DR) Planning with the Cloud Desktop with the Cloud Desktop info@os33.com (866) 796-0310 www.os33.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering from a disaster

More information

Presentation: May 15 th 2013 Location: Saskatoon Speaker: Robert Picard. Airport Expertise. Holistic Approach to IT Solutions Automation Intelligence

Presentation: May 15 th 2013 Location: Saskatoon Speaker: Robert Picard. Airport Expertise. Holistic Approach to IT Solutions Automation Intelligence Presentation: May 15 th 2013 Location: Saskatoon Speaker: Robert Picard Airport Expertise Holistic Approach to IT Solutions Automation Intelligence Agenda Automation Intelligence (AI) Concept Responding

More information

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS VIEWABILL Cloud Security and Operational Architecture featuring RUBY ON RAILS VAB_CloudSecurity V1 : May 2014 Overview The Viewabill.com cloud is a highly-secure, scalable and redundant solution that enables

More information

Deploy App Orchestration 2.6 for High Availability and Disaster Recovery

Deploy App Orchestration 2.6 for High Availability and Disaster Recovery Deploy App Orchestration 2.6 for High Availability and Disaster Recovery Qiang Xu, Cloud Services Nanjing Team Last Updated: Mar 24, 2015 Contents Introduction... 2 Process Overview... 3 Before you begin...

More information

CTERA Portal Datacenter Edition

CTERA Portal Datacenter Edition Understanding CTERA Portal Snapshot Retention Policies CTERA Portal Datacenter Edition August 2013 Version 3.2 2013, CTERA Networks. All rights reserved 1 About CTERA Portal Snapshot Retention Policies

More information

Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 ( Act ), 1 and Rule

Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 ( Act ), 1 and Rule SECURITIES AND EXCHANGE COMMISSION (Release No. 34-70917; File No. SR-CME-2013-24) November 21, 2013 Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing of Proposed Rule Change

More information

VegaStream Tutorial - The Advantages & Disadvantages of Using Virtual Machines

VegaStream Tutorial - The Advantages & Disadvantages of Using Virtual Machines Getting Started with Server Virtualization HAROLD READ VIRTUALIZATION PRACTICE M AN AGER H T T P : / / W W W. A L L I N. C O M A L L I N C O N S U LT I N G S A L E S @ A L L I N. C O M 7 8 1. 2 1 3. 6

More information

INTERNET CORE ROUTER CORE ROUTER HSRP GW. domains, processing over one million messages per Our backbone providers include Level 3, TelCove and

INTERNET CORE ROUTER CORE ROUTER HSRP GW. domains, processing over one million messages per Our backbone providers include Level 3, TelCove and .NET Application Ho s t i n g Connectivity INTERNET DMD.NET Hosting s Boston, MA, Louisville, KY, Irvine, and San Fransisco, CA data centers connect to the internet through multiple backbones to ensure

More information

System Requirements Date 2014/09/22

System Requirements Date 2014/09/22 System Requirements Date 2014/09/22 orksoft_system_requirements.docx Version 1.0.42 orksoft_system_requirements.docx 22/09/2014 Page 1 / 10 1 orksoft System Requirements This document details the system

More information

2003 Year Established. 5,000+ Seats Available. 250,000 Sq. Ft. of Recovery Space. 6 Recovery Facilities. 100% Success Rate for Disaster Declarations

2003 Year Established. 5,000+ Seats Available. 250,000 Sq. Ft. of Recovery Space. 6 Recovery Facilities. 100% Success Rate for Disaster Declarations Recovery Services 2003 Year Established RECOVER Hypertec BCDR is a premier provider of business continuity and disaster recovery services on a nationwide scale. With state-of-the-art recovery centers that

More information

Astaro Mail Archiving Service Version 1.0

Astaro Mail Archiving Service Version 1.0 Astaro Mail Archiving Service Version 1.0 Process documentation Table of Contents 1. Introduction... 2 2. Overview... 2 2.1 Production Cloud... 3 2.2 Backup Cloud... 3 2.3 Control Cloud... 3 2.4 Access

More information

A CBTS White Paper. Offsite Backup. David Imhoff Product Manager, CBTS 4/22/2012 www.cbts.cinbell.com

A CBTS White Paper. Offsite Backup. David Imhoff Product Manager, CBTS 4/22/2012 www.cbts.cinbell.com A CBTS White Paper Offsite Backup David Imhoff Product Manager, CBTS 4/22/2012 www.cbts.cinbell.com Overview Business Data Backup Challenges Protecting critical data is a challenge for every organization.

More information

Policy Title: Data Systems Back-Up. Date Issued:

Policy Title: Data Systems Back-Up. Date Issued: Policy Title: Data Systems Back-Up Date Issued: September 1, 2007; Revised April 1, 2009; Revised June 22, 2010 Responsible Dept: Executive; Administration; I.T. POLICY Within the infrastructure of the

More information

Data Center Refresh: Build or Buy?

Data Center Refresh: Build or Buy? Data Center Refresh: Build or Buy? In-house data centers vs. colocation, managed services and cloud computing: 5 questions to consider Presented by Cosentry, the trusted Midwest provider of Managed and

More information

Linux High Availability

Linux High Availability Linux High Availability In general, there are service monitor daemons running on the load balancer to check server health periodically, as illustrated in the figure of LVS high availability. If there is

More information

Santa Clara, CA 95054

Santa Clara, CA 95054 Leading-Edge Datacenter Facility Silicon Valley GENERAL In excess of 41,000 sq. ft. of raised floor 9 MVA of utility power into facility Purpose built Green Datacenter Sutton Roley Lic. 00793235 (408)

More information

Year 2 Objectives 1. Assess current Internet usage patterns. 2. Monitor Internet usage types to shape and optimize network traffic rules.

Year 2 Objectives 1. Assess current Internet usage patterns. 2. Monitor Internet usage types to shape and optimize network traffic rules. Three-Year Goals and Objectives Future Proofing/Big Picture Projects Revised - Spring 2012 Goal: Internet Connection Capacity Upgrade Increase campus Internet circuit capacity to serve new and additional

More information

Infinite Campus Private Cloud District Migration Discussion

Infinite Campus Private Cloud District Migration Discussion Infinite Campus Private Cloud District Migration Discussion 12/10/15 Questions/Comments -- https://app.gosoapbox.com/ (Access Code - KDEdata) Infinite Campus Private Cloud Migration Agenda Purpose Project

More information

WHY EMAIL FAILS DELL SURVEY OF EMAIL OUTAGES. WHITE PAPER Dell Modular Services. www.dell.com/modularservices

WHY EMAIL FAILS DELL SURVEY OF EMAIL OUTAGES. WHITE PAPER Dell Modular Services. www.dell.com/modularservices DELL SURVEY OF EMAIL OUTAGES WHITE PAPER Dell Modular Services www.dell.com/modularservices THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

INTERNET CORE ROUTER CORE ROUTER HSRP GW. domains, processing over one million messages per and Cinergy. GB SWITCH GB SWITCH

INTERNET CORE ROUTER CORE ROUTER HSRP GW. domains, processing over one million messages per and Cinergy. GB SWITCH GB SWITCH Cold Fusion Hosting Connectivity INTERNET DMD CF Hosting s Louisville data center connects to the Internet through multiple backbones to ensure that the data is transmitted to clients seamlessly. CORE

More information

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GETTING THE MOST FROM THE CLOUD. A White Paper presented by GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are

More information

Systems, Storage and Software in the National Supercomputing Service. CSCS User Assembly, Luzern, 26 th March 2010 Neil Stringfellow

Systems, Storage and Software in the National Supercomputing Service. CSCS User Assembly, Luzern, 26 th March 2010 Neil Stringfellow Systems, Storage and Software in the National Supercomputing Service CSCS User Assembly, Luzern, 26 th March 2010 Neil Stringfellow Cray XT5 Monte Rosa 22,168 processors 1844 twelve-way nodes 2 AMD 2.4

More information

Cloud-based archiving Secure. Easy. Affordable. Centricity Image Archive

Cloud-based archiving Secure. Easy. Affordable. Centricity Image Archive GE Healthcare Cloud-based archiving Secure. Easy. Affordable. Centricity Image Archive Optimize your valuable IT resources Centricity Image Archive from GE Healthcare is a vendor-neutral, cloud-based data-storage

More information

Data Center Context. Trends & Energy Use. Joshua Hatch Director, Sustainability Analytics Brightworks Sustainability Advisors

Data Center Context. Trends & Energy Use. Joshua Hatch Director, Sustainability Analytics Brightworks Sustainability Advisors Data Center Context Trends & Energy Use Joshua Hatch Director, Sustainability Analytics Brightworks Sustainability Advisors Data Center Context Societal trends in business and individuals: Connectivity

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Page 1 Instsanda FAQs v1.2 Instanda FAQs Contents Hosting, Security, Monitoring and Management... 3 Where is Instanda hosted?... 3 What is the hosting datacentre compliance?...

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

HP Data Center Services

HP Data Center Services HP Data Center Services HP Technology Services - Per Event Services Technical data Enterprise-class data center facility infrastructures need to support both current IT objectives and new equipment and

More information

Cloud Computing for Business. Is It Right For You?

Cloud Computing for Business. Is It Right For You? A Cloud Computing for Business Is It Right For You? 1 So you want to move to the cloud? Cloud computing is a huge buzz word in the industry right now, and a lot of businesses are feeling compelled to move

More information

Audience. At Course Completion. Prerequisites. Course Outline. Take This Training

Audience. At Course Completion. Prerequisites. Course Outline. Take This Training Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Course 5054A: Two days; Instructor-Led Preliminary Course Syllabus Note: You are viewing a Preliminary Course Syllabus.

More information

Interim Data Center Strategy. Implementation Update

Interim Data Center Strategy. Implementation Update Interim Data Center Strategy Implementation Update Department Server Rooms Kalanimoku Building The Current Data Center Environment The State currently uses a primary data center and numerous departmental/divisional

More information

Cloud Hosting Option For New OnSite Customers

Cloud Hosting Option For New OnSite Customers Cloud Hosting Option For New OnSite Customers 1655 Palm Beach Lakes Blvd. Ste 708 West Palm Beach, FL 33401 Ph: 561-491-6000 Fx: 877-491-5860 Published: 10/29/14 Introduction To Cloud Hosting? In the past

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

Managed Enterprise Internet and Security Services

Managed Enterprise Internet and Security Services Managed Enterprise Internet and Security Services NOMINATING CATEGORY: CYBER SECURITY INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF INFORMATION OFFICER COMMONWEALTH OF PENNSYLVANIA FINANCE BUILDING HARRISBURG,

More information

How To Use Irecruit Software

How To Use Irecruit Software irecruit is a hosted SaaS (Software as a Service), cloud-based recruiting software designed to provide any size of business a cost effective, affordable and way to manage the recruiting process online.

More information

LuxCloud Pre-Sales FAQ Dynamics CRM + Hosted 365

LuxCloud Pre-Sales FAQ Dynamics CRM + Hosted 365 LuxCloud Pre-Sales FAQ Dynamics CRM + Hosted 365 Document Version 1.0 The Trusted Channel Centric Marketplace 1 The Trusted Channel Centric Marketplace Table of Contents 1 Questions and Answers on Hosted

More information

Availability Digest. www.availabilitydigest.com. Banks Use Synchronous Replication for Zero RPO February 2010

Availability Digest. www.availabilitydigest.com. Banks Use Synchronous Replication for Zero RPO February 2010 the Availability Digest Banks Use Synchronous Replication for Zero RPO February 2010 Two banks, the Bank of New York and the Fifth Third Bank, have each built highly-resilient, triplexed center complexes

More information

Virtus serves up colocation on demand in London, readies second datacenter

Virtus serves up colocation on demand in London, readies second datacenter Virtus serves up colocation on demand in London, readies second datacenter Analyst: Kelly Morgan 10 Mar, 2014 Virtus Data Centres hired CEO Neil Cresswell in April 2013, and has launched some innovative

More information

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

Attachment G.17. SAPN_PUBLIC IT Data Centre Opex Step Change. 03 July, 2015

Attachment G.17. SAPN_PUBLIC IT Data Centre Opex Step Change. 03 July, 2015 Attachment G.17 SAPN_PUBLIC IT Data Centre Opex Step Change 03 July, 2015 SAPN G.17_Data Centre Opex Step Change Original Proposal SA Power Networks submitted an opex step change totalling $4.446 (June

More information

Introduction to Datacenters & the Cloud

Introduction to Datacenters & the Cloud Introduction to Datacenters & the Cloud Introduction to Storage in the Cloud Alex M. Hurd Clarkson Open Source Institute April 14, 2015 Alex M. Hurd (COSI) Introduction to Datacenters & the Cloud April

More information

Company Overview. Benefits. Your Business is Our Focus

Company Overview. Benefits. Your Business is Our Focus Company Overview Quonix Networks Inc. is a leading regional provider of hosting, colocation, and managed datacenter services based in the Metro Philadelphia region. The company is focused on delivering

More information

Management Tools for Data Center Physical Infrastructure

Management Tools for Data Center Physical Infrastructure Management Tools for Data Center Physical Infrastructure Jack Hack Data Center Solutions BeLux Software Consultant Benelux APC by Schneider Electric X-ICT Xperience 2010 15 April Management Tools for Data

More information

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Data Center Consolidation: Lessons From The Field John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Agenda Factors to consider Technology strategy Building a project team How to use vendors wisely

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

ICADBS402A Complete database backup and restore

ICADBS402A Complete database backup and restore ICADBS402A Complete database backup and restore Release: 1 ICADBS402A Complete database backup and restore Modification History Version ICADBS402A Comments This version first released with ICA11 Information

More information

Contact Centers in the Cloud: A Better Way to Source

Contact Centers in the Cloud: A Better Way to Source Contact Centers in the Cloud: A Better Way to Source By Irwin Lazar Vice President and Service Director, Nemertes Research Executive Summary Contact Center Software as a Service (CCSaaS) solutions provide

More information

Cloud S ecurity Security Processes & Practices Jinesh Varia

Cloud S ecurity Security Processes & Practices Jinesh Varia Cloud Security Processes & Practices Jinesh Varia Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices AWS Security White Paper Available

More information

How To Write A Server On A Flash Memory On A Perforce Server

How To Write A Server On A Flash Memory On A Perforce Server Simplified HA/DR Using Storage Solutions Tom Tyler, Perforce Software Agnes Jacob, NetApp 1 Introduction Major League Requirements Review: Perforce Server Storage Profile HA vs. DR Fault Tree Analysis,

More information

Managed & Professional Services

Managed & Professional Services Managed & Professional Services Table of Contents Advanced Technical Solutions... 2 Managed Services... 4 Professional Services... 6 Proactive Monitoring... 8 1 Advanced Technical Solutions Capabilities

More information

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to

More information

Operations and Network Center (CORE)

Operations and Network Center (CORE) Operations and Network Center (CORE) Get to know us The Operations and Network Center (CORE) is the cornerstone in Informatica ECI's strategy for the provision of managed information technology services.

More information

Web Content Filtering. Why E-mail Sorting Solutions? Why ST BERNARD?

Web Content Filtering. Why E-mail Sorting Solutions? Why ST BERNARD? Web Content Filtering Why E-mail Sorting Solutions? Why ST BERNARD? Focused on Managed Messaging SaaS Security Since 2003 Superior-Architected Infrastructure DATACENTERS: Carrier-class hosting facilities

More information

Business Continuity at CME Group

Business Continuity at CME Group 1 Business Continuity at CME Group CME Group is proud of its solid Business Continuity Management program, which is central to helping mitigate potential impacts to our markets and customers. It defines

More information

MIRRORING HARD DRIVES IN REAL TIME WITH NO-COST SOFTWARE

MIRRORING HARD DRIVES IN REAL TIME WITH NO-COST SOFTWARE MIRRORING HARD DRIVES IN REAL TIME WITH NO-COST SOFTWARE 1 Web location for this presentation: http://aztcs.org Click on Meeting Notes 2 SUMMARY You can mirror two or more hard drives in real time using

More information

CSLOXINFO IDC@Exchange

CSLOXINFO IDC@Exchange CSLOXINFO IDC@Exchange IDC@Exchange - Secure and Connected Get your business protected and connected : IDC@Exchange - CSLOXINFO Internet Data Center (IDC) with direct connection to our self-managed internet

More information

Turnkey Technologies- A Closer Look

Turnkey Technologies- A Closer Look Presentation Agenda Turnkey Technologies, Inc. introduction Understanding & Embracing The Cloud Cloud Considerations How to Pick a Hosting Strategy Licensing Options & Sample Managed Services what to look

More information

Data Center Presentation

Data Center Presentation Data Center Presentation The NetSource Datacenter. Agenda General Layout of Data Center Policies and Procedures Designed to Latest Standards High Performance High Reliability High Security Design Details

More information

Troux Hosting Options

Troux Hosting Options Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4

More information

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an

More information

Security and Data Center Overview

Security and Data Center Overview Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)

More information

High availability on the Catalyst Cloud

High availability on the Catalyst Cloud White paper High availability on the Catalyst Cloud Features and techniques to improve availability, resiliency and business continuity of web applications hosted on the Catalyst Cloud 3 February 2016

More information

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP COMLINK Cloud Technical Specification Guide CLOUD DESKTOP Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Desktop 1-2 CloudProtect 1 DataProtect 2 Server Protect 2 Desktop

More information

Greening Data Centers

Greening Data Centers Greening Data Centers Dallas Thornton SDSC Division Director, Cyberinfrastructure Services March 2, 2011 Data Centers Are Enormous Users of Power US Data Centers (TeraWatt Hours per Year) 125 US Televisions

More information

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they

More information

Secure Hosting Solutions For SAGE Energy Management

Secure Hosting Solutions For SAGE Energy Management Secure Hosting Environment Partnerships In order to provide advanced levels of infrastructure security, Armstrong has partnered with two entities. Logicalis Inc. is recognized as a Channel Company s 2015

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

SAP hybris Commerce, cloud edition, Managed Services Description

SAP hybris Commerce, cloud edition, Managed Services Description SAP hybris Commerce, cloud edition, Managed Services Description Effective June 2015 OBJECTIVES AND SCOPE This document provides supplemental information regarding the Managed Services for the SAP hybris

More information

Implementation platform

Implementation platform Technical side of ASYCUDA World Implementation in SRI LANKA Customs Thilaka Pragnaratne Deputy Superintendent of Customs Implementation platform and network structure Implementation platform Perimeter

More information

Hosting Features, Terms & Policies

Hosting Features, Terms & Policies Hosting Features, Terms & Policies Portalogiks SharePoint Hosting Table of Contents Data Center Introduction... 2 Connectivity... 3 Power... 3 Security... 3 Environment... 3 Hosting Hardware & Software...

More information

Testing in the Cloud. A live demonstration of deploying testing in the cloud. 19-July Sydney, Australia 21-July Melbourne, Australia

Testing in the Cloud. A live demonstration of deploying testing in the cloud. 19-July Sydney, Australia 21-July Melbourne, Australia Testing in the Cloud A live demonstration of deploying testing in the cloud 19-July Sydney, Australia 21-July Melbourne, Australia Using the Cloud: A Practical View into the Cloud world The organisations

More information

Is it Possible to Live Without Having Real Estate?

Is it Possible to Live Without Having Real Estate? S max n i 1 a i q maxi n a i i 1 1 - - - - - - - - Information Security Goals Confidentiality Requirements Integrity Requirements Availability Requirements Mission Criticality C0 C1 C2 C3 I0

More information