Safety Critical & High Availability Systems
|
|
- Doreen Walters
- 8 years ago
- Views:
Transcription
1 SCHA - Version: 1 21 June 2016 Safety Critical & High Availability Systems
2 Safety Critical & High Availability Systems SCHA - Version: 1 3 days Course Description: This Masterclass examines the design of embedded systems and software that are to provide services in applications that could, when they fail, threaten the well-being or safety of people. Many, though not all, of these systems must not be stopped under any circumstances, and thus must be designed for high availability. Practical guidance is offered on how to address these concerns when designing systems in fields such as medical, automotive, avionics, nuclear and chemical process control. The Masterclass surveys concepts and alternatives for system and software architectures appropriate for safetycritical and high availability systems. Following an examination of hazard and risk analysis techniques, the seminar goes on to list a number of approaches to software safety that span fault avoidance, fault detection, and fault containment tactics including redundancy, recovery, masking and barriers. A variety of candidate architectural design patterns are examined, including dual/triple modular redundancy, shutdown monitors, dissimilar independent designs, backup parallel patterns and active/monitor parallel patterns. Many realworld examples are presented. Systems which are required to provide high availability must be designed to tolerate faults. Their design is usually based on off-the-shelf hardware and software combined in ways that will achieve
3 five-nines (99.999%) or greater availability. Basic hardware N-plexing and voting issues are discussed, followed by an in-depth study of a number of backward error recovery fault tolerance techniques including Checkpoint-Rollback, Process Pairs, and Recovery Blocks. The class continues with several forward error recovery techniques. Technical issues such as failover management, data replication, and software design defects, are addressed in depth. This Masterclass is far from a general course about system or software design theory, but rather it is tightly focused on the design of embedded systems and software that are required to provide their intended functions without endangering the safety or life of users or their environment, while at the same time maintaining high availability if required. Intended audience: This Masterclass is intended for practicing real-time and embedded systems engineers, software system architects, project managers and technical consultants who have responsibility for designing, structuring and implementing the hardware and software for real-time and embedded computer systems in applications that could, when they fail, threaten the well-being or life of people. Many of these systems have high availability as an additional design requirement Prerequisites: Course participants are expected to be familiar with general embedded and real-time software design. Objectives: The primary goal of this Masterclass is to give the participant the skills necessary to design systems and software for real-time and embedded computers in which faults and failures could pose a danger to human life. As part of this, participants gain skills in designing systems for high availability. This is very practical, results-oriented
4 training that provides knowledge and skills that can be applied immediately. Topics: Definitions and Background Hazards and Risks Safety vs. Fault Tolerance Design Issues for Safety Redundancy Approaches to Dependability Examples: Automotive Brake-by-Wire, Steer-by-Wire Preparatory Analyses Hazard Analysis: FMEA Fault & Event Tree Analysis Exercise: Fault Tree Analysis Probabilistic Event Tree Analysis Risk Analysis Approaches to Safety: Fault Avoidance, Fault Detection, Fault Tolerance Fundamental Safety Design Patterns Detection of Sensor Errors Failstop Fault Masking Shutdown Design Patterns Single Channel Patterns Multi-Channel Safety Design Patterns Actuation Monitoring Options Dual Channel Patterns Dual Closed-Loop Patterns
5 Heterogeneous Peer-Channel Pattern Example: Flight Control Computer Development Dual-Dual Pattern Design Patterns for Resiliency and Safety Monitor-Actuator Pattern Extended Example: Medical Respiratory Ventilator The Safety Executive Extended Example: Automotive Drive-by-Wire Extended Example: Airbus A330/340 Fly-by-Wire A Cookbook for Safety-Critical Design Functionality Learning from System Failures and Accidents Sources of System Accidents Hazard-Based Risk Analysis Calculations Exercise: Spacecraft Risk Analysis Software Factors in Some Famous Accidents High Availability: Underlying Principles Fault Avoidance vs. Tolerance Failure Curves Replication vs. Functional Redundancy vs. Analytic Redundancy Dynamic vs. Static Redundancy Extended Example: Space Shuttle Software Fundamental System-Level Availability Design Patterns Static Hardware Fault Tolerance N-Plex Design Exercise: MTBF, MTTF Calculations in Triple Modular Redundancy Dynamic System Fault Tolerance Redundant Pairs
6 Clusters Cluster Failover Strategy Choices Concepts for Backward Error Recovery Design Diversity Dynamic System Redundancy Backward Error Recovery Transactions & Checkpointing System and Software Design Patterns for High Availability Checkpoint-Rollback Process Pairs Recovery Blocks Limitations of Backward Error Recovery Patterns Forward Error Recovery Design Patterns Technical Issues in High Availability Design Failover Management Data Replication Dealing with Software Design Faults C Language in Critical Systems Software Robustness: MISRA-C, LINT, Static Code Analyzers Exercise: C-Language Shenanigans
7 º Final Examination
Design of High Availability Systems & Software
HighAv - Version: 2 21 June 2016 Design of High Availability Systems & Software Design of High Availability Systems & Software HighAv - Version: 2 2 days Course Description: This course examines the high-level
More informationEmbedded Real-Time Systems (TI-IRTS) Safety and Reliability Patterns B.D. Chapter 9. 405-456
Embedded Real-Time Systems (TI-IRTS) Safety and Reliability Patterns B.D. Chapter 9. 405-456 Version: 10-5-2010 Agenda Introduction to safety Patterns: 1. Protected Single Channel Pattern 2. Homogeneous
More informationEmbedded Systems Lecture 9: Reliability & Fault Tolerance. Björn Franke University of Edinburgh
Embedded Systems Lecture 9: Reliability & Fault Tolerance Björn Franke University of Edinburgh Overview Definitions System Reliability Fault Tolerance Sources and Detection of Errors Stage Error Sources
More informationManaging and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
More informationWestek Technology Snapshot and HA iscsi Replication Suite
Westek Technology Snapshot and HA iscsi Replication Suite Westek s Power iscsi models have feature options to provide both time stamped snapshots of your data; and real time block level data replication
More informationBig company HA does not have to be complicated or expensive for SMBs
hosted by Mario Blandini @ Drobo Big company HA does not have to be complicated or expensive for SMBs Virtual Server high availability for SMBs to both increase the availability of services and lower TCO
More informationISO 26262 Introduction
ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product
More informationRed Hat Enterprise linux 5 Continuous Availability
Red Hat Enterprise linux 5 Continuous Availability Businesses continuity needs to be at the heart of any enterprise IT deployment. Even a modest disruption in service is costly in terms of lost revenue
More informationDesigning, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationSafety Issues in Automotive Software
Safety Issues in Automotive Software Paolo Panaroni, Giovanni Sartori INTECS S.p.A. SAFEWARE 1 INTECS & Safety A very large number of safety software development, V&V activities and research project on
More informationTÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical
More informationMS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationHP Certified Professional
Purpose of the Exam Prep Guide Audience HP Certified Professional Implementing Windows Server 2003 on ProLiant Cluster Solutions Exam # HP0-794 Exam Preparation Guide The intent of this guide is to set
More informationCourse 20465: Designing a Data Solution with Microsoft SQL Server
Course 20465: Designing a Data Solution with Microsoft SQL Server Overview About this course The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure
More informationAvailability Digest. www.availabilitydigest.com. SAP on VMware High Availability Analysis. A Mathematical Approach. December 2012
the Availability Digest www.availabilitydigest.com SAP on VMware High Availability Analysis A Mathematical Approach December 2012 Vas Mitra SAP Virtualization Architect Editor s note: Vas Mitra is a SAP
More informationDesigning a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Page 1 of 6 Designing a Data Solution with Microsoft SQL Server Course 20465C: 4 days; Instructor-Led Introduction The focus of this four-day
More informationDesign Patterns for Safety-Critical Embedded Systems
Design Patterns for Safety-Critical Embedded Systems Von der Fakultät für Mathematik, Informatik und Naturwissenschaften der RWTH Aachen University zur Erlangung des akademischen Grades eines Doktors der
More informationSTORAGE CENTER WITH NAS STORAGE CENTER DATASHEET
STORAGE CENTER WITH STORAGE CENTER DATASHEET THE BENEFITS OF UNIFIED AND STORAGE Combining block and file-level data into a centralized storage platform simplifies management and reduces overall storage
More informationImplementing High-Availability (HA) Solutions for Siebel ebusiness Applications
Implementing High-Availability (HA) Solutions for Siebel ebusiness Applications Agenda Overview of High Availability for Siebel Web Servers Application Object Manager Servers Gateway NS & Non-Object Manager
More informationSOFTWARE DEVELOPMENT FOR EMBEDDED SYSTEMS
SOFTWARE DEVELOPMENT FOR EMBEDDED SYSTEMS Trends and Challenges in Developing Software for Embedded Systems Motivation This survey addresses software development in the field of embedded systems. Our goal
More information10215: Implementing and Managing Microsoft Server Virtualization
10215: Implementing and Managing Microsoft Server Virtualization Microsoft - Virtualização Nível: Avançado Duração: 30h Sobre o curso This five-day, instructor-led course will provide you with the knowledge
More informationControlling Risks Risk Assessment
Controlling Risks Risk Assessment Hazard/Risk Assessment Having identified the hazards, one must assess the risks by considering the severity and likelihood of bad outcomes. If the risks are not sufficiently
More informationASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY
ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY Dr. Qi Van Eikema Hommes SAE 2012 Government/Industry Meeting January 25, 2012 1 Outline ISO 26262 Overview Scope of the Assessment
More informationA System-safety process for by-wire automotive systems
A System-safety process for by-wire automotive systems Steer-by-wire and other by-wire systems (as defined in this article) offer many passive and active safety advantages. To help ensure these advantages
More informationHow To Write A Server On A Flash Memory On A Perforce Server
Simplified HA/DR Using Storage Solutions Tom Tyler, Perforce Software Agnes Jacob, NetApp 1 Introduction Major League Requirements Review: Perforce Server Storage Profile HA vs. DR Fault Tree Analysis,
More informationValue Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity
Value Paper Author: Edgar C. Ramirez Diverse redundancy used in SIS technology to achieve higher safety integrity Diverse redundancy used in SIS technology to achieve higher safety integrity Abstract SIS
More informationNEC Express Partner Program. Deliver true innovation. Enjoy the rewards.
NEC Express Partner Program Deliver true innovation. Enjoy the rewards. Why should you become an NEC Express Partner? As a value-added reseller, you re under enormous pressure to grow rapidly, control
More informationINDIA 28-30 September 2011 virtual techdays
Building highly Available Services on Windows Azure Platform Pooja Singh Technical Architect, Accenture Aakash Sharma Technical Lead, Accenture Laxmikant Bhole Senior Architect, Accenture Assumptions You
More informationApache S4: A Distributed Stream Computing Platform
Apache S4: A Distributed Stream Computing Platform Presented at Stanford Infolab Nov 4, 2011 http://incubator.apache.org/projects/s4 (migrating from http://s4.io) S4 Committers: {fpj, kishoreg, leoneu,
More informationTÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical
More informationCONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist
CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11
More informationKey Challenges in Cloud Computing to Enable Future Internet of Things
The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet
More informationM6430a Planning and Administering Windows Server 2008 Servers
M6430a Planning and Administering Windows Server Servers Course 6430A: Five days; Instructor-Led Introduction This five-day instructor-led course provides students with the knowledge and skills to implement,
More informationServer Virtualization with Windows Server Hyper-V and System Center
Server Virtualization with Windows Server Hyper-V and System Center About this Course This five day course will provide you with the knowledge and skills required to design and implement Microsoft Server
More informationVess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0
Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Purpose 1 Scope 1 Audience 1 What is High Availability?
More informationPervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
More information5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
More informationCloud Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms 1
Cloud Computing 1 Definitions (I) We have redefined Cloud Computing to include everything that we already do. I do not understand what we would do differently other then change the working of some of our
More informationELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL
61508-3 ª IEC: 1997 1 Version 12.0 05/12/97 COMMISSION CEI ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL COMMISSION Functional safety of electrical/electronic/ programmable
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers Course 6430 Five days Instructor-led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
More informationWhat is a Petabyte? Gain Big or Lose Big; Measuring the Operational Risks of Big Data. Agenda
April - April - Gain Big or Lose Big; Measuring the Operational Risks of Big Data YouTube video here http://www.youtube.com/watch?v=o7uzbcwstu April, 0 Steve Woolley, Sr. Manager Business Continuity Dennis
More informationFAULT-TOLERANT COMPUTING
This document contains 3087 words. FAULT-TOLERANT COMPUTING For articles on related subjects see ERROR-CORRECTING CODE; and ERRORS. Fault-tolerant computing is the art and science of building computing
More informationAOL CUSTOMER SUCCESS STORY
AOL CUSTOMER SUCCESS STORY AOL serves over 65 million web pages a day. With the Clustrix deployment, each data center now has a fault tolerant, scalable database that can grow with the data set and increasing
More informationSelecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004)
Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Dale Perry Worldwide Pressure Marketing Manager Emerson Process Management Rosemount Division Chanhassen, MN 55317 USA
More informationHIPEAC 2015. Segregation of Subsystems with Different Criticalities on Networked Multi-Core Chips in the DREAMS Architecture
HIPEAC 2015 Segregation of Subsystems with Different Criticalities on Networked Multi-Core Chips in the DREAMS Architecture University of Siegen Roman Obermaisser Overview Mixed-Criticality Systems Modular
More informationAvaya Aura Virtualized Environment
Avaya Aura Virtualized Environment Table of Contents Redundancy Options for Avaya Aura Virtualized Environment (AAVE)... 1 Avaya Aura Communication Manager (CM) Software Duplication and Statefull Failover...
More information20465C: Designing a Data Solution with Microsoft SQL Server
20465C: Designing a Data Solution with Microsoft SQL Server Course Details Course Code: Duration: Notes: 20465C 5 days This course syllabus should be used to determine whether the course is appropriate
More informationAdministering a Microsoft SQL Server 2000 Database
Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge
More informationQUality Assessment of System ARchitectures (QUASAR)
Pittsburgh, PA 15213-3890 QUality Assessment of System ARchitectures (QUASAR) Donald Firesmith Acquisition Support Program (ASP) Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University
More informationDowntime, whether planned or unplanned,
Deploying Simple, Cost-Effective Disaster Recovery with Dell and VMware Because of their complexity and lack of standardization, traditional disaster recovery infrastructures often fail to meet enterprise
More informationRPO represents the data differential between the source cluster and the replicas.
Technical brief Introduction Disaster recovery (DR) is the science of returning a system to operating status after a site-wide disaster. DR enables business continuity for significant data center failures
More informationServer Virtualization with Windows Server Hyper-V and System Center
Course 20409 Server Virtualization with Windows Server Hyper-V and System Center Length: Language(s): Audience(s): 5 Days English IT Professionals Level: 300 Technology: Windows Server 2012 Type: Delivery
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge
More informationCASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level -ORACLE TIMESTEN 11gR1 CASE STUDY Oracle TimesTen In-Memory Database and Shared Disk HA Implementation
More informationThe Aspect Unified IP Five 9s Environment
Technical Overview The Aspect Unified IP Five 9s Environment Technical Overview Aspect Unified IP 7 is a next-generation customer contact solution that enables companies to interact with consumers through
More information2. An analytic safety-attribute model. 2.1 Failure classification. 2.2 Failure cause
Safety Tactics for Software Architecture Design Weihang Wu Tim Kelly Department of Computer Science, University of York, York YO10 5DD, UK {weihang.wu, tim.kelly}@cs.york.ac.uk Abstract The influence of
More informationAdministering a Microsoft SQL Server 2000 Database
Administering a Microsoft SQL Server 2000 Database Elements of this syllabus are subject to change. Key Data Course #: 2072A Number of Days: 5 Format: Instructor-Led Certification Exams: 70-228: System
More informationUniversity of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities
II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationDesigning a Data Solution with Microsoft SQL Server 2014
Page 1 of 8 Overview The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies.
More informationCourse 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005
Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led
More informationLinuxWorld Conference & Expo Server Farms and XML Web Services
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
More informationDesigning a Data Solution with Microsoft SQL Server
The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies. It describes how
More informationHIGH AVAILABILITY LINUX ARCHITECTURE FOR MISSION CRITICAL WORKLOADS
HIGH AVAILABILITY ARCHITECTURE FOR MISSION CRITICAL WORKLOADS HIGH AVAILABILITY ARCHITECTURE FOR MISSION CRITICAL WORKLOADS (LF422) A high availability cluster capable of withstanding a data center outage
More informationCourse 20412A: Configuring Advanced Windows Server 2012 Services
Course 20412A: Configuring Advanced Windows Server 2012 Services Course Length: 5 Days Overview Course 20412A is part three of a three-course series that includes courses 20410A and 20411A. The series
More informationQuality is Advantage
Quality is Advantage Configuring Advanced Windows Server 2012 Services Course duration: 36 academic hours Exam Code: 70-412 This version of this course is built on the final release version of Windows
More informationMS-10215: Implementing and Managing Microsoft Server Virtualization. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery
MS-10215: Implementing and Managing Microsoft Server Virtualization This five-day instructor led course will provide you with the knowledge and skills to deploy and manage a server virtualization environment
More informationSoftware Engineering for Real- Time Systems.
Software Engineering for Real- Time Systems. Presented by Andrew Dyer-Smith and Jamie McClelland Overview What are Real-Time Systems. Requirements of Real-Time Systems Current Technology Construction 1
More informationCourse 20465C: Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Five days, instructor-led About this Course The focus of this five-day instructor-led course is on planning and implementing enterprise
More informationSkelta BPM and High Availability
Skelta BPM and High Availability Introduction Companies are now adopting cloud for hosting their business process management (BPM) tools. BPM on cloud can help control costs, optimize business processes
More informationDesigning a Data Solution with Microsoft SQL Server 2014
20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus
More informationDesigning a Data Solution with Microsoft SQL Server
Course Code: M20465C Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Data Solution with Microsoft SQL Server Overview The focus of this five-day instructor-led course is on planning
More informationAdministering a Microsoft SQL Server 2000 Database
Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,
More informationHadoop s Entry into the Traditional Analytical DBMS Market. Daniel Abadi Yale University August 3 rd, 2010
Hadoop s Entry into the Traditional Analytical DBMS Market Daniel Abadi Yale University August 3 rd, 2010 Data, Data, Everywhere Data explosion Web 2.0 more user data More devices that sense data More
More informationBosch Packaging Academy Essential Training
Essential Training Operating Fundamentals Work safely during operation Understand the basic functions of the equipment Get familiar with the operating elements Be able to operate the equipment Get familiar
More informationSTORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
More informationMiddleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
More informationCisco Disaster Recovery: Best Practices White Paper
Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2
More informationIP Telephony: Reliability You Can Count On
WHITE PAPER IP Telephony: Reliability You Can Count On Architecture Matters Table of Contents 1. IP Delivers a Foundation for Reliability.................................. 3 2. Compare Three Different
More informationWeb Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
More informationMixed-Criticality: Integration of Different Models of Computation. University of Siegen, Roman Obermaisser
Workshop on "Challenges in Mixed Criticality, Real-time, and Reliability in Networked Complex Embedded Systems" Mixed-Criticality: Integration of Different Models of Computation University of Siegen, Roman
More informationSystem Availability and Data Protection of Infortrend s ESVA Storage Solution
System Availability and Data Protection of Infortrend s ESVA Storage Solution White paper Abstract This white paper analyzes system availability and data protection on Infortrend s ESVA storage systems.
More informationAtlas Emergency Detection System (EDS)
Atlas Emergency Detection System (EDS) Jeff A. Patton 1 United Launch Alliance, Littleton, Colorado, 80127-7005 [Abstract] The Atlas Expendable Launch Vehicle Program has been studying safe abort requirements
More informationMarch 2008 Grant Halverson CEO, GFG Group. Regional Processing Models
March 2008 Grant Halverson CEO, GFG Group Regional Processing Models The search for successful regional and global IT processing models has been a major focus of the last fifteen years across banks, insurance
More informationMultiPARTES. Virtualization on Heterogeneous Multicore Platforms. 2012/7/18 Slides by TU Wien, UPV, fentiss, UPM
MultiPARTES Virtualization on Heterogeneous Multicore Platforms 2012/7/18 Slides by TU Wien, UPV, fentiss, UPM Contents Analysis of scheduling approaches Virtualization of devices Dealing with heterogeneous
More informationTesting of safety-critical software some principles
1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6
More informationNEC Corporation of America Intro to High Availability / Fault Tolerant Solutions
NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions 1 NEC Corporation Technology solutions leader for 100+ years Established 1899, headquartered in Tokyo First Japanese joint
More informationOracle EPM Disaster Recovery High Level Overview
By: Damon Hannah, Managing Consultant Oracle EPM Disaster Recovery High Level Overview Abstract: Few Enterprise Performance Management (EPM) topics are more discussed and less understood than Disaster
More informationCisco Nexus 1000V and Cisco Nexus 1110 Virtual Services Appliance (VSA) across data centers
Cisco Nexus 1000V and Cisco Nexus 1110 Virtual Services Appliance (VSA) across data centers With the improvement in storage, virtualization and L2 extension technologies, customers can now choose to have
More informationPowering Converged Infrastructures
Powering Converged Infrastructures By Mike Jackson Product Manager Eaton Executive summary Converged infrastructures utilize virtualization and automation to achieve high levels of availability in a costeffective
More informationIntroduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level
ISO 26262 the Emerging Automotive Safety Standard Agenda Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 4 : Product Development System Level Part 6 : Product Development
More informationGovernment Degree on the Safety of Nuclear Power Plants 717/2013
Translation from Finnish. Legally binding only in Finnish and Swedish. Ministry of Employment and the Economy, Finland Government Degree on the Safety of Nuclear Power Plants 717/2013 Chapter 1 Scope and
More informationLinear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III
Electric Drives and Controls Hydraulics Linear Motion and Assembly Technologies Pneumatics Service profile Drive & Control Industrial Ethernet: The key advantages of SERCOS III SERCOS III is the open,
More informationTIBCO StreamBase High Availability Deploy Mission-Critical TIBCO StreamBase Applications in a Fault Tolerant Configuration
TIBCO StreamBase High Availability Deploy Mission-Critical TIBCO StreamBase s in a Fault Tolerant Configuration TIBCO STREAMBASE HIGH AVAILABILITY The TIBCO StreamBase event processing platform provides
More informationHigh Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
More informationMicrosoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills
More informationHigh Availability Design Patterns
High Availability Design Patterns Kanwardeep Singh Ahluwalia 81-A, Punjabi Bagh, Patiala 147001 India +91 98110 16337 kanwardeep@gmail.com Atul Jain 135, Rishabh Vihar Delhi 110092 India +91 98119 84678
More informationRETIS Lab Real-Time Systems Laboratory
RETIS Lab Real-Time Systems Laboratory A brief introduction RETIS Lab Real-Time Systems Laboratory RETIS Lab investigates embedded computing systems with particular emphasis in Real-time methodologies
More informationDesign for Safety. 1 Introduction. Neil Storey University of Warwick, Coventry, UK
Design for Safety Neil Storey University of Warwick, Coventry, UK 1 Introduction Perhaps an appropriate starting point for a paper entitled Design for Safety is to define what we mean by design and to
More information