INTELLIGENT ALARMS DETECTION FOR THE ANALYSIS OF SYSTEM FAULT IMPACT ON BUSINESS

Size: px
Start display at page:

Download "INTELLIGENT ALARMS DETECTION FOR THE ANALYSIS OF SYSTEM FAULT IMPACT ON BUSINESS"

Transcription

1 INTELLIGENT ALARMS DETECTION FOR THE ANALYSIS OF SYSTEM FAULT IMPACT ON BUSINESS Pace, C. (1), Russo, I., Fernández, V., Rossi, B. & García Martínez, R. Abstract The tools for fault impact analysis are important for the deployment of critical mission systems. These tools can be also used as a development phase aid. In this pages we introduce several concepts related to "business alarms". Business alarms are an approximation to the company's business conceptual scheme driven by the business rules from systems conceptual schemes. In order to specify them we propose the utilization of Knowledge Engineering typical techniques. Company's High Dependence in Computer Systems: A Definition of Critical Mission Systems. Our business reality shows us the company's strong dependence of the business processes in their support computer systems and the high level of confidence in the reliability of the technology. Not far way in the past a computer system was the replacement -or complementfor a manual workflow. There was always the option of returning to the old methods if the system fails. Today is completely different: A computer system replaces an older computer system, there is no way back, we don't have the choice to return to a "blood traction" system. Between the computational systems dependent business process we find the one we will call: "Critical Mission". A pragmatic "Critical Mission" definition can be the following: "A Critical Mission System is the one that if it doesn't work or it doesn t' perform properly the main service provided by the company cannot operate" [MASSA, 1997] From de definition previously expound it spring up that the availability of company s services it s going to depend on the availability of critical mission systems. For the implementation of any successful diagram of high availability for critical mission applications is necessary the consciousness of the company s management and it s necessary to be qualified for changing in the generalizations that were been given for a context [Bateston 1979]. Objectives The object of alarm detection for impact analysis of fault business systems is to reduce the breach between business controls and typical control system. For it, furthermore specifying an alarm visualization system for the direction responsible of the systems, we are going to specificity the alarm transmission to a center with following purpose:

2 Development support Help desk with an end user problems and resolution expert database Contingency maneuvers coordination The rush in the projects makes that most of the time the errors are not taken into account into the development phase, and a transactional structure for handling them is added later. Sometimes this structure is not completely implemented and the error handling is left to the database engines and operating systems mechanisms. The fact of the existence of a development support center can facilitate and allow the adding of code chunks with the purpose of centralized debugging. The support center support will have a rule based main kernel that will do a nexus between development and help desk to final users. This kernel will allow: Give a greater quality help to final users. Relate user faults with systems faults in the development manager format. Moreover, the own nature of the objectives, this eases the acceptation of the knowledge engineer in the organization (one of the primary steps to make possible knowledge acquisition). It s going to be a company s direction responsibility to present him as the developer of this center and help desk for development and final users. Description of the Knowledge Engineer Role. Sometimes it s hard to explain to the analysts cannot explain the knowledge engineer role because they may see his function as a possible risk to their jobs. The principal difference is that the analyst treat with the whole organization and systems necessities but a knowledge engineer treats with the experts [Brule 1989]. The interactions between experts and knowledge engineer are represented according to the following diagram: Critical Mission System Expert Networking Expert Critical Mission Systems Expert Knowledge Engineer Platform Expert

3 A knowledge engineer doesn t relate directly with the whole organization, he does it through the interface provided by an expert in critical mission systems The different experts must be familiarized with the definition based on business of critical mission systems, adopted by the direction. The direction systems of a typical company has got at least the Following departments: Development Networking Platforms The expert in critical mission systems in accordance with the knowledge engineer will resolve the management with multiple experts with different conceptual diagrams working over the same dominion; for it, we are going to use the following reference frame [SHAW, 1989] Consensus: Experts use in a same way terminology and concepts. Conflict: Experts use the same terminology for different concepts Correspondence: Experts use different terminology for the same concepts Contrast: Experts do not agree with their terminology and concepts. An expert in critical mission systems must have the following profile: Knowledge and pledge in according with the activities that take part in the main company s business. Experience on multi-platform environments. Experience on organization and technologies changes. Management, access and control on every support resource. Responsibility and capacity management during possible contingence systems. For this expert back boxes are non existent, every system appearance that Could affect business processes of the company, there are his own problem; for him there is not existence of processes and responsibilities separation. In our case the steps of a knowledge engineer are: a) Isolate main and necessary company s business process and associated computer systems. b) Formalize and document the present and necessary redundancies. c) Identify company s business alarms and their formation rules and dependencies. Business A business alarm is a parameter that shows us if each of the critical mission systems is failing in a direct or indirect way, causing an interruption in our main business.

4 Each business alarm is the result of the encapsulation of computer systems alarm by critical mission task [MASSA, 1996] Business Manager Business Encapsulation by Critical Mission Tasks Network Platform Network Manager Manager Platform Manager These alarms can be viewed from a development support center, where they will be coordinated by business alarms managers. They may act in a reactive or proactive way, in accordance with their incumbency and profiles for each case. As demonstration of this concept, a prototype was implemented for the encapsulation and viewing of business alarms, according a possible specification given by an expert in critical mission systems. This program runs under Windows and is the responsible on the conversion of common alarms into the different formats of business alarms. The prototype works with the following kind of alarms: SNMP Conversion of host alarms into business alarms Code embedded alarms.

5 The business alarms are consolidated in a time-indexed database. Each kind of alarm has it s own formation rules. They are shown graphically or by an automated procedure. The program also features interface, and alarm and notification retransmission to field experts. This tool can also be used as an arbitrating tool and registry. The program was built using the common steps for alarm software programming. The program modules are: Synchronization Auditory Information Capture Consolidation Analysis Viewing Registry One of the most important modules is the one we will call software alarm proxy. This proxy interprets and translates the alarms to the standards used by the network or the hardware platforms. Proprietary Proxy Standard Other Encapsulation by Critical Mission Task Identification and utilization of points of reinforcement and redundancies. During his work in the company the Knowledge Engineer will identify the point where the conditions of availability must be reinforce and where the redundancies must be implemented. We will spring up two types of redundancies: Redundancy of localized Systems Redundancy of distributed systems The first one consists in the implementation of systems that are at least duplicated in the original site. It s desirable that the system has an automatic recovery procedure. Distributed systems redundancy consists in the duplication of the original system in a remote site. For this, a data coherence assurance mechanism must be provided.

6 Site A Second Order Redundancy Relationship Site B Redundancy and Load Balancing Coherence Negotiation Contingency Startup Maneuvers The expert must know each redundancy type and know how to identify real redundancies to fictitious ones. Redundancies in a computer system can be: Basic Service Redundancy: without this the system cannot operate, they are for example-: the power systems, temperature and humidity controls, etc. Platform Redundancy: Can be given by several different platforms or by hardware with internal redundant architecture. Network Redundancy: For each of the system s interconnections, we must have logical and physical different ways or circuits. This redundant ways can be sharing and balancing the load in nominal system state, but they must be originally dimensioned in a manner that the peak activity is allowed with half of the circuits. Redundancy: The main purpose of all the already mentioned redundancies is to keep the software redundancy. redundancy is the hardest redundancy to get. There are several issues about control and data coherence to be taken into account; these are dependent of the inner architecture of each software module. SOFTWARE REDUNDANCY NETWORK REDUNDANCY PLATFORM REDUNDANCY SUPPORT REDUNDANCY Conclusion and Results The role of the knowledge engineer covers a wide spectrum in a critical mission environment, from the support of the original design to the startup and tuning of the end user s help desk.

7 Due to the strong relationship between time and alarms, we verified the importance of having and unique time for all the company s computer systems, or provide the necessary mechanism in order to adjust the time registry of each separate system. The formalization of rules and knowledge in the area of critical mission systems allows the company to make predictions of the dimensioning and correct forecasting of the systems taking into account their critical nature. As results of the processes of systematization and formalization of knowledge we have: Rules for the platform specification in order to forecast a scheme of high availability and contingency. We documented the need of the creation of a software alarms and a development support center based in this alarms The cost issues related to the startup of an end user help desk were verified. At last, a prototype program with demonstration purpose was build in order to show the exposed concepts. Future Development Issues Once build the database structure and identifying the attributes in this way: Exogenous: Network,, and Platform. Endogenous: Business. Claims registered in the help desk system. We can add to the prototype automated alarm rule extraction modules using several algorithms such as: ID3, C4.5, OC1 or Sipina, for later confronting the results with the expert s opinion. References [BATESON, 1979] G. Bateson. Mind and nature: a necessary unity, New York: Dutto, [BRULE, 1989] [GAINES, 1987] [MASSA, 1996] James F. Brulé and Alexander Blount. Knowledge Adquisition. New York: McGraw-Hill, Brian R Gaines. Canadian Engineering Centennial Convention: Proceedings of Electrical Engineering Sessions. IEEE 87TH0186-7, pp.42-49, Eduardo Julio Massa. Critical mission applications for open system architectures. International Systems Audit and Control Association meeting. Chicago, 1996.

8 [MASSA, 1997] [SHAW, 1989] Eduardo Julio Massa - Procesos de Misión Crítica y Procesamiento de Información en Red en Arquitecturas Abiertas. Estrategia de Controles por aplicación de Misión Crítica. Conferencia Internacional de CISA, Mildred L G Shaw and Brian R Gaines. Comparing Conceptual Structures: Consensus, Conflict, Correspondence and Contrast. Knowledge Acquisition 1(4), , 1989.

Introduction to Network Management

Introduction to Network Management Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function

More information

Guide to the IT Passport Examination

Guide to the IT Passport Examination Information-Technology Engineers Examination Guide to the IT Passport Examination Information-technology Promotion Agency, Japan New Examination System Deliberation Committee Level 1 Examination Working

More information

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP PROGRAMMING & SOFTWARE DEVELOPMENT AND INFORMATION SUPPORT & SERVICES PATHWAY SOFTWARE UNIT UNIT 5 Programming & and Support & s: (Unit 5) PAGE

More information

Designing a Microsoft SharePoint 2010 Infrastructure

Designing a Microsoft SharePoint 2010 Infrastructure Course Code: M10231 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Designing a Microsoft SharePoint 2010 Infrastructure Overview This five day ILT course teaches IT professionals to design and

More information

March 2008 Grant Halverson CEO, GFG Group. Regional Processing Models

March 2008 Grant Halverson CEO, GFG Group. Regional Processing Models March 2008 Grant Halverson CEO, GFG Group Regional Processing Models The search for successful regional and global IT processing models has been a major focus of the last fifteen years across banks, insurance

More information

Clarity Assurance allows operators to monitor and manage the availability and quality of their network and services

Clarity Assurance allows operators to monitor and manage the availability and quality of their network and services Clarity Assurance allows operators to monitor and manage the availability and quality of their network and services clarity.com The only way we can offer World Class Infocomm service is through total automation

More information

Clarity Infrastructure Management helps network operators to plan and document the change to their networks

Clarity Infrastructure Management helps network operators to plan and document the change to their networks Clarity Infrastructure Management helps network operators to plan and document the change to their networks clarity.com 2 Clarity Simplifying Operations Cost effective and timely network rollouts or upgrades

More information

Introduction to Database Systems

Introduction to Database Systems Introduction to Database Systems A database is a collection of related data. It is a collection of information that exists over a long period of time, often many years. The common use of the term database

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Agenda do Mini-Curso. Sérgio Yoshio Fujii. Ethan Boardman. sergio.fujii@areva-td.com. ethan.boardman@areva-td.com

Agenda do Mini-Curso. Sérgio Yoshio Fujii. Ethan Boardman. sergio.fujii@areva-td.com. ethan.boardman@areva-td.com Agenda do Mini-Curso Sérgio Yoshio Fujii sergio.fujii@areva-td.com Ethan Boardman ethan.boardman@areva-td.com Agenda do Mini-Curso Sistemas de Distribuição (DMS) Characteristics of Distribution Network

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

InfraStruxure Management Software

InfraStruxure Management Software InfraStruxure Management Software End to end data center management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems InfraStruxure Central

More information

FRCC NETWORK SERVICES REQUEST FOR PROPOSAL

FRCC NETWORK SERVICES REQUEST FOR PROPOSAL FRCC NETWORK SERVICES REQUEST FOR PROPOSAL January 2013 TABLE OF CONTENTS A. INTRODUCTION AND INSTRUCTIONS TO VENDORS... 1 A.1 Introduction... 1 A.2 Background Information... 1 A.3 General Conditions...

More information

Information Technology Specialist - Band A. Class Specifications Demonstration Project

Information Technology Specialist - Band A. Class Specifications Demonstration Project Information Technology Specialist Class Specifications Demonstration Project (910Axx, 910Bxx, 910Cxx, 910Dxx) 9104A, 9104B, 9104C, 9104D I. Definition The Information Technology Specialist series is characterized

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,

More information

Three Fundamental Techniques To Maximize the Value of Your Enterprise Data

Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Prepared for Talend by: David Loshin Knowledge Integrity, Inc. October, 2010 2010 Knowledge Integrity, Inc. 1 Introduction Organizations

More information

Trusting the Data: Analytics and Visualization. Copyr i ght 2014 O SIs oft, LLC.

Trusting the Data: Analytics and Visualization. Copyr i ght 2014 O SIs oft, LLC. Trusting the Data: Analytics and Visualization Presented by John Juna About us Electric Delivery Company Providing service to approximately 3.8 million customers across Northern Illinois Manages 90,000

More information

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above. ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that

More information

Career Tracks- Information Technology Family

Career Tracks- Information Technology Family Career Tracks- Information Technology Family FUNCTIONAL AREA Applications Programming AV IT AV IT Engineering Bioinformatics Involved in the development of server/os/desktop/mobile applications and services

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

can you improve service quality and availability while optimizing operations on VCE Vblock Systems? SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible

More information

agility made possible

agility made possible SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate

More information

Internal Control Deliverables. For. System Development Projects

Internal Control Deliverables. For. System Development Projects DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...

More information

RATIONALIZING THE MULTI-TOOL ENVIRONMENT

RATIONALIZING THE MULTI-TOOL ENVIRONMENT RATIONALIZING THE MULTI-TOOL ENVIRONMENT INTRODUCTION Over time, businesses are likely to acquire multiple, redundant tools for monitoring the availability, performance and capacity of their IT infrastructure.

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP

Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP NuDesign OEM Product Family The SCTE HMS subcommitte has devised an extensive set of standards for outside and inside

More information

NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G)

NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G) NOMINATION FORM Title of Nomination: Project/System Manager: Job Title: Agency: Enterprise Technology Service Desk Elizabeth Dignan Program Manager State Technology Office Department: Address: 4030 Esplanade

More information

STSG Methodologies and Support Structure

STSG Methodologies and Support Structure STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

Exhibit F. VA-130620-CAI - Staff Aug Job Titles and Descriptions Effective 2015

Exhibit F. VA-130620-CAI - Staff Aug Job Titles and Descriptions Effective 2015 Applications... 3 1. Programmer Analyst... 3 2. Programmer... 5 3. Software Test Analyst... 6 4. Technical Writer... 9 5. Business Analyst... 10 6. System Analyst... 12 7. Software Solutions Architect...

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING

META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING Ramesh Babu Palepu 1, Dr K V Sambasiva Rao 2 Dept of IT, Amrita Sai Institute of Science & Technology 1 MVR College of Engineering 2 asistithod@gmail.com

More information

CA Workload Automation

CA Workload Automation PRODUCT SHEET: CA Workload Automation CA Workload Automation Improve the availability of critical IT workload processes and schedules enterprise-wide by leveraging real-time IT automation, embedded workflow,

More information

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322 Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery

More information

CA Service Desk Manager

CA Service Desk Manager DATA SHEET CA Service Desk Manager CA Service Desk Manager (CA SDM), on-premise or on-demand, is designed to help you prevent service disruptions, better manage change risks, and provides a 360-degree

More information

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT GENERAL DISTRIBUTION OCDE/GD(95)115 OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT THE APPLICATION OF THE PRINCIPLES OF GLP TO COMPUTERISED

More information

Nexus Professional Whitepaper. Repository Management: Stages of Adoption

Nexus Professional Whitepaper. Repository Management: Stages of Adoption Sonatype Nexus Professional Whitepaper Repository Management: Stages of Adoption Adopting Repository Management Best Practices SONATYPE www.sonatype.com sales@sonatype.com +1 301-684-8080 12501 Prosperity

More information

May 2013 Oracle Spatial and Graph User Conference

May 2013 Oracle Spatial and Graph User Conference May 2013 Oracle Spatial and Graph User Conference May 22, 2013 Ronald Reagan Building and International Trade Center Washington, DC USA Farrid Zeighami Strategic Project Architect, So. Cal. Edison Andy

More information

Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University. manzano@cs.fsu.

Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University. manzano@cs.fsu. Enterprise Security Moving from Chaos to Control with Integrated Security Management Yanet Manzano Florida State University manzano@cs.fsu.edu manzano@cs.fsu.edu 1 Enterprise Security Challenges Implementing

More information

Data Validation and Data Management Solutions

Data Validation and Data Management Solutions FRONTIER TECHNOLOGY, INC. Advanced Technology for Superior Solutions. and Solutions Abstract Within the performance evaluation and calibration communities, test programs are driven by requirements, test

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Advanced Metering Information Systems

Advanced Metering Information Systems e Executive Brief: Advanced ing Information s Introduction e s mission is to help utilities maximize the value of their advanced metering infrastructure ( AMI ) and fixed network 1 investments. Most utilities

More information

Alcatel-Lucent OmniVista TM 4760 Network Management System

Alcatel-Lucent OmniVista TM 4760 Network Management System Alcatel-Lucent OmniVista TM 4760 Network Management System Network Management Systems Telecom managers need flexible network management tools to deal with the challenge of staying current with today s

More information

Manage Software Development in LabVIEW with Professional Tools

Manage Software Development in LabVIEW with Professional Tools Manage Software Development in LabVIEW with Professional Tools Introduction For many years, National Instruments LabVIEW software has been known as an easy-to-use development tool for building data acquisition

More information

InfraStruxure TM Management Software

InfraStruxure TM Management Software InfraStruxure TM Management Software End to end data center infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems

More information

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Aye Min Zaw 1, Hla Myo Tun 2 Department of Electronic Engineering, Mandalay Technological

More information

High Availability Design Patterns

High Availability Design Patterns High Availability Design Patterns Kanwardeep Singh Ahluwalia 81-A, Punjabi Bagh, Patiala 147001 India kanwardeep@gmail.com +91 98110 16337 Atul Jain 135, Rishabh Vihar Delhi 110092 India jain.atul@wipro.com

More information

Big Data Engineer Position Description

Big Data Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

Network Management Basics

Network Management Basics CHAPTER 6 Chapter Goal Become familiar with the basic functions of a network management system. Introduction This chapter describes functions common to most network-management architectures and protocols.

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

CMDB Essential to Service Management Strategy. All rights reserved 2007

CMDB Essential to Service Management Strategy. All rights reserved 2007 CMDB: Essential to the Service Management strategy Business Proposition: This white paper describes how the CMDB is an essential component of the IT Service Management Strategy, and why the FrontRange

More information

Cisco Nexus 7000 Series Supervisor Module

Cisco Nexus 7000 Series Supervisor Module Cisco Nexus 7000 Series Supervisor Module The Cisco Nexus 7000 Series Supervisor Module (Figure 1) scales the control plane and data plane services for the Cisco Nexus 7000 Series system in scalable data

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

System Analysis and Design

System Analysis and Design SYSTEM ANALYSIS AND DESIGN Module : Data and Information () Types of information: operational, tactical, strategic and statutory why do we need information systems management structure requirements of

More information

Integrated Remote System for Monitoring Point Machines. Rationalize preventive maintenance and reduce costs

Integrated Remote System for Monitoring Point Machines. Rationalize preventive maintenance and reduce costs Integrated Remote System for Monitoring Point Machines Rationalize preventive maintenance and reduce costs Background & Introduction: Traditional monitoring is currently being reinvented to meet today

More information

Foundations for Systems Development

Foundations for Systems Development Foundations for Systems Development ASSIGNMENT 1 Read this assignment introduction. Then, read Chapter 1, The Systems Development Environment, on pages 2 25 in your textbook. What Is Systems Analysis and

More information

Rotorcraft Health Management System (RHMS)

Rotorcraft Health Management System (RHMS) AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center

More information

AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of the Riskmetrics system in the Investment Management Division of UNJSPF

AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of the Riskmetrics system in the Investment Management Division of UNJSPF INTERNAL AUDIT DIVISION AUDIT REPORT Audit of the Riskmetrics system in the Investment Management Division of UNJSPF Overall results relating to the effective implementation of the Riskmetrics system were

More information

Table of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24

Table of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24 Table of Contents CHAPTER 1 Web-Based Systems 1 The Web 1 Web Applications 2 Let s Introduce a Case Study 3 Are WebApps Really Computer Software? 4 Are the Attributes of WebApps Different from the Attributes

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

SGE: Information System for Strategic Planning Management Applied to an Electric Utility

SGE: Information System for Strategic Planning Management Applied to an Electric Utility , October 21-23, 2015, San Francisco, USA SGE: Information System for Strategic Planning Management Applied to an Electric Utility Omar Hernández, Martín Santos, Sarai Gallardo Abstract In this paper we

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

Organizations remain under intense pressure to reduce costs To reduce costs we must increase efficiency in resource allocation

Organizations remain under intense pressure to reduce costs To reduce costs we must increase efficiency in resource allocation Total Cost of Ownership: What is it Really? August 11, 2003 The Challenge How do I optimize my IT investments? Organizations remain under intense pressure to reduce costs To reduce costs we must increase

More information

Knowledge Base Data Warehouse Methodology

Knowledge Base Data Warehouse Methodology Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This

More information

Overview of Service Support & Service

Overview of Service Support & Service Overview of Service Support & Service Delivery Functions ITIL Service Support / Delivery- 1 Service Delivery Functions Availability Management IT Services Continuity Management Capacity Management Financial

More information

Senior Network Administrator Page 2

Senior Network Administrator Page 2 Long Beach Community College District CLASS SPECIFICATION Senior Network Administrator Date Adopted: May 22, 2006 FLSA Status: EEOC Job Category: Union Representation: Non-Exempt Professionals Represented

More information

Total Exploration & Production: Field Monitoring Case Study

Total Exploration & Production: Field Monitoring Case Study Total Exploration & Production: Field Monitoring Case Study 1 Summary TOTAL S.A. is a word-class energy producer and provider, actually part of the super majors, i.e. the worldwide independent oil companies.

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

Network Router Monitoring & Management Services

Network Router Monitoring & Management Services Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER

More information

UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2)

UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2) Additional Financing of Food and Nutrition Social Welfare Project (RRP MON 42322) UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2) 1. This document

More information

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges

More information

Understanding the Promise of (DCIM)

Understanding the Promise of (DCIM) Understanding the Promise of Data Center Infrastructure Management (DCIM) Chuck Kramer, RCDD, NTS, CDCP, CDFOM Senior Solutions Consultant Emerson Network Power What is DCIM? The monitoring, collection

More information

TNT SOFTWARE White Paper Series

TNT SOFTWARE White Paper Series TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE

More information

Service Management from Serena Software. Orchestrated. Visibility, Flexibility and Ease of Use through Process-Based IT Service Management

Service Management from Serena Software. Orchestrated. Visibility, Flexibility and Ease of Use through Process-Based IT Service Management Orchestrated Service Management from Serena Software Visibility, Flexibility and Ease of Use through Process-Based IT Service Management Solution Brief Challenges High TCO as systems are inflexible, expensive

More information

Essential NCPI Management Requirements for Next Generation Data Centers

Essential NCPI Management Requirements for Next Generation Data Centers Essential NCPI Requirements for Next Generation Data Centers By Ted Ives White Paper #14 1 Executive Summary The management of physical infrastructure in data centers can no longer be considered independently

More information

Internet-Accessible Power Monitoring & Control Systems

Internet-Accessible Power Monitoring & Control Systems Internet-Accessible Power Monitoring & Control Systems By GE Specification Engineers Keith B. Brock, P.E. Robert P. Hansen, PhD, P.E. Introduction Accessing electrical system information from any location

More information

San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, 2015. Electric Grid Operations

San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, 2015. Electric Grid Operations San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, 2015 Electric Grid Operations Director Electric Grid Operations: Responsible for overall transmission

More information

The Case for a Stand-alone Rating Engine for Insurance. An Oracle Brief April 2009

The Case for a Stand-alone Rating Engine for Insurance. An Oracle Brief April 2009 The Case for a Stand-alone Rating Engine for Insurance An Oracle Brief April 2009 The Case for a Stand-alone Rating Engine for Insurance Stand-alone rating engines provide the opportunity to modernize

More information

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing

More information

Accounts Payable Invoice Processing. White Paper

Accounts Payable Invoice Processing. White Paper www.allstarss.com ACCELERATING Business Processes Accounts Payable Invoice Processing Table of Contents Table of Contents TABLE OF CONTENTS... I THE BUSINESS CHALLENGE... 2 Invoice Processing Costs...

More information

Increase Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation

Increase Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation White Paper Increase Business Intelligence Infrastructure Responsiveness and Reliability Using IT Automation What You Will Learn That business intelligence (BI) is at a critical crossroads and attentive

More information

The Business Case for Virtualization Management: A New Approach to Meeting IT Goals By Rich Corley Akorri

The Business Case for Virtualization Management: A New Approach to Meeting IT Goals By Rich Corley Akorri The BusinessCase forvirtualization Management: A New ApproachtoMeetingITGoals ByRichCorley Akorri July2009 The Business Case for Virtualization Management: A New Approach to Meeting IT Goals By Rich Corley

More information

BIMS - Branch Intelligent Management System

BIMS - Branch Intelligent Management System BIMS - Intelligent Management System Solution Overview Traditional network management software manage the devices in network through SNMP or Telnet protocol that requires IP address of the managed device

More information

Module: Sharepoint Administrator

Module: Sharepoint Administrator Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture

More information

Pro/INTRALINK 9.0/9.1 Curriculum Guide

Pro/INTRALINK 9.0/9.1 Curriculum Guide Pro/INTRALINK 9.0/9.1 Curriculum Guide NOTE: For a graphical depiction of the curriculum based on job role, please visit this page: http://www.ptc.com/services/edserv/learning/paths/ptc/proi_90.htm Web

More information

Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)

Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18) Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined

More information

Convergent data center for future network

Convergent data center for future network Convergent data center for future network Xia zhen hua (Lawrence Hsia) Huawei Technologies xiazhenhua@huawei.com Abstract In this article, we will analyze current issues and new challenges on user profile,

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

Micron Quality Manual

Micron Quality Manual Micron Quality Manual The Quality Management System (QMS) is an integral component in allowing Micron to achieve the next level in Quality Control and in delivering Total Quality Excellence to our customers.

More information

Integrating a web application with Siebel CRM system

Integrating a web application with Siebel CRM system Integrating a web application with Siebel CRM system Mika Salminen, Antti Seppälä Helsinki University of Technology, course Business Process Integration: Special Course in Information Systems Integration,

More information

The Spectrum of Data Integration Solutions: Why You Should Have Them All

The Spectrum of Data Integration Solutions: Why You Should Have Them All HAWTIN, STEVE, Schlumberger Information Systems, Houston TX; NAJIB ABUSALBI, Schlumberger Information Systems, Stavanger, Norway; LESTER BAYNE, Schlumberger Information Systems, Stavanger, Norway; MARK

More information

Cisco Unified Computing Remote Management Services

Cisco Unified Computing Remote Management Services Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing

More information

Intelligent Infrastructure & Security

Intelligent Infrastructure & Security SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information