A Systematic Method for Big Data Technology Selection
|
|
|
- Solomon Douglas
- 10 years ago
- Views:
Transcription
1 A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015
2 Copyright 2015 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [Distribution Statement A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-us Government use and distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected]. DM
3 Agenda Background Problem Method Results and Lessons Learned 3
4 Background Two Providers, Two EHR Systems Military Health System Supports 9.7 million people active duty, dependents, retirees Global 700+ hospitals, clinics, and other facilities 135,000 employees, $49B per year Electronic Health Record system Multiple legacy systems, over 100 application interfaces 1PB+ data, 99 year data retention Veterans Health Administration 6 million patients 153 VA medical centers,1,300+ outpatient clinics and centers Single Electronic Health Record system (VistA) Local customizations and extensions 4
5 Background Limited EHR Interoperability 3.5 million shared patients Multiple interoperation projects since 2001 Federal Health Information Exchange (FHIE) Bidirectional Health Information Exchange (BHIE) Clinical Data Repository/Health Data Repository (CHDR) interface Laboratory Data Sharing Interface (LDSI) 5
6 Background Interagency Project Office (IPO) Created by 2008 NDAA to be single point of accountability for electronic health record integration Initially planned to develop new Integrated EHR (iehr) for MHS and VHA Redirected in Feb VHA to continue VistA evolution MHS to acquire COTS solution (DHMSM) 6
7 Background Interagency Project Office (IPO) TATRC/SEI Engagement Created by 2008 NDAA to be single point of accountability for electronic health record integration Initially planned to develop new Integrated EHR (iehr) for MHS and VHA Redirected in Feb VHA to continue VistA evolution MHS to acquire COTS solution (DHMSM) 7
8 TATRC/SEI Partnership U.S. Army's Telemedicine & Advanced Technology Research Center U.S. Army Medical Research and Materiel Command (USAMRMC) Lab TATRC Advanced Concepts Team engaged SEI to help them support the IPO 8
9 The IPO s Problem We ve got Big Data A best practice for big data systems is to use a NoSQL data store Is NoSQL* a good fit for our system? If so, can we narrow down the COTS product trade space? * NoSQL category of data stores that provide high scalability and performance by partitioning and replicating data across a cluster of servers, characterized by no schema on writes and simple read/query interfaces. 9
10 Big Data Technology Evaluation Challenges Convergence of Concerns Data store technology and system architecture are intertwined Can t defer technology selection Rapidly changing technology landscape New products emerging, multiple releases per year on existing products Need to balance speed with precision Large potential solution space Need to quickly narrow down and focus Scale makes full-fidelity prototyping impractical Data sets, compute nodes, load generation Technology is highly configurable Need to focus on go/no-go criteria Avoid trap of optimizing every test run 10
11 Convergence of Concerns SQL s single system abstraction produces strong separation of concerns between application and database Petascale systems are changing architecture principles by creating convergence of concerns Can t abstract away underlying technology and topology - application, data, and deployment topology are tightly coupled Data layer decisions drive system architecture Need to select technology early in the development cycle decision becomes embedded in the architecture and is hard to change I. Gorton and J. Klein, Distribution, Data, Deployment: Software Architecture Convergence in Big Data Systems, IEEE Software, vol. 32, no. 3, pp , May/June doi: /MS
12 Convergence of Concerns SQL s single system abstraction produces strong separation of concerns between application and database Petascale systems are changing architecture principles by creating convergence of concerns Can t abstract away underlying technology and topology - application, data, and deployment topology are tightly coupled Data layer decisions drive system architecture Need to select technology early in the development cycle decision becomes embedded in the architecture and is hard to change I. Gorton and J. Klein, Distribution, Data, Deployment: Software Architecture Convergence in Big Data Systems, IEEE Software, vol. 32, no. 3, pp , May/June doi: /MS
13 Solution Space The NoSQL Landscape Source: 13
14 Evaluation Method Lightweight Evaluation and Architecture Prototyping for Big Data (LEAP4BD) 18 Nov Carnegie Mellon University 14 Distribution Distribution is Statement Unlimited A: Approved for Public Release;
15 Evaluation Method LEAP4BD Lightweight Evaluation and Architecture Prototyping for Big Data (LEAP4BD) Aims Risk reduction Rapid, streamlined selection/acquisition Steps Assess the system context and landscape Identify the architecturally-significant requirements and decision criteria Evaluate candidate technologies against quality attribute decision criteria Validate architecture decisions and technology selections through focused prototyping 15
16 Assess the existing and future data landscape Identify the application s fundamental data holdings, their relationships, Identify most frequent queries and access patterns Identify required performance and quantifies expected data and transaction growth Output: The scope and context for the rest of the analysis and evaluation Initial insights into the suitability of a range of NoSQL candidates to support the application s requirements 16
17 Identify the architecturally-significant requirements and develop decision criteria Focus on scalability, performance, security, availability, and data consistency Engage with stakeholders to characterize the application s quality attribute requirements Quality Attribute Workshop Stakeholder interviews Combine these architecture requirements with the characteristics of the data model (from previous step) to generate the necessary information for initial architecture design and technology selection 17
18 Evaluate candidate technologies against quality attribute decision criteria Identify and evaluate candidate Big Data technologies against the applications data and quality attribute requirements Selects a small number of candidates (typically two to four) for validation through prototyping and testing 18
19 LEAP4BD Knowledge Base Form-based queries Tabular and graphical reports 19
20 Validate architecture decisions and technology selections Perform focused prototyping Go/no-go criteria Evaluate the prototype s behavior against a set of carefully designed, application-specific criteria (e.g., performance, scalability, etc.) Generate concrete evidence that can support the downstream investment decisions required to build, operate, and evolve the system Qualitative evidence Data model fit, deployment options, etc. Quantitative evidence Sensitivities and inflection points, look for trends rather than absolutes 20
21 Applying LEAP4BD with TATRC for the IPO 18 Nov Carnegie Mellon University 21 Distribution Distribution is Statement Unlimited A: Approved for Public Release;
22 Requirements - Driving Use Cases Conducted stakeholder workshop Query Retrieve the 5 latest medical test results for a patient Used to populate many application UI screens Strong consistency on updates all readers see the same data when a new test result is written Within a facility Across facilities telemedicine, real time consultations Core Workload 80% read/20% write Also assessed a write-only workload for pre-loading a facilities cache with records for scheduled patient appointments 22
23 Select Candidate Technologies IPO wanted to understand implications and differences among different NoSQL technologies for their application Selected one representative from each NoSQL category (keyvalue, wide column, document, and graph store) Based on feature screening and market leadership, we chose Riak (key-value) Cassandra (wide column) MongoDB (document) Did not prototype and evaluate any graph store none had horizontal partitioning needed to support the scalability requirements 23
24 Test Design and Execution Running in SEI Virtual Private Cloud (Amazon Web Services) Typical configuration 12 virtual machines, peaked 35 active virtual machines over multiple configurations SEI/TATRC ACT Collaboration SEI Infrastructure management, experiment planning, analysis and synthesis of results TATRC ACT database installation and configuration, workload development and test execution Defined consistent environment - Server platform, test client platform, deployment topology Mapped application s logical data model onto each database and load database Defined test client to perform desired workloads, and measure and collect performance data 24
25 Typical Test Results Throughput (3x3 configuration, read-only workload) 25
26 Typical Test Results Throughput (3x3 configuration, write-only workload) 26
27 Typical Test Results Throughput (3x3 configuration, read/write workload) 27
28 Test Results Cost of Strong Consistency (Cassandra data store) 28
29 LEAP4BD Outcomes Focus on the data storage and access services addresses the major risk areas for an application Keeps the method lean, rapidly produces design insights that become the basis for downstream decisions Highly transparent and systematic analysis and evaluation method significantly reduces the burden of justification for the necessary investments to build, deploy, and operate the application Data-driven decisions Informed adoption of modern technologies to reduce costs while ensuring that an application can satisfy its quality attribute requirements Increased confidence in architecture design and database technology selection Hands-on experience working with the technology during prototype development, reduces development risks Identifies risks that must be mitigated in design and implementation, along with detailed strategies and measures that allow for continual assessment 29
30 Key SEI Capabilities that Contributed to Project Success Domain Healthcare IT Technology Evaluation Technology Big Data Distributed Systems Cloud Facilities Virtual Private Cloud 30
31 Contact Information John Klein Senior Member of the Technical Staff Architecture Practices U.S. mail: Software Engineering Institute Customer Relations 4500 Fifth Avenue Pittsburgh, PA USA World Wide Web: Customer Relations
Moving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
Assurance Cases for Design Analysis of Complex System of Systems Software
Assurance Cases for Design Analysis of Complex System of Systems Software Presented at AIAA Infotech@Aerospace Conference Software Assurance Session 8 April 2009 Stephen Blanchette, Jr. Problem: SoS are
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
Agile Development and Software Architecture: Understanding Scale and Risk
Agile Development and Software Architecture: Understanding Scale and Risk Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert L. Nord SSTC, April 2012 In collaboration
Contracting Officer s Representative (COR) Interactive SharePoint Wiki
Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
How To Use Elasticsearch
Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver [email protected] Sean Hutchison [email protected] January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
Defense Healthcare Management Systems
Defense Healthcare Management Systems Recovering Warrior Task Force Interagency Program Office (IPO) Review Mr. Christopher Miller 28 January 2014 1 Agenda Topic Introduction Program Executive Office (PEO)
VoIP in Flow A Beginning
VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of
Implementing the DoD/VA Virtual Lifetime Electronic Record
Implementing the DoD/VA Virtual Lifetime Electronic Record SOA IN HEALTHCARE CONFERENCE July 14, 2010 Doug Felton Manager, Enterprise Framework DoD/VA Interagency Program Office (IPO) Agenda What is the
Buyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University [email protected] Nader Mehravari Software
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
Extending AADL for Security Design Assurance of the Internet of Things
Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering
Quality Attribute- Guided Evaluation of NoSQL Databases: An Experience Report
Quality Attribute- Guided Evaluation of NoSQL Databases: An Experience Report John Klein, Software Engineering Institute Ian Gorton, Software Engineering Institute Neil Ernst, Software Engineering Institute
Network Analysis with isilk
Network Analysis with isilk Presented at FloCon 2011 Ron Bandes CERT Network Situational Awareness (NetSA) Group 2011 Carnegie Mellon University 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL
Getting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
Data Modeling for Big Data
Data Modeling for Big Data by Jinbao Zhu, Principal Software Engineer, and Allen Wang, Manager, Software Engineering, CA Technologies In the Internet era, the volume of data we deal with has grown to terabytes
Introduction to Big Data Training
Introduction to Big Data Training The quickest way to be introduce with NOSQL/BIG DATA offerings Learn and experience Big Data Solutions including Hadoop HDFS, Map Reduce, NoSQL DBs: Document Based DB
ELECTRONIC HEALTH RECORDS. Outcome-Oriented Metrics and Goals Needed to Gauge DOD s and VA s Progress in Achieving Interoperability
United States Government Accountability Office Report to Congressional Committees August 2015 ELECTRONIC HEALTH RECORDS Outcome-Oriented Metrics and Goals Needed to Gauge DOD s and VA s Progress in Achieving
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon
GAO ELECTRONIC HEALTH RECORDS. DOD and VA Should Remove Barriers and Improve Efforts to Meet Their Common System Needs
GAO United States Government Accountability Office Report to February 2011 ELECTRONIC HEALTH RECORDS DOD and VA Should Remove Barriers and Improve Efforts to Meet Their Common System Needs Report Documentation
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
Data Management Maturity (DMM) Model Update
Data Management Maturity (DMM) Model Update Rawdon Young November 2012 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Contents / Agenda The DMM SEI Observations on Core
How To Handle Big Data With A Data Scientist
III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in
Analytics March 2015 White paper. Why NoSQL? Your database options in the new non-relational world
Analytics March 2015 White paper Why NoSQL? Your database options in the new non-relational world 2 Why NoSQL? Contents 2 New types of apps are generating new types of data 2 A brief history of NoSQL 3
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
Defense Healthcare Management Systems
Defense Healthcare Management Systems Christopher Miller DHMS Program Executive Officer AFCEA Bethesda Health IT Day 13 Nov 2013 1 What is a Program Executive Officer (PEO)? A key leader in the military
Cloud Scale Distributed Data Storage. Jürmo Mehine
Cloud Scale Distributed Data Storage Jürmo Mehine 2014 Outline Background Relational model Database scaling Keys, values and aggregates The NoSQL landscape Non-relational data models Key-value Document-oriented
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
UNCLASSIFIED. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Health Program Date: February 2015 0130: Defense Health Program / BA 2: RDT&E COST ($ in Millions) Prior Years FY 2014 FY 2015 Management System
Supply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
Evaluating NoSQL for Enterprise Applications. Dirk Bartels VP Strategy & Marketing
Evaluating NoSQL for Enterprise Applications Dirk Bartels VP Strategy & Marketing Agenda The Real Time Enterprise The Data Gold Rush Managing The Data Tsunami Analytics and Data Case Studies Where to go
Penetration Testing Tools
Penetration Testing Tools Ken van Wyk January 2007 ABSTRACT: This article provides a primer on the most commonly used tools for traditional penetration testing. (A related article provides an overview
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide IBM Cognos Business Intelligence (BI) helps you make better and smarter business decisions faster. Advanced visualization
INTRODUCTION TO CASSANDRA
INTRODUCTION TO CASSANDRA This ebook provides a high level overview of Cassandra and describes some of its key strengths and applications. WHAT IS CASSANDRA? Apache Cassandra is a high performance, open
Accelerating Cassandra Workloads using SanDisk Solid State Drives
WHITE PAPER Accelerating Cassandra Workloads using SanDisk Solid State Drives February 2015 951 SanDisk Drive, Milpitas, CA 95035 2015 SanDIsk Corporation. All rights reserved www.sandisk.com Table of
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
ELECTRONIC HEALTH RECORDS. VA and DOD Need to Support Cost and Schedule Claims, Develop Interoperability Plans, and Improve Collaboration
United States Government Accountability Office Report to Congressional Requesters February 2014 ELECTRONIC HEALTH RECORDS VA and DOD Need to Support Cost and Schedule Claims, Develop Interoperability Plans,
Service Measurement Index Framework Version 2.1
Service Measurement Index Framework Version 2.1 July 2014 CSMIC Carnegie Mellon University Silicon Valley Moffett Field, CA USA Introducing the Service Measurement Index (SMI) The Service Measurement Index
ORACLE OLAP. Oracle OLAP is embedded in the Oracle Database kernel and runs in the same database process
ORACLE OLAP KEY FEATURES AND BENEFITS FAST ANSWERS TO TOUGH QUESTIONS EASILY KEY FEATURES & BENEFITS World class analytic engine Superior query performance Simple SQL access to advanced analytics Enhanced
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
I N T E R S Y S T E M S W H I T E P A P E R F O R F I N A N C I A L SERVICES EXECUTIVES. Deploying an elastic Data Fabric with caché
I N T E R S Y S T E M S W H I T E P A P E R F O R F I N A N C I A L SERVICES EXECUTIVES Deploying an elastic Data Fabric with caché Deploying an elastic Data Fabric with caché Executive Summary For twenty
Vblock Systems hybrid-cloud with Cisco Intercloud Fabric
www.vce.com Vblock Systems hybrid-cloud with Cisco Intercloud Fabric Version 1.0 April 2015 THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." VCE MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.
KVM and Hypervisor Security David Shepard and Matt Gaston CMU/SEI Cyber Innovation Center February 2012 2012 by Carnegie Mellon University. Published SEI PROPRIETARY INFORMATION. Distribution: Director
Distribution, Data, Deployment Software Architecture Convergence in Big Data Systems
FEATURE: BIG DATA SOFTWARE SYSTEMS Distribution, Data, Deployment Software Architecture Convergence in Big Data Systems Ian Gorton and John Klein, Software Engineering Institute // Big data systems present
Database lifecycle management
Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Trends and New Directions in Software Architecture
Trends and New Directions in Software Architecture Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Chief Scientist, Software Solutions Division SEI Fellow Copyright 2015
SQL Azure vs. SQL Server
SQL Azure vs. SQL Server Authors Dinakar Nethi, Niraj Nagrani Technical Reviewers Michael Thomassy, David Robinson Published April 2010 Summary SQL Azure Database is a cloud-based relational database service
Software Security Engineering: A Guide for Project Managers
Software Security Engineering: A Guide for Project Managers Gary McGraw Julia H. Allen Nancy Mead Robert J. Ellison Sean Barnum May 2013 ABSTRACT: Software is ubiquitous. Many of the products, services,
An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview
An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.
Accelerating Big Data: Using SanDisk SSDs for MongoDB Workloads
WHITE PAPER Accelerating Big Data: Using SanDisk s for MongoDB Workloads December 214 951 SanDisk Drive, Milpitas, CA 9535 214 SanDIsk Corporation. All rights reserved www.sandisk.com Accelerating Big
LEVERAGE VBLOCK SYSTEMS FOR Esri s ArcGIS SYSTEM
Leverage Vblock Systems for Esri's ArcGIS System Table of Contents www.vce.com LEVERAGE VBLOCK SYSTEMS FOR Esri s ArcGIS SYSTEM August 2012 1 Contents Executive summary...3 The challenge...3 The solution...3
VistA Evolution Program Vision and Associated Knowledge Gaps: HSRD Cyberseminar
VistA Evolution Program Vision and Associated Knowledge Gaps: HSRD Cyberseminar 3 April 2014 OIA Health Informatics: Health Solutions Management Merry Ward, MS, PhD VistA Evolution Research and Development
Server Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
UNCLASSIFIED. UNCLASSIFIED Defense Health Program Page 1 of 10 R-1 Line #9
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Defense Health Program Date: March 2014 0130: Defense Health Program / BA 2: RDT&E COST ($ in Millions) Prior Years FY 2013 FY 2014 OCO # Total FY
NoSQL Databases. Institute of Computer Science Databases and Information Systems (DBIS) DB 2, WS 2014/2015
NoSQL Databases Institute of Computer Science Databases and Information Systems (DBIS) DB 2, WS 2014/2015 Database Landscape Source: H. Lim, Y. Han, and S. Babu, How to Fit when No One Size Fits., in CIDR,
can you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
ESS event: Big Data in Official Statistics. Antonino Virgillito, Istat
ESS event: Big Data in Official Statistics Antonino Virgillito, Istat v erbi v is 1 About me Head of Unit Web and BI Technologies, IT Directorate of Istat Project manager and technical coordinator of Web
Online Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance
DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES
DISK IMAGE BACKUP For Physical Servers VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results
Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for Multitenant Deployments
Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for Multitenant Deployments February 2014 Contents Microsoft Dynamics NAV 2013 R2 3 Test deployment configurations 3 Test results 5 Microsoft Dynamics NAV
Abuse of CPE Devices and Recommended Fixes
Abuse of CPE Devices and Recommended Fixes Dr. Paul Vixie (Farsight Security, Inc.) Chris Hallenbeck (US-CERT, DHS) Jonathan Spring (CERT/CC, Carnegie Mellon) August 7, 2014 Black Hat USA 2014 2014 Carnegie
Performance and Scalability Overview
Performance and Scalability Overview This guide provides an overview of some of the performance and scalability capabilities of the Pentaho Business Analytics platform. PENTAHO PERFORMANCE ENGINEERING
Log Insight Manager. Deployment Guide
Log Insight Manager Deployment Guide VERSION: 3.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
Defense Healthcare Management Systems
Defense Healthcare Management Systems DoD Electronic Health Records & Interoperability Strategy July 9, 2014 Mary Ann Rockey Deputy Program Executive Officer Defense Healthcare Management Systems Distribution
Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION
October 2013 Daitan White Paper Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION Highly Reliable Software Development Services http://www.daitangroup.com Cloud
www.progress.com DEPLOYMENT ARCHITECTURE FOR JAVA ENVIRONMENTS
DEPLOYMENT ARCHITECTURE FOR JAVA ENVIRONMENTS TABLE OF CONTENTS Introduction 1 Progress Corticon Product Architecture 1 Deployment Options 2 Invoking Corticon Decision Services 4 Corticon Rule Engine 5
MongoDB in the NoSQL and SQL world. Horst Rechner [email protected] Berlin, 2012-05-15
MongoDB in the NoSQL and SQL world. Horst Rechner [email protected] Berlin, 2012-05-15 1 MongoDB in the NoSQL and SQL world. NoSQL What? Why? - How? Say goodbye to ACID, hello BASE You
On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform
On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform Page 1 of 16 Table of Contents Table of Contents... 2 Introduction... 3 NoSQL Databases... 3 CumuLogic NoSQL Database Service...
Integrating Big Data into the Computing Curricula
Integrating Big Data into the Computing Curricula Yasin Silva, Suzanne Dietrich, Jason Reed, Lisa Tsosie Arizona State University http://www.public.asu.edu/~ynsilva/ibigdata/ 1 Overview Motivation Big
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? CA Capacity Management and Reporting Suite for Vblock Platforms
MongoDB Developer and Administrator Certification Course Agenda
MongoDB Developer and Administrator Certification Course Agenda Lesson 1: NoSQL Database Introduction What is NoSQL? Why NoSQL? Difference Between RDBMS and NoSQL Databases Benefits of NoSQL Types of NoSQL
High Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February 2015. www.visolve.com
High Availability of VistA EHR in Cloud ViSolve Inc. White Paper February 2015 1 Abstract Inspite of the accelerating migration to cloud computing in the Healthcare Industry, high availability and uptime
