10 Factors To Consider When Evaluating Geospatial Data Streaming Services

Size: px
Start display at page:

Download "10 Factors To Consider When Evaluating Geospatial Data Streaming Services"

Transcription

1 10 Factors To Consider When Evaluating Geospatial Data Streaming Services A Whitepaper by i cubed, LLC 2012 i-cubed, LLC 1600 Prospect Park Way Fort Collins, Colorado USA

2 Why Stream? Dynamic streaming of imagery and vector content has significantly increased over the last several years along with the growth of web services within the Geospatial community. This growth has been fueled by broad adoption of OGC W*S standards and increasing availability of compatible web services from many commercial and government organizations. In many cases, streaming of content is the easiest way to disseminate the content across an entire organization or to the public at large in a standardized way. i cubed was an early adopter of web serving technology and has been a leader in streaming imagery and vector web services since As our hosting capabilities have grown, so too have our dynamic image delivery services and the infrastructure to support them. While some organizations may choose to use Commercial Off The Shelf (COTS) or open source web server applications to stream data themselves, there are many collateral issues that should be considered when electing to take on the burden of providing performant and reliable streaming web services. 1. Infrastructure and Physical Security The hardware and environmental infrastructure required to provide robust and resilient services are significant, particularly when it comes to providing scalable services that are needed to accommodate surge demand. i cubed's primary serving facility is maintained in a Tier 3 facility. All environmental and power systems are completely redundant and operate in an N+1 configuration with no single point of failure. The physical servers themselves are monitored 24 X 7, and protected by 5 physical barriers which incorporate key card and biometric access controls. This infrastructure ensures that no unauthorized physical access is permitted to the hardware and storage systems and ensures that in the event of power outages, all environmental and power infrastructure is functional. 2. Service Level While internal consumers of a web service within an organization may be more tolerant of intermittent service interruptions, external users typically are not. In the case of mission critical applications such as emergency response, even a small amount of down time can have serious implications. Additionally, many organizations have a broad geographic reach and literally "Follow the sun" in providing services to their customers. Because of this, even events like scheduled system maintenance may impact end users who are distributed across the globe. i cubed believes the minimum service level outside of regularly scheduled maintenance activities is 99.9%. This level of service provides no more than 8.75 hours of downtime outside or regularly scheduled maintenance per year. Due to the clustered nature of the i cubed infrastructure 'stack' many maintenance activities can be performed without impacting services. Furthermore, for activities requiring down time, i cubed has structured its scheduled maintenance window to last no more than 3 hours per week and exploits this window at a time when the least number of customers will be impacted.

3 3. Reliability and Resiliency Reliability goes hand in hand with maintaining a minimum service level. While it is relatively easy to maintain a service level of 99%, reaching 99.9% or higher requires a sophisticated approach that includes clustering and load balancing of hardware and software applications as well as internet connections and all other critical infrastructure, to eliminate all single points of failure in the stack. Resiliency refers to continuity of operations in the event that the primary serving facility is completely unavailable. In order to accomplish this, all infrastructure, applications, data, services and ancillary systems must be replicated to one or more secondary data centers with an appropriate level of geographic separation to ensure physical and logical independence. Additionally, appropriate protocols need to be established for switching between these sites in the event of a failure at the primary site. The i cubed infrastructure has been designed from the ground up with reliability as a cornerstone of the architecture. Internet connectivity is provided through a 'mesh' of 13, tier 1 international internet providers. All traffic is dynamically routed across these providers which helps optimize performance of i cubed services globally. To accomplish Disaster Recovery (DR), i cubed maintains 2 completely independent streaming systems. All data, services and applications are continuously replicated between sites, which ensures that in the event of a critical system failure, the backup system can be invoked to minimize interruption of services. 4. Monitoring, Alerting and Reporting i cubed firmly believes that "if you can't measure it, you can't manage it". While hardware and application clustering help ensure system stability, monitoring, alerting and reporting are the foundation of system continuity. The i cubed system is monitored 24 X 7 from multiple independent external nodes which are integrated into a tiered escalation and alerting system. All events are logged and issues which impact system performance or availability are escalated appropriately to ensure on call staff is notified immediately. The i cubed IT and Network Operations Center (NOC) team are available via this system 24 X 7 X 365 to respond to critical events and maintain service level. In addition, every streaming request that enters the system is logged which enables detailed reporting to be provided to organizations on actual use and system response times for different data sets. These reports are very useful in understanding and justifying the cost benefit of providing streaming services and they also provide business intelligence about where an organization's "hot spots" are located. The figure to the right shows an example of the Network Operations Center Monitor (NOCMon). Figure 1 The Network Operations Center Monitor info@i3.com

4 Additionally, i cubed contracts a 3rd party to audit the i cubed services against its stated Service Level (99.5%) and typically maintains a better than 99.9% uptime. Figure 2 3rd Party Audit of i cubed WMS services 5. Content Protection Sensitive data provided via web services needs additional protection to maintain confidentiality and prevent abusive behavior such as 'scraping', where content may be downloaded by an unauthorized user or in an unauthorized manner, effectively 'stealing' the content. i cubed employs a layered approach to protect proprietary customer content and detecting and preventing abuse. Some services at i cubed can be configured to use secured tokens and passwords for the highest level of protection. While this may be unnecessary (or even unsupported) for some applications, there are still ways in which i cubed protects customer content. Hosted content at i cubed is made available through a subscription which is tied to a web service endpoint via a Globally Unique Identifier (GUID). Use of GUIDs provides a reasonable level of protection from abuse and unauthorized use by obfuscating the web service URL, however, in some cases additional protection is needed. The i cubed DataDoors system includes ability to 'Whitelist' and 'Blacklist' specific IP addresses and ranges of IP addresses which enforces additional levels of protection. A Whitelist entry allows for requests only from that IP address or address range and no others. Conversely, a Blacklist entry blocks any requests originating from the specified IP address or range of addresses. Whitelists and Blacklists can be configured for a specific subscription which allows great flexibility in protecting customer data.

5 The final tier employed by DataDoors to provide content protection involves the detection of suspicious activity and automatically blocking the offending IP addresses. All streaming subscriptions can be configured to provide "Auto Smiting" functions. When Auto Smiting is active, the DataDoors Network Operations Center Monitor automatically assesses each request received by the system. Using a sophisticated algorithm, patterns of abuse are detected and if specific thresholds are reached, the IP address is automatically blocked. 6. Auto Expiration of Subscriptions, Pre Defined Hits In some cases, it is desirable to allocate a specific web server end point for a defined period of time or for serving a specific volume of data. This may be the case when contractors are working with customer data and need to be removed from access at the end of a contract. The i cubed DataDoors system provides this ability in addition to providing access for a pre defined number of image requests for a specific subscription. These services can be reconfigured at any time to extend service availability. 7. 'Extreme' Serving Support for Large Requests In some cases customer may want to send imagery from a WMS service to a plotting device to print large format maps. In many cases dynamic imagery servers will fail on requests that are larger than 2000 X 2000 pixels. Additionally, some client applications may time out and either request the same imagery again or fail completely. The i cubed DataDoors streaming system incorporates an advanced 'Plot' streaming request handler that supports image requests of up to 20,000 X 20,0000 pixels. This handler allows large requests to be fulfilled, and elegantly handles poorly behaved client applications that may make multiple large requests that could otherwise overwhelm a standard imagery server. Due to the clustered and load balanced nature of the system, these large requests can be handled without impacting the performance of other requests. 8. Support for Multiple Protocols and High Performance Tile Caches In many cases, supporting the myriad of web client applications can be difficult, especially as protocols evolve and new protocols are created. Additionally, while some users may desire the flexibility of a dynamically rendered image with an unlimited number of display scales, others may require the high performance of pre rendered tile caches. In many cases these requirements can result in replication of data in multiple projections on the streaming servers which can significantly increase cost. While the DataDoors streaming system supports many existing protocols (OGC W*S, WMS T, WMS C, ESRI Imager Server, ArcGIS Server, Google Earth, Bing, etc.), the pluggable architecture of the DataDoors streaming system permits rapid integration of new streaming protocols as they become available. Additionally, these protocols can often be integrated on top of existing data which can reduce or eliminate the need for duplication and replication of data. This flexibility allows for customer data to be presented to client applications in a variety of ways while remaining extensible to future technologies and requirements.

6 9. Serving on the Edge Latency, Internet Performance and CDN's Many applications perform well when housed inside an internal network or in a regional context but suffer performance degradation due to internet latency as the distance to the servers increase. This can cause the user experience to deteriorate to unacceptable levels, especially internationally, and result in loss of clients. The i cubed DataDoors streaming system supports Content Delivery Networks such as Akamai and CloudFront etc. for static content, and also includes proprietary network optimization technology (called hsservices) that dramatically improves performance of dynamic requests. For example, average internet latency within the US is around 700 milliseconds compared to around 3500 milliseconds from the US to India. Using the optimized DataDoors hsservices transport layer, latency to India is decreased to around 800 milliseconds which is a significant improvement. In many cases, this technology has eliminated the need to place multiple Points of Presence (POPs) around the globe and enables i cubed customers to reduce cost, while maintaining an acceptable user experience. 10. Performance Optimization, Content Augmentation, Metadata and Geo Fencing Most Geo Spatial content (particularly imagery) is not natively optimized to provide the best performance for dynamic streaming services. While services based on native data files can be instantiated, the rendering times will often not meet the expectations of end users. As data is ingested into the DataDoors streaming system, it is optimized to provide the best end user experience. Standard 1000 X 1000 pixel dynamic requests are typically rendered on the i cubed servers in under 1000 milliseconds and which improves the end user experience. i cubed also has extensive experience in providing color balancing and seamless integration of multi temporal/multisensor data sets to create tonally balanced services that eliminate the 'patchwork' visual effects that that are inherent in these composite mosaics. This type of processing provides a performant and visually enhanced service that greatly improves the end user experience. An example of value added seamless integration by i cubed is shown below: Figure 3 Typical Multi Sensor Integration Figure 4 i cubed Value Added Seamless Integration

7 In many cases, customer have their own unique content that they wish to stream, however, they may also wish to augment their content to include other data sets that may be available from other sources that they themselves do not own. Finding and staging these data sets and the associated metadata can be a significant challenge. i cubed has a variety of standard off the shelf global imagery services including DEM's, Topo Maps, Bathymetry, etc., that can be used to augment a proprietary customer data set. This content can be integrated as a separate service for customers or directly combined with proprietary data to create a seamless custom streaming service of the best available data for end users. As well, these services can be configured on the i cubed servers in order to eliminate the need for customers to manage any of the data or stage these services themselves. In addition to providing standardized imagery and vector services integrated with i cubed and third party provided imagery services, i cubed can also configure user specified metadata rendered directly onto each image request, or as a separate WFS service that can be integrated into a variety of client applications. The i cubed DataDoors stack also includes ability to apply Geo Fences against WMS and Tile Cache services to restrict access to defined geographic areas on a subscription basis. This capability allows access control to be applied spatially and can help in situations where a user, such as a contractor, only needs access to a subset of the available data for a defined period of time. Summary While it is reasonably easy for an organization to stand up streaming services there is often much more associated with standing up services that are robust, resilient, flexible, performant and scalable. If these are requirements for the services that are provided by the system, then it typically needs to be architected from the ground up to achieve these objectives. The additional requirements for service monitoring, alerting and reporting require additional independent external infrastructure in place and either a dedicated or on call team to respond to issues as they arise. In i cubed's experience, requirements from streaming services often evolve quickly from an initial simple request to "stream some imagery". The i cubed DataDoors system provides a scalable, extensible and flexible platform to support these evolving requirements and protocols and is backed by a 24 X 7 team that has maintained a service level in excess of our stated objectives of 99.5%.

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Availability of Services in the Era of Cloud Computing

Availability of Services in the Era of Cloud Computing Availability of Services in the Era of Cloud Computing Sanjay P. Ahuja 1 & Sindhu Mani 1 1 School of Computing, University of North Florida, Jacksonville, America Correspondence: Sanjay P. Ahuja, School

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

Medical Grade Network Design and Operation

Medical Grade Network Design and Operation Medical Grade Network Design and Operation Chesapeake NetCraftsmen has been supporting our health care customers with designs and implementations of 'Medical Grade Networks'. In this whitepaper we will

More information

Esri ArcGIS Server 10 for VMware Infrastructure

Esri ArcGIS Server 10 for VMware Infrastructure Esri ArcGIS Server 10 for VMware Infrastructure October 2011 DEPLOYMENT AND TECHNICAL CONSIDERATIONS GUIDE Table of Contents Introduction... 3 Esri ArcGIS Server 10 Overview.... 3 VMware Infrastructure

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

VitalPBX. Hosted Voice That Works. For You

VitalPBX. Hosted Voice That Works. For You VitalPBX Hosted Voice That Works For You Vital Voice & Data s VitalPBX VVD Hosted PBX solutions provide you with the stability of a traditional telephone PBX system and the flexibility that only a next

More information

Looking Ahead The Path to Moving Security into the Cloud

Looking Ahead The Path to Moving Security into the Cloud Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application

More information

High Availability for Citrix XenApp

High Availability for Citrix XenApp WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...

More information

AppSense Environment Manager. Enterprise Design Guide

AppSense Environment Manager. Enterprise Design Guide Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...

More information

Pervasive PSQL Meets Critical Business Requirements

Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive

More information

A Dell Technical White Paper Dell Storage Engineering

A Dell Technical White Paper Dell Storage Engineering Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool

More information

Architecture Statement

Architecture Statement Architecture Statement Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) 2016 Primex Wireless, Inc. The Primex logo is a registered trademark of Primex

More information

AAPT Business Content Delivery Network

AAPT Business Content Delivery Network AAPT Business Content Delivery Network Service Schedule An AAPT Cloud Solution This Service Schedule forms part of the Agreement between Us and You and cannot be used as a stand-alone agreement. Any terms

More information

Cloud Infrastructure Foundation. Building a Flexible, Reliable and Automated Cloud with a Unified Computing Fabric from Egenera

Cloud Infrastructure Foundation. Building a Flexible, Reliable and Automated Cloud with a Unified Computing Fabric from Egenera Cloud Infrastructure Foundation Building a Flexible, Reliable and Automated Cloud with a Unified Computing Fabric from Egenera Executive Summary At its heart, cloud computing is a new operational and business

More information

INDIA 28-30 September 2011 virtual techdays

INDIA 28-30 September 2011 virtual techdays Building highly Available Services on Windows Azure Platform Pooja Singh Technical Architect, Accenture Aakash Sharma Technical Lead, Accenture Laxmikant Bhole Senior Architect, Accenture Assumptions You

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Designing a Cloud Storage System

Designing a Cloud Storage System Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

More information

Customer Cloud Architecture for Mobile

Customer Cloud Architecture for Mobile Customer Cloud Architecture for Mobile Executive Overview This paper describes vendor neutral best practices for hosting the services and components required to support mobile apps using cloud computing.

More information

Customer Cloud Architecture for Mobile

Customer Cloud Architecture for Mobile Customer Cloud Architecture for Mobile Executive Overview This paper describes vendor neutral best practices for hosting the services and components required to support mobile apps using cloud computing.

More information

Ecomm Enterprise High Availability Solution. Ecomm Enterprise High Availability Solution (EEHAS) www.ecommtech.co.za Page 1 of 7

Ecomm Enterprise High Availability Solution. Ecomm Enterprise High Availability Solution (EEHAS) www.ecommtech.co.za Page 1 of 7 Ecomm Enterprise High Availability Solution Ecomm Enterprise High Availability Solution (EEHAS) www.ecommtech.co.za Page 1 of 7 Ecomm Enterprise High Availability Solution Table of Contents 1. INTRODUCTION...

More information

Apache HBase. Crazy dances on the elephant back

Apache HBase. Crazy dances on the elephant back Apache HBase Crazy dances on the elephant back Roman Nikitchenko, 16.10.2014 YARN 2 FIRST EVER DATA OS 10.000 nodes computer Recent technology changes are focused on higher scale. Better resource usage

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

TECHNICAL NOTES BrightSign Network Security Statement BrightSign, LLC. 16795 Lark Ave., Suite 200 Los Gatos, CA 95032 408-852-9263 www.brightsign.

TECHNICAL NOTES BrightSign Network Security Statement BrightSign, LLC. 16795 Lark Ave., Suite 200 Los Gatos, CA 95032 408-852-9263 www.brightsign. TECHNICAL NOTES BrightSign Network Security Statement BrightSign, LLC. 16795 Lark Ave., Suite 200 Los Gatos, CA 95032 408-852-9263 www.brightsign.biz INTRODUCTION For a cloud-based content management and

More information

XRoads Networks, Inc.

XRoads Networks, Inc. Network Load Balancing Overview Revision 3.5.0 March 2006 What Is Network Load Balancing? Network load balancing (aka multihoming, or dual-wan routing) is the ability to aggregate two or more widearea

More information

Conventionally, software testing has aimed at verifying functionality but the testing paradigm has changed for software services.

Conventionally, software testing has aimed at verifying functionality but the testing paradigm has changed for software services. 1 Conventionally, software testing has aimed at verifying functionality but the testing paradigm has changed for software services. Developing a full-featured and functioning software service is necessary;

More information

Meeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702

Meeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Meeting Management Solution Technology and Security Overview 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Technology SaaS Software as a Service is offered as well. Client may

More information

Enterprise GIS Architecture Deployment Options. Andrew Sakowicz

Enterprise GIS Architecture Deployment Options. Andrew Sakowicz Enterprise GIS Architecture Deployment Options Andrew Sakowicz Audience Audience - Architects - Developers - Administrators - Project Managers Level: - Beginner / Intermediate Introduction Andrew Sakowicz

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

BASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS

BASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS WHITEPAPER BASHO DATA PLATFORM BASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS INTRODUCTION Big Data applications and the Internet of Things (IoT) are changing and often improving our

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

The Application Front End Understanding Next-Generation Load Balancing Appliances

The Application Front End Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

EMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD

EMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD EMC VPLEX FAMILY Transparent information mobility within, across, and between data centers A STORAGE PLATFORM FOR THE PRIVATE CLOUD In the past, users have relied on traditional physical storage to meet

More information

How To Use Arcgis For Free On A Gdb 2.2.2 (For A Gis Server) For A Small Business

How To Use Arcgis For Free On A Gdb 2.2.2 (For A Gis Server) For A Small Business Esri Middle East and Africa User Conference December 10 12 Abu Dhabi, UAE Understanding ArcGIS in Virtualization and Cloud Environments Marwa Mabrouk Powerful GIS capabilities Delivered as Web services

More information

Developing Fleet and Asset Tracking Solutions with Web Maps

Developing Fleet and Asset Tracking Solutions with Web Maps Developing Fleet and Asset Tracking Solutions with Web Maps Introduction Many organizations have mobile field staff that perform business processes away from the office which include sales, service, maintenance,

More information

Learning Management Redefined. Acadox Infrastructure & Architecture

Learning Management Redefined. Acadox Infrastructure & Architecture Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

Elearning Experts Service Agreement

Elearning Experts Service Agreement Elearning Experts Service Agreement Application Hosting Support Availability Support Cases Elearning Experts Uptime Storage Bandwidth and Video Streaming Software Upgrades Software Additions and Customizations

More information

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide

More information

Availability Digest. MySQL Clusters Go Active/Active. December 2006

Availability Digest. MySQL Clusters Go Active/Active. December 2006 the Availability Digest MySQL Clusters Go Active/Active December 2006 Introduction MySQL (www.mysql.com) is without a doubt the most popular open source database in use today. Developed by MySQL AB of

More information

Citrix XenServer Backups with SEP sesam

Citrix XenServer Backups with SEP sesam Citrix XenServer Backups with SEP sesam Contents Introduction and Overview...2 XenServer Backup Methods...2 Offline Backup... 3 Online Live Memory Backup... 3 Online Quiesced Backup... 4 Online Normal

More information

www.basho.com Technical Overview Simple, Scalable, Object Storage Software

www.basho.com Technical Overview Simple, Scalable, Object Storage Software www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...

More information

Cloud Customer Architecture for Web Application Hosting, Version 2.0

Cloud Customer Architecture for Web Application Hosting, Version 2.0 Cloud Customer Architecture for Web Application Hosting, Version 2.0 Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural

More information

FIREWALL CLEANUP WHITE PAPER

FIREWALL CLEANUP WHITE PAPER FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The

More information

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security F5 and Oracle Database Solution Guide Solutions to optimize the network for database operations, replication, scalability, and security Features >> Improved operations and agility >> Global scaling Use

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi 431920472@student.ksa.edu.sa Soha S. Zaghloul smekki@ksu.edu.sa Faculty of Computer and Information

More information

Big Data Without Big Headaches: Managing Your Big Data Infrastructure for Optimal Efficiency

Big Data Without Big Headaches: Managing Your Big Data Infrastructure for Optimal Efficiency Big Data Without Big Headaches: Managing Your Big Data Infrastructure for Optimal Efficiency The Growing Importance, and Growing Challenges, of Big Data Big Data is hot. Highly visible early adopters such

More information

Load Balancing & High Availability

Load Balancing & High Availability Load Balancing & High Availability 0 Optimizing System Resources through Effective Load Balancing An IceWarp White Paper October 2008 www.icewarp.com 1 Background Every server is finite. Regardless of

More information

Avid ISIS 7000. www.avid.com

Avid ISIS 7000. www.avid.com Avid ISIS 7000 www.avid.com Table of Contents Overview... 3 Avid ISIS Technology Overview... 6 ISIS Storage Blade... 6 ISIS Switch Blade... 7 ISIS System Director... 7 ISIS Client Software... 8 ISIS Redundant

More information

A Guide to Hybrid Cloud An inside-out approach for extending your data center to the cloud

A Guide to Hybrid Cloud An inside-out approach for extending your data center to the cloud A Guide to Hybrid Cloud An inside-out approach for extending your data center to the cloud Inside INTRODUCTION Create a Flexible IT Environment With Hybrid Cloud CHAPTER 1 Common Business Drivers for Hybrid

More information

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 Report on FORTRUST s Enterprise Data Center and Colocation Services System Relevant to Security and Availability For the Period October

More information

PINsafe Multifactor Authentication Solution. Technical White Paper

PINsafe Multifactor Authentication Solution. Technical White Paper PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time

More information

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9 Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Avaya Aura Virtualized Environment

Avaya Aura Virtualized Environment Avaya Aura Virtualized Environment Table of Contents Redundancy Options for Avaya Aura Virtualized Environment (AAVE)... 1 Avaya Aura Communication Manager (CM) Software Duplication and Statefull Failover...

More information

Subject: Using Google Earth, Google Earth Pro, and Google Maps for FWS activities

Subject: Using Google Earth, Google Earth Pro, and Google Maps for FWS activities Subject: Using Google Earth, Google Earth Pro, and Google Maps for FWS activities Page 1 of 5 As an FWS employee, can I use Google mapping software or applications to help me with my job? The short answer

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES

DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES .com DOSarrest External Monitoring S ystem (DEMS) User s Guide REAL BROWSER MONITORING OF YOUR WEBSITE MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

High Availability Storage

High Availability Storage High Availability Storage High Availability Extensions Goldwyn Rodrigues High Availability Storage Engineer SUSE High Availability Extensions Highly available services for mission critical systems Integrated

More information

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data HyperQ DR Replication White Paper The Easy Way to Protect Your Data Parsec Labs, LLC 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com info@parseclabs.com

More information

UniFS A True Global File System

UniFS A True Global File System UniFS A True Global File System Introduction The traditional means to protect file data by making copies, combined with the need to provide access to shared data from multiple locations, has created an

More information

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution The Challenge Businesses that rely on Microsoft Lync Server must guarantee uninterrupted

More information

Fax Server Cluster Configuration

Fax Server Cluster Configuration Fax Server Cluster Configuration Low Complexity, Out of the Box Server Clustering for Reliable and Scalable Enterprise Fax Deployment www.softlinx.com Table of Contents INTRODUCTION... 3 REPLIXFAX SYSTEM

More information

Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud

Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Use case Figure 1: Company C Architecture (Before Migration) Company C is an automobile insurance claim processing company with

More information

TranScend. Next Level Payment Processing. Product Overview

TranScend. Next Level Payment Processing. Product Overview TranScend Next Level Payment Processing Product Overview Product Functions & Features TranScend is the newest, most powerful, and most flexible electronics payment system from INTRIX Technology, Inc. It

More information

Lustre Networking BY PETER J. BRAAM

Lustre Networking BY PETER J. BRAAM Lustre Networking BY PETER J. BRAAM A WHITE PAPER FROM CLUSTER FILE SYSTEMS, INC. APRIL 2007 Audience Architects of HPC clusters Abstract This paper provides architects of HPC clusters with information

More information

Bhuvan. Indian Earth Observation Visualization. Indian Space Research Organisation. http://bhuvan.nrsc.gov.in. Multi Resolution. Societal Applications

Bhuvan. Indian Earth Observation Visualization. Indian Space Research Organisation. http://bhuvan.nrsc.gov.in. Multi Resolution. Societal Applications Multi Resolution Bhuvan Societal Applications Indian Earth Observation Visualization http://bhuvan.nrsc.gov.in 3D Geographic Models Seamless Fly Through Indian Space Research Organisation Thematic Vectors

More information

Fault-Tolerant Computer System Design ECE 695/CS 590. Putting it All Together

Fault-Tolerant Computer System Design ECE 695/CS 590. Putting it All Together Fault-Tolerant Computer System Design ECE 695/CS 590 Putting it All Together Saurabh Bagchi ECE/CS Purdue University ECE 695/CS 590 1 Outline Looking at some practical systems that integrate multiple techniques

More information

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20 Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20 Azure Cloud Topology Public cloud providers such as Amazon Web Service, Google, IBM, Rackspace, etc. have similar

More information

Deploying Exchange Server 2007 SP1 on Windows Server 2008

Deploying Exchange Server 2007 SP1 on Windows Server 2008 Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...

More information

Increasing Data Center Resilience While Lowering PUE

Increasing Data Center Resilience While Lowering PUE Increasing Data Center Resilience While Lowering PUE Nandini Mouli, Ph.D. President/Founder esai LLC mouli.nandini@gmail.com www.esai.technology Introduction esai LLC esai LLC: Is a Disadvantaged woman-owned

More information

are you helping your customers achieve their expectations for IT based service quality and availability?

are you helping your customers achieve their expectations for IT based service quality and availability? PARTNER BRIEF Service Operations Management from CA Technologies are you helping your customers achieve their expectations for IT based service quality and availability? FOR PARTNER USE ONLY DO NOT DISTRIBUTE

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Reducing Configuration Complexity with Next Gen IoT Networks

Reducing Configuration Complexity with Next Gen IoT Networks Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration

More information

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension CAS7318 A Geo Redundant Cloud VoIP Service Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension Brett Buckingham Managing Director, silhouette Research and Development Broadview

More information

Barracuda Load Balancer Online Demo Guide

Barracuda Load Balancer Online Demo Guide Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

SwiftStack Global Cluster Deployment Guide

SwiftStack Global Cluster Deployment Guide OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read

More information

Future Proofing the Data Center: A New Architecture for Innovation and Investment Protection Built on Carrier-Class Routers

Future Proofing the Data Center: A New Architecture for Innovation and Investment Protection Built on Carrier-Class Routers White Paper : A New Architecture for Innovation and Investment Protection Built on Carrier-Class Routers Contents Executive Summary....2 Introduction: Understanding the Need for Carrier-Class Routers....2

More information

http://media.amazonwebservices.com/pdf/aws_security_whitepaper.pdf http://media.amazonwebservices.com/pdf/aws_security_whitepaper.

http://media.amazonwebservices.com/pdf/aws_security_whitepaper.pdf http://media.amazonwebservices.com/pdf/aws_security_whitepaper. 1. Cloud Costs Questions a. Are there any better ways for us to predict / manage our transfer costs than what we discussed in the meeting today? [DSB] There is currently no methodology with AWS to purchase

More information

ArcGIS for Server in the Amazon Cloud. Michele Lundeen Esri

ArcGIS for Server in the Amazon Cloud. Michele Lundeen Esri ArcGIS for Server in the Amazon Cloud Michele Lundeen Esri What we will cover ArcGIS for Server in the Amazon Cloud Why How Extras Why do you need ArcGIS Server? Some examples Publish - Dynamic Map Services

More information

First Line of Defense to Protect Critical Infrastructure

First Line of Defense to Protect Critical Infrastructure RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

Infoblox Grid TM. Automated Network Control for. Unifying DNS Management and Extending the Infoblox Grid TM to the F5 Global Traffic Manager

Infoblox Grid TM. Automated Network Control for. Unifying DNS Management and Extending the Infoblox Grid TM to the F5 Global Traffic Manager Key Differentiators Application Layer Availability Minimizes downtime and improves the user experience by determining health at the application layer for every user. Management Automation: Provides automated

More information