Solution & Design Architecture
|
|
|
- Job Armstrong
- 10 years ago
- Views:
Transcription
1 Solution & Design Architecture
2 Agenda Key Requirements Independence to ULBs Workflow : Administrator Activities Solution To Address Key Requirements Flexibility in selection of services Application Usage Accounting Solution Architecture Diagram Security facility and Risks mitigation Facility of Audit Trail & Problem Detection Deployment Architecture Interface to external applications Helpdesk and SLA Monitoring URLs & Sub-domains Identification and Measurement of SLA Way forward Delivery of services in Offline Mode
3 Key Requirements Independence to ULBs to manage their data & environment ULB specific administrators to manage users & their access rights Implement dynamic workflow and by-laws Facility to accommodate ULB specific customization for dynamic business workflow, forms/reports, language Monitor, record & track different services related transactions for accounting purpose among ULBs Establishment of accountability & problem detection, the means by which changes to the information (inserts, updates and deletes) are recorded for 'audit' purposes Security features to protect information and control relevant accesses; i.e. capability to secure data using encryption, provide network and infrastructure security for reliable and transparent services
4 Key Requirements (contd ) Facility to accommodate external interfaces for GIS Payment Gateway Existing system in ULBS Selection from various applications available in the software solution for the services and sub-processes Designating specific domain names to individual ULBs (Urban Local Bodies); i.e. ULB specific identifiable name Identification & measurement of Service Level Agreements (SLAs) Continuation of service delivery during the time of crisis or disconnection from centralized network
5 Addressing Key Requirements
6 Independence to ULBs Administration for Multi-tenancy To provide independence to ULBs to manage their data & environment. State level administrator would create ULB administrator. ULB administrator to : Create and manage access and login rights of the ULB users. Handle ULB specific business logic and bye-laws in the application solution. The customizations specific to ULBs for dynamic business workflow, forms/reports, language, look and feel be taken care in the application solution. Manage contents of the application solution.
7 Workflow : Administrator Activities SLNA Administrator Features and Responsibilities: SLNA ADMINISTRATOR ACTIVITIES 1. Create customized workflows for each ULB MIS & REPORTING SLNA WORKFLOW MANAGEMENT ROLE DEFINITION UI REPOSITORY ULB PROCESS FLOW CUSTOMIZATION 2. Create roles that can be used by ULBs for their workflow 3. Be able to assign fine granularity tasks to roles, for greater flexibility 4. Should enforce system-behavior protocols- for e.g., load balancing etc. depending on time of the day. ULB Administrator Features and Responsibilities: 1. Be able to assign role(s) to employees according to the workflow for a process. ULB ADMINISTRATOR ACTIVITIES ROLE ASSIGNMENT DYNAMIC ROLE DELEGATION ULB WORKFLOW MANAGEMENT UI CUSTOMIZATION AND DYNAMIC FORM LIBRARY MIS & REPORTING 2. Allow Dynamic workflow management and dynamic farms. 3. Should be able to collapse or expand a workflow depending on the ULB s specific requirements
8 Flexibility in Selection of Service Scenario 1: Flexibility to ULBs to continue using existing applications by getting them integrated to the centralized application: i.e. if a ULB already has 2 applications and wants to continue using them along with centralized application solution for other services. Changes required to integrate existing application should be implemented in the centralized solution. Scenario 2: Flexibility to integrate new applications to centralized application to handle future needs: i.e. if a ULB has future requirements of more services, then existing centralized solution should be able to integrate these new applications to existing centralized application solution without impacting current services of application.
9 Application Usage (Transaction) Accounting Application would take care of accountings through a Transaction Accounting module for transactions done for services. Application would provide customized reports for MIS and Auditable reports. Reports provided by Transaction Accounting module would support & help in revenue/cost sharing model. During offline mode, the application should take care of transactions accounting. The online accounting should also be managed by the application.
10 Security Facility & Risks Mitigation Application solution should capture all aspects for reconciliation of risks to provide data security. Appropriate restrictions must be imposed to maintain ULB specific user level security and user specific conditional accesses. Application solution should provide sufficient network and infrastructure level security at the ULBs. Consideration for sufficient redundancy should be done to maintain recommended availability of the application.
11 Facility of Audit Trail & Problem Detection Application solution should be able to establish the accountability for data modification or deletion by maintaining audit trail logs and reports. Delivery of services to the citizens has to be maintained during the hour of crisis such as network failure or virus attack by tracking and resolving issues without negotiating with SLA.
12 Interface to External Applications Application solution to provide a gateway to have interface to external applications viz. Geographical Information System (GIS) for field surveys information and instant data, Payment gateways to enable online payment processing for secure, fast and traceable transactions, Interoperability to other existing applications
13 URLs & Sub-domains Each ULB may have a separate URL registered individually Would require dedicated front-end web server Separate URL id to be registered and customized ULB would require to establish and maintain components which would add to their ownership and expense. Common URL for state with provision for sub domains for ULBs Common URL is preferred solution at the state
14 Identification and Measurement of Service Level Agreements (SLA) Standard set to evaluate performance of the metrics and the processes executed through application solution. Service level agreements of the workflows in the application solution should be defined and escalated to the next level in case of breach of SLAs There should be deployment of SLA monitoring tool to establish a scrutiny on performance of service related transactions
15 Delivery of Services in Offline Mode SLNA/ULB need to identify the services which need to be provided in offline mode; (when connectivity to datacenter is not available, or the main server is down). For the services to be provided in offline mode, DPR should provide functionality of each service in offline mode. While providing services in offline mode, the risks should be clearly identified & the risk mitigation strategy should be clearly defined in DPR. Special care to be taken in case of transactions of financial nature.
16 Scalability and Future Provisioning It is envisaged that the same solution will be used for providing services in remaining ULBs of the State. Hardware sizing to be planned considering the Mission Cities in the State. Appropriate technologies to address software & hardware scalability (for remaining ULBs & seasonal peak loads) like virtualization, server farms, cloud computing, etc. should be evaluated and deployed.
17 Solution Architecture Diagram
18 Solution Architecture Diagram Separate presentation layer for all ULBs
19 Solution Architecture Diagram System administrators would be able to administer ULB specific components Multi tenancy
20 Solution Architecture Diagram Audit and reconciliation functionality
21 Solution Architecture Diagram System usage / Transaction accounting module providing MIS to support revenue / cost sharing System usage / Transaction accounting data repository
22 Solution Architecture Diagram Service-specific repository Would contain data about various ULBs (through association of data with ULB id)
23 Solution Architecture Diagram External Interfaces and Services
24 Deployment Architecture Suggestive deployment architecture would be centralized deployment architecture for e-municipality application. External users (citizens/business users) access non-restricted areas of application over internet. Internal users (Internal departmental) connected through SWAN (State Wide Area Network) and access the application over intranet. Other government agencies communicating between various emunicipality application may access the applications over SWAN.
25 Deployment Architecture (contd ) Existing Environment Security & networking infrastructure is available as part of hosting environment at state level. New Environment Application server, Database server & Storage facility to be made available by ASP as part of this project. Helpdesk facility to be made available by ASP as part of this project.
26 Deployment Architecture
27 Deployment Architecture Existing Environment New Environment To Be Hosted
28 Deployment Architecture (External Users)
29 Deployment Architecture (Internal Users)
30 Helpdesk and SLA Monitoring
31 Way Forward For Deployment State to identify Application Service Provider for procurement & installation of server side hardware & software Data ownership, its management and define the SLA (Service Level Agreement) with various ULBs and Applications Service Provider Roll out strategy in the number of ULBs Need & use of Support/ Help Desk for software application and other related infrastructure components ULB to provide Detail about the applications that are currently being used for providing services, particularly if any of them is a part of the new state solution Schema, database design that is being currently used to ASP (Application Service Provider) Details on how the existing networking components can be re-used or integrated with the new setup Details of the number of physical locations, departments / offices, users in the department, existing delivery channels like Citizen Facilitation Centers (CFC), SWAN, SDC etc
32 Way Forward State to identify : Users/Stakeholders of the application Various Access Channels Last mile connectivity Data center for server farms and hosting application External applications/interfaces Deployment System & Data Security Requirements Functional requirements of the applications ULB to provide : ULB specific customization requirements Details about existing applications Access rights requirements ULB specific By-laws
33 Q&A
34 Thank You
Guidelines for Infrastructure & Application Hosting in SDC
Guidelines for Infrastructure & Application Hosting in SDC V 1.0 Department of Electronics & Information Technology, Ministry of Communications and Information Technology, Government of India Abstract
SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG
Operational Manual For SSDG 1 Table of Contents ABBREVIATIONS... 5 SECTION 1: INTRODUCTION... 6 1 INTRODUCTION... 7 1.1 INTENDED USER... 7 1.2 HOW TO USE... 7 1.3 ORGANIZATION OF THE MANUAL... 8 1.4 HELPDESK...
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data
Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance
An Oracle White Paper June, 2014. Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c
An Oracle White Paper June, 2014 Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c Product Overview... 1 Introduction... 1 Laying the Groundwork for Monitoring...
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
Automated Building Plan Approval
Automated Building Plan Approval Prior to the implementation of 74 th CAA in most of the urban local bodies, town planning section was responsible for issuing the permissions for building plan approval.
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Version 1.0. IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process
Version 1.0 IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process Table of Contents 1 Planning and Organization... 6 1.1 Executive Overview... 6 1.1.1 ITSM & ITAM
SaaS & Cloud Application Development & Delivery
SaaS & Cloud Application Development & Delivery A Whitepaper by Ekartha, Inc. by Gurpreet Singh, Ekartha Inc. Raj Sethi, Ekartha Inc. Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516)
LDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Service Design, Management and Composition: Service Level Agreements Objectives
Objectives! motivation for service level agreements! definition / measurement of levels! management of SLAs! formal representation 2 Content! definition! example! metrics! negotiation! optimization! monitoring!
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Building a SaaS Application. ReddyRaja Annareddy CTO and Founder
Building a SaaS Application ReddyRaja Annareddy CTO and Founder Introduction As cloud becomes more and more prevalent, many ISV s and enterprise are looking forward to move their services and offerings
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Mobile Application Development Platform Comparison
Mobile Application Development Platform Comparison Unvired Inc. Disclaimer: This document has been prepared based on publicly available data of other platform vendors and is subject to change. Comparison
DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
For more information about UC4 products please visit www.uc4.com. Automation Within, Around, and Beyond Oracle E-Business Suite
For more information about UC4 products please visit www.uc4.com Automation Within, Around, and Beyond Oracle E-Business Suite Content Executive Summary...3 Opportunities for Enhancement: Automation Within,
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
CA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security [email protected] CA Technologies Content-Aware IAM strategy CA Technologies
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:
With Windows, Web and Mobile clients Richmond SupportDesk is accessible to Service Desk operators wherever they are.
Richmond Systems Richmond Systems is a leading provider of software solutions enabling organisations to implement enterprise wide, best practice, IT Service Management. Richmond SupportDesk is currently
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
Request for Proposal for Application Development and Maintenance Services for XML Store platforms
Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Multi-Tenancy in SharePoint 2010. DD105 Spencer Harbar Enterprise Architect harbar.net
Multi-Tenancy in SharePoint 2010 DD105 Spencer Harbar Enterprise Architect harbar.net About Spencer www.harbar.net [email protected] @harbars General SharePoint Dogsbody Microsoft Certified Master SharePoint
Building Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Module: Sharepoint Administrator
Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture
SaaS the new normal. Service-now.com, Terry Brown
SaaS the new normal Service-now.com, Terry Brown Discussion Points Undeniable evolution What is SaaS? How can you benefit from SaaS Creating an ITSM solution at John Maneely Company Business drivers affecting
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Service Portfolio Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
IAAS CLOUD EXCHANGE WHITEPAPER
IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
ParlaMI, Enterprise Instant Messaging
ParlaMI, Enterprise Instant Messaging A step forward for the optimization and protection of corporate communications Why should you use instant messaging in your business environment? Optimize business
Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC)
Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Department of Information Technology, Govt. of India, Electronics Niketan, New Delhi 110 003. 1.0 Preamble 1.1
Microsoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks
Microsoft Exchange Load Balancing Unique Applied Patent Technology By XRoads Networks Microsoft Exchange Server Balancing The following is an introduction and overview as to how the EdgeXOS appliances
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
How To Choose A Cloud Computing Solution
WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.
THE COMPLETE WORKFLOW MANAGEMENT SOLUTION FOR ENTERPRISES
THE COMPLETE WORKFLOW MANAGEMENT SOLUTION FOR ENTERPRISES Employee On-Boarding Payroll Collaboration Intranet Employee Data Performance Training & Skills and Leave Comprehensive Hiring Appraisals & Performance
Citrix Receiver for Enterprise Applications The technical detail
Citrix Receiver for Enterprise Applications Technical White Paper Citrix Receiver for Enterprise Applications The technical detail This technical paper details a solution that lets on-the-road personnel
Managing and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
Release 6.2.1 System Administrator s Guide
IBM Maximo Release 6.2.1 System Administrator s Guide Note Before using this information and the product it supports, read the information in Notices on page Notices-1. First Edition (January 2007) This
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Integration Maturity Model Capability #5: Infrastructure and Operations
Integration Maturity Model Capability #5: Infrastructure and Operations How improving integration supplies greater agility, cost savings, and revenue opportunity TAKE THE INTEGRATION MATURITY SELFASSESSMENT
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
SUCCESSFUL SHAREPOINT IMPLEMENTATIONS. Maximize Application Availability and Protect Your Mission Critical Assets
SUCCESSFUL SHAREPOINT IMPLEMENTATIONS Maximize Application Availability and Protect Your Mission Critical Assets Brought to You By 5090 Richmond Avenue Suite #336 3 Second Street, Suite # 202 Houston,
How To Secure Cloud Computing
A hole in the cloud: Is cloud secure? N. Vijaykumar Infosys Technologies Limited, Bangalore presented at Security in cloud is a key challenge! 70% 60% 50% 40% 30% 20% 10% 0% Data integrity tampering Hacker
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
Data In The Cloud: Who Owns It, and How Do You Get it Back?
Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?
Frequently Asked Questions Aerohive ID Manager
Frequently Asked Questions Aerohive ID Manager About the Product... 1 Ordering FAQs... 4 Product Strategy... 6 About the Product 1. What is ID Manager? ID Manager is Aerohive s new cloud-based guest management
Siebel HelpDesk Guide. Version 8.0, Rev. C March 2010
Siebel HelpDesk Guide Version 8.0, Rev. C March 2010 Copyright 2005, 2010 Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain proprietary
What s new in AM 9.30 Accelerating business outcomes
What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive
HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
Networking and High Availability
yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
SERVICE EXCELLENCE SUITE
USERS GUIDE Release Management Service Management and ServiceNow SERVICE EXCELLENCE SUITE Table of Contents Introduction... 3 Overview, Objectives, and Current Scope... 4 Overview... 4 Objectives... 4
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
e Governance ULB Level Reform
ULB Level Reform 1. The Reform e-governance is a form of public administration making use of information and communication technologies (ICT) to enhance the access and delivery of government services to
Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives
Greytip Online Cloud based HR & Payroll software Cloud Technology Platform Enables Leading 16 Snapshot Client Profile A global HR & Payroll outsourcing company. The company is in the business of delivering
Supporting GIS Best practices for Incident Management and Daily Operations
Supporting GIS Best practices for Incident Management and Daily Operations Shaun Collins, Project Manager Venkat Nittala, Operations Lead Agenda Introduction & History of GIS at PG&E PG&E GIS Environment
Cloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution
BEST PRACTICES WHITE PAPER The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution Nine Things to Look For in Your Next SaaS Service Desk Table of Contents Introduction...................................................
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Zentera Cloud Federation Network for Hybrid Computing
Zentera Cloud Federation Network for Hybrid Computing The New Era of Hybrid Computing Cloud computing technology, the next computing paradigm after client-server, will shift enterprise IT to a new era
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
10231B: Designing a Microsoft SharePoint 2010 Infrastructure
10231B: Designing a Microsoft SharePoint 2010 Infrastructure Course Number: 10231B Course Length: 5 Days Course Overview This 5 day course teaches IT Professionals to design and deploy Microsoft SharePoint
Essential NCPI Management Requirements for Next Generation Data Centers
Essential NCPI Requirements for Next Generation Data Centers By Ted Ives White Paper #14 1 Executive Summary The management of physical infrastructure in data centers can no longer be considered independently
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
