Solution & Design Architecture
|
|
- Job Armstrong
- 8 years ago
- Views:
Transcription
1 Solution & Design Architecture
2 Agenda Key Requirements Independence to ULBs Workflow : Administrator Activities Solution To Address Key Requirements Flexibility in selection of services Application Usage Accounting Solution Architecture Diagram Security facility and Risks mitigation Facility of Audit Trail & Problem Detection Deployment Architecture Interface to external applications Helpdesk and SLA Monitoring URLs & Sub-domains Identification and Measurement of SLA Way forward Delivery of services in Offline Mode
3 Key Requirements Independence to ULBs to manage their data & environment ULB specific administrators to manage users & their access rights Implement dynamic workflow and by-laws Facility to accommodate ULB specific customization for dynamic business workflow, forms/reports, language Monitor, record & track different services related transactions for accounting purpose among ULBs Establishment of accountability & problem detection, the means by which changes to the information (inserts, updates and deletes) are recorded for 'audit' purposes Security features to protect information and control relevant accesses; i.e. capability to secure data using encryption, provide network and infrastructure security for reliable and transparent services
4 Key Requirements (contd ) Facility to accommodate external interfaces for GIS Payment Gateway Existing system in ULBS Selection from various applications available in the software solution for the services and sub-processes Designating specific domain names to individual ULBs (Urban Local Bodies); i.e. ULB specific identifiable name Identification & measurement of Service Level Agreements (SLAs) Continuation of service delivery during the time of crisis or disconnection from centralized network
5 Addressing Key Requirements
6 Independence to ULBs Administration for Multi-tenancy To provide independence to ULBs to manage their data & environment. State level administrator would create ULB administrator. ULB administrator to : Create and manage access and login rights of the ULB users. Handle ULB specific business logic and bye-laws in the application solution. The customizations specific to ULBs for dynamic business workflow, forms/reports, language, look and feel be taken care in the application solution. Manage contents of the application solution.
7 Workflow : Administrator Activities SLNA Administrator Features and Responsibilities: SLNA ADMINISTRATOR ACTIVITIES 1. Create customized workflows for each ULB MIS & REPORTING SLNA WORKFLOW MANAGEMENT ROLE DEFINITION UI REPOSITORY ULB PROCESS FLOW CUSTOMIZATION 2. Create roles that can be used by ULBs for their workflow 3. Be able to assign fine granularity tasks to roles, for greater flexibility 4. Should enforce system-behavior protocols- for e.g., load balancing etc. depending on time of the day. ULB Administrator Features and Responsibilities: 1. Be able to assign role(s) to employees according to the workflow for a process. ULB ADMINISTRATOR ACTIVITIES ROLE ASSIGNMENT DYNAMIC ROLE DELEGATION ULB WORKFLOW MANAGEMENT UI CUSTOMIZATION AND DYNAMIC FORM LIBRARY MIS & REPORTING 2. Allow Dynamic workflow management and dynamic farms. 3. Should be able to collapse or expand a workflow depending on the ULB s specific requirements
8 Flexibility in Selection of Service Scenario 1: Flexibility to ULBs to continue using existing applications by getting them integrated to the centralized application: i.e. if a ULB already has 2 applications and wants to continue using them along with centralized application solution for other services. Changes required to integrate existing application should be implemented in the centralized solution. Scenario 2: Flexibility to integrate new applications to centralized application to handle future needs: i.e. if a ULB has future requirements of more services, then existing centralized solution should be able to integrate these new applications to existing centralized application solution without impacting current services of application.
9 Application Usage (Transaction) Accounting Application would take care of accountings through a Transaction Accounting module for transactions done for services. Application would provide customized reports for MIS and Auditable reports. Reports provided by Transaction Accounting module would support & help in revenue/cost sharing model. During offline mode, the application should take care of transactions accounting. The online accounting should also be managed by the application.
10 Security Facility & Risks Mitigation Application solution should capture all aspects for reconciliation of risks to provide data security. Appropriate restrictions must be imposed to maintain ULB specific user level security and user specific conditional accesses. Application solution should provide sufficient network and infrastructure level security at the ULBs. Consideration for sufficient redundancy should be done to maintain recommended availability of the application.
11 Facility of Audit Trail & Problem Detection Application solution should be able to establish the accountability for data modification or deletion by maintaining audit trail logs and reports. Delivery of services to the citizens has to be maintained during the hour of crisis such as network failure or virus attack by tracking and resolving issues without negotiating with SLA.
12 Interface to External Applications Application solution to provide a gateway to have interface to external applications viz. Geographical Information System (GIS) for field surveys information and instant data, Payment gateways to enable online payment processing for secure, fast and traceable transactions, Interoperability to other existing applications
13 URLs & Sub-domains Each ULB may have a separate URL registered individually Would require dedicated front-end web server Separate URL id to be registered and customized ULB would require to establish and maintain components which would add to their ownership and expense. Common URL for state with provision for sub domains for ULBs Common URL is preferred solution at the state
14 Identification and Measurement of Service Level Agreements (SLA) Standard set to evaluate performance of the metrics and the processes executed through application solution. Service level agreements of the workflows in the application solution should be defined and escalated to the next level in case of breach of SLAs There should be deployment of SLA monitoring tool to establish a scrutiny on performance of service related transactions
15 Delivery of Services in Offline Mode SLNA/ULB need to identify the services which need to be provided in offline mode; (when connectivity to datacenter is not available, or the main server is down). For the services to be provided in offline mode, DPR should provide functionality of each service in offline mode. While providing services in offline mode, the risks should be clearly identified & the risk mitigation strategy should be clearly defined in DPR. Special care to be taken in case of transactions of financial nature.
16 Scalability and Future Provisioning It is envisaged that the same solution will be used for providing services in remaining ULBs of the State. Hardware sizing to be planned considering the Mission Cities in the State. Appropriate technologies to address software & hardware scalability (for remaining ULBs & seasonal peak loads) like virtualization, server farms, cloud computing, etc. should be evaluated and deployed.
17 Solution Architecture Diagram
18 Solution Architecture Diagram Separate presentation layer for all ULBs
19 Solution Architecture Diagram System administrators would be able to administer ULB specific components Multi tenancy
20 Solution Architecture Diagram Audit and reconciliation functionality
21 Solution Architecture Diagram System usage / Transaction accounting module providing MIS to support revenue / cost sharing System usage / Transaction accounting data repository
22 Solution Architecture Diagram Service-specific repository Would contain data about various ULBs (through association of data with ULB id)
23 Solution Architecture Diagram External Interfaces and Services
24 Deployment Architecture Suggestive deployment architecture would be centralized deployment architecture for e-municipality application. External users (citizens/business users) access non-restricted areas of application over internet. Internal users (Internal departmental) connected through SWAN (State Wide Area Network) and access the application over intranet. Other government agencies communicating between various emunicipality application may access the applications over SWAN.
25 Deployment Architecture (contd ) Existing Environment Security & networking infrastructure is available as part of hosting environment at state level. New Environment Application server, Database server & Storage facility to be made available by ASP as part of this project. Helpdesk facility to be made available by ASP as part of this project.
26 Deployment Architecture
27 Deployment Architecture Existing Environment New Environment To Be Hosted
28 Deployment Architecture (External Users)
29 Deployment Architecture (Internal Users)
30 Helpdesk and SLA Monitoring
31 Way Forward For Deployment State to identify Application Service Provider for procurement & installation of server side hardware & software Data ownership, its management and define the SLA (Service Level Agreement) with various ULBs and Applications Service Provider Roll out strategy in the number of ULBs Need & use of Support/ Help Desk for software application and other related infrastructure components ULB to provide Detail about the applications that are currently being used for providing services, particularly if any of them is a part of the new state solution Schema, database design that is being currently used to ASP (Application Service Provider) Details on how the existing networking components can be re-used or integrated with the new setup Details of the number of physical locations, departments / offices, users in the department, existing delivery channels like Citizen Facilitation Centers (CFC), SWAN, SDC etc
32 Way Forward State to identify : Users/Stakeholders of the application Various Access Channels Last mile connectivity Data center for server farms and hosting application External applications/interfaces Deployment System & Data Security Requirements Functional requirements of the applications ULB to provide : ULB specific customization requirements Details about existing applications Access rights requirements ULB specific By-laws
33 Q&A
34 Thank You
Guidelines for Infrastructure & Application Hosting in SDC
Guidelines for Infrastructure & Application Hosting in SDC V 1.0 Department of Electronics & Information Technology, Ministry of Communications and Information Technology, Government of India Abstract
More informationSSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG
Operational Manual For SSDG 1 Table of Contents ABBREVIATIONS... 5 SECTION 1: INTRODUCTION... 6 1 INTRODUCTION... 7 1.1 INTENDED USER... 7 1.2 HOW TO USE... 7 1.3 ORGANIZATION OF THE MANUAL... 8 1.4 HELPDESK...
More informationCloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationMinder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data
Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance
More informationHow SITEFORUM provides you with main components to build and run an innovative cloud computing service for an industry or special interest group
Status: June 2011 How SITEFORUM provides you with main components to build and run an innovative cloud computing service for an industry or special interest group tags: software, social business, online
More informationAn Oracle White Paper June, 2014. Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c
An Oracle White Paper June, 2014 Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c Product Overview... 1 Introduction... 1 Laying the Groundwork for Monitoring...
More informationEnterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
More informationIntroductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
More informationAutomated Building Plan Approval
Automated Building Plan Approval Prior to the implementation of 74 th CAA in most of the urban local bodies, town planning section was responsible for issuing the permissions for building plan approval.
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationDependable SaaS Applications and Solutions
Software as Service Bojan Cukic WVU For non-profit educational use only 1 WHY Software as Service? Product sales and license fee revenues declining Users unhappy with high maintenance support fees Exceptions:
More informationVersion 1.0. IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process
Version 1.0 IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process Table of Contents 1 Planning and Organization... 6 1.1 Executive Overview... 6 1.1.1 ITSM & ITAM
More informationSaaS & Cloud Application Development & Delivery
SaaS & Cloud Application Development & Delivery A Whitepaper by Ekartha, Inc. by Gurpreet Singh, Ekartha Inc. Raj Sethi, Ekartha Inc. Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516)
More informationLDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
More informationSingle Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
More informationService Design, Management and Composition: Service Level Agreements Objectives
Objectives! motivation for service level agreements! definition / measurement of levels! management of SLAs! formal representation 2 Content! definition! example! metrics! negotiation! optimization! monitoring!
More informationWeb Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
More informationWeb Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
More informationProtect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
More informationBuilding a SaaS Application. ReddyRaja Annareddy CTO and Founder
Building a SaaS Application ReddyRaja Annareddy CTO and Founder Introduction As cloud becomes more and more prevalent, many ISV s and enterprise are looking forward to move their services and offerings
More informationDirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationMobile Application Development Platform Comparison
Mobile Application Development Platform Comparison Unvired Inc. Disclaimer: This document has been prepared based on publicly available data of other platform vendors and is subject to change. Comparison
More informationDirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationFor more information about UC4 products please visit www.uc4.com. Automation Within, Around, and Beyond Oracle E-Business Suite
For more information about UC4 products please visit www.uc4.com Automation Within, Around, and Beyond Oracle E-Business Suite Content Executive Summary...3 Opportunities for Enhancement: Automation Within,
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationCA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationAlice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: info@ekartha.com Web:
More informationAbout this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010.
Course 10231B: Designing a Microsoft SharePoint 2010 Infrastructure OVERVIEW About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Audience Profile
More informationWith Windows, Web and Mobile clients Richmond SupportDesk is accessible to Service Desk operators wherever they are.
Richmond Systems Richmond Systems is a leading provider of software solutions enabling organisations to implement enterprise wide, best practice, IT Service Management. Richmond SupportDesk is currently
More informationNetworking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
More informationRequest for Proposal for Application Development and Maintenance Services for XML Store platforms
Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...
More informationRemote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
More informationMulti-Tenancy in SharePoint 2010. DD105 Spencer Harbar Enterprise Architect harbar.net
Multi-Tenancy in SharePoint 2010 DD105 Spencer Harbar Enterprise Architect harbar.net About Spencer www.harbar.net spence@harbar.net @harbars General SharePoint Dogsbody Microsoft Certified Master SharePoint
More informationBuilding Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
More informationDelivery date: 18 October 2014
Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group
More informationThe ODCA, Helix Nebula and Federated Identity Management. Mick Symonds Principal Solutions Architect Atos Managed Services NL
The ODCA, Helix Nebula and Federated Identity Management Principal Solutions Architect Atos Managed Services NL Agenda The Open Data Center Alliance Helix Nebula Federated Identity Management as a service
More informationIT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
More informationModule: Sharepoint Administrator
Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture
More informationSaaS the new normal. Service-now.com, Terry Brown
SaaS the new normal Service-now.com, Terry Brown Discussion Points Undeniable evolution What is SaaS? How can you benefit from SaaS Creating an ITSM solution at John Maneely Company Business drivers affecting
More informationSaaS Data Architecture. An Oracle White Paper Oct 2008
SaaS Data Architecture An Oracle White Paper Oct 2008 SaaS Data Architecture Introduction... 3 DATA ARCHITECTURE APPROACHES... 3 Separate Databases... 4 Shared Database, Separate Schemas... 4 Shared Database,
More informationExtranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
More informationService Portfolio Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
More informationFTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
More informationIAAS CLOUD EXCHANGE WHITEPAPER
IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support
More informationInteroperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
More informationCloud Service Rollout. Chapter 9
Cloud Service Rollout Chapter 9 Cloud Service Topics Cloud service rollout plans vary depending on the type of cloud service SaaS, PaaS, or IaaS and the vendor. Unit Topics Identifying vendor roles and
More informationProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
More informationParlaMI, Enterprise Instant Messaging
ParlaMI, Enterprise Instant Messaging A step forward for the optimization and protection of corporate communications Why should you use instant messaging in your business environment? Optimize business
More informationGuidelines For Technical and Financial Support For Establishment of State Data Centre (SDC)
Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Department of Information Technology, Govt. of India, Electronics Niketan, New Delhi 110 003. 1.0 Preamble 1.1
More informationImplementing VoIP monitoring solutions. Deployment note
Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and
More informationMicrosoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks
Microsoft Exchange Load Balancing Unique Applied Patent Technology By XRoads Networks Microsoft Exchange Server Balancing The following is an introduction and overview as to how the EdgeXOS appliances
More informationAn Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
More informationHow To Choose A Cloud Computing Solution
WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.
More information7. End user consultation to understand stakeholders expectation
Terms of Reference for Preparation of DPR for the e district pilot projects for a State (generally two district per State and not more than three districts per State in any case) The emplaned consultant
More informationTHE COMPLETE WORKFLOW MANAGEMENT SOLUTION FOR ENTERPRISES
THE COMPLETE WORKFLOW MANAGEMENT SOLUTION FOR ENTERPRISES Employee On-Boarding Payroll Collaboration Intranet Employee Data Performance Training & Skills and Leave Comprehensive Hiring Appraisals & Performance
More informationCitrix Receiver for Enterprise Applications The technical detail
Citrix Receiver for Enterprise Applications Technical White Paper Citrix Receiver for Enterprise Applications The technical detail This technical paper details a solution that lets on-the-road personnel
More informationManaging and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
More informationRelease 6.2.1 System Administrator s Guide
IBM Maximo Release 6.2.1 System Administrator s Guide Note Before using this information and the product it supports, read the information in Notices on page Notices-1. First Edition (January 2007) This
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationIntegration Maturity Model Capability #5: Infrastructure and Operations
Integration Maturity Model Capability #5: Infrastructure and Operations How improving integration supplies greater agility, cost savings, and revenue opportunity TAKE THE INTEGRATION MATURITY SELFASSESSMENT
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationSUCCESSFUL SHAREPOINT IMPLEMENTATIONS. Maximize Application Availability and Protect Your Mission Critical Assets
SUCCESSFUL SHAREPOINT IMPLEMENTATIONS Maximize Application Availability and Protect Your Mission Critical Assets Brought to You By 5090 Richmond Avenue Suite #336 3 Second Street, Suite # 202 Houston,
More informationHow To Secure Cloud Computing
A hole in the cloud: Is cloud secure? N. Vijaykumar Infosys Technologies Limited, Bangalore presented at Security in cloud is a key challenge! 70% 60% 50% 40% 30% 20% 10% 0% Data integrity tampering Hacker
More informationSIGMA CRIS: SCIENTIFIC OUTPUTS, INTEGRATION AND INTEROPERABILITY
SIGMA CRIS: SCIENTIFIC OUTPUTS, INTEGRATION AND INTEROPERABILITY From an On-Premise solution to service model for SIGMA CONSORTIUM Jordi Cuní Chief Information Officer SIGMA AIE EUNIS 2015 SIGMA AIE SIGMA
More informationSupplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
More informationDESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
More informationData In The Cloud: Who Owns It, and How Do You Get it Back?
Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?
More informationFrequently Asked Questions Aerohive ID Manager
Frequently Asked Questions Aerohive ID Manager About the Product... 1 Ordering FAQs... 4 Product Strategy... 6 About the Product 1. What is ID Manager? ID Manager is Aerohive s new cloud-based guest management
More informationSiebel HelpDesk Guide. Version 8.0, Rev. C March 2010
Siebel HelpDesk Guide Version 8.0, Rev. C March 2010 Copyright 2005, 2010 Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain proprietary
More informationWhat s new in AM 9.30 Accelerating business outcomes
What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive
More informationHP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
More informationRiverbed Stingray & Joyent Content Delivery Cloud
Riverbed Stingray & Joyent Content Delivery Cloud Executive Summary Timely delivery of applications is critical to the success of most companies. But many applications now operate over vast geographical
More informationNetworking and High Availability
yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationContents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com
Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and
More informationFamily Datasheet AEP Series A
Trusted Security Everywhere Family Datasheet AEP Series A Covering: Hardware Edition Virtual Edition Load Balancer AEP Networks, Inc. All rights reserved. Secure Application Access 2500. 4500. 6500. 8500
More informationSERVICE EXCELLENCE SUITE
USERS GUIDE Release Management Service Management and ServiceNow SERVICE EXCELLENCE SUITE Table of Contents Introduction... 3 Overview, Objectives, and Current Scope... 4 Overview... 4 Objectives... 4
More informationSharePoint Pros and Cons
Virtual Training Center for SharePoint 2007 Virtual Training Center for SharePoint 2007 7 Common Mistakes in Implementing SharePoint 2007 ABOUT THE AUTHOR Devereaux Milburn is the author of VTC for SharePoint
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More informationState of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
More informatione Governance ULB Level Reform
ULB Level Reform 1. The Reform e-governance is a form of public administration making use of information and communication technologies (ICT) to enhance the access and delivery of government services to
More informationCloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives
Greytip Online Cloud based HR & Payroll software Cloud Technology Platform Enables Leading 16 Snapshot Client Profile A global HR & Payroll outsourcing company. The company is in the business of delivering
More informationSupporting GIS Best practices for Incident Management and Daily Operations
Supporting GIS Best practices for Incident Management and Daily Operations Shaun Collins, Project Manager Venkat Nittala, Operations Lead Agenda Introduction & History of GIS at PG&E PG&E GIS Environment
More informationCloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
More informationSLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
More informationSecurity It s an ecosystem thing
Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment
More informationThe SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution
BEST PRACTICES WHITE PAPER The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution Nine Things to Look For in Your Next SaaS Service Desk Table of Contents Introduction...................................................
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
More informationManaged Services Solutions
Managed Services Solutions Managing Services in Real-Time with Total Control Excellence in servicing leading edge technology E Docs E Serve E Tech E Net Introducing Managed Services Managed Services enable
More informationCloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
More informationZentera Cloud Federation Network for Hybrid Computing
Zentera Cloud Federation Network for Hybrid Computing The New Era of Hybrid Computing Cloud computing technology, the next computing paradigm after client-server, will shift enterprise IT to a new era
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More information10231B: Designing a Microsoft SharePoint 2010 Infrastructure
10231B: Designing a Microsoft SharePoint 2010 Infrastructure Course Number: 10231B Course Length: 5 Days Course Overview This 5 day course teaches IT Professionals to design and deploy Microsoft SharePoint
More informationEssential NCPI Management Requirements for Next Generation Data Centers
Essential NCPI Requirements for Next Generation Data Centers By Ted Ives White Paper #14 1 Executive Summary The management of physical infrastructure in data centers can no longer be considered independently
More informationThe governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
More information