Architecture Evaluation Methods: Introduction to ATAM
|
|
|
- Harvey Sanders
- 10 years ago
- Views:
Transcription
1 Architecture Evaluation Methods: Introduction to ATAM
2 Contents What is ATAM? What are the outputs of ATAM? Phases and Steps of ATAM ATAM Running Example Introduction to ATAM 2
3 What is ATAM? ATAM (Architecture Trade-Off Analysis Method) is an architecture evaluation method developed in the Software Engineering Institute at the end of the 90s The purpose of ATAM is to assess the consequences of architectural design decisions in the light of quality attributes. ATAM helps in foreseeing how an attribute of interest can be affected by an architectural design decision. The Quality Attributes of interest are clarified by analyzing the stakeholder s scenarios in terms of stimuli and responses. Once the scenarios had been defined, the next step is to define which architectural approaches 1 can affect to those quality attributes. 1 In ATAM, the term architectural approaches are used to refer both to architectural styles or patterns Introduction to ATAM 3
4 What are the outputs of ATAM? The ATAM output are: A set of architectural approaches identified and or applied: Sometimes we can identify architectural approaches that cannot be applied on our architecture A Utility Tree: a top-down mechanism for directly and efficiently translating the business drivers of a system into concrete quality attribute scenarios. A set of scenarios identified and the subset that had been effectively mapped in the architecture. A set of questions about the quality attributes in the architecture and the answers to these questions. In our case our questions are a set of metrics and the answers are the values measured. The risks identified: risks that the architecture is able to mitigate and the risks that threaten the system and the business goals. Introduction to ATAM 4
5 ATAM Scenarios In ATAM both the scenarios that had been identified and those that had been mapped into the architecture are documented in terms of stimuli and response. In some cases, we can identify scenarios that describe requirements that cannot be effectively mapped into the architecture. We document both the ones that had been identified and those that had been mapped into the architecture. Stimuli are the events that cause the architecture to respond or change. To analyze an architecture for adherence to quality requirements, those requirements need to be expressed in terms that are concrete and measurable or observable. Introduction to ATAM 5
6 Utility Tree The utility tree contains attribute goals concrete enough for prioritization. Those scenarios will make these architectural response goals even more specific. The prioritization can be done by using Low, Medium or High literals associated to each leaf node. Usually this prioritization is done using two dimensions: the (1) importance of each node in the success of the system and the (2) degree of perceived risk associated to the achievement of that goal. (1) (2) Introduction to ATAM 6
7 ATAM Phases and Steps I Phase 1: Presentation 1. Present ATAM: The method is described to the evaluators and stakeholders. 2. Present business drivers: business goals which motivate the development effort and hence that will be the primary architectural drivers are presented. 3. Present the architecture: describe the proposed architecture, focusing on how it addresses the business drivers. Phase 2: Investigation and Analysis 4. Identify architectural approaches (patterns): Architectural approaches supporting the system and business goals are identified by the architect, but not analyzed 5. Generate quality attribute utility tree: Quality factors that comprise system utility (performance, availability, security, etc.) are elicited, specified down to scenarios level, annotated with stimuli and responses, and prioritized. 6. Analyze architectural approaches: The stakeholders and the architect analyze how the architectural approaches affect to the quality factors identified in Step 5. Introduction to ATAM 7
8 ATAM Phases and Steps II Phase 3: Testing 7. Brainstorm and prioritize scenarios: If required, more scenarios are generated and prioritized together with the scenarios on the utility tree. 8. Analyze architectural approaches: This step reiterates step 6, but here the highly ranked scenarios from Step 7 are considered and we should decide which architectural patterns are applied and how the architecture will be modified. Phase 4: Reporting 9. Present results: Based upon the information collected in the ATAM (patterns, scenarios, attribute-specific questions, the utility tree, risks, sensitivity points, tradeoffs) the ATAM team presents the findings to the assembled stakeholders and potentially writes a report detailing this information. Introduction to ATAM 8
9 ATAM Running Example
10 ATAM in a Mision Control System FASE 1: 1. ATAM Presentation 2. Business Goals Presentation: In our example we are going to deal with a mission control system, and the business goals, are among others, the high reliability and high performance. 3. Architecture Presentation: The system of our example is the Battlefield Control System. This system is used to control the movements of troops in the battlefield. There are two types of nodes in its architecture: Server Node (commander): is the node that supports those in head of taking decisions. It handles a database with the soldiers and battlefield status and also transmits the orders to the client nodes. In addition is capable of communicating with other Server nodes to send and receive orders. Client Nodes (Soldiers): make requests to the server and update the server s database The internode communication between the clients and the server is only though encrypted messages sent via a shared radio communication channel 9600bds limited bandwidth Only one node can be broadcasting at any moment. Introduction to ATAM 10
11 3. Architecture Presentation Original Architecture to be evaluated: Introduction to ATAM 11
12 Architectural Limitations This system architecture has a reliability problem, the system depends totally on the server If the server fails the system becomes totally useless. We should consider which architectural transformations can be applied to this architecture to solve this problem. Introduction to ATAM 12
13 4. Architectural Patterns Identification: Backup Server Problem addressed: In some systems a failure on the server means that the system goes down and the service is interrupted. Structure: A client node can promote to backup server by sending a request and by receiving the corresponding ACK from the server. The backup server mirrors the server database each 10 minutes and monitors the communications between the server and the client nodes (stores every message sent). If the server fails automatically promotes to server. Consequences: Improves the availability of the system Increases the communications through the channel, since the backup server has to receive a copy of the server s database (in our case 55Kb) Introduction to ATAM 13
14 4.Architectural Patterns Identification: Non ACK Backup (1/2) 3x Problem: In some systems a failure on the server means that the system goes down and the service is interrupted. Structure: A client node can promote to Non-ACK backup server by sending a request to the server. A Non-ACK Backup Server node can promote to backup server by sending a request and by receiving the corresponding ACK from the server. The Non-ACK Backup Server only monitors the communications, storing a copy of the messages sent through the communication channel. If a Non-ACK Backup Server needs to promote directly to Server, it will ask the other clients to resend information about their state. The backup server mirrors the server database each 10 minutes and monitors the communications between the server and the client nodes (stores every message sent). If the server fails automatically promotes to server. Introduction to ATAM 14
15 4. Architectural Patterns Identification: Non ACK Backup (2/2) 3x Consequences: Improves the system s availability. The system survives to an eventual failure both on the server and on the backup servers before a backup server has promoted to server. Maintain two backup servers mirroring the server's database increases the network load, since the two backup servers have to receive a copy of the server s database (in our case 55Kb) If there is a simultaneous failure on the server and on each single backup server require the Non-ACK backup to ask the other client nodes to resend the state, increasing the recovery time. Introduction to ATAM 15
16 5. Utility Tree Generation How Important it is (High/Medium/Low) How difficult to achieve it is (High/Medium/Low) Introduction to ATAM 16
17 Architecture Evaluation (Additional Step) In this step, we are going to apply the metrics that evaluate the fulfillment of each NFR. Reliability Analysis: The probability of failure of a node (and of the server) is 5%, so the probability of failure of the system P(Server) = 5% Performance Analysis: The communication channel is only used for transition between server and clients and then it is ready to send a 100% of the time. Introduction to ATAM 17
18 Architecture Evaluation (Additional Step) We are going to obtain the values for the metrics by means of an Excel spreadsheet that automates the calculations. Introduction to ATAM 18
19 Architecture Evaluation (Additional Step) We are going to obtain the values for the metrics by means of an Excel spreadsheet that automates the calculations. Reliability: Probability of Failure Value Obtained 5% Does it fulfill the minimal threshold defined in NFR_001? Performance: % of Time Ready To Send Value Obtained 100% Does it fulfill the minimal threshold defined in NFR_001? NO YES Introduction to ATAM 19
20 6. Architectural Approaches Analysis Architectural Approaches Analysis How will the approaches identified in Step 4 improve the quality factors presented in the utility tree? The application of the Backup Pattern will increase the reliability of the system, but on the contrary, it makes use of the communication channel to mirror the server s database. The application of the Non-ACK Backup will improve much more the reliability, but on the other hand the communication channel will probably be busy too much time. Introduction to ATAM 20
21 Scenario Prioritization and Approach Analysis Phase 3: 7. Scenario Prioritization In our case since we did not aggregate new scenarios and both scenarios on the utility tree are high priority scenarios. 8. Architectural Approaches Analysis Considering the architecture, the architectural approaches and the high priority scenarios we should decide which approach is more appropriated, and detect the changes on the architecture. Introduction to ATAM 21
22 8. Approach Analysis II Original Architecture Option 1 Option 2 Scenarios Introduction to ATAM 22
23 8. Approach Analysis III: Backup Server Alternative After considering the original architecture, the availability problem, all the scenarios in the utility tree and the patterns available we can conclude that the best option is to apply the Backup Pattern. Introduction to ATAM 23
24 Resulting Architecture Evaluation (Additional Step) In this step we are going to apply the metrics that measure each NFR in order to evaluate the NFR fulfillment in the resulting architecture after applying the backup pattern. Reliability Analysis: The probability of failure of the system is now the cumulative probability of a simultaneous failure both on the server and on the backup server. P(System) = P(Server) * P(Backup Server) Performance Analysis: We should analyze the percentage of the time in which the communication channel is used with mirroring purposes. The backup server mirrors once each 10 minutes % = 100- Introduction to QuaDAI 24
25 Resulting Architecture Evaluation (Additional Step) We are going to calculate the metrics by means of an Excel spreadsheet that automates the metrics calculation. Introduction to ATAM 25
26 Resulting Architecture Evaluation (Additional Step) We are going to calculate the metrics by means of an Excel spreadsheet that automates the metrics calculation. Reliability: Probability of Failure Value Obtained 0,25% Does it fulfill the minimal threshold defined in NFR_001? Performance: % of Time Ready To Send Value Obtained 99% Does it fulfill the minimal threshold defined in NFR_001? YES YES Introduction to ATAM 26
27 9. Present Results The original architecture did not support the reliability scenario Once the architecture has been modified (after the application of the Backup Server Pattern) it accomplishes both scenarios. Reliability: Probability of failure 0.25% Performance: Percentage of time that the communication channel is ready to send 99% Introduction to ATAM 27
28 Architecture Evaluation Methods: Introduction to ATAM
Why Plan B DR? Benefits of Plan B Disaster Recovery Service:
Benefits of Plan B Disaster Recovery Service: Very Fast Recovery your critical systems back in around 30 minutes. Very simple to set-up it only takes about 20 minutes to install the Plan B DR appliance
DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
Disaster Recovery Remote off-site Storage for single server environment
. White Paper Disaster Recovery Remote off-site Storage for single server environment When it comes to protecting your data there is no second chance January 1, 200 Prepared by: Bill Schmidley CompassPoint
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997
1 Swirl Multiplayer Gaming Simplified CS4512 Systems Analysis and Design Assignment 1 2010 Marque Browne 0814547 Manuel Honegger - 0837997 Kieran O' Brien 0866946 2 BLANK MARKING SCHEME 3 TABLE OF CONTENTS
Knowledge-Based Systems Engineering Risk Assessment
Knowledge-Based Systems Engineering Risk Assessment Raymond Madachy, Ricardo Valerdi University of Southern California - Center for Systems and Software Engineering Massachusetts Institute of Technology
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
PORTFOLIO & PROJECT MANAGEMENT
PORTFOLIO & PROJECT MANAGEMENT Webinar & Demonstration Session March 6, 2015 vestapartners.com USA CANADA EUROPE AUSTRALIA SOUTHEAST ASIA +1 203 517 0400 +1 289 337 1793 +31 0 70 220 9720 +61 3 8676 0672
ATAM: Method for Architecture Evaluation
ATAM: Method for Architecture Evaluation Rick Kazman Mark Klein Paul Clements August 2000 TECHNICAL REPORT CMU/SEI-2000-TR-004 ESC-TR-2000-004 Pittsburgh, PA 15213-3890 ATAM: SM Method for Architecture
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...
Giving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
IBM PROTECTIER: FROM BACKUP TO RECOVERY
SOLUTION PROFILE IBM PROTECTIER: FROM BACKUP TO RECOVERY NOVEMBER 2011 When it comes to backup and recovery, backup performance numbers rule the roost. It s understandable really: far more data gets backed
GAO. Year 2000 Computing Crisis: Business Continuity and Contingency Planning
GAO United States General Accounting Office Accounting and Information Management Division August 1998 Year 2000 Computing Crisis: Business Continuity and Contingency Planning GAO/AIMD-10.1.19 Preface
CONTINUITY OF OPERATIONS AUDIT PROGRAM EVALUATION AND AUDIT
CONTINUITY OF OPERATIONS AUDIT PROGRAM EVALUATION AND AUDIT April 16, 2014 INTRODUCTION Purpose The purpose of the audit is to give assurance that the development of the Metropolitan Council s Continuity
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
EOH Cloud Services - EOH Cloud Backup - Server
EOH Cloud Services - EOH Cloud Backup - Server EOH Cloud Backup - Server Page 1 EOH Cloud Backup - Server Reliable backup and recovery is critical in today s information-driven business. Besides the sheer
Mature Agile with a twist of CMMI
Mature Agile with a twist of CMMI Carsten Ruseng Jakobsen Systematic Software Engineering [email protected] Kent Aaron Johnson AgileDigm, Incorporated [email protected] Abstract Systematic is
Business Continuity Planning at Financial Institutions
Business Continuity Planning at Financial Institutions July 2003 Bank of Japan Table of Contents Introduction...2 1 The Bank s View of Business Continuity Planning 1) Significance of business continuity
000-280. IBM Cloud Computing Infrastructure Architect V1 Exam. http://www.examskey.com/000-280.html
IBM 000-280 IBM Cloud Computing Infrastructure Architect V1 Exam TYPE: DEMO http://www.examskey.com/000-280.html Examskey IBM 000-280 exam demo product is here for you to test the quality of the product.
Strategic Outcome- Based Metrics for the Federal Government
RG Perspective Strategic Outcome- Based Metrics for the Federal Government 11 Canal Center Plaza Alexandria, VA 22314 HQ 703-548-7006 Fax 703-684-5189 www.robbinsgioia.com 2013 Robbins Gioia, Inc. 1. Introduction
CXA 204 1I Basic Administration for Citrix XenApp 6
COURSE DESCRIPTION CXA 204 1I Basic Administration for Citrix XenApp 6 Basic Administration for Citrix XenApp 6 training course provides the foundation necessary for administrators to effectively centralize
How To Create A Multi Disk Raid
Click on the diagram to see RAID 0 in action RAID Level 0 requires a minimum of 2 drives to implement RAID 0 implements a striped disk array, the data is broken down into blocks and each block is written
PSYOP Campaign Planning
CHAPTER 4 PSYOP Campaign Planning PSYOP campaign development and Implementation are used to modify the behavior of various target audiences in support of U. S. objectives. In practice, the scope of PSYOP
McKINSEY & COMPANY NONPROFIT BOARD SELF ASSESSMENT TOOL OVERVIEW
OVERVIEW The Nonprofit Board Self Assessment Tool is designed to help nonprofit organizations assess their board's and identify priorities for board activities going forward. We believe this combination
How To Build A Clustered Storage Area Network (Csan) From Power All Networks
Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require
The Essentials of Analysis and Design. Mehran Rezaei [email protected]
The Essentials of Analysis and Design Mehran Rezaei [email protected] Stakeholders: Players in the Systems Game A stakeholder: any person who has an interest in an existing or proposed information
Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com
Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing 1 P a g e Table of Contents What is the key to agility in Data Warehousing?... 3 The need to address requirements completely....
How To Be A Database Administrator
Office of Human Resources Database Administrator III Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs advanced level professional information technology work installing, configuring, and upgrading
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Citrix XenApp 6.5 Administration
Presentation Style: Duration: Tutor-led Classroom 5 Days Course Start Time: 09:30hrs Course End Time: 16:30hrs Citrix XenApp 6.5 Basic Administration training course provides the foundation necessary for
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT http://www.tutorialspoint.com/pmp-exams/project_risk_management.htm Copyright tutorialspoint.com Here is a list of sample questions which would help you to understand the pattern
A Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
Rackspace Cloud Databases and Container-based Virtualization
Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many
Storage Area Network
Storage Area Network 2007 Infortrend Technology, Inc. All rights Reserved. Table of Contents Introduction...3 SAN Fabric...4 Advantages of SAN Solution...4 Fibre Channel SAN vs. IP SAN...4 Fibre Channel
Date: 08/18/2015 Windows 2008R2 SP1 EndoWorks 7.4 Windows Updates Description Tested Pass/Fail Date
Date: 08/18/2015 The following list of Microsoft Windows 2008R2 SP1 updates have been tested and approved for EndoWorks 7.4 compatibility. Prior to applying Windows Updates, make sure your system is current
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Offshore Development Team on Demand
Offshore Development Team on Demand We can save your time and money while providing invaluable expertise in building up your own custom software development team. Our extensive experience in numerous software
Disaster Recovery Planning Procedures and Guidelines
Disaster Recovery Planning Procedures and Guidelines A Mandatory Reference for ADS Chapter 545 New Reference: 06/01/2006 Responsible Office: M/DCIO File Name: 545mal_060106_cd44 Information System Security
Recent Interview with Dean Haritos, CEO of PushMX Software of Silicon Valley, California
Recent Interview with Dean Haritos, CEO of PushMX Software of Silicon Valley, California Q: Please tell us about PushMX Software. What is the background story? A: The team that developed the PushMX suite
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards
Redundancy = Protection from Network Failure. Redundancy Standards WP-31-REV0-4708-1/5 Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards For a very
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
Documentation for data centre migrations
Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed
Disaster Recovery. Continuity in an Uncertain World
Disaster Recovery Continuity in an Uncertain World The Cloud is confusing well it can be, and that s where CloudU comes in. CloudU is a comprehensive Cloud Computing training and education curriculum developed
IT Financial Management and Cost Recovery
WHITE PAPER November 2010 IT Financial Management and Cost Recovery Patricia Genetin Sr. Principal Consultant/CA Technical Sales David Messineo Sr. Services Architect/CA Services Table of Contents Executive
Aerospace Software Engineering
16.35 Aerospace Software Engineering Software Architecture The 4+1 view Patterns Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Why Care About Software Architecture? An architecture provides a vehicle
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Requirements Management John Hrastar
Requirements Management John Hrastar NASA Project Management Conference March 30-31, 2004 University of Maryland Conference Center Introduction Three aspects of requirements management Requirements in
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Chapter 6. Architecture About Infrastructure. Introduction. Real World Examples
Introduction Chapter 6 Architecture and Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders What is the architecture of an organization? What is the infrastructure
SOFT 423: Software Requirements
SOFT 423: Software Requirements Week 3 Class 1 Finish Elicitation & Start Analysis SOFT 423 Winter 2015 1 Last Class Questionnaires Document Inspection Requirements Stripping Use Cases Scenarios SOFT 423
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
High Availability (HA) Aidan Finn
High Availability (HA) Aidan Finn About Aidan Finn Technical Sales Lead at MicroWarehouse (Dublin) Working in IT since 1996 MVP (Virtual Machine) Experienced with Windows Server/Desktop, System Center,
Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
Website Disaster Recovery
Website Disaster Recovery Contents Overview... 2 Disaster Preparedness for the Internet Age... 2 Some Fundamental Questions... 2 Planning Your Recovery... 3 Start with a Backup Plan... 4 Backup Commandments...
Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL
SCHOONER WHITE PAPER Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL About Schooner Information Technology Schooner Information Technology provides
Metrics to Assess and Manage Software Application Security Risk. M. Sahinoglu, S. Stockton, S. Morton, P. Vasudev, M. Eryilmaz
Metrics to Assess and Manage Software Application Security Risk M. Sahinoglu, S. Stockton, S. Morton, P. Vasudev, M. Eryilmaz Auburn University at Montgomery (AUM) and ATILIM University, Ankara [email protected],
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Top 10 Disaster Recovery Pitfalls
Top 10 Disaster Recovery Pitfalls The key to successful disaster recovery is good planning. But with so much at stake for your business, how do you plan with confidence and ensure all stakeholders know
Session Objectives. The need for reliable notification methods EMERGENCY NOTIFICATION. What s Best for Your Organization?
EMERGENCY NOTIFICATION What s Best for Your Organization? Suzanne Bernier, CBCP Emergency Mgmt Program Coordinator Workplace Safety & Insurance Board [email protected] Doug Sievers, CBCP Manager
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
2014 BPM Products Mature But Not Equal
2014 BPM Products Mature But Not Equal Prepared By: Cindy Gregoire, TxMQ Practice Manager, Middleware & Application Integration Services ABSTRACT Comparison between IBM s ilog and Open Source (Drools)
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
Organizational Requirements Engineering
Chapter 9, Non-functional Requirements Organizational Requirements Engineering Prof. Dr. Armin B. Cremers Sascha Alda Armin B. Cremers, Sascha Alda Organizational Requirements Engineering 1 Overview of
ETERNUS CS800 data protection appliance featuring deduplication to protect your unique data
data protection appliance featuring deduplication to protect your unique data Just for a moment imagine your daily business from a different perspective We lift you up where you belong Forget the constraints
BITAG Publishes Report: Differentiated Treatment of Internet Traffic
1550 Larimer Street, Suite 168 Denver, CO. 80202 BITAG Publishes Report: Differentiated Treatment of Internet Traffic Denver, CO (October 8, 2015): Today, the Broadband Internet Technical Advisory Group
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
Audience: FAA Administration and partners with Service Level Agreements FAA Strategic Goal(s) Alignment:
UWM IT STRATEGIC FOCUS October 2013 STRATEGIC FOCUS DETAILS Develop Annual IT Strategic Status Report DESCRIPTION Inform the UWM community about central and distributed IT activities within a budgetary
Patterns to Introduce Continuous Integration to Organizations
Patterns to Introduce Continuous Integration to Organizations Kenichiro Ota Shift inc. Tokyo Japan [email protected] [email protected] Hiroko Tamagawa Shift inc. Tokyo Japan [email protected]
Standards for Developing and Implementing Administrative Systems at UC Davis
Page 1 of 7 Standards for Developing and Implementing Administrative Systems at UC Davis Introduction The purpose of this document is to describe Standards for Developing and Implementing Administrative
Capacity Plan. Template. Version X.x October 11, 2012
Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business
Before taking this course, Citrix recommends that learners have the following:
Course CXA-206 Citrix XenApp 6.5 Administration Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize and manage applications
Project Management Plan for
Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
New Features in PSP2 for SANsymphony -V10 Software-defined Storage Platform and DataCore Virtual SAN
New Features in PSP2 for SANsymphony -V10 Software-defined Storage Platform and DataCore Virtual SAN Updated: May 19, 2015 Contents Introduction... 1 Cloud Integration... 1 OpenStack Support... 1 Expanded
