Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading
|
|
- Lilian Boone
- 5 years ago
- Views:
Transcription
1 Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading Presenters: John Ingram - British Gas Trading Ty Sapsford - OCS Consulting Plc British Gas Trading embarked upon a major development project in 1996/97 in order to enter the electricity market at deregulation in April One of the systems within the programme required both OLTP and OLAP functionality to support a Trading business division initiative. Trading selected The SAS System for delivering the OLAP functionality. Business constraints, driven by external market factors, created a situation requiring a quick response concerning the OLTP functionality. The SAS System s flexibility and functional breadth made it a leading choice to respond to this situation. The SAS System enabled IT to deliver to the business division a system that satisfied the business requirements, while meeting IT strategic objectives. This paper shall describe the IT architecture and how The SAS System supported this architecture. A brief summary of the costs and benefits of the SAS System within a strategic IT architecture will conclude this paper.
2 Presenters Notes: Corporate Strategic IT Architecture defined the hardware and software configuration of the system as: Hardware: Servers Digital Clients Compaq.. Software: Servers Database Server - Digital Unix v4.0b Oracle v Open Process xxx.xx Redbox xxx.xx Application Server - Windows NT v4.0 service pack 3 SMS Server xxx.xx Clients Windows NT v4.0 service pack 3 Clients Lotus Excel v7 SMS Client xxx.xx The application scoping study deliverables identified the additional requirement for the selected solution to be located in the software configurations of both the Database and Application servers. The SAS System v6.12 ts020 was selected. The following SAS modules are located on the servers: Database Server SAS/Base SAS/Connect SAS/Access to Oracle Application Server SAS/Base SAS/Connect SAS/Access to PC File Formats SAS/Assist SAS/AF * * SAS/AF was used in the development environment to build the Graphical User Interface (GUI).
3 British Gas Trading IT architecture strategic objectives are defined in detail in many internal documents. The IT architecture objectives of interest to this application may be summarised as (SAS Meeting IT Strategic Objectives:): Data Management Data Access External Interfaces Database Management Interface Definitions Security Backup and Recovery Audit Security Data Integrity Timely Complete Correct Valid Data Consistency Corporate Definitions Business Unit Area Definitions External Definitions Application Management Delivery Unix Environment Windows NT Environment Extendibility Vendor Pedigree Custom Application Code Year 2000 Recovery Backup Disaster Security User Interfaces Data Interfaces Code
4 The following table highlights the experienced strengths and weaknesses The SAS System provided towards the IT Strategic Architecture objectives (SAS Meeting IT Strategic Objectives:): Objective: Strength Weaknesses Data Management Data Access External Interfaces Database Management Interface Definitions Security Backup and Recovery Audit Security Strong support of proprietary and non-proprietary file formats provided. Support for required file formats and proprietary access languages enable interface definitions to use optimal mechanisms. SAS datasets being proprietary are inaccessible to other products. SAS compiled code is equally inaccessible to other product access manipulation. The option exists to remove the access to the compiled code source via The SAS System tools or to apply access restrictions to the SAS datasets, though this was not persued in the actual system. SAS support of Oracle dbms system enabled leveraging Oracle s transactional recovery facilities. SAS metadata facilities enabled uncomplicated data management systems to be provided that required limited effort to build. SAS cross functional use, providing both OLAP and OLTP functionality, enable audit tracking to be more comprehensive than normally anticipated by multi-vendor solution. Operating and Oracle system security is fully supported by SAS. Customisation of standard SAS scripts necessary to tailor to each operating environment is relatively simple. Additionally, SAS provided further security layer, using Oracle as a profile storage container. Integrating Oracle into the SAS security enable British Gas Trading Oracle skills to be used in the security maintenance area. Separate SAS modules required for proprietary file formats. Multiple skills required to support SAS files, spreadsheet files, and Oracle tables manipulations. The SAS System was required for accessing the data or source code. SAS not being a transactional relational database system, meant provisioning for transactional recovery facilities was required. NOTE: This only became necessary when project restrictions decided The SAS System would provide transactional facilities. Audit functionality not inherent in SAS modules. SAS support for object orientated approach reduced much of the effort. Support for multiple security layers increased development efforts and user interface complexity.
5 Objective: Strength Weaknesses Data Management Data Integrity Timely Complete Correct Valid The SAS applications integrated well into the scheduling tool, Open Process. All processing completed within the business and IT requirements as demonstrated by the allocated batch window. Notable gains during later tuning efforts have been made. The ability to capture an extensive range of data formats within SAS enable the solution to meet its completeness criteria. Several elements of the data model required integration of the business rules to ensure that a correct values are maintained, i.e. data values treated differently due to business environment conditions. The ability to represent these element s data values was met using SAS flexible data manipulation methods and data representation formats. The ability to validate a data representation using a mixture of SAS functions and data types within a single procedure or simple program module reduced effort and increased both the range of validity checking and its robustness. Customise loading mechanism required for Oracle in Digital Unix environment. Not provided by the default SAS/Access to Oracle product This was resolved using SAS/Base and SAS/Access to Oracle solution that OCS built into the system. Program complexity was increased by completeness requirements. Perceived weaknesses during early phases was restriction of supported data types within SAS of char (max length 200) and numeric (max 8 bytes), though no formal business requirement for more than these data types was identified. Providing data correctness required the data model to integrate business rules. This included all stages of the project, i.e. documentation and diagrams, pseudocode and program modules. Integration of SAS within a CASE tool would have minimised this effort, though some additional effort may have been required to operate the CASE tool. Duplicate processing occurred to enable more than simplex read error failures. More sophisticated maintenance requirements, particularly with the database feed, i.e. Year 2000 support increased complexity of code.
6 Objective: Strength Weaknesses Data Consistency Corporate Definitions Business Unit Area Definitions External Definitions IT Strategic Architecture established the database environments, i.e. Oracle as the strategic data repository. SAS ability to actively integrate within an Oracle environment ensured that data was captured, updated and if necessary removed as defined by the corporate data strategy policies. Business requirements meant the data required metamorphosing from the corporate definition to another format was required. The application of SAS SQL views and reformatting functions to transpose and manipulate the data tables enable the project to meet both corporate and business requirements. The system interfaces with several external entities, being both internal and external to the organisation. SAS/BASE product provided all the mechanisms to meet the external organisation entity interface requirements. The internal interfaces were meet again using SAS/BASE with the addition of SAS/Access to PC File Formats. Performance was effected by the inherent overhead associated with a transactional dbms system versus a informational. This is partially offset by the advantages of a transactional dbms with recovery and to some degree with database integrity. Controls implemented within the solution assisted with ensure a consistency was maintained between the two definitions. These controls required additional effort. Using objects to perform the transformations reduced this effort, plus gains from operating on an information dbms (SAS) data table with later processes counteracted part of the effort cost. Additionally effort necessary to
7 Objective: Strength Weaknesses Application Management Delivery Unix Environment Windows NT Environment Extendibility Vendor Pedigree Custom Application Code Connectivity was easily established with SAS/CONNECT product, with minimal customisation of the connect script and using the chosen communication protocol, i.e. TCP/IP. Access to the application is controlled by an Oracle table containing users profiles. SAS catalogues minimised file management and complement security standards. SAS ability to communicate with the operating environment enable leveraging the Unix operating system to perform maintenance functions on non-sas file types and to communicate with the support message system Redbox. The trading system was to support the ability for a user to have their profile fully portable. SAS initiation process is managed by files in ASCII text format, i.e. config and autoexec files. The text format enable ready customisation to ensure the application met the profile criteria. The application profile while maintained in a SAS proprietary file, i.e. profile.sc2, was known to the system as a standard file, thus was also readily integrated into the NT environment. The stability and multi-platform support of The SAS System met British Gas Trading software vendor pedigree standards. The modular approach to configuring SAS fulfilled scalability requirements. Structured programming and object orientated approaches maximised reuseability which reduced effort, actively assisted interface consistency reducing effort by development team and by users in learning the application, and lasted have increase ease to analysis and remedy changes to the trading system. Unix connectivity and relatively poor inherent access and security controls increase exposure to unwanted access. The text format of the config and autoexec files are a strength and weakness. A skilled person can readily access and understand the files, thus additional access controls were required. The breadth of SAS led to some extra efforts being required to identify certain operational system specific behaviours. This would not be unique to SAS. Requires more analysis and design effort to be expended initially to identify modules/objects.
8 Objective: Strength Weaknesses Application Management Extendibility Year 2000 Recovery Backup Disaster Security User Interfaces Data Interfaces Combination of yearcutoff option and range of date formats and functions made meeting year 2000 compliance simple to perform. The SAS System version 6.12 year 2000 compliant certificate and SAS support of providing year 2000 setinit enable year 2000 testing to be performed. Use of SAS metadata and data processing facilities supplied the application with the capability to validate backups during operation, which was critical particularly during some of the overnight batch routines. Access to operating system enable SAS to perform backup functions on non- SAS files. Use of similar metadata and data processing facilities within the SAS System enabled the application to registered and performed disaster recovery or disaster notification where recovery not possible. Three levels of security provided by vendors, i.e. Windows NT, Unix and Oracle are integrated into the application. Additionally a further level of security is encoded into the SAS/AF interface. Use of initcmd, custom profile, custom config and autoexec files delivered via SMS enable users to be restricted access to the SAS System except where this is provisioned within the application. SAS and Oracle security are incorporated. Oracle users are defined roles which control privileges a users has within Oracle. SAS datasets and views support encryption and access controls where the functional requirements stated such requirement. All custom code and libraries are supplied to the users in readonly mode, with the users Performing full year 2000 compliance was not possible due to non-compliance of operating system, thus some assumptions of validity of year 2000 compliance were necessary. Difficult for tester to validate SAS files were correctly backed up without experience and access to the SAS System. This was the same for Oracle tables. The SAS System being an informational database is not provisioned with roll-back, journalising and other disaster functions. This was not critical due to the system as Oracle was defined as the data repository. The only risk was during Oracle updates by SAS within the application. Extra effort is required to support the levels of security, which is an on-going cost for the business. A user with the appropriate levels of skills could alter the library mode, as could a user with the appropriate Oracle user id and password edit the data tables.
9 Code having only their private libraries available in write mode. Access privileges are controlled using NT file and folder privilege controls. This is further complemented by access privileges assigned to the SAS catalogues. The option to provide the production environment with compiled code missing source is also available. Operational support can be adversely effected by too much code security. Code security is an area require content revision during the system life cycle.
10 Summary: Balance Sheet Assets Flexibility - providing transactional and informational facilities which are integral to a trading system Multi-platform support - enabled the trading system to implement the designated optimal client/server solution Open data support - ability to access and produce multiple file systems, i.e. Oracle, Lotus 1-2-3, MS Excel, etc. provided flexibility and data options not readily available to other systems 3 rd and 4 th generation language support - use of structured and object-orientated approaches code to integrated readily into the solution. Selective use of appropriate methodologies to sections of the solution code be supported by the development team Year 2000 compliance - year 2000 compliance within the SAS System and the SAS custom code was able to be tested and documented Extendibility - The SAS System being readily expanded with new modules. The custom code using structured and object-orientated programming standards coupled with coding standards enable both extensions and long-term support to be provided with minimal additional effort. Liabilities Provisioning of printing methods with the vendor software not as strong as required. Thus increasing effort in development to provide hardcopy output Proprietary nature of SAS data tables increases complexity of access to data held within SAS. Thus increasing effort to ensure data stored within Oracle tables where data to be available to other systems, or where transactional functionalities required Service Level Agreement more complex as production support provisioning not within current British Gas Trading IT skill portfolio (SAS Skills). Commitment to skill transferral and training required of both the vendor (SAS) and third party consultancy (OCS). Way Ahead Business Requirements Review User Acceptance Testing Phase 2
11 Questions?
12 OCS Consulting plc acknowledges all other copyrights and trademarks OCS Consulting plc 1
13 JOHN INGRAM - STRATEGIC CONSULTANT, BRITISH GAS TRADING TY SAPSFORD - SENIOR CONSULTANT, OCS CONSULTING plc IT STRATEGIC ARCHITECTURE MILESTONES TRADING SYSTEM MILESTONES IT STRATEGIC ARCHITECTURE TRADING SYSTEM ARCHITECTURE DATA MANAGEMENT APPLICATION MANAGEMENT OCS Consulting plc 2
14 OCS Consulting plc 3
15 OCS Consulting plc 4
16 OCS Consulting plc 5
17 SERVERS DATABASE SERVER (SAS 6.12 TS020) SAS/BASE SAS/CONNECT SAS/ACCESS TO ORACLE APPLICATION SERVER (SAS 6.12 TS020) SAS/BASE SAS/CONNECT SAS/ACCESS TO PC FILE FORMATS SAS/GRAPH SAS/ASSIST SAS/AF* CLIENTS DESKTOP NONE * SAS/AF APPLICABLE IN DEVELOPMENT ONLY OCS Consulting plc 6
18 OCS Consulting plc 7
19 EXTERNAL INTERFACES DATABASE MANAGEMENT INTERFACE DEFINITIONS SECURITY BACKUP AND RECOVERY SECURITY TIMELY COMPLETE CORRECT VALID CORPORATE DEFINITIONS BUSINESS UNIT AREA DEFINITIONS EXTERNAL DEFINITIONS OCS Consulting plc 8
20 UNIX ENVIRONMENT WINDOW NT ENVIRONMENT VENDOR PEDIGREE CUSTOM APPLICATION CODE YEAR 2000 BACKUP AND RECOVERY DISASTER USER INTERFACES DATA INTERFACES CODE OCS Consulting plc 9
21 OCS Consulting plc 10
22 OCS Consulting plc 11
BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationSysgem Enterprise Manager
Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationData Protection. Plugging the gap. Gary Comiskey 26 February 2010
Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationIBM s Integrated Data Management Solutions for the DBA
Information Management IBM s Integrated Data Management Solutions for the DBA Stop Stressing and Start Automating! Agenda Daily Woes: Trials and tribulations of the DBA Business Challenges: Beyond the
More informationVirtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services
Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as
More informationMicrosoft SQL Server Training Course Catalogue. Learning Solutions
Training Course Catalogue Learning Solutions Querying SQL Server 2000 with Transact-SQL Course No: MS2071 Two days Instructor-led-Classroom 2000 The goal of this course is to provide students with the
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationDeploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform
Deploy Your step-by-step guide to successfully deploy an app with FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements, and
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationSoftware Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created>
Software Requirements Specification for Version 1.0 approved Prepared by Software Requirements Specification for Page 2 Table of Contents Revision
More informationSAS Solutions for the Web: Static and Dynamic Alternatives Matthew Grover, S-Street Consulting, Inc.
SAS Solutions for the Web: Static and Dynamic Alternatives Matthew Grover, S-Street Consulting, Inc. Abstract This paper provides a detailed analysis of creating static and dynamic web content using the
More informationFusion Registry 9 SDMX Data and Metadata Management System
Registry 9 Data and Management System Registry 9 is a complete and fully integrated statistical data and metadata management system using. Whether you require a metadata repository supporting a highperformance
More informationThis Document is licensed to
GAMP 5 Page 291 End User Applications Including Spreadsheets 1 Introduction This appendix gives guidance on the use of end user applications such as spreadsheets or small databases in a GxP environment.
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationTransition Plan. Data Center Operations Outsourcing. Implementation: Final. Ref: TR0007
Data Center Operations Outsourcing Transition Plan Implementation: Final Page 1 of 15 DOCUMENT CONTROL SHEET Schedule/Exhibit Amendment Control Sheet Title of Amended Document: Section 4 Transition Plan
More informationNEN The Education Network
NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected
More informationIT Attestation in the Cloud Era
IT Attestation in the Cloud Era The need for increased assurance over outsourced operations/ controls April 2013 Symeon Kalamatianos M.Sc., CISA, CISM Senior Manager, IT Risk Consulting Contents Introduction
More informationCreating Enterprise and WorkGroup Applications with 4D ODBC
Creating Enterprise and WorkGroup Applications with 4D ODBC Page 1 EXECUTIVE SUMMARY 4D ODBC is an application development tool specifically designed to address the unique requirements of the client/server
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationCAPABILITY STATEMENT
CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More informationCwJ Consulting Ltd Technology & Roadmap guide. Author: Christopher Cantle Date: 7 th March 2017 Version: 2.5
CwJ Consulting Ltd Technology & Roadmap guide Author: Christopher Cantle Date: 7 th March 2017 Version: 2.5 Technology & Roadmap Guide Page 1 of 17 Contents 1. Introduction... 3 2. Environment Management
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationIntroduction to AppDev Studio Software
Introduction to AppDev Studio Software Olivier Zaech SAS Switzerland Introduction This paper is an introduction to AppDev Studio software. AppDev Studio is a complete Standalone Information Delivery Java
More informationMassimo Nardone, TKK, S Security of Communication Protocols
Network Logging/Auditing of network devices Firewall (types, management, procedures) Remote Access Passive intrusion detection Services/Applications Account authorization Account termination Accounts Lockout
More informationPROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS
>> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT
More informationAUDIT OF ICT STRATEGY IMPLEMENTATION
APPENDIX A 2 1. Background AUDIT OF ICT STRATEGY IMPLEMENTATION 1.1. This report summarises the findings from the audit of ICT Strategy Implementation. This was a planned audit assignment which was undertaken
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationSAS/ACCESS Interface to R/3
9.1 SAS/ACCESS Interface to R/3 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS/ACCESS 9.1 Interface to R/3: User s Guide. Cary, NC: SAS Institute
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationSparta Systems TrackWise Digital Solution
Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities
More informationINFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK
INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK 1. INTRODUCTION The Board of Directors of the Bidvest Group Limited ( the Company ) acknowledges the need for an IT Governance Framework as recommended
More informationZero impact database migration
Zero impact database migration How to avoid the most common pitfalls of migrating from Oracle to SQL Server. ABSTRACT Migrating data from one platform to another requires a lot of planning. Some traditional
More informationEnabling efficiency through Data Governance: a phased approach
Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency
More informationNew Zealand Government IbM Infrastructure as a service
New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as
More informationManaged Services.
Global IT Infrastructure and Deployment Specialists Managed Services Delivering proactive technology support to give you complete confidence in the essentials of your business and the power of your competitive
More informationThree Key Considerations for Your Public Cloud Infrastructure Strategy
GOING PUBLIC: Three Key Considerations for Your Public Cloud Infrastructure Strategy Steve Follin ISG WHITE PAPER 2018 Information Services Group, Inc. All Rights Reserved The Market Reality The race to
More informationTRACKVIA SECURITY OVERVIEW
TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times
More informationEnterprise Data Architect
Enterprise Data Architect Position Summary Farmer Mac maintains a considerable repository of financial data that spans over two decades. Farmer Mac is looking for a hands-on technologist and data architect
More informationVulnerability Assessments and Penetration Testing
CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze
More informationNesstar Server Configuration Tool User Guide
Nesstar Server Configuration Tool User Guide Version 3.50 The Configuration Tool allows the server Administrator to edit most of the server configuration properties and to perform basic administrative
More informationISO27001:2013 The New Standard Revised Edition
ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information
More informationSMR Deployment Enablers
SMR Deployment Enablers Kris MacCrory Decision Analysis Services 2017 Energy Technologies Institute LLP - Subject to notes on page 1 Small Modular Reactor (SMR) Deployment Enablers Project Kris MacCrory
More informationJOB TITLE: Senior Database Administrator PRIMARY JOB DUTIES Application Database Development
JOB TITLE: Senior Database Administrator The Senior Database Administrator is responsible for managing multiple production and nonproduction Oracle, MSSQL, and PostgreSQL databases: 4 production Oracle
More informationAdministration and Data Retention. Best Practices for Systems Management
Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices
More informationRSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief
RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing
More informationData Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security
T rusted Application Trusted System Trusted Network Physical Security System T echnology Data Warehouse P roject Filetransfer Access right just on the data transfer directories Mailbox L oadprocess Data
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationVersion 1.4 Paribus Discovery for Microsoft Dynamics CRM User Guide
Version 1.4 Paribus Discovery for Microsoft Dynamics CRM User Guide Document Version 1.3 Release Date: September 2011 QGate Software Limited D2 Fareham Heights, Standard Way, Fareham Hampshire, PO16 8XT
More informationMicrosoft Developing SQL Databases
1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20762 - Developing SQL Databases Price $4290.00 (inc GST) Version C Overview This five-day instructor-led course provides students with the
More informationAchieving effective risk management and continuous compliance with Deloitte and SAP
Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationNORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives
NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information
More informationIT or Application or Test Environments Management and Terminologies.
IT or Application or Test Environments Management and Terminologies. IT or Software Application Environments Management is probably one of the most misunderstood concepts in terms of the part it plays
More informationChoosing a Secure Cloud Service Provider
Choosing a Secure Cloud Service Provider Dr. Ricci IEONG, CISSP, CISA, CISM, CCSK, CCSP, CEH,GPEN, GIAC Advisory Board, ISSAP, ISSMP, F.ISFS Vice President Professional Development Cloud Security Alliance
More informationData Center Operations Guide
Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards
More informationEnterprise Services for NFuse (ESN) February 12, 2002
Enterprise Services for NFuse (ESN) February 12, 2002 What is Enterprise Services for NFuse?... 1 What solution does ESN enable?... 2 What s the difference between NFuse and Enterprise Services for NFuse?...
More informationImplementing Problem Resolution Models in Remedy
CERN-IT-2000-001 15 February 2000 Implementing Problem Resolution Models in Remedy Miguel Marquina, Raúl Ramos, José Padilla CERN, IT Division, User Support Group This paper defines the concept of Problem
More informationHPE Proactive 24 Service
Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationInformation Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV
Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationTRIREME Commander: Managing Simulink Simulations And Large Datasets In Java
TRIREME Commander: Managing Simulink Simulations And Large Datasets In Java Andrew Newell Electronic Warfare & Radar Division, Defence Science and Technology Organisation andrew.newell@dsto.defence.gov.au
More informationMigrating a Business-Critical Application to Windows Azure
Situation Microsoft IT wanted to replace TS Licensing Manager, an application responsible for critical business processes. TS Licensing Manager was hosted entirely in Microsoft corporate data centers,
More informationDatabase Environment. Pearson Education 2009
Chapter 2 Database Environment 1 Chapter 2 - Objectives Purpose of three-level database architecture. Contents of external, conceptual, and internal levels. Purpose of external/conceptual and conceptual/internal
More informationSupport for the HIPAA Security Rule
white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationMeltem Özturan misprivate.boun.edu.tr/ozturan/mis515
Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationIT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao
IT Service Delivery and Support Week Three IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Infrastructure Essentials Computer Hardware Operating Systems (OS) & System Software Applications
More informationSiebel Brightware. Implementation Readiness Guide. Version 8.1.6
Siebel Brightware Implementation Readiness Guide Version 8.1.6 Copyright 2005, 2006, Oracle. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information;
More informationITIL: The Key Differences Between Versions 2 and 3
ITIL: The Key Differences Between Versions 2 and 3 A brief History of ITIL First published in the late 1980s, ITIL started as a project to document best practices in IT. Since that time it has become known
More informationIntroduction to ISO/IEC 27001:2005
Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating
More informationWipro s Endur Test Automation Framework (W-ETAF) Reduces time and effort for the implementation and maintenance of an automated test solution.
Wipro s Endur Test Automation Framework (W-ETAF) Reduces time and effort for the implementation and maintenance of an automated test solution. Introduction: Commodity trading, transaction and risk a changing
More informationGreen Star Volume Certification. Process Guide
Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationThe ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationCopyright
Manually Upgrading the P6 Professional Database for Microsoft SQL Server Release 8.2 December 2011 Copyright Oracle Primavera Manually Upgrading the P6 Professional Database for Microsoft SQL Server Copyright
More informationAUTOMATED RESOURCE MANAGEMENT SYSTEM (ARMS)
AUTOMATED RESOURCE MANAGEMENT SYSTEM (ARMS) SYSTEM REQUIREMENTS DOCUMENT (SRD) December 19, 2003 Version 1.2 Delivered On: December 19, 2003 Delivered To: Federal Emergency Management Agency Contact No.:
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationNew York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief
Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationM&A Cyber Security Due Diligence
M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationUnifia Environment (UE) Application & Security Overview
Unifia Environment (UE) Application & Security Overview 2017 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 14 SP3217V03 Unifia Environment UE Application & Security Overview The Olympus Unifia Environment
More informationContents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp.
TPLWPT Contents Summary... 1 General Information... 1 Technology... 2 Server Technology... 2 Business Layer... 4 Client Technology... 4 Structure... 4 Ultra-Thin Client Considerations... 7 Internet and
More informationAn Oracle White Paper May Oracle VM 3: Overview of Disaster Recovery Solutions
An Oracle White Paper May 2014 Oracle VM 3: Overview of Disaster Recovery Solutions Contents Introduction... 1 Overview of DR Solutions with Oracle VM... 2 Choose your DR solution path... 2 Continuous
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationJuly 20, 2006 Oracle Application Express Helps Build Web Applications Quickly by Noel Yuhanna with Megan Daniels
QUICK TAKE Oracle Application Express Helps Build Web Applications Quickly by Noel Yuhanna with Megan Daniels EXECUTIVE SUMMARY A lesser-known but powerful application development tool that comes freely
More informationSeamless Dynamic Web (and Smart Device!) Reporting with SAS D.J. Penix, Pinnacle Solutions, Indianapolis, IN
Paper RIV05 Seamless Dynamic Web (and Smart Device!) Reporting with SAS D.J. Penix, Pinnacle Solutions, Indianapolis, IN ABSTRACT The SAS Business Intelligence platform provides a wide variety of reporting
More informationAugust Oracle - GoldenGate Statement of Direction
August 2015 Oracle - GoldenGate Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your
More information