Security, Monitoring, and Control of the Re-engineered Hubble Space Telescope Control Center System
|
|
- Mitchell Nash
- 6 years ago
- Views:
Transcription
1 Security, Monitoring, and Control of the Re-engineered Hubble Space Telescope Control Center System Caleb Principe, NASA Goddard Space Flight Center Larry Barrett, Orbital Sciences Corporation Thomas Buchanan, QSS Group Inc. Jay Lockwood, Lockwood Software
2 CCS Overview Hubble Space Telescope (HST) Control Center System (CCS) is one component of a larger, more complex spacecraft management system CCS provides the following functions: Spacecraft Communications Coordination Spacecraft Commanding Spacecraft Health and Safety Analysis CCS does not perform: Scheduling of Spacecraft Observations or Resources Processing or Distribution of Downlinked Science Data February 25,
3 CCS Overview HST Communications Shuttle HST Test Facilities JSC Electrical Simulation VEST VSTIF WSC/ TDRS NCC DSN Flight S/W Science Instrument Core SM DASDF ESTIF SITS SEER SMOR UTC UPS Control Center System CCS HSTNet HST Contingency HST Users UTC HST Customer GSFC Center Network Environment (CNE) WSC DSN JSC Backup CCS STScI Planning & Scheduling Remote Users Internet NCC Science Data Processing UPS P&S Local Users Public Users February 25,
4 Goals of CCS Re-engineering Significantly Reduce Cost of Operations by: streamlining business processes for normal operations automating routine and repetitive operational procedures providing secure, remote access to system resources maximizing utilization of spacecraft resources Reduce Maintenance Costs by: utilizing state-of-the-practice technologies and methods adhering to government and industry standards in development cost-effective use of off-the-shelf (OTS) components building fault-tolerance into the system architecture February 25,
5 System Concept Drivers Architectural modular and extensible to facilitate maintenance and reuse scaleable to allow deployment of functional subsets Operational automate ground-system operations, provide manual override engineering expertise captured in on-line knowledge-bases Developmental integrated development environment established to maximize productivity integrated product team (IPT) based organization instituted to minimize implementation errors February 25,
6 Target Environments Operational Environments Highly distributed, server-class processors used for: Spacecraft control and monitoring CCS system maintenance Test Facilities Small number of co-resident processors used for: Flight software development Spacecraft anomaly isolation and resolution Stand-alone Configurations Single processor configuration used for: Science instrument development and check-out February 25,
7 CCS System Architecture System partitioned into three functional segments: Command and Communications Engineering Data Processing User Workstations Logical Processor concept used to enable scaleability highly cohesive set of functions decoupled through use of middleware independent of physical nodes Data Driven architecture supports tailoring and reuse configuration database drives most system functionality February 25,
8 CCS System Architecture WS Data Server WS Data Server Front End Processor Core Network Firewall Backbone Network Firewall Application Server GUI Server Application Server GUI Server Spacecraft Commanding Communications Management Spacecraft Monitoring Analysis and Trending Engineering Data Archive Ground System Management Public Web Server Internet Firewall HSTNet Test Facilities WS February 25,
9 Development Methodology Hybrid methodology established using best of: Business Process Re-engineering Top-Down Functional Decomposition with Data-Flow Analysis Thread-based Dynamic Behavior Models Object-Oriented Analysis/Design Entity-Relationship Modeling Methods adopted with elements from waterfall, incremental, and spiral approaches Applied method that best fit the development of the target product Development Environment/Tools tailored to support project specific needs February 25,
10 Technological Enablers Middleware Encapsulates interprocess communication methods Nameserver provides directory of software applications Security Firewalls Applications unaware of Firewall in communication path Unnecessary for reduced configurations Web Servers and Browsers Common user interface across multiple workstation platforms Automated System Monitors Distributed resource monitoring and failover support February 25,
11 OTS Component Integration Functional prototyping used to assess candidate products Provided method of identifying best-of-breed Primary selection criteria included: adherence to appropriate standards scaleability maintainability compatibility with other products Encapsulation used to insulate applications from OTS product features Rogue Wave libraries and custom software used February 25,
12 Security Considerations Security built-in from the beginning Guideline: Prohibit what is not explicitly allowed Drove network topology and functional allocation Eliminated some OTS products from consideration Implementing security concurrently with applications simplified system integration process Stateful-inspection firewall technology supported scaleability Security concerns detected and corrected immediately Functional access controls implemented at application level February 25,
13 Functional Security Architecture - Restricts Source of Connection - Initiates Login/Logout Processing - Passes only Recognized Protocols - Performs User Requested Function - Restricts User Functional Access - Supports Strong Authentication - Queries ACP about User Privileges Mechanisms - Supports Secured Link CCS Application System Function Request and Response GUI Server Security Firewall Secured LInk (via Encryption) User Workstation Validate Access to Privileged Sub-functions Validate Login and Logout Requests Access Control Process (ACP) User Security Profile Information - Establishes User Sessions at Login - Manages User Security Profiles - Provides User Privilege Information to Specific Applications February 25,
14 System Management Approach Application dependency information used to automate startup and failover sequences allows system to operate in multiple valid configurations Local monitoring of each resource performed COTS products used to monitor system resources and applications Centralized analysis engine used to identify and recover from suspected failure conditions Knowledge-base integrates system-wide monitoring information to determine probable source of detected error conditions Recovery measures range from simple application restart to full processor failover February 25,
15 System Management Architecture Startup/Recovery Commands Component Status CCS Host Processors Automated System Manager Physical Host Configuration System Configuration and Status Information Application Layer System Executable b Executable k Host A... Host N Executable a Application Status and Heartbeat Startup/Shutdown Requests Logical Proc 1 Logical Proc 2 Application Monitor CPU Utilization Executable a Executable b... Executable k Network I/F Utilization System Resource Monitor Potential Problem February 25,
16 Current Status Preparing for sixth incremental Release in 18 months CCS has been successfully delivered in operational, test facility, and single processor configurations Preparing for switchover to CCS for Servicing Mission 3 from shadow mode operation to primary spacecraft control system Independent Assessment of Security Architecture pending System Management architecture is finalized system dependency analysis complete knowledge-base population and validation in progress February 25,
17 Conclusions A configurable, extensible ground system architecture can be developed Use of OTS products reduces development time and costs Design based on Logical Processors can facilitate scalability Early emphasis on security drives other architectural decisions Browser-based user interface provides flexibility Automated System Management functions are reaching maturity Tailored methodology and tools are critical to meeting development goals February 25,
18 Contact Information URL February 25,
GSAW The Earth Observing System (EOS) Ground System: Leveraging an Existing Operational Ground System Infrastructure to Support New Missions
GSAW 2016 The Earth Observing System (EOS) Ground System: Leveraging an Existing Operational Ground System Infrastructure to Support New Missions David Hardison NASA Goddard Space Flight Center Johnny
More informationS&OC System Requirements Review: GSRD Traceability Matrix
STScI-JWST-CI-0099 Space Telescope Science Institute James Webb Space Telescope Mission S&OC System Requirements Review: GSRD Traceability Matrix 20 December 2004 Issue A REVISION HISTORY ISSUE DESCRIPTION
More informationLockheed Martin Corporation. All Rights Reserved. 1
eileen.b.liu@lmco.com 1 LOCKHEED MARTIN HERITAGE 40 + years of planetary heritage Diverse mission requirements Incremental hardware evolution Strong operations focus Multiple NASA interfaces 2 LOCKHEED
More informationDeclarative Self-Expand Service Access Framework for NASA Mission Users
Declarative Self-Expand Service Access Framework for NASA Mission Users Rose Pajerski, Jinghong J. Chen, David Warren, Keiji Tasaki, Senior Scientist, Fraunhofer Center for Experimental Software Engineering,
More informationCosting Information Assurance
Costing Information Assurance Marybeth Panock 30 September 2009 The Aerospace Corporation The Aerospace Corporation 2009 1 Costing Information Assurance or Security Called Security for this exercise to
More informationNASA/AFSCN/NOAA/Lockheed Martin Ground Network and Space Network Interoperability Plans
NASA/AFSCN/NOAA/Lockheed Martin Ground Network and Space Network Interoperability Plans March 4, 2003 Lindolfo Martinez Lockheed Martin Space Operations Lindolfo.Martinez@csoconline.com GSAW 2003 1 Purpose
More informationCS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities
More informationCentral Administration Console Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationF6 Model-driven Development Kit (F6MDK)
F6 Model-driven Development Kit (F6MDK) Gabor Karsai, Abhishek Dubey, Andy Gokhale, William R. Otte, Csanad Szabo; Vanderbilt University/ISIS Alessandro Coglio, Eric Smith; Kestrel Institute Prasanta Bose;
More informationWebSphere 4.0 General Introduction
IBM WebSphere Application Server V4.0 WebSphere 4.0 General Introduction Page 8 of 401 Page 1 of 11 Agenda Market Themes J2EE and Open Standards Evolution of WebSphere Application Server WebSphere 4.0
More informationChapter 6 Architectural Design. Chapter 6 Architectural design
Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying
More informationArchitectural Design
Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural
More informationArchitectural Blueprint
IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint
More informationObjectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture
Objectives Architectural Design To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural
More informationSecurity Fundamentals for your Privileged Account Security Deployment
Security Fundamentals for your Privileged Account Security Deployment February 2016 Copyright 1999-2016 CyberArk Software Ltd. All rights reserved. CAVSEC-PASSF-0216 Compromising privileged accounts is
More informationSoftware architecture in ASPICE and Even-André Karlsson
Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12
More informationSystem types. Distributed systems
System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors
More informationArchitectural Design
Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures Chapter 6 Architectural design 2 PART 1 ARCHITECTURAL DESIGN
More informationCourse 40045A: Microsoft SQL Server for Oracle DBAs
Skip to main content Course 40045A: Microsoft SQL Server for Oracle DBAs - Course details Course Outline Module 1: Database and Instance This module provides an understanding of the two major components
More informationFor presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop.
For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop. The authors can be reached at cb@mitre.org or ioannis @Mitre.org. In
More informationSub Phase: High-Level Design. From Requirements Analysis to User Manual. System Design
Sub Phase: High-Level Design 1 From Requirements Analysis to User Manual System Design 2 1 Map of design phase HIGH LEVEL DESIGN Module Interfaces Modularization architecture DESIGN Data Persistance Subsystem
More informationArchitectural Decomposition & Representations Reid Holmes
Architectural Decomposition & Representations Reid Holmes What is SW architecture? Definition: Blueprint for construction and evolution. Encompasses: Structure Behaviour The set of principal design decisions
More informationRefresher: Lifecycle models. Lecture 22: Moving into Design. Analysis vs. Design. Refresher: different worlds. Analysis vs. Design.
Analysis vs. Design Why the distinction? Design Processes Logical vs. Physical Design System vs. Detailed Design Architectures System Architecture Software Architecture Architectural Patterns (next lecture)
More informationArchitectural Decomposition Reid Holmes
Material and some slide content from: - Emerson Murphy-Hill - Software Architecture: Foundations, Theory, and Practice - Essential Software Architecture - Steve Easterbrook Architectural Decomposition
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation
More informationFlight Software Development and Validation Workflow Management System
Flight Software Development and Validation Workflow Management System Dan GULTUREANU*,1, Kevin KERNS 1, Tom HENTHORN 1, John QUACH 1, Mitch KLEEN 1 *Corresponding author 1 Space Systems/Loral (SSL), Software
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation
More informationIdentity Firewall. About the Identity Firewall
This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History
More informationMigrationWiz Security Overview
MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database
More information5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered
Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process
More informationSubsystem Development. T&DF Development. LAT Flight Software Testbed. LAT Integration & Test. Mission Systems Integration & Test EGSE TKR EM1 LOF
GLAST Technical Memorandum GTM023A From: Scott Williams To: G. Haller Date: 13 July 2001 Subject: Concept for Summary Description of the Electrical Ground Support Equipment () concept to support the development
More informationChapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design
Chapter 6 Architectural Design Lecture 1 1 Topics covered ² Architectural design decisions ² Architectural views ² Architectural patterns ² Application architectures 2 Software architecture ² The design
More informationCRaTER Scence Operation Center Requirements Document. Dwg. No
Rev. ECO Description Author Approved Date 01 32-157 Initial Release for comment RFGoeke 7/27/06 CRaTER Scence Operation Center Requirements Document Dwg. No. 32-01209 Revision 01 July 26, 2006 32-01209
More informationCisco NAC Profiler Architecture Overview
CHAPTER 2 Topics in this chapter include: Overview, page 2-1 Cisco NAC Profiler System Deployment Model, page 2-3 Cisco NAC Profiler Usage: Port Provisioning and Endpoint Directory, page 2-4 Overview Cisco
More information(we call it GMSEC) Dan Smith. Leap Day GSAW 2012 Session 11A Expanding Access to Satellite Information through the Compatible C2 Framework.
National Aeronautics and Space Administration GSAW 2012 Session 11A Expanding Access to Satellite Information through the Compatible C2 Framework. NASA and Compat C2 (we call it GMSEC) Leap Day 2012 Dan
More informationAttribute-Driven Design
Attribute-Driven Design Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Attribute-Driven Design The ADD method is an approach to defining a software architecture in which the design process is based
More informationInstalling and Administering a Satellite Environment
IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00
More informationApplication Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.
Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Abstract This Application Note describes the steps required for installing and configuring
More informationNetezza PureData System Administration Course
Course Length: 2 days CEUs 1.2 AUDIENCE After completion of this course, you should be able to: Administer the IBM PDA/Netezza Install Netezza Client Software Use the Netezza System Interfaces Understand
More informationWHAT IS SOFTWARE ARCHITECTURE?
WHAT IS SOFTWARE ARCHITECTURE? Chapter Outline What Software Architecture Is and What It Isn t Architectural Structures and Views Architectural Patterns What Makes a Good Architecture? Summary 1 What is
More informationArchitectural Design
Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures PART 1 ARCHITECTURAL DESIGN DECISIONS Recap on SDLC Phases
More informationSupport for the HIPAA Security Rule
white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationA Distributed Network Architecture for PC-Based Telemetry Systems
A Distributed Network Architecture for PC-Based Telemetry Systems by Paul A. Thoreson, Lockheed Martin Telemetry & Instrumentation Presented to Ground Systems Architectures Workshop February 26, 1997 frank:/550/gndsysws
More informationLecture 1. Chapter 6 Architectural design
Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process
More informationAdvanced On-board Control Procedure
1 Overview The Advanced On-Board Control Procedure (AOBCP) product is one of a set of technologies that allows to implement cost effective operation and control of a spacecraft. Together these technologies
More informationArchitectural Blueprint The 4+1 View Model of Software Architecture. Philippe Kruchten
Architectural Blueprint The 4+1 View Model of Software Architecture Philippe Kruchten Model What is a model? simplified abstract representation information exchange standardization principals (involved)
More informationWFF Pad 0A Universal Ground Fluid Control System
WFF Pad 0A Universal Ground Fluid Control System Executive Overview March 2012 Command and Control Technologies Corporation CCT is under contract to the Mid-Atlantic Regional Spaceport to build, install,
More informationArcGIS for Server: Administration and Security. Amr Wahba
ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server
More informationIBM Data Warehousing Balanced Configuration Unit for AIX, V1.1 accelerates development of data warehouse and business intelligence infrastructures
Software Announcement IBM Data Warehousing Balanced Configuration Unit for AIX, V1.1 accelerates development of data warehouse and business intelligence infrastructures Overview The Data Warehousing Balanced
More informationSynergetics-Standard-SQL Server 2012-DBA-7 day Contents
Workshop Name Duration Objective Participants Entry Profile Training Methodology Setup Requirements Hardware and Software Requirements Training Lab Requirements Synergetics-Standard-SQL Server 2012-DBA-7
More informationAbout the XenClient Enterprise Solution
About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes
More informationReport. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution
CERN-ACC-2013-0237 Wojciech.Sliwinski@cern.ch Report Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution W. Sliwinski, I. Yastrebov, A. Dworak CERN, Geneva, Switzerland
More informationAdministration Guide - NetApp File Archiver
Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method
More informationDesigning Database Solutions for Microsoft SQL Server (465)
Designing Database Solutions for Microsoft SQL Server (465) Design a database structure Design for business requirements Translate business needs to data structures; de-normalize a database by using SQL
More informationConfiguring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:
This chapter contains the following sections: Information About NTP, page 1 Licensing Requirements, page 3 Prerequisites for NTP, page 3 Guidelines and Limitations for NTP, page 3 Default Settings for
More informationGLAST Large Area Telescope:
Gamma-ray Large Area Space Telescope GLAST Large Area Telescope: ISOC Subsystems WBS: 4.1.B David Lung Stanford Linear Accelerator Center ISOC Deputy Manager dlung@slac.stanford.edu Document: LAT-PR-XXXXX
More informationNext-Generation Architecture for Virtual Prototyping
Next-Generation Architecture for Virtual Prototyping Dr. Bipin Chadha John Welsh Principal Member Manager Lockheed Martin ATL Lockheed Martin ATL (609) 338-3865 (609) 338-3865 bchadha@atl.lmco.com jwelsh@atl.lmco.com
More informationQlik Sense Enterprise architecture and scalability
White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,
More informationData Domain OpenStorage Primer
White Paper Data Domain OpenStorage Primer Abstract Data Domain s support for Symantec NetBackup OpenStorage enables the use of disk as disk, eliminating the need to emulate tape drives, tape cartridges,
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationManaging Oracle Real Application Clusters. An Oracle White Paper January 2002
Managing Oracle Real Application Clusters An Oracle White Paper January 2002 Managing Oracle Real Application Clusters Overview...3 Installation and Configuration...3 Oracle Software Installation on a
More informationExtended Search Administration
IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using
More informationticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding
ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com
More informationRediffmail Enterprise High Availability Architecture
Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of
More informationVirtualization with VMware ESX and VirtualCenter SMB to Enterprise
Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, four-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including
More informationFailover for High Availability in the Public Cloud
This chapter describes how to configure Active/Backup failover to accomplish high availability of the Cisco ASAv in a public cloud environment, such as Microsoft Azure. About Failover in the Public Cloud,
More informationWW HMI SCADA Connectivity and Integration - Multi-Galaxy
Slide 1 WW HMI SCADA-06 2014 Connectivity and Integration - Multi-Galaxy Steven L. Weygandt Portfolio Product Manager - Device Integration /Wonderware Social.Invensys.com @InvensysOpsMgmt / #SoftwareRevolution
More informationSAP Solutions on VMware vsphere : High Availability
SAP Solutions on VMware vsphere : High Availability Table of Contents Introduction...1 vsphere Overview...1 VMware Fault Tolerance...1 Background on High Availability for SAP Solutions...2 VMware HA...3
More informationMarc Hornbeek DevOps-the-Gray Principal DevOps Consultant, Trace3 Author, DevOps Test Engineering Course The DevOps Institute
HOST EXPERT PANEL Shashi Kiran CMO Quali Marc Hornbeek DevOps-the-Gray Principal DevOps Consultant, Trace3 Author, DevOps Test Engineering Course The DevOps Institute Pascal Joly Director, Technology Partnerships
More informationCCSDS Space Link Extension (SLE)
CCSDS Space Link Extension (SLE) Proposal for a NASA Wide Ground Data Service Standard Nascom Block Phase Out Work Group Team Prepared by Larry Muzny Lockheed Martin Space Operations Consolidated Space
More informationNASA/GSFC s Flight Software Architecture: Core Flight Executive and Core Flight System
NASA/GSFC s Flight Software Architecture: Core Flight Executive and Core Flight System Alan Cudmore Software Engineering Division NASA/Goddard Space Flight Center Alan.P.Cudmore@nasa.gov 301-286-5809 cfe-
More informationActian PSQL Vx Server Licensing
Actian PSQL Vx Server Licensing Overview The Actian PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application migration
More informationData Consistency with SPLICE Middleware. Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division
Data Consistency with SPLICE Middleware Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division Slide 1 6/30/2005 Background! US Navy Combat Systems are evolving to distributed systems
More informationBeOn Security Cybersecurity for Critical Communications Systems
WHITEPAPER BeOn Security Cybersecurity for Critical Communications Systems Peter Monnes System Design Engineer Harris Corporation harris.com #harriscorp TABLE OF CONTENTS BeOn Security... 3 Summary...
More informationMinsoo Ryu. College of Information and Communications Hanyang University.
Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based
More informationCentral Administration Console Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Central Administration Console Installation and User's Guide SC27-2808-04 IBM Tivoli Storage Manager FastBack for Workstations Version
More informationIT Services IT LOGGING POLICY
IT LOGGING POLICY UoW IT Logging Policy -Restricted- 1 Contents 1. Overview... 3 2. Purpose... 3 3. Scope... 3 4. General Requirements... 3 5. Activities to be logged... 4 6. Formatting, Transmission and
More informationThis chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections:
This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: About NTP, page 1 Licensing Requirements for NTP, page 3 Prerequisites
More informationArchitectural Design. Architectural Design. Software Architecture. Architectural Models
Architectural Design Architectural Design Chapter 6 Architectural Design: -the design the desig process for identifying: - the subsystems making up a system and - the relationships between the subsystems
More informationSpitzer Heritage Archive
Spitzer Heritage Archive Xiuqin Wu, Trey Roby, Loi Ly IRSA/SSC, California Institute of Technology, 100-22, Pasadena, CA, USA ABSTRACT The Spitzer Heritage Archive 1 will host all the raw and final reprocessed
More informationIBM Proventia Management SiteProtector Installation Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Installation Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports, read the information in
More informationEMC Business Continuity for Microsoft Applications
EMC Business Continuity for Microsoft Applications Enabled by EMC Celerra, EMC MirrorView/A, EMC Celerra Replicator, VMware Site Recovery Manager, and VMware vsphere 4 Copyright 2009 EMC Corporation. All
More informationSoftware Architectures. Lecture 6 (part 1)
Software Architectures Lecture 6 (part 1) 2 Roadmap of the course What is software architecture? Designing Software Architecture Requirements: quality attributes or qualities How to achieve requirements
More informationMySQL Database Administrator Training NIIT, Gurgaon India 31 August-10 September 2015
MySQL Database Administrator Training Day 1: AGENDA Introduction to MySQL MySQL Overview MySQL Database Server Editions MySQL Products MySQL Services and Support MySQL Resources Example Databases MySQL
More informationVirtualization with VMware ESX and VirtualCenter SMB to Enterprise
Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including
More informationMySQL for Database Administrators Ed 4
Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals
More informationWebSphere Application Server, Version 5. What s New?
WebSphere Application Server, Version 5 What s New? 1 WebSphere Application Server, V5 represents a continuation of the evolution to a single, integrated, cost effective, Web services-enabled, J2EE server
More informationConfiguring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:
This chapter contains the following sections: Information About NTP Information About NTP, on page 1 Licensing Requirements, on page 2 Prerequisites for NTP, on page 3 Guidelines and Limitations for NTP,
More informationQuick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE
Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE
More informationSpace Robotics. Lecture #23 November 15, 2016 Robotic systems Docking and berthing interfaces Attachment mechanisms MARYLAND U N I V E R S I T Y O F
Lecture #23 November 15, 2016 Robotic systems Docking and berthing interfaces Attachment mechanisms 1 2016 David L. Akin - All rights reserved http://spacecraft.ssl.umd.edu Shuttle Remote Manipulator System
More informationMicro Focus Studio Enterprise Edition Test Server
product review Micro Focus Studio Enterprise Edition Test Server Micro Focus Studio Enterprise Edition Test Server (Test Server) is a testing suite that supports pre-production testing of mainframe applications
More informationI&T&C Organization Chart
I&T&C Organization Chart I&T&C Manager Elliott Bloom WBS 4.1.9 I&T Engineer B. Grist WBS 4.1.9.1 Reliability & QA D. Marsh WBS 4.1.9.2 Mechanical Ground Support Equipment TBD Instrument Operations Coordinator
More informationGoAhead Software NDIA Systems Engineering 2010
GoAhead Software NDIA Systems Engineering 2010 High Availability and Fault Management in Objective Architecture Systems Steve Mills, Senior Systems Architect Outline Standards/COTS and the Mission-Critical
More informationIBM Tivoli Storage Manager for AIX Version Installation Guide IBM
IBM Tivoli Storage Manager for AIX Version 7.1.3 Installation Guide IBM IBM Tivoli Storage Manager for AIX Version 7.1.3 Installation Guide IBM Note: Before you use this information and the product it
More informationT22 - Industrial Control System Security
T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial
More informationSoftware Quality. Richard Harris
Software Quality Richard Harris Part 1 Software Quality 143.465 Software Quality 2 Presentation Outline Defining Software Quality Improving source code quality More on reliability Software testing Software
More informationControls Electronic messaging Information involved in electronic messaging shall be appropriately protected.
I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To
More informationPROCESSING MANAGEMENT TOOLS FOR EARTH OBSERVATION PRODUCTS AT DLR-DFD
PROCESSING MANAGEMENT TOOLS FOR EARTH OBSERVATION PRODUCTS AT DLR-DFD M. Böttcher (1), R. Reißig (2), E. Mikusch (2), C. Reck (2) (1) Werum Software & Systems, D-21337 Lüneburg, Germany, phone: +49 4131
More information