Security, Monitoring, and Control of the Re-engineered Hubble Space Telescope Control Center System

Size: px
Start display at page:

Download "Security, Monitoring, and Control of the Re-engineered Hubble Space Telescope Control Center System"

Transcription

1 Security, Monitoring, and Control of the Re-engineered Hubble Space Telescope Control Center System Caleb Principe, NASA Goddard Space Flight Center Larry Barrett, Orbital Sciences Corporation Thomas Buchanan, QSS Group Inc. Jay Lockwood, Lockwood Software

2 CCS Overview Hubble Space Telescope (HST) Control Center System (CCS) is one component of a larger, more complex spacecraft management system CCS provides the following functions: Spacecraft Communications Coordination Spacecraft Commanding Spacecraft Health and Safety Analysis CCS does not perform: Scheduling of Spacecraft Observations or Resources Processing or Distribution of Downlinked Science Data February 25,

3 CCS Overview HST Communications Shuttle HST Test Facilities JSC Electrical Simulation VEST VSTIF WSC/ TDRS NCC DSN Flight S/W Science Instrument Core SM DASDF ESTIF SITS SEER SMOR UTC UPS Control Center System CCS HSTNet HST Contingency HST Users UTC HST Customer GSFC Center Network Environment (CNE) WSC DSN JSC Backup CCS STScI Planning & Scheduling Remote Users Internet NCC Science Data Processing UPS P&S Local Users Public Users February 25,

4 Goals of CCS Re-engineering Significantly Reduce Cost of Operations by: streamlining business processes for normal operations automating routine and repetitive operational procedures providing secure, remote access to system resources maximizing utilization of spacecraft resources Reduce Maintenance Costs by: utilizing state-of-the-practice technologies and methods adhering to government and industry standards in development cost-effective use of off-the-shelf (OTS) components building fault-tolerance into the system architecture February 25,

5 System Concept Drivers Architectural modular and extensible to facilitate maintenance and reuse scaleable to allow deployment of functional subsets Operational automate ground-system operations, provide manual override engineering expertise captured in on-line knowledge-bases Developmental integrated development environment established to maximize productivity integrated product team (IPT) based organization instituted to minimize implementation errors February 25,

6 Target Environments Operational Environments Highly distributed, server-class processors used for: Spacecraft control and monitoring CCS system maintenance Test Facilities Small number of co-resident processors used for: Flight software development Spacecraft anomaly isolation and resolution Stand-alone Configurations Single processor configuration used for: Science instrument development and check-out February 25,

7 CCS System Architecture System partitioned into three functional segments: Command and Communications Engineering Data Processing User Workstations Logical Processor concept used to enable scaleability highly cohesive set of functions decoupled through use of middleware independent of physical nodes Data Driven architecture supports tailoring and reuse configuration database drives most system functionality February 25,

8 CCS System Architecture WS Data Server WS Data Server Front End Processor Core Network Firewall Backbone Network Firewall Application Server GUI Server Application Server GUI Server Spacecraft Commanding Communications Management Spacecraft Monitoring Analysis and Trending Engineering Data Archive Ground System Management Public Web Server Internet Firewall HSTNet Test Facilities WS February 25,

9 Development Methodology Hybrid methodology established using best of: Business Process Re-engineering Top-Down Functional Decomposition with Data-Flow Analysis Thread-based Dynamic Behavior Models Object-Oriented Analysis/Design Entity-Relationship Modeling Methods adopted with elements from waterfall, incremental, and spiral approaches Applied method that best fit the development of the target product Development Environment/Tools tailored to support project specific needs February 25,

10 Technological Enablers Middleware Encapsulates interprocess communication methods Nameserver provides directory of software applications Security Firewalls Applications unaware of Firewall in communication path Unnecessary for reduced configurations Web Servers and Browsers Common user interface across multiple workstation platforms Automated System Monitors Distributed resource monitoring and failover support February 25,

11 OTS Component Integration Functional prototyping used to assess candidate products Provided method of identifying best-of-breed Primary selection criteria included: adherence to appropriate standards scaleability maintainability compatibility with other products Encapsulation used to insulate applications from OTS product features Rogue Wave libraries and custom software used February 25,

12 Security Considerations Security built-in from the beginning Guideline: Prohibit what is not explicitly allowed Drove network topology and functional allocation Eliminated some OTS products from consideration Implementing security concurrently with applications simplified system integration process Stateful-inspection firewall technology supported scaleability Security concerns detected and corrected immediately Functional access controls implemented at application level February 25,

13 Functional Security Architecture - Restricts Source of Connection - Initiates Login/Logout Processing - Passes only Recognized Protocols - Performs User Requested Function - Restricts User Functional Access - Supports Strong Authentication - Queries ACP about User Privileges Mechanisms - Supports Secured Link CCS Application System Function Request and Response GUI Server Security Firewall Secured LInk (via Encryption) User Workstation Validate Access to Privileged Sub-functions Validate Login and Logout Requests Access Control Process (ACP) User Security Profile Information - Establishes User Sessions at Login - Manages User Security Profiles - Provides User Privilege Information to Specific Applications February 25,

14 System Management Approach Application dependency information used to automate startup and failover sequences allows system to operate in multiple valid configurations Local monitoring of each resource performed COTS products used to monitor system resources and applications Centralized analysis engine used to identify and recover from suspected failure conditions Knowledge-base integrates system-wide monitoring information to determine probable source of detected error conditions Recovery measures range from simple application restart to full processor failover February 25,

15 System Management Architecture Startup/Recovery Commands Component Status CCS Host Processors Automated System Manager Physical Host Configuration System Configuration and Status Information Application Layer System Executable b Executable k Host A... Host N Executable a Application Status and Heartbeat Startup/Shutdown Requests Logical Proc 1 Logical Proc 2 Application Monitor CPU Utilization Executable a Executable b... Executable k Network I/F Utilization System Resource Monitor Potential Problem February 25,

16 Current Status Preparing for sixth incremental Release in 18 months CCS has been successfully delivered in operational, test facility, and single processor configurations Preparing for switchover to CCS for Servicing Mission 3 from shadow mode operation to primary spacecraft control system Independent Assessment of Security Architecture pending System Management architecture is finalized system dependency analysis complete knowledge-base population and validation in progress February 25,

17 Conclusions A configurable, extensible ground system architecture can be developed Use of OTS products reduces development time and costs Design based on Logical Processors can facilitate scalability Early emphasis on security drives other architectural decisions Browser-based user interface provides flexibility Automated System Management functions are reaching maturity Tailored methodology and tools are critical to meeting development goals February 25,

18 Contact Information URL February 25,

GSAW The Earth Observing System (EOS) Ground System: Leveraging an Existing Operational Ground System Infrastructure to Support New Missions

GSAW The Earth Observing System (EOS) Ground System: Leveraging an Existing Operational Ground System Infrastructure to Support New Missions GSAW 2016 The Earth Observing System (EOS) Ground System: Leveraging an Existing Operational Ground System Infrastructure to Support New Missions David Hardison NASA Goddard Space Flight Center Johnny

More information

S&OC System Requirements Review: GSRD Traceability Matrix

S&OC System Requirements Review: GSRD Traceability Matrix STScI-JWST-CI-0099 Space Telescope Science Institute James Webb Space Telescope Mission S&OC System Requirements Review: GSRD Traceability Matrix 20 December 2004 Issue A REVISION HISTORY ISSUE DESCRIPTION

More information

Lockheed Martin Corporation. All Rights Reserved. 1

Lockheed Martin Corporation. All Rights Reserved. 1 eileen.b.liu@lmco.com 1 LOCKHEED MARTIN HERITAGE 40 + years of planetary heritage Diverse mission requirements Incremental hardware evolution Strong operations focus Multiple NASA interfaces 2 LOCKHEED

More information

Declarative Self-Expand Service Access Framework for NASA Mission Users

Declarative Self-Expand Service Access Framework for NASA Mission Users Declarative Self-Expand Service Access Framework for NASA Mission Users Rose Pajerski, Jinghong J. Chen, David Warren, Keiji Tasaki, Senior Scientist, Fraunhofer Center for Experimental Software Engineering,

More information

Costing Information Assurance

Costing Information Assurance Costing Information Assurance Marybeth Panock 30 September 2009 The Aerospace Corporation The Aerospace Corporation 2009 1 Costing Information Assurance or Security Called Security for this exercise to

More information

NASA/AFSCN/NOAA/Lockheed Martin Ground Network and Space Network Interoperability Plans

NASA/AFSCN/NOAA/Lockheed Martin Ground Network and Space Network Interoperability Plans NASA/AFSCN/NOAA/Lockheed Martin Ground Network and Space Network Interoperability Plans March 4, 2003 Lindolfo Martinez Lockheed Martin Space Operations Lindolfo.Martinez@csoconline.com GSAW 2003 1 Purpose

More information

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

F6 Model-driven Development Kit (F6MDK)

F6 Model-driven Development Kit (F6MDK) F6 Model-driven Development Kit (F6MDK) Gabor Karsai, Abhishek Dubey, Andy Gokhale, William R. Otte, Csanad Szabo; Vanderbilt University/ISIS Alessandro Coglio, Eric Smith; Kestrel Institute Prasanta Bose;

More information

WebSphere 4.0 General Introduction

WebSphere 4.0 General Introduction IBM WebSphere Application Server V4.0 WebSphere 4.0 General Introduction Page 8 of 401 Page 1 of 11 Agenda Market Themes J2EE and Open Standards Evolution of WebSphere Application Server WebSphere 4.0

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

Architectural Design

Architectural Design Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Architectural Blueprint

Architectural Blueprint IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint

More information

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture Objectives Architectural Design To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Security Fundamentals for your Privileged Account Security Deployment

Security Fundamentals for your Privileged Account Security Deployment Security Fundamentals for your Privileged Account Security Deployment February 2016 Copyright 1999-2016 CyberArk Software Ltd. All rights reserved. CAVSEC-PASSF-0216 Compromising privileged accounts is

More information

Software architecture in ASPICE and Even-André Karlsson

Software architecture in ASPICE and Even-André Karlsson Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12

More information

System types. Distributed systems

System types. Distributed systems System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors

More information

Architectural Design

Architectural Design Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures Chapter 6 Architectural design 2 PART 1 ARCHITECTURAL DESIGN

More information

Course 40045A: Microsoft SQL Server for Oracle DBAs

Course 40045A: Microsoft SQL Server for Oracle DBAs Skip to main content Course 40045A: Microsoft SQL Server for Oracle DBAs - Course details Course Outline Module 1: Database and Instance This module provides an understanding of the two major components

More information

For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop.

For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop. For presentation at the Fourth Software Engineering Institute (SEI) Software Architecture Technology User Network (SATURN) Workshop. The authors can be reached at cb@mitre.org or ioannis @Mitre.org. In

More information

Sub Phase: High-Level Design. From Requirements Analysis to User Manual. System Design

Sub Phase: High-Level Design. From Requirements Analysis to User Manual. System Design Sub Phase: High-Level Design 1 From Requirements Analysis to User Manual System Design 2 1 Map of design phase HIGH LEVEL DESIGN Module Interfaces Modularization architecture DESIGN Data Persistance Subsystem

More information

Architectural Decomposition & Representations Reid Holmes

Architectural Decomposition & Representations Reid Holmes Architectural Decomposition & Representations Reid Holmes What is SW architecture? Definition: Blueprint for construction and evolution. Encompasses: Structure Behaviour The set of principal design decisions

More information

Refresher: Lifecycle models. Lecture 22: Moving into Design. Analysis vs. Design. Refresher: different worlds. Analysis vs. Design.

Refresher: Lifecycle models. Lecture 22: Moving into Design. Analysis vs. Design. Refresher: different worlds. Analysis vs. Design. Analysis vs. Design Why the distinction? Design Processes Logical vs. Physical Design System vs. Detailed Design Architectures System Architecture Software Architecture Architectural Patterns (next lecture)

More information

Architectural Decomposition Reid Holmes

Architectural Decomposition Reid Holmes Material and some slide content from: - Emerson Murphy-Hill - Software Architecture: Foundations, Theory, and Practice - Essential Software Architecture - Steve Easterbrook Architectural Decomposition

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

Flight Software Development and Validation Workflow Management System

Flight Software Development and Validation Workflow Management System Flight Software Development and Validation Workflow Management System Dan GULTUREANU*,1, Kevin KERNS 1, Tom HENTHORN 1, John QUACH 1, Mitch KLEEN 1 *Corresponding author 1 Space Systems/Loral (SSL), Software

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

Identity Firewall. About the Identity Firewall

Identity Firewall. About the Identity Firewall This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History

More information

MigrationWiz Security Overview

MigrationWiz Security Overview MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database

More information

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process

More information

Subsystem Development. T&DF Development. LAT Flight Software Testbed. LAT Integration & Test. Mission Systems Integration & Test EGSE TKR EM1 LOF

Subsystem Development. T&DF Development. LAT Flight Software Testbed. LAT Integration & Test. Mission Systems Integration & Test EGSE TKR EM1 LOF GLAST Technical Memorandum GTM023A From: Scott Williams To: G. Haller Date: 13 July 2001 Subject: Concept for Summary Description of the Electrical Ground Support Equipment () concept to support the development

More information

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered ² Architectural design decisions ² Architectural views ² Architectural patterns ² Application architectures 2 Software architecture ² The design

More information

CRaTER Scence Operation Center Requirements Document. Dwg. No

CRaTER Scence Operation Center Requirements Document. Dwg. No Rev. ECO Description Author Approved Date 01 32-157 Initial Release for comment RFGoeke 7/27/06 CRaTER Scence Operation Center Requirements Document Dwg. No. 32-01209 Revision 01 July 26, 2006 32-01209

More information

Cisco NAC Profiler Architecture Overview

Cisco NAC Profiler Architecture Overview CHAPTER 2 Topics in this chapter include: Overview, page 2-1 Cisco NAC Profiler System Deployment Model, page 2-3 Cisco NAC Profiler Usage: Port Provisioning and Endpoint Directory, page 2-4 Overview Cisco

More information

(we call it GMSEC) Dan Smith. Leap Day GSAW 2012 Session 11A Expanding Access to Satellite Information through the Compatible C2 Framework.

(we call it GMSEC) Dan Smith. Leap Day GSAW 2012 Session 11A Expanding Access to Satellite Information through the Compatible C2 Framework. National Aeronautics and Space Administration GSAW 2012 Session 11A Expanding Access to Satellite Information through the Compatible C2 Framework. NASA and Compat C2 (we call it GMSEC) Leap Day 2012 Dan

More information

Attribute-Driven Design

Attribute-Driven Design Attribute-Driven Design Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Attribute-Driven Design The ADD method is an approach to defining a software architecture in which the design process is based

More information

Installing and Administering a Satellite Environment

Installing and Administering a Satellite Environment IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00

More information

Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.

Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Abstract This Application Note describes the steps required for installing and configuring

More information

Netezza PureData System Administration Course

Netezza PureData System Administration Course Course Length: 2 days CEUs 1.2 AUDIENCE After completion of this course, you should be able to: Administer the IBM PDA/Netezza Install Netezza Client Software Use the Netezza System Interfaces Understand

More information

WHAT IS SOFTWARE ARCHITECTURE?

WHAT IS SOFTWARE ARCHITECTURE? WHAT IS SOFTWARE ARCHITECTURE? Chapter Outline What Software Architecture Is and What It Isn t Architectural Structures and Views Architectural Patterns What Makes a Good Architecture? Summary 1 What is

More information

Architectural Design

Architectural Design Architectural Design Topics i. Architectural design decisions ii. Architectural views iii. Architectural patterns iv. Application architectures PART 1 ARCHITECTURAL DESIGN DECISIONS Recap on SDLC Phases

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

A Distributed Network Architecture for PC-Based Telemetry Systems

A Distributed Network Architecture for PC-Based Telemetry Systems A Distributed Network Architecture for PC-Based Telemetry Systems by Paul A. Thoreson, Lockheed Martin Telemetry & Instrumentation Presented to Ground Systems Architectures Workshop February 26, 1997 frank:/550/gndsysws

More information

Lecture 1. Chapter 6 Architectural design

Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process

More information

Advanced On-board Control Procedure

Advanced On-board Control Procedure 1 Overview The Advanced On-Board Control Procedure (AOBCP) product is one of a set of technologies that allows to implement cost effective operation and control of a spacecraft. Together these technologies

More information

Architectural Blueprint The 4+1 View Model of Software Architecture. Philippe Kruchten

Architectural Blueprint The 4+1 View Model of Software Architecture. Philippe Kruchten Architectural Blueprint The 4+1 View Model of Software Architecture Philippe Kruchten Model What is a model? simplified abstract representation information exchange standardization principals (involved)

More information

WFF Pad 0A Universal Ground Fluid Control System

WFF Pad 0A Universal Ground Fluid Control System WFF Pad 0A Universal Ground Fluid Control System Executive Overview March 2012 Command and Control Technologies Corporation CCT is under contract to the Mid-Atlantic Regional Spaceport to build, install,

More information

ArcGIS for Server: Administration and Security. Amr Wahba

ArcGIS for Server: Administration and Security. Amr Wahba ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server

More information

IBM Data Warehousing Balanced Configuration Unit for AIX, V1.1 accelerates development of data warehouse and business intelligence infrastructures

IBM Data Warehousing Balanced Configuration Unit for AIX, V1.1 accelerates development of data warehouse and business intelligence infrastructures Software Announcement IBM Data Warehousing Balanced Configuration Unit for AIX, V1.1 accelerates development of data warehouse and business intelligence infrastructures Overview The Data Warehousing Balanced

More information

Synergetics-Standard-SQL Server 2012-DBA-7 day Contents

Synergetics-Standard-SQL Server 2012-DBA-7 day Contents Workshop Name Duration Objective Participants Entry Profile Training Methodology Setup Requirements Hardware and Software Requirements Training Lab Requirements Synergetics-Standard-SQL Server 2012-DBA-7

More information

About the XenClient Enterprise Solution

About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes

More information

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution CERN-ACC-2013-0237 Wojciech.Sliwinski@cern.ch Report Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution W. Sliwinski, I. Yastrebov, A. Dworak CERN, Geneva, Switzerland

More information

Administration Guide - NetApp File Archiver

Administration Guide - NetApp File Archiver Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

Designing Database Solutions for Microsoft SQL Server (465)

Designing Database Solutions for Microsoft SQL Server (465) Designing Database Solutions for Microsoft SQL Server (465) Design a database structure Design for business requirements Translate business needs to data structures; de-normalize a database by using SQL

More information

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections: This chapter contains the following sections: Information About NTP, page 1 Licensing Requirements, page 3 Prerequisites for NTP, page 3 Guidelines and Limitations for NTP, page 3 Default Settings for

More information

GLAST Large Area Telescope:

GLAST Large Area Telescope: Gamma-ray Large Area Space Telescope GLAST Large Area Telescope: ISOC Subsystems WBS: 4.1.B David Lung Stanford Linear Accelerator Center ISOC Deputy Manager dlung@slac.stanford.edu Document: LAT-PR-XXXXX

More information

Next-Generation Architecture for Virtual Prototyping

Next-Generation Architecture for Virtual Prototyping Next-Generation Architecture for Virtual Prototyping Dr. Bipin Chadha John Welsh Principal Member Manager Lockheed Martin ATL Lockheed Martin ATL (609) 338-3865 (609) 338-3865 bchadha@atl.lmco.com jwelsh@atl.lmco.com

More information

Qlik Sense Enterprise architecture and scalability

Qlik Sense Enterprise architecture and scalability White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,

More information

Data Domain OpenStorage Primer

Data Domain OpenStorage Primer White Paper Data Domain OpenStorage Primer Abstract Data Domain s support for Symantec NetBackup OpenStorage enables the use of disk as disk, eliminating the need to emulate tape drives, tape cartridges,

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002 Managing Oracle Real Application Clusters An Oracle White Paper January 2002 Managing Oracle Real Application Clusters Overview...3 Installation and Configuration...3 Oracle Software Installation on a

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com

More information

Rediffmail Enterprise High Availability Architecture

Rediffmail Enterprise High Availability Architecture Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, four-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

Failover for High Availability in the Public Cloud

Failover for High Availability in the Public Cloud This chapter describes how to configure Active/Backup failover to accomplish high availability of the Cisco ASAv in a public cloud environment, such as Microsoft Azure. About Failover in the Public Cloud,

More information

WW HMI SCADA Connectivity and Integration - Multi-Galaxy

WW HMI SCADA Connectivity and Integration - Multi-Galaxy Slide 1 WW HMI SCADA-06 2014 Connectivity and Integration - Multi-Galaxy Steven L. Weygandt Portfolio Product Manager - Device Integration /Wonderware Social.Invensys.com @InvensysOpsMgmt / #SoftwareRevolution

More information

SAP Solutions on VMware vsphere : High Availability

SAP Solutions on VMware vsphere : High Availability SAP Solutions on VMware vsphere : High Availability Table of Contents Introduction...1 vsphere Overview...1 VMware Fault Tolerance...1 Background on High Availability for SAP Solutions...2 VMware HA...3

More information

Marc Hornbeek DevOps-the-Gray Principal DevOps Consultant, Trace3 Author, DevOps Test Engineering Course The DevOps Institute

Marc Hornbeek DevOps-the-Gray Principal DevOps Consultant, Trace3 Author, DevOps Test Engineering Course The DevOps Institute HOST EXPERT PANEL Shashi Kiran CMO Quali Marc Hornbeek DevOps-the-Gray Principal DevOps Consultant, Trace3 Author, DevOps Test Engineering Course The DevOps Institute Pascal Joly Director, Technology Partnerships

More information

CCSDS Space Link Extension (SLE)

CCSDS Space Link Extension (SLE) CCSDS Space Link Extension (SLE) Proposal for a NASA Wide Ground Data Service Standard Nascom Block Phase Out Work Group Team Prepared by Larry Muzny Lockheed Martin Space Operations Consolidated Space

More information

NASA/GSFC s Flight Software Architecture: Core Flight Executive and Core Flight System

NASA/GSFC s Flight Software Architecture: Core Flight Executive and Core Flight System NASA/GSFC s Flight Software Architecture: Core Flight Executive and Core Flight System Alan Cudmore Software Engineering Division NASA/Goddard Space Flight Center Alan.P.Cudmore@nasa.gov 301-286-5809 cfe-

More information

Actian PSQL Vx Server Licensing

Actian PSQL Vx Server Licensing Actian PSQL Vx Server Licensing Overview The Actian PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application migration

More information

Data Consistency with SPLICE Middleware. Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division

Data Consistency with SPLICE Middleware. Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division Data Consistency with SPLICE Middleware Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division Slide 1 6/30/2005 Background! US Navy Combat Systems are evolving to distributed systems

More information

BeOn Security Cybersecurity for Critical Communications Systems

BeOn Security Cybersecurity for Critical Communications Systems WHITEPAPER BeOn Security Cybersecurity for Critical Communications Systems Peter Monnes System Design Engineer Harris Corporation harris.com #harriscorp TABLE OF CONTENTS BeOn Security... 3 Summary...

More information

Minsoo Ryu. College of Information and Communications Hanyang University.

Minsoo Ryu. College of Information and Communications Hanyang University. Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Central Administration Console Installation and User's Guide SC27-2808-04 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

IT Services IT LOGGING POLICY

IT Services IT LOGGING POLICY IT LOGGING POLICY UoW IT Logging Policy -Restricted- 1 Contents 1. Overview... 3 2. Purpose... 3 3. Scope... 3 4. General Requirements... 3 5. Activities to be logged... 4 6. Formatting, Transmission and

More information

This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections:

This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: About NTP, page 1 Licensing Requirements for NTP, page 3 Prerequisites

More information

Architectural Design. Architectural Design. Software Architecture. Architectural Models

Architectural Design. Architectural Design. Software Architecture. Architectural Models Architectural Design Architectural Design Chapter 6 Architectural Design: -the design the desig process for identifying: - the subsystems making up a system and - the relationships between the subsystems

More information

Spitzer Heritage Archive

Spitzer Heritage Archive Spitzer Heritage Archive Xiuqin Wu, Trey Roby, Loi Ly IRSA/SSC, California Institute of Technology, 100-22, Pasadena, CA, USA ABSTRACT The Spitzer Heritage Archive 1 will host all the raw and final reprocessed

More information

IBM Proventia Management SiteProtector Installation Guide

IBM Proventia Management SiteProtector Installation Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Installation Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports, read the information in

More information

EMC Business Continuity for Microsoft Applications

EMC Business Continuity for Microsoft Applications EMC Business Continuity for Microsoft Applications Enabled by EMC Celerra, EMC MirrorView/A, EMC Celerra Replicator, VMware Site Recovery Manager, and VMware vsphere 4 Copyright 2009 EMC Corporation. All

More information

Software Architectures. Lecture 6 (part 1)

Software Architectures. Lecture 6 (part 1) Software Architectures Lecture 6 (part 1) 2 Roadmap of the course What is software architecture? Designing Software Architecture Requirements: quality attributes or qualities How to achieve requirements

More information

MySQL Database Administrator Training NIIT, Gurgaon India 31 August-10 September 2015

MySQL Database Administrator Training NIIT, Gurgaon India 31 August-10 September 2015 MySQL Database Administrator Training Day 1: AGENDA Introduction to MySQL MySQL Overview MySQL Database Server Editions MySQL Products MySQL Services and Support MySQL Resources Example Databases MySQL

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

MySQL for Database Administrators Ed 4

MySQL for Database Administrators Ed 4 Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals

More information

WebSphere Application Server, Version 5. What s New?

WebSphere Application Server, Version 5. What s New? WebSphere Application Server, Version 5 What s New? 1 WebSphere Application Server, V5 represents a continuation of the evolution to a single, integrated, cost effective, Web services-enabled, J2EE server

More information

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections: This chapter contains the following sections: Information About NTP Information About NTP, on page 1 Licensing Requirements, on page 2 Prerequisites for NTP, on page 3 Guidelines and Limitations for NTP,

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

Space Robotics. Lecture #23 November 15, 2016 Robotic systems Docking and berthing interfaces Attachment mechanisms MARYLAND U N I V E R S I T Y O F

Space Robotics. Lecture #23 November 15, 2016 Robotic systems Docking and berthing interfaces Attachment mechanisms MARYLAND U N I V E R S I T Y O F Lecture #23 November 15, 2016 Robotic systems Docking and berthing interfaces Attachment mechanisms 1 2016 David L. Akin - All rights reserved http://spacecraft.ssl.umd.edu Shuttle Remote Manipulator System

More information

Micro Focus Studio Enterprise Edition Test Server

Micro Focus Studio Enterprise Edition Test Server product review Micro Focus Studio Enterprise Edition Test Server Micro Focus Studio Enterprise Edition Test Server (Test Server) is a testing suite that supports pre-production testing of mainframe applications

More information

I&T&C Organization Chart

I&T&C Organization Chart I&T&C Organization Chart I&T&C Manager Elliott Bloom WBS 4.1.9 I&T Engineer B. Grist WBS 4.1.9.1 Reliability & QA D. Marsh WBS 4.1.9.2 Mechanical Ground Support Equipment TBD Instrument Operations Coordinator

More information

GoAhead Software NDIA Systems Engineering 2010

GoAhead Software NDIA Systems Engineering 2010 GoAhead Software NDIA Systems Engineering 2010 High Availability and Fault Management in Objective Architecture Systems Steve Mills, Senior Systems Architect Outline Standards/COTS and the Mission-Critical

More information

IBM Tivoli Storage Manager for AIX Version Installation Guide IBM

IBM Tivoli Storage Manager for AIX Version Installation Guide IBM IBM Tivoli Storage Manager for AIX Version 7.1.3 Installation Guide IBM IBM Tivoli Storage Manager for AIX Version 7.1.3 Installation Guide IBM Note: Before you use this information and the product it

More information

T22 - Industrial Control System Security

T22 - Industrial Control System Security T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial

More information

Software Quality. Richard Harris

Software Quality. Richard Harris Software Quality Richard Harris Part 1 Software Quality 143.465 Software Quality 2 Presentation Outline Defining Software Quality Improving source code quality More on reliability Software testing Software

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

PROCESSING MANAGEMENT TOOLS FOR EARTH OBSERVATION PRODUCTS AT DLR-DFD

PROCESSING MANAGEMENT TOOLS FOR EARTH OBSERVATION PRODUCTS AT DLR-DFD PROCESSING MANAGEMENT TOOLS FOR EARTH OBSERVATION PRODUCTS AT DLR-DFD M. Böttcher (1), R. Reißig (2), E. Mikusch (2), C. Reck (2) (1) Werum Software & Systems, D-21337 Lüneburg, Germany, phone: +49 4131

More information