Root cause codes: Level One: See Chapter 6 for a discussion of using hierarchical cause codes.
|
|
- Wesley Singleton
- 5 years ago
- Views:
Transcription
1 Root cause codes: See Chapter 6 for a discussion of using hierarchical cause codes. Level one is where the cause is found, levels two and three are what the cause is, in increasing detail. While many level two and three codes can be used with any level one code, some are more specific and only match certain codes in the hierarchy. Matches should be obvious from their context. This list is not necessarily complete, but it is useful as it is. Note that many human factor codes are not listed. Several of the frameworks contain comprehensive human factor causes. Level One: ADDRESS RESOLUTION SYSTEMS APPLICATION CODE-BUSINESS-EXISTING APPLICATION CODE-BUSINESS-NEW APPLICATION CODE-WEB-EXISTING APPLICATION CODE-WEB-NEW APPLICATION OTHER AUTHENTICATION SYSTEMS BATCH BUSINESS OPERATIONS BUSINESS OTHER COOLING DATA FEEDS DATABASE DESKTOP DISASTERS-MAN-MADE DISASTERS-NATURAL FACILITIES OTHER FILESYSTEM Services such as DNS, DHCP, WINS etc. Code developed internally for business use, either directly by staff or indirectly from other applications, which has been unchanged in production for more than one release cycle Code developed internally for business use, either directly by staff or indirectly from other applications, which was released in the last release cycle Applies usually to applications that would be subject to internet specific issues, such as latency and load balancing, which has been unchanged in production for more than one release cycle Applies usually to applications that would be subject to internet specific issues, such as latency and load balancing, which was released in the last release cycle Services such as LDAP, Active Directory or OID. job or process developed internally for business use that runs under the control of a scheduler or robot Normal or abnormal business operations or processes Interruptions to internally managed HVAC and other cooling Data sources used directly for business operations or processed via applications Database components managed internally Desktop operating and applications of an end user computing nature Fire, large scale accidents, terrorist acts and other miscellaneous disasters that have occurred as the result of human action Fire, flood, and other miscellaneous disasters that have occurred naturally Directory structure, permissions, and security, for files stored on computer media
2 INFRASTRUCTURE OTHER MESSAGING , SMTP, and other methods to share electronic messages. Not for message bus or other queue management. See Middleware MIDDLEWARE Inter-system communications such as message bus and other queue management components managed internally NETWORK-CABLING Physical network cabling faults or errors NETWORK-CARDS Hardware, software or configuration related to network interface cards (NICs) NETWORK-FIREWALL Hardware, software or configuration related to firewalls NETWORK-OTHER NETWORK-ROUTER Hardware, software or configuration related to internal or external network routing that is internally managed (if carrier related, use External codes) NETWORK-SWITCH Hardware, software or configuration related to network switching POWER Power loss, UPS, generator and battery faults, and spikes and surges in power supplies for internally managed environments SERVER-LINUX Operating system software or configuration related to Linux SERVER-OTHER SERVER-UNIX Operating system software or configuration related to UNIX SERVER-WINDOWS Operating system software or configuration related to Windows STORAGE Hardware, software or configuration related to mass storage such as storage area networks. Do not use for disk drives on servers. THIRD PARTY-CARRIER Providers of communications connectivity THIRD PARTY-CLIENT Customer actions, omissions, processes, procedures etc. (i.e. something about how a service recipient used the service) THIRD PARTY-OTHER THIRD PARTY-SERVICE PROVIDER A provider of specific services under contract to the organization, such as SaaS, hosted data centre services and other managed services THIRD PARTY-VENDOR Specific packaged products and services such as third party software, where the cause is beyond the internal organisation's control boundary UNKNOWN The cause is not known - always have unknown at levels 2 and 3 as well VOICE Hardware, software or configuration related to voice infrastructure components, including switches, voice recorders and handsets Level Two CHANGE-DEPLOYMENT CHANGE-DESIGN Change deployment failure Design requirements during the Release lifecycle
3 CHANGE-DEVELOPMENT CHANGE-FUNCTIONAL REQUIREMENTS CHANGE-OTHER CHANGE-TESTING CONFIGURATION CONNECTIVITY DATA FEEDS DATA PROCESSING DATA REPLICATION ERROR FAILOVER-DR FIRMWARE HARDWARE-CPU HARDWARE-DISK HARDWARE-DISK ADAPTER HARDWARE-FIBER CABLE HARDWARE-INTERFACE CONVERTER HARDWARE-MEMORY HARDWARE-NIC HARDWARE-OTHER HARDWARE-SAN HARDWARE-STORAGE HARDWARE-SYSTEM BOARD HARDWARE-TRANSCEIVER HARDWARE-UPS OPERATING SYSTEM PERFORMANCE PROCESS-PROCEDURE PROJECT-DEPLOYMENT PROJECT-DESIGN PROJECT-FUNCTIONAL REQUIREMENTS PROJECT-OTHER PROJECT-TESTING PUBLIC FACILITIES SECURITY TABLE SPACE-QUOTA UNKNOWN UTILITY SOFTWARE Development issue during the Release lifecycle Functional requirements during the Release lifecycle The specific reason related to change is not defined Testing did not discover the failure type A configuration failure of any type A physical connection failed Data was not sent from or received by one application to another (or one batch job to another; one process to another; one function to another) Data was not fully processed through the normal steps. Data was not replicated, copied or migrated fully through the normal steps An application coding defect High availability or disaster recovery did not work as designed A firmware error (vendor supplied software code usually implemented on-chip or in static memory) CPU error or failure Disk error or failure Disk adapter error or failure Fibre Cable error or failure Interface Converter error or failure Memory error or failure NIC error or failure A hardware error or failure not covered by other categories SAN fabric error or failure Storage array error or failure System Board error or failure Transceiver error or failure Uninterruptable Power Supply (UPS) error or failure Operating System error or failure Performance not meeting specifications/expectations Process or procedure break Major release or project deployment failure Design requirements during the Release lifecycle Functional requirements related to a major release or project The specific reason related to a project is not defined Testing did not discover the failure type External utility error or failure Security compromised or breached The database did not have the correct table space or quota allocated The cause is not known Vendor-supplied utility software error or failure
4 Level Three BUG BUILD BUSINESS VOLUME CAPACITY CONFLICTS CORRUPTED MESSAGE DATA CORRUPTION DATA INTEGRITY DATA VALIDATION ERROR DATE-TIME ERROR DOS EXCEPTION PROCESSING EXTERNAL TO CONTROL INCORRECT INPUT INCORRECTLY DEFINED INCORRECTLY IMPLEMENTED KNOWN ISSUE LACK OF WARRANTY SUPPORT LATE FEED LOAD BALANCE LOGIC ERROR MALWARE MANUAL ENTRY ERROR MISINTERPRETED REQUIREMENTS MISSED FROM TEST SCOPE MISSED PEER REVIEW NO BACKOUT PLAN NO WARRANTY PERIOD The vendor has acknowledged a bug in their code A hardware of software build error The business did not provide IT with sufficient information and time to adjust capacity to account for added business volume IT was aware of the potential business volume maximums but did not adequately design the IT environment to handle this business volume Conflicts between to data sources or between data and other sources such as application processing or middleware A corrupted message could not be handled correctly Corrupted data was accepted and processed, leading to invalid output or a corrupted data input or file was received and could not be processed Invalid data was accepted and processed Application code allows data to be entered that should not be allowed or allows data to be processed that should not be process Application code allows invalid date/times be entered or does not properly handle valid date/times The security breach is specific to a Denial of Service attack Application code did not handle an exception correctly The cause is outside the control of the organisation. It can be mitigated with internal measures but not resolved Data entry was incorrect - business operations data entry Functional requirements incorrectly defined against specified business requirements The requirements were not implemented as specified Accepted known issue Post release support did not meet defined warranty service levels A data feed was received or sent late impacting dependent processing Performance degradation due to incorrect load balancing A logic error exists in application code did not handle standard operating processes The security breach relates to malicious software A process step or configuration entry is performed manually and there is insufficient error checking in place Business requirements misinterpreted when documenting requirements and design A situation arose in production that was not covered in the test plan Peer review not done or inadequate No back-out plan was provided or was insufficient to allow successful back-out There was no warranty provided post release
5 NON-COMPLIANT NON-PROD TO PROD ACCESS NOT DEFINED NOT DOCUMENTED NOT FOLLOWED OTHER PACKAGING PHYSICAL DISCONNECT PLANNING PROCESS NOT UPDATED RESOURCE CONSTRAINT SCHEDULING CONSTRAINT SCHEDULING ERROR SCRIPT ERROR SETTING SYNTAX ERROR TESTING FAILURE TESTING NOT COMPLETED TUNING UNKNOWN VERSION VIRUS The configuration item does not comply with current coding standards or lifecycle management plan A non-production environment is accessing data or services from a production environment or a production environment is accessing data or services from a nonproduction environment Requirements, configuration or processing steps do not exist or have not been defined Requirements, configuration or processing steps have not been documented Requirements, configuration or processing steps have not been followed The cause does not match any of the current codes - see root cause description for details Software packaging error Connection between two or more sites was lost A situation arose that was not anticipated in change or project planning and could not be overcome during deployment Process documentation is out of date or was not documented following a change or the process itself has not been updated Insufficient time and/or skilled resources were allocated for successful deployment The change could not proceed or had to be backed out because of scheduling conflict or constraint A processing or batch schedule is out of order, has missing steps or conflicts with other steps or schedules A script used to execute commands or process data contained error(s) A configuration setting is incorrect. E.g. memory allocation, swap space, file size, maximum number of connections etc. Any error where the syntax of commands was incorrect, e.g. Spelling, punctuation or use of comments A test case failed but the release was allowed to continue Testing was not completed and/or signed off and release was allowed to continue A setting or environment was not optimally configured The cause is not known Errors due to incompatible or incorrect versions of utility software, operating or firmware The security breach is specific to a virus attack Go to for updates and more information.
SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationTable of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup
Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Server Setup Module 1 / Unit 1 Servers and Racks Server Hardware and Software
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationAs storage networking technology
Chapter 10 Storage As storage networking technology matures, larger and complex implementations are becoming more common. The heterogeneous nature of storage infrastructures has further added to the complexity
More informationRFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service
RFP 2017 845 Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service Version 1 Contents Project objectives... 1 Background... 1 Scope... 1 Timeframe and Cost... 4 Stakeholders, roles and responsibilities...
More informationIT infrastructure layers requiring Privileged Identity Management
White Paper IT infrastructure layers requiring Privileged Identity Management Abstract Much of today s IT infrastructure is structured as different layers of devices (virtual and physical) and applications.
More informationHUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI OceanStor Enterprise Unified Storage System HyperReplication Technical White Paper Issue 01 Date 2014-03-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may
More informationLevel 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services
9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationNetworks - Technical specifications of the current networks features used vs. those available in new networks.
APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description
More informationVMware vsphere with ESX 4.1 and vcenter 4.1
QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access
More informationReal-time Monitoring, Inventory and Change Tracking for. Track. Report. RESOLVE!
Real-time Monitoring, Inventory and Change Tracking for Track. Report. RESOLVE! Powerful Monitoring Tool for Full Visibility over Your Hyper-V Environment VirtualMetric provides the most comprehensive
More informationUnit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus
Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:
More informationCourse No. MCSA Days Instructor-led, Hands-on
MCSA: Windows Server 2012 Course No. MCSA2012 9 Days Instructor-led, Hands-on Introduction In this accelerated course nine day course, students will gain the skills and knowledge necessary to administer
More informationConfiguring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S
Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Contents Introduction...1 iscsi Explained...1 Initiators...1 Discovery and Logging On...2 Authentication...2 Designing the
More informationAnalysis of EMS Outages. Venkat Tirupati, Senior Reliability Engineer NERC Monitoring and Situational Awareness Conference September 18, 2013
Analysis of EMS Outages Venkat Tirupati, Senior Reliability Engineer NERC Monitoring and Situational Awareness Conference September 18, 2013 Agenda Introduction Analysis of Restorations Contributing &
More informationMicrosoft Certified Solutions Associate (MCSA)
Microsoft Certified Solutions Associate (MCSA) Installing and Configuring Windows Server 2012 (70-410) Module 1: Deploying and Managing Windows Server 2012 Windows Server 2012 Overview Overview of Windows
More informationDisaster Recovery and Business Continuity
Disaster Recovery and Business A Rackspace White Paper Spring 2010 Summary The purpose of this guide is to cut through the jargon around Business and Disaster Recovery, explain the differences and help
More informationAnalysis of EMS Outages
Analysis of EMS Outages Venkat Tirupati, LCRA, Supervisor EMS & Advanced Applications NERC 2 nd Annual Monitoring and Situational Awareness Conference September 22, 2 Agenda Introduction Common themes
More informationOMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.
OMi Management Pack for Microsoft Software Version: 1.01 For the Operations Manager i for Linux and Windows operating systems User Guide Document Release Date: April 2017 Software Release Date: December
More informationASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER
ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER IT Audit, Information Security & Risk Insight Africa 2014 Johnson Falana CISA,MIT,CEH,Cobit5 proverb814@yahoo.com Overview Information technology
More informationE3-E4 CM TECHNICAL IT INFRASTRUCTURE
E3-E4 CM TECHNICAL IT INFRASTRUCTURE WELCOME This is a presentation for the E3-E4 CM Technical Module for the Topic: IT Infrastructure. Eligibility: Those who have got the Up-gradation from E3 to E4. This
More informationWindows 7, Enterprise Desktop Support Technician
Windows 7, Enterprise Desktop Support Technician Course 50331D; 5 days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills needed to isolate,
More informationRequirements for IT Infrastructure
Requirements for IT Infrastructure This information contained in this document is taken from the NCSC Website directly via: https://www.cyberessentials.ncsc.gov.uk/requirements-for-it-infrastructure.html
More informationWhat's New in SUSE LINUX Enterprise Server 9
What's New in SUSE LINUX Enterprise Server 9 www.novell.com July 29, 2004 2 TABLE OF CONTENTS Table of Contents...2 Executive Summary...3 New Kernel...3 New Scalability and Availability s...5 New Systems
More informationWhat s in Installing and Configuring Windows Server 2012 (70-410):
What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.
More informationMCTS/MCSE - Windows Server 2008 R2. Course Outline. MCTS/MCSE - Windows Server 2008 R Jun 2018
Course Outline MCTS/MCSE - Windows Server 2008 R2 15 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationDude Solutions Business Continuity Overview
Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....
More informationMicrosoft Certified Solutions Expert (MCSE)
Microsoft Certified Solutions Expert (MCSE) Installing and Configuring Windows Server 2012 (70-410) Module 1: Deploying and Managing Windows Server 2012 Windows Server 2012 Overview Overview of Windows
More information70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure
70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center
More informationVMware Mirage Getting Started Guide
Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationVMware vsphere 5.5 Professional Bootcamp
VMware vsphere 5.5 Professional Bootcamp Course Overview Course Objectives Cont. VMware vsphere 5.5 Professional Bootcamp is our most popular proprietary 5 Day course with more hands-on labs (100+) and
More informationDesigning Windows Server 2008 Network and Applications Infrastructure
Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of
More informationFeature Comparison Summary
Feature Comparison Summary,, and The cloud-ready operating system is the cloud-ready operating system that delivers new layers of security and Azure-inspired innovation for the applications and infrastructure
More informationMCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter One Introducing Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter One Introducing Windows Server 2008 Objectives Distinguish among the different Windows Server
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationWindows Client, Enterprise Desktop Support Technician
Course 50331D: Windows Client, Enterprise Desktop Support Technician Page 1 of 11 Windows Client, Enterprise Desktop Support Technician Course 50331D: 3 days; Instructor-Led Introduction (Updated for Windows
More informationISO27001 Preparing your business with Snare
WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security
More informationAllowing Users to Run Services at the OLCF with Kubernetes
Allowing Users to Run Services at the OLCF with Kubernetes Jason Kincl Senior HPC Systems Engineer Ryan Adamson Senior HPC Security Engineer This work was supported by the Oak Ridge Leadership Computing
More informationCLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS
CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS SERVICE LEVEL AGREEMENT CLASSIC VPS 05 MARCH 2018 FINAL/V1.0 2 / 18 CLOUDVPS SERVICE LEVEL AGREEMENT CLASSIC VPS DOCUMENT TYPE SERVICE LEVEL AGREEMENT CLASSIC
More informationRecommendations for Implementing an Information Security Framework for Life Science Organizations
Recommendations for Implementing an Information Security Framework for Life Science Organizations Introduction Doug Shaw CISA, CRISC Director of CSV & IT Compliance Azzur Consulting Agenda Why is information
More informationBest practices with Snare Enterprise Agents
Best practices with Snare Enterprise Agents Snare Solutions About this document The Payment Card Industry Data Security Standard (PCI/DSS) documentation provides guidance on a set of baseline security
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More information2013 HSC Information Technology Marking Guidelines
201 HSC Information Technology Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 A 2 B D 4 A 5 C 6 B 7 D 8 B 9 B 10 D 11 C 12 A 1 C 14 A 15 C 1 Section II Question 16 (a) Identifies
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationChapter 14: Advanced Troubleshooting
Chapter 14: Advanced Troubleshooting IT Essentials v6.0 ITE v6.0 1 Chapter 14 - Sections & Objectives 14.0 Introduction Review Troubleshooting Steps 14.1 Computer Components and Peripherals Troubleshoot
More informationOhio Supercomputer Center
Ohio Supercomputer Center Data Lifecycle Management No: Effective: OSC-1 May 1, 2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationOverview. Prerequisites. VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot
VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot Course Name Format Course Books vsphere Version Delivery Options Remote Labs Max Attendees Requirements Lab Time Availability May, 2017 Suggested Price
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationSUPPLEMENTAL TERMS FOR LIFE SCIENCES SOLUTION SUITE PUBLIC CLOUD NOVEMBER 2016
EMC Suite Public Cloud SaaS Service Standards Supplemental Terms The SaaS Service Standards in this document apply (i) only between EMC and those organizations that procure the applicable SaaS Services
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationPowerVault MD3 Storage Array Enterprise % Availability
PowerVault MD3 Storage Array Enterprise 99.999% Availability Dell Engineering June 2015 A Dell Technical White Paper THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS
More informationWhat's in this guide... 4 Documents related to NetBackup in highly available environments... 5
Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...
More informationCourse Content of MCSA ( Microsoft Certified Solutions Associate )
Course Content of MCSA 2012 - ( Microsoft Certified Solutions Associate ) Total Duration of MCSA : 45 Days Exam 70-410 - Installing and Configuring Windows Server 2012 (Course 20410A Duration : 40 hrs
More informationVMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.
VMware Overview Kontakt: jens.soeldner@netlogix.de 1-1 You Are Here Virtual Infrastructure VMware Overview ESX Server Installation ESX Server Installation Networking Networking Storage Storage ESX Server
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationIntegrating Microsoft Forefront Threat Management Gateway (TMG)
Integrating Microsoft Forefront Threat Management Gateway (TMG) EventTracker v7.x Publication Date: Sep 16, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This
More informationEMC Celerra CNS with CLARiiON Storage
DATA SHEET EMC Celerra CNS with CLARiiON Storage Reach new heights of availability and scalability with EMC Celerra Clustered Network Server (CNS) and CLARiiON storage Consolidating and sharing information
More informationBrocade FOS Release v6.2.2f9 Internal Content Notes
Brocade FOS Release v6.2.2f9 Internal Content Notes The Brocade CCE process has been used to provide stable code fixes to various Brocade customer sites. The following sections document the defects and
More informationKeys to a more secure data environment
Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting
More informationORACLE DATABASE LIFECYCLE MANAGEMENT PACK
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
More informationSystem Requirements for EFS (Electronic Filing System) This manual supersedes all previous versions. Version 3.1
System Requirements for EFS (Electronic Filing System) This manual supersedes all previous versions. Version 3.1 A publication of:, The information in this document is subject to change without notice.
More informationMission-Critical Lustre at Santos. Adam Fox, Lustre User Group 2016
Mission-Critical Lustre at Santos Adam Fox, Lustre User Group 2016 About Santos One of the leading oil and gas producers in APAC Founded in 1954 South Australia Northern Territory Oil Search Cooper Basin
More informationSQL Azure as a Self- Managing Database Service: Lessons Learned and Challenges Ahead
SQL Azure as a Self- Managing Database Service: Lessons Learned and Challenges Ahead 1 Introduction Key features: -Shared nothing architecture -Log based replication -Support for full ACID properties -Consistency
More informationThe Host Environment. Module 2.1. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. The Host Environment - 1
The Host Environment Module 2.1 2006 EMC Corporation. All rights reserved. The Host Environment - 1 The Host Environment Upon completion of this module, you will be able to: List the hardware and software
More informationSPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER. NAS Controller Should be rack mounted with a form factor of not more than 2U
SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER S.No. Features Qualifying Minimum Requirements No. of Storage 1 Units 2 Make Offered 3 Model Offered 4 Rack mount 5 Processor 6 Memory
More informationINFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT
INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT Policy UT Health San Antonio shall adopt and document Standards and Procedures to define and manage a secured operating configuration for all
More informationWindows Server 2016 MCSA Bootcamp
Course Overview This course will provide experienced IT professionals who wish to either upgrade their skills for the purpose of certifying on Microsoft Windows Server 2016 or who wish to gain information
More informationEllipse Support. Contents
Ellipse Support Ellipse Support Contents Ellipse Support 2 Commercial In Confidence 3 Preface 4 Mission 5 Scope 5 Introduction 6 What do you need to know about tuning and configuration? 6 How does a customer
More informationICT Disaster Recovery Plan
Dronfield Henry Fanshawe School Policy No: S33 ICT Disaster Recovery Plan Revision No: 2 Date Issued: Sept 2017 Committee: Author: Statutory RDD Date Adopted: November 2017 Minute No: 17/63 Review Date:
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationCOPYRIGHTED MATERIAL. Contents
Contents Introduction... xxi Chapter 1 Installing Windows Small Business Server 2008...1 Windows Small Business Server 2008 Overview...1 What s Included in SBS 2008?...2 Limitations of Small Business Server
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationDell Service Description
Dell Service Description Dell Setup Services for Microsoft Azure Site Recovery Introduction Dell is pleased to provide Dell Setup Services for Microsoft Azure Site Recovery (the Service(s) ) in accordance
More information50331 Windows Client, Enterprise Desktop Support Technician
Course This course provides students with the knowledge and skills needed to isolate, document and resolve problems on Windows Desktops in a corporate domain. The material is geared towards corporate IT
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More information20533B: Implementing Microsoft Azure Infrastructure Solutions
20533B: Implementing Microsoft Azure Infrastructure Solutions Course Details Course Code: Duration: Notes: 20533B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationPretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance
PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively
More informationCall for Applications Post of IT Systems Engineer or Senior IT Systems Engineer I or Senior IT Systems Engineer II IT Services
Applications are invited for the post of IT Systems Engineer or Senior IT Systems Engineer I or Senior IT Systems Engineer II at the and as may be required by the University of Malta. Post of IT Systems
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationQuick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE
Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE
More informationVMware vsphere with ESX 6 and vcenter 6
VMware vsphere with ESX 6 and vcenter 6 Course VM-06 5 Days Instructor-led, Hands-on Course Description This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere
More informationCXS Citrix XenServer 6.0 Administration
Course Overview View Course Dates & Register Today Students will learn to effectively install, configure, administer, and troubleshoot XenServer 6.0. Students will also learn how to configure a Provisioning
More informationThe ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationCitrix 1Y0-A26. Citrix XenServer 6.0 Administration. Download Full Version :
Citrix 1Y0-A26 Citrix XenServer 6.0 Administration Download Full Version : https://killexams.com/pass4sure/exam-detail/1y0-a26 QUESTION: 107 Scenario: An administrator built four new hosts in an existing
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationA GPFS Primer October 2005
A Primer October 2005 Overview This paper describes (General Parallel File System) Version 2, Release 3 for AIX 5L and Linux. It provides an overview of key concepts which should be understood by those
More information20413B: Designing and Implementing a Server Infrastructure
20413B: Designing and Implementing a Server Infrastructure Course Outline Course Introduction Course Introduction Module 01 - Planning a Server Upgrade and Migration Lesson 1: Upgrade and Migration Considerations
More informationMCSA Windows Server 2012
MCSA Windows Server 2012 This course is developed for IT professionals who need to design, plan, implement, manage and support Microsoft Windows 2012 networks or who plan to take the related MCSE and MCSA
More informationEffective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO
Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:
More informationMaximum Availability Architecture: Overview. An Oracle White Paper July 2002
Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network
More informationORACLE ENTERPRISE COMMUNICATIONS BROKER
ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP
More informationTechnical Field Enablement. Symantec Messaging Gateway 10.0 HIGH AVAILABILITY WHITEPAPER. George Maculley. Date published: 5 May 2013
Symantec Messaging Gateway 10.0 HIGH AVAILABILITY WHITEPAPER George Maculley Date published: 5 May 2013 Document Version: 1.0 Technical Field Enablement Contents Introduction... 3 Scope... 3 Symantec Messaging
More informationSEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy
Draft Version AG 1.1 Deleted: 0 Appendix AG Incident Management Policy 1 Definitions In this document, except where the context otherwise requires: Expressions defined in section A of the Code (Definitions
More informationChapter 1: Introduction
Chapter 1: Introduction Silberschatz, Galvin and Gagne 2009 Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System
More information