System Analysis & design
|
|
- Moses Ira Ramsey
- 5 years ago
- Views:
Transcription
1 Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) Copyright 2014 Dr. Hossam Ragab
2 8 A n important component of the design phase is the architecture design, which describes the system s hardware, software, and network environment. The architecture design flows primarily from the nonfunctional requirements, such as operational, performance, security, cultural, and political requirements. The deliverables from architecture design include the architecture design and the hardware and software specification.
3 OBJECTIVES Describe the fundamental components of an information system. Describe server-based, client-based, and client server architectures. Describe newer architectural options, such as cloud computing. Explain how operational, performance, security, cultural, and political requirements affect the architecture design. Create an architectural design. Create a hardware and software specification.
4 ARCHITECTURE DESIGN An important step of the design phase is the creation of the architecture design, the plan for how the information system components will be distributed across multiple computers and what hardware, operating system software, and application software will be used on each computer (e.g., Windows or Linux operating system software). The nonfunctional requirements developed early in the analysis phase play a key role in architecture design. These requirements are reexamined and refined into more detailed requirements that influence the system s architecture. The objective of architecture design is to determine how the software components of the information system will be assigned to the hardware devices of the system.
5 ELEMENTS OF AN ARCHITECTURE DESIGN Architectural Components The major architectural components of any system are the software and the hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. Software systems can be divided into four basic functions, which are the basic building blocks of any information system. 1. Data storage; Most information systems require data to be stored and retrieved, whether a small file or a large database. These are the data entities documented in ERDs. 2. Data access logic; the processing required to access data, often meaning database queries in Structured Query Language (SQL) 3. Application logic; the logic documented in the DFDs, use cases, and functional requirements. 4. Presentation logic; the display of information to the user and the acceptance of the user s commands (the user interface)
6 ELEMENTS OF AN ARCHITECTURE DESIGN Architectural Components Hardware components of a systems are client computers, servers, and the network that connects them. 1. Client computers; are the input output devices employed by the user and are usually descktop or laptop computers, and also handheld devices, smartphones, special-purpose terminals. 2. Servers; are larger multi-user computers used to store software and data. 3. The network that connects the computers can vary in speed from slow, to medium-speed, to fast, to high-speed.
7 ELEMENTS OF AN ARCHITECTURE DESIGN Client Server Architectures attempt to balance the processing between client devices and one or more server devices. The client is responsible for the presentation logic, The server is responsible for the data access logic and data storage. The application logic may reside on the client, reside on the server, or be split between both Two-Tiered Client Server Architecture ** If the client contained all or most of the application logic, it is called a thick or fat client
8 ELEMENTS OF AN ARCHITECTURE DESIGN Client Server Architectures have four important benefits; They are scalable, that means it is easy to increase or decrease the storage and processing capabilities of the servers. can support many different types of clients and servers. It is possible to connect computers that use different operating systems so that you are not locked into one vendor. (Middleware is a type of system software designed to translate between different vendors software, and installed on both the client and server computers) for thin client server architectures that use Internet standards, it is simple to clearly separate the presentation logic, the application logic, and the data access logic and design each to be somewhat independent. it is possible to change the application logic without changing the presentation logic or the data, which are stored in databases if a server fails in a client server architecture, only the applications requiring that server will fail. The failed server can be swapped out and replaced and the applications can then be restored Client server architectures have critical limitations; The complexity of writing the software and / or updating the overall system, due to all applications in client server computing have two parts, the software on the client side and the software on the server side.
9 ELEMENTS OF AN ARCHITECTURE DESIGN Client Server Tiers; There are many ways in which the application logic can be partitioned between the client and the server. In the Two-Tiered Client Server Architecture the server is responsible for the data and the client is responsible for the application and presentation, and it called a two-tiered architecture because it uses only two sets of computers clients and servers A three-tiered architecture uses three sets of computers, the software on the client computer is responsible for presentation logic, an application server(s) is responsible for the application logic, and a separate database server(s) is responsible for the data access logic and data storage
10 An n-tiered architecture distributes the work of the application (the middle tier) among multiple layers of more specialized server computers. This type of architecture is common in today s Web-based e-commerce systems. The browser software on client computers makes HTTP requests to view pages from the Web server(s), and the Web server(s) enable the user to view merchandise for sale by responding with HTML documents As the user shops, components on the application server(s) are called as needed to allow the user to put items in a shopping cart; determine item pricing and availability; compute purchase costs, sales tax, and shipping costs; authorize payments, etc.., those elements of business logic, or detailed processing, are stored on the application server(s) and are accessible to any application. The database server(s) manage the data components of the system. Each of these four components is separate, which makes it easy to spread the different components on different servers and to partition the application logic on a Web-oriented server and a business-oriented server.
11 n-tiered architecture advantage compared with two / three - tiered architecture is that; it separates out the processing that occurs to better balance the load on the different servers; it is more scalable If we discover that the application server is too heavily loaded, we can simply replace it with a more powerful server or just put in several more application servers to share the load. if we discover that the database server is underused, we could store data from another application on it. n-tiered architecture disadvantage compared with two/three - tiered architecture are that; the configuration puts a greater load on the network the n-tiered model requires more communication among the servers; it generates more network traffic, so you need a higher-capacity network it is much more difficult to program and test software in n-tiered architectures than in two-tiered architectures, because more devices have to communicate properly to complete a user s transaction
12 Less Common Architectures Server-Based Architectures The very first computing architectures were serverbased, with the server (usually, a central mainframe computer) performing all four application functions. The clients (usually, terminals) enabled users to send and receive messages to and from the server computer. The clients merely captured keystrokes and sent them to the server for processing, and accepted instructions from the server on what to display This very simple architecture often works very well. Application software is developed and stored on the server, and all data are on the same computer. There is one point of control because all messages flow through the one central server. Software development and software administration are simplified because a single computer hosts the entire system (operating system and application software).
13 Less Common Architectures Client-Based Architectures With client-based architectures, the clients are microcomputers on a local area network, and the server is a server computer on the same network. The application software on the client computers is responsible for the presentation logic, the application logic, and the data access logic; the server simply provides storage for the data This simple architecture often works very well in situations with low numbers of users or limited data access requirements. The fundamental problem in the clientbased architecture is that all data on the server must travel to the client for processing.
14 Advances in Architecture Configurations Advances in hardware, software, and networking have given rise to a number of new architecture options. Two advances that are currently getting a lot of attention, virtualization and cloud computing. Virtualization This term, in the computing domain, refers to the creation of a virtual device or resource, such as a server or storage device. Server virtualization involves partitioning a physical server into smaller virtual servers. Software is used to divide the physical server into multiple virtual environments, called virtual or private servers. Storage virtualization involves combining multiple network storage devices into what appears to be single storage unit. Storage area network (SAN) uses storage virtualization to create a highspeed sub network of shared storage devices In this environment, tasks such as backup, archiving, and recovery are easier and faster.
15 Advances in Architecture Configurations Cloud computing This term refers to everything, from computing power to computing infrastructure, applications, business processes to personal collaboration of which can be delivered as a service wherever and whenever needed, It is no longer necessary for organizations to own, manage, and administer their own computing infrastructure. Cloud computing can be defined as the set of hardware, networks, storage, services, and interfaces that combine to deliver aspects of computing as a service, and it can be implemented in three ways: private cloud, public cloud, and hybrid clouds. Public clouds, services are provided as a service over the Internet with little or no control over the underlying technology infrastructure Private clouds offer activities and functions as a service, but are deployed over a company intranet or hosted data center Hybrid clouds combine the power of both public and private clouds, activities and tasks are allocated to private or public clouds as required Cloud computing suppliers utilize virtualization as a key enabling technology, for cloud computing customers, the point is to outsource IT technology, applications, and skills with a pay per usage model. Through the cloud computing model, the power of virtualization is converted into measurable business value.
16 CREATING AN ARCHITECTURE DESIGN The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Creating an architecture design begins with the nonfunctional requirements. The first step is to refine the nonfunctional requirements into more detailed requirements Then employed those detailed nonfunctional requirements to help select the architecture to be used (server-based, client-based, or client server) and the software components to be placed on each device. In a client server architecture, it has to decide whether to use a two-tier, three-tier, or n-tier architecture. There are four primary types of nonfunctional requirements that can be important in designing the architecture: 1. Operational requirements, 2. Performance requirements, 3. Security requirements, and 4. Cultural and political requirements.
17 CREATING AN ARCHITECTURE DESIGN Operational requirements, specify the operating environment in which the system must perform and how those may change over time. (operating systems, system software, and information systems with which the system must interact, but will on occasion also include the physical environment if the environment is important to the application e.g., in a noisy factory floor where no audible alerts can be heard). The four key operational requirement areas are; 1. Technical Environment Requirements Specify the type of hardware and software on which the system will work, usually focus on the operating system software (e.g., Windows, Linux), database system software (e.g., Oracle), and other system software (e.g., Internet Explorer). 2. System Integration Requirements need to the system to operate with other information systems, either inside or outside the company. These typically specify interfaces through which data will be exchanged with other systems. 3. Portability Requirements define how the technical operating environments may evolve over time and how the system must respond (e.g., the system may currently run on Windows Vista, but in the future may have to run on Windows 7 and Linux). Portability requirements also refer to potential changes in business requirements that will drive technical-environment changes. For example, many organizations today are working to ensure their applications are optimized for devices such as the ipad in response to user demand. 4. Maintainability Requirements specify the business requirement changes that can be anticipated, not all changes are predictable but some are.
18 Operational Requirements
19 CREATING AN ARCHITECTURE DESIGN Performance Requirements, focus on performance issues such as response time, capacity, and reliability. As analysts define the performance requirements for the system, the testability of those requirements is a key issue. Each requirement must be measurable so that a benchmark comparison can be made. The three key Performance requirement areas are; 1. Speed Requirements (a) how fast the system must operate (the response time of the system), and (b) how long it takes transactions in one part of the system to be reflected in other parts. 2. Capacity Requirements attempt to predict how many users the system will have to support, both in total and simultaneously. 3. Availability and Reliability Requirements focus on the extent to which users can assume that the system will be available for them to use. While some systems are intended to be used just during the 40-hour work week, other systems are designed to be used by people around the world
20 Performance Requirements
21 CREATING AN ARCHITECTURE DESIGN Security Requirements, Security is the ability to protect the information system from disruption and data loss, whether caused by an intentional act (e.g., a hacker or a terrorist attack) or a random event (e.g., disk failure, tornado). Security is primarily the responsibility of the operations group, the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations. Developers of new systems must ensure that the system s security requirements produce reasonable precautions to prevent problems; system developers are responsible for ensuring security within the information systems themselves. System developers must know the security standards that are applicable to their organizations. The most important computer asset in any organization is not the equipment; it is the organization s data. Security within systems usually focuses on; 1. specifying who can access what data, 2. identifying the need for encryption and authentication, and 3. ensuring that the application prevents the spread of viruses.
22 Security Requirements
23 CREATING AN ARCHITECTURE DESIGN Cultural and Political Requirements, are specific to the countries in which the system will be used. Important part of the design of the system s architecture is understanding the global cultural and political requirements for the system
24 CREATING AN ARCHITECTURE DESIGN Designing the Architecture Operational Requirements System integration requirements may lead to one architecture over another, depending upon the architecture and design of the system(s) with which the system needs to integrate Performance Requirements information systems that have high performance requirements are best suited to client server architectures. Security Requirements, server-based architectures tend to be more secure because all software is in one location and because mainframe operating systems are more secure than microcomputer operating systems. Cultural and Political Requirements As the cultural and political requirements become more important, the ability to separate the presentation logic from the application logic and the data becomes important. Nonfunctional Requirements and Their Implications for Architecture Design
25 HARDWARE AND SOFTWARE SPECIFICATION The hardware and software specification is a document that describes what hardware and software are needed to support the application. When a specification document is created, the hardware needed to support the future system is listed and then described in as much detail as possible. Next, the software to run on each hardware component is written down, along with any additional associated costs, such as technical training, maintenance, extended warranties, and licensing agreements. The project team will work in conjunction with the purchasing department to acquire the hardware and software.
26
Systems Analysis and Design II
Systems Analysis and Design II Chapter 8. Architecture Design. Dr. Tinabo Chapter 8: Outline Elements of an architecture design. Creating an architecture design. Hardware and software specification. INTRODUCTION,
More informationChapter 11: Physical Architecture Layer Design
Chapter 11: Physical Architecture Layer Design Objectives Understand the different physical architecture components. Understand server-based, client-based, and client server physical architectures. Be
More informationARCHITECTURE DESIGN CHAPTER 8 OBJECTIVES CHAPTER OUTINE
CHAPTER 8 ARCHITECTURE DESIGN A n important component of the design phase is the architecture design, which describes the system s hardware, software, and network environment. The architecture design flows
More informationCLIENT SERVER ARCHITECTURE:
CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationMeltem Özturan misprivate.boun.edu.tr/ozturan/mis515
Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility
More informationNetwork. Arcstar Universal One
Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than
More informationNext-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
More informationBusiness Data Communications and Networking
Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/
More informationCloud Computing the VMware Perspective. Bogomil Balkansky Product Marketing
Cloud Computing the VMware Perspective Bogomil Balkansky Product Marketing Cloud Computing - the Key Questions What is it? Why do you need it? How do you build (or leverage) one (or many)? How do you operate
More informationChapter 3. Database Architecture and the Web
Chapter 3 Database Architecture and the Web 1 Chapter 3 - Objectives Software components of a DBMS. Client server architecture and advantages of this type of architecture for a DBMS. Function and uses
More informationKey Ideas. OO Analysis and Design Foundation. Objectives. Adapted from slides 2005 John Wiley & Sons, Inc.
Slide 1 Information Systems Development COMM005 (CSM03) Autumn Semester 2009 Dr. Jonathan Y. Clark Email: j.y.clark@surrey.ac.uk Course Website: www.computing.surrey.ac.uk/courses/csm03/isdmain.htm Course
More informationBackup Exec Subscription Licensing Guide
Backup Exec Subscription Licensing Guide Last Update: 27 September 2017 CONTENTS Product Overview... 3 Backup Exec Subscription Licensing... 4 Packaging and Licensing Overview....5 Packaging and Licensing
More informationWhat to Look for in a DRaaS Solution
What to Look for in a DRaaS Solution Storage Switzerland, LLC GEORGE CRUMP - LEAD ANALYST Introduction Disaster Recovery as a Service (DRaaS) outsources and simplifies the most difficult situations that
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Course 20465 : Designing Database Solutions for Microsoft SQL Server 2012 Page 1 of 6 Designing Database Solutions for Microsoft SQL Server 2012 Course 20465: 4 days; Instructor-Led Introduction This course
More informationCisco CloudCenter Solution Use Case: Application Migration and Management
Cisco CloudCenter Solution Use Case: Application Migration and Management Application migration and management Cloud computing is here to stay. According to recent Gartner research 1, from 2011 to 2014
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Designing Database Solutions for Microsoft SQL Server 2012 Course 20465A 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Designing Database Solutions for Microsoft SQL Server 2012 Course 20465B 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available
More informationQM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS
QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives
More informationCourse AZ-100T01-A: Manage Subscriptions and Resources
Course AZ-100T01-A: Manage Subscriptions and Resources Module 1: Managing Azure Subscriptions In this module, you ll learn about the components that make up an Azure subscription and how management groups
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationWeb Serving Architectures
Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationDesign Checklist. Application Architecture. Initial cost and Total Cost of Ownership (TCO) Enterprise Resource Planning (ERP) Peter Lo
Design Checklist Application Architecture Peter Lo Before selecting application architecture, the analyst must consider the following issues: Enterprise resource planning Initial cost and Total Cost of
More informationArchitectural Design
Modeling and Systems Development Lecture 9 Architectural Design Creating a clear plan of what needs to be built and the infrastructure to build it on Design The purpose of the analysis phase is to figure
More informationIBM Storwize V7000: For your VMware virtual infrastructure
IBM Storwize V7000: For your VMware virtual infrastructure Innovative midrange disk system leverages integrated storage technologies Highlights Complement server virtualization, extending cost savings
More informationSystem Analysis & design
Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) 5 A PICTURE IS WORTH A 1,000 WORDS A process model is a graphical way of representing
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationContinuous Processing versus Oracle RAC: An Analyst s Review
Continuous Processing versus Oracle RAC: An Analyst s Review EXECUTIVE SUMMARY By Dan Kusnetzky, Distinguished Analyst Most organizations have become so totally reliant on information technology solutions
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationSurvey of Oracle Database
Survey of Oracle Database About Oracle: Oracle Corporation is the largest software company whose primary business is database products. Oracle database (Oracle DB) is a relational database management system
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump
ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops
More informationCloud Computing For Researchers
Cloud Computing For Researchers August, 2016 Compute Canada is often asked about the potential of outsourcing to commercial clouds. This has been investigated as an alternative or supplement to purchasing
More informationCloud on z Systems Solution Overview: IBM Cloud Manager with OpenStack
Cloud on z Systems Solution Overview: IBM Cloud Manager with OpenStack June 1, 2015 IBM Systems Nisha Bonda Client Technical Specilist Mike Bonett zgrowth Team North America Table of Contents ACKNOWLEDGEMENTS
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationCLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department
1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud
More informationFUJITSU Backup as a Service Rapid Recovery Appliance
FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports
More informationDatabase Management System Fall Introduction to Information and Communication Technologies CSD 102
Database Management System Fall 2016 Introduction to Information and Communication Technologies CSD 102 Outline What a database is, the individuals who use them, and how databases evolved Important database
More informationCourse: 2553A Administering Microsoft SharePoint Portal Server 2003
Course: 2553A Administering Microsoft SharePoint Portal Server 2003 Description: This three-day course provides students with the knowledge and skills to deploy and manage a Microsoft SharePoint Portal
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding
More informationSCALEFAST COMMERCE CLOUD INFRASTRUCTURE
SCALEFAST COMMERCE CLOUD INFRASTRUCTURE ALWAYS-ON, GLOBAL ECOMMERCE INFRASTRUCTURE Scalefast provides the highest level of availability, performance and security for your online store. We take care of
More informationIvanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines
Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates
More informationVIRTUAL PRIVATE NETWORKS (VPN)
VIRTUAL PRIVATE NETWORKS (VPN) Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION Helping employees work productively anytime, anywhere is a necessity in many organizations. Offering
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationMagento Commerce Architecture and Security Model Last updated: Aug 2017
Magento Commerce Architecture and Security Model Last updated: Aug 2017 Architecture The Magento Commerce architecture is designed to provide a highly secure environment. Each customer is deployed into
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationStorage Made Easy. SoftLayer
Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018)
By using On Schedule web application you are making an agreement with us, code fish, according to the current terms and conditions at the time of use. Upon the terms and conditions changing you will be
More informationProviding an Enterprise File Share and Sync Solution for
Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)
More informationStorage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3
INVESTOR NEWSLETTER ISSUE N 3 Storage Made Easy Providing an Enterprise File Fabric for STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR OPENIO Storage Made Easy (SME) File Fabric is a comprehensive Enterprise
More informationWelcome to Gumnut Cloud
Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers
More informationDeploying Application and OS Virtualization Together: Citrix and Virtuozzo
White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3
More informationWhere are you with your Cloud or Clouds? Simon Kaye Dr Cloud
Where are you with your Cloud or Clouds? Simon Kaye Dr Cloud 15 th September, 2011 2 3 Cloud Computing definitions are varying, but a common set of attributes can be identified 4 Organizations need to
More informationCloud Computing Concepts, Models, and Terminology
Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and
More informationCND Exam Blueprint v2.0
EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding
More informationSecurity Architecture Models for the Cloud
White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,
More information25 Best Practice Tips for architecting Amazon VPC
25 Best Practice Tips for architecting Amazon VPC 25 Best Practice Tips for architecting Amazon VPC Amazon VPC is one of the most important feature introduced by AWS. We have been using AWS from 2008 and
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationBackup and Restore Strategies
Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything
More informationBenefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing
Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP Silverton Consulting, Inc. StorInt Briefing BENEFITS OF MULTI- NODE SCALE- OUT CLUSTERS RUNNING NETAPP CDOT PAGE 2 OF 7 Introduction
More informationBACKUP AND RECOVERY OF A HIGHLY VIRTUALIZED ENVIRONMENT
BACKUP AND RECOVERY OF A HIGHLY VIRTUALIZED ENVIRONMENT Featuring Industry Perspectives from The Enterprise Strategy Group (ESG) 24 January 2013 Jason Buffington (@Jbuff), ESG Senior Analyst, Data Protection
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationFebruary 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure
February 2017 Version: 1.0 Xerox App Gallery 4.0 Information Assurance Disclosure 2017 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey and WorkCentre are trademarks of
More informationEBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD
EBOOK NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD NetApp ONTAP Cloud for Microsoft Azure The ONTAP Cloud Advantage 3 Enterprise-Class Data Management 5 How ONTAP Cloud
More informationSecurity Solutions. Overview. Business Needs
Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.
More informationACS 3907 E-Commerce. E-Commerce Design Architecture Part 1. Client/Server Architecture. Instructor: Kerry Augustine February 7 th 2019
ACS 3907 E-Commerce Instructor: Kerry Augustine February 7 th 2019 2014 Pearson Education, Inc. Publishing as Prentice Hall 1 E-Commerce Design Architecture Part 1 Client/server architecture Two-tier vs.
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationBack To The Future - VMware Product Directions. Andre Kemp Sr. Product Marketing Manager Asia - Pacific
Back To The Future - VMware Product Directions Andre Kemp Sr. Product Marketing Manager Asia - Pacific Disclaimer This session contains product features that are currently under development. This session/overview
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationIZO MANAGED CLOUD FOR AZURE
USE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AZURE 1. LET S UNDERSTAND THE MARKET DYNAMICS In this era of digitisation, the cloud debate is over-enterprises have already moved a sizeable portion of their
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationDeploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform
Deploy Your step-by-step guide to successfully deploy an app with FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements, and
More informationAdministering System Center Configuration Manager
Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site
More informationADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently
More informationA Cloud WHERE PHYSICAL ARE TOGETHER AT LAST
A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT
More informationIntroduction to Oracle
Class Note: Chapter 1 Introduction to Oracle (Updated May 10, 2016) [The class note is the typical material I would prepare for my face-to-face class. Since this is an Internet based class, I am sharing
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationDHIS2 Hosting Proposal
www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and
More informationTechnology Outsourcing with Cloud Computing. Understanding the Opportunity
Technology Outsourcing with Cloud Computing Understanding the Opportunity Cloud Basics Cloud Benefits Summary Q&A Agenda CLOUD BASICS What is the cloud? Software As a Service Infrastructure As a Service
More informationStorage Made Easy. Mirantis
Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top
More informationCLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University
CLOUD COMPUTING IT0530 G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University What is virtualization? Virtualization is way to run multiple operating systems and user applications on the same
More informationAdministering System Center Configuration Manager
Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently
More informationTHE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION
THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION CONTENTS EXECUTIVE SUMMARY HANDLING CONFLICTING RESPONSIBILITIES WITH CARE DIGITAL TRANSFORMATION CREATES NEW
More informationHow unified backup and cloud enable your digital transformation success
Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation
More informationSoftware Defined Storage for the Evolving Data Center
Software Defined Storage for the Evolving Data Center Petter Sveum Information Availability Solution Lead EMEA Technology Practice ATTENTION Forward-looking Statements: Any forward-looking indication of
More informationWindows Server The operating system
Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationHOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE
HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More information