Legacy Migration using a Virtual PPDM: A Case Study
|
|
- Claud Malone
- 6 years ago
- Views:
Transcription
1 Legacy Migration using a Virtual : A Case Study Gary Meyers: Anadarko Petroleum Mike Skeffington: EnergyIQ info@energyiq.info
2 Overview Migrating a legacy, distributed data management solution can be disruptive The issues are multiplied by the number of integrated systems To mitigate risk, a migration should be managed in phases that minimize disrupting existing operations and deliver added value to the business This paper will provide a case study of a project designed to: Migrate a complex data management environment over several phases Deliver key business value with each phase Minimize disruption and reduce IT risk with each phase Replace proprietary legacy systems with a COTS solution info@energyiq.info 2
3 10+ Years Of Evolution Well Header Gulf of Mexico North America Production Formation Reference Dir. Surveys Paleo Test Core 3.7 DB Direct Scripts International Completion Injection Scripts Etc. Vendor/Proprietary/Public 10+ Data Sources Primary Data Types and Corp. Repository 6.1M Well Header Records Dozens of
4 Design The Future Gap Analysis: Interviewed over 90 business users to understand their data needs Findings: Single trusted repository was needed Expose data blending processes and quality results for risk assessment Make data easily available to business functions to improve decision making Ensure long-term sustainability by adopting a commercial solution Build independence from data providers Challenge: Timely delivery without impacting existing workflows and processes Approach: Iterative phases to deliver critical business value, minimal disruption info@energyiq.info 4
5 The Desired Future State Sources Consumers Sources Consumers Scripts 3.7 Scripts Future State Loader 3.8 Data Access Layer/API Integrated ly Supported Well Hierarchy Data Management Apps (not TOAD) E&P Aware and APIs E&P Data Quality Standard Reports Query / Export Workflow Automation Platform Broad User Application Support info@energyiq.info 5
6 Approach Phase 1 Challenge: has multiple records for the same wells - Very confusing to users Resolution: EnergyIQ software implemented to expose the blended Well Hierarchy Result: Visible data quality, richer data, happy users info@energyiq.info 6
7 Phase I (++) Well Header Gulf of Mexico North America Production Formation Reference Dir. Surveys Paleo Test Core 3.7 DB Direct Scripts? International Completion Injection Scripts Etc. Blended Well Header info@energyiq.info
8 Approach Phase 2 Implement a virtual 3.8 data model as a series of views against the Well Hierarchy and data stores Deploy a 3.8 Gold compliant browser to meet immediate business needs (query/browse data) No changes to proprietary data loaders and existing workflows Browser 3.8 Tables 3.8 Views Result: Mitigate risk for the full migration Immediate value by exposing the views to Spotfire Sets up future migration with minimal impact Proprietary Legacy Well Hierarchy info@energyiq.info 8
9 Key Challenge: Performance Desired Outcome: Browser application performs as if it were accessing a physical database Approach: Populate key reference tables within 3.8 Establish several key views as materialized views Add a new table to provide an index between the two physical data stores, referenced by the views Iterate and tune the view designs in UAT Result: Performant, and will improve with future phases info@energyiq.info 9
10 Approach Next Planned Phase Deploy commercial Well Hierarchy in 3.8 Deploy data applications and management tools Expose data access layer for long term sustainability New Data Access Layer/API Browser Benefits: Reduce operational costs and risks Improve performance Expose common access protocol Replace custom code with commercial Begin migrating consumers to new access layer Begin migrating sources to new 3.8 Proprietary Legacy 3.8 Tables 3.8 Views Well Hierarchy
11 Approach Possible Next Steps Migrate sources to 3.8 with commercial loaders Create a virtual through a set of views preserving legacy applications before migration Continue migrating legacy consumers to the Data Access Layer Benefits: Further reduce risk and cost Retire legacy systems (, consumers, etc.) Retire legacy loaders//scripts Allow the business to migrate apps on their schedule Approach removes data provider dependencies New Data Access Layer/API Legacy Proprietary Legacy Browser 3.8 Tables Views Well Hierarchy info@energyiq.info
12 Long Term Objective Well Header Sources Consumers Gulf of Mexico North America Production Formation Reference Dir. Surveys Paleo Loader 3.8 Data Access Layer/API Integrated International Test Core Completion Injection Etc. Views Legacy
13 Summary And Lessons Learned Large migration projects are often disruptive to the business due to the inherent complexity and timeframes involved Use of a virtual database approach can minimize disruption This approach empowers IT and Business to migrate/upgrade on own schedule Deliver incremental value with short phases Performance is a key concern consider view designs This approach will work with non- sources into a platform Utilization of a Data Access Layer (API) for loading and consuming data should mitigate the impact of future migrations info@energyiq.info 13
14 Questions? 14
Well Discovery and a Corporate Well Master. Jesus Rodriguez, Marathon Oil Mike Skeffington, EnergyIQ May, 2018
Well Discovery and a Corporate Well Master Jesus Rodriguez, Marathon Oil Mike Skeffington, EnergyIQ May, 2018 Outcomes Focus areas Well Data Program Started in 2016 Well Data Program Trusted Data Manager
More informationBuilding a Trusted Master Data Store Steve Cooper: President EnergyIQ
Building a Trusted Master Data Store Steve Cooper: President EnergyIQ 7061 S. University Blvd Centennial, CO 80122 303-790-0919 www.energyiq.info Alternative Title Things that make my head hurt 2 Outline
More informationNeuraDB. E&P Data Management Simplified. Tarun Chandrasekhar Director, Data Management Products Neuralog
NeuraDB E&P Data Management Simplified Tarun Chandrasekhar Director, Data Management Products Neuralog www.neuralog.com What is NeuraDB? NeuraDB is an E&P focused Enterprise Data Management System NeuraDB
More informationVeritas Provisioning Manager
Veritas Provisioning Manager Automated server provisioning, part of the Veritas Server Foundation suite, automates server provisioning and management from physical bare metal discovery and OS installation
More informationData Quality and the PPDM Business Rules Steve Cooper: President
Data Quality and the PPDM Business Rules Steve Cooper: President 7061 S. University Blvd Centennial, CO 80122 303-790-0919 www.energyiq.info Background The PPDM Business Rules initiative provides a platform
More information5 Steps to Government IT Modernization
5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationDEVOPSIFYING NETWORK SECURITY. An AlgoSec Technical Whitepaper
DEVOPSIFYING NETWORK SECURITY An AlgoSec Technical Whitepaper Introduction This technical whitepaper presents and discusses the concept of Connectivity as Code, a complementary concept to Infrastructure
More informationSTRATEGIES FOR MANAGING LARGE AMOUNTS OF RASTER LOG DATA. Brandon Schroeder
STRATEGIES FOR MANAGING LARGE AMOUNTS OF RASTER LOG DATA Brandon Schroeder DATA MANAGEMENT INITIATIVES General Principals Capture and catalog data as it s coming in Provide the G&G users access to the
More informationData Loading Best Practice
Data Loading Best Practice PPDM Association Richard Cook ETL Solutions www.etlsolutions.com Raising data management standards Agenda Data loading PPDM Mapping tables Automated population of PPDM Data Management
More informationData Sheet: ITTIA ODBC. Copyright 2005 ITTIA LLC All rights reserved
Data Sheet: ITTIA ODBC Copyright 2005 ITTIA LLC All rights reserved Data Sheet: ITTIA ODBC ITTIA ODBC meets the needs of developers who need to connect their db.* Open Source database or proprietary Birdstep
More informationSIEBEL 15 RELEASE & UPGRADE SUMMARY
SIEBEL 15 RELEASE & UPGRADE SUMMARY Eagle Creek Software Services H UPGRADING SIEBEL WITHOUT SKIPPING A BEAT UPGRADING SIEBEL WITHOUT SKIPPING A BEAT Siebel 15 Release and Upgrade Summary IP2015, also
More informationWhat s New in Ideagen Pentana 4.2
--- What s New in Ideagen Pentana 4.2 Table of Contents 1 Introduction... 2 2 Major New Features... 3 2.1 Key Issues/Strategic Risks... 3 2.2 Definition Sign Offs... 3 2.3 Sampling... 4 2.4 Audit Problems...
More information85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges
Do You Have A Firewall Around Your Cloud? California Cybersecurity Education Summit 2018 Tyson Moler Oracle Security, North America Public Sector Conquering The Big Threats & Challenges Real Life Threats
More informationTransitioning to Symyx
Whitepaper Transitioning to Symyx Notebook by Accelrys from Third-Party Electronic Lab Notebooks Ordinarily in a market with strong growth, vendors do not focus on competitive displacement of competitor
More informationEnovia to Aras. Marc Young, Managing Partner xlm Solutions
Enovia to Aras Marc Young, Managing Partner xlm Solutions Enovia to Aras Agenda Introduction Review of Data Model Aras Enovia SmarTeam Enovia V6 / Matrix One Data Migration Strategies Co-Existence Strategies
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationCA Test Data Manager Key Scenarios
WHITE PAPER APRIL 2016 CA Test Data Manager Key Scenarios Generate and secure all the data needed for rigorous testing, and provision it to highly distributed teams on demand. Muhammad Arif Application
More informationImprove Internal Controls with Governance, Risk, and Compliance Solutions
Improve Internal Controls with Governance, Risk, and Compliance Solutions Jay Castleberry Director, Technology Delivery & Maintenance 0 (SCE) Company Overview One of the largest electric utilities in North
More informationSecuring SharePoint TASSCC TEC 2009 Web 2.0 Conference
Securing SharePoint TASSCC TEC 2009 Web 2.0 Conference Dan Cornell Email: dan@denimgroup.comd Twitter: @danielcornell March 26 th, 2009 Agenda Background SharePoint Basics Securing SharePoint Common Approaches
More informationEstablishing a Well Hierarchy
Establishing a Well Hierarchy Bryan Sagebiel Solutions Architect 7061 S University Blvd, Ste. 304 Centennial, CO 80122 303.790.0919 Overview The North American oil & gas industry is undergoing a step change
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016
All Are Trying, Some Are Benefiting; Few Are Maximizing Value September 2016 Executive Summary Cloud adoption has increased 61% from last year, with 73% pursuing a hybrid cloud strategy and on-premises
More informationData Protection. Plugging the gap. Gary Comiskey 26 February 2010
Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at
More informationEXAM - ADM-211. Administration Essentials for Experienced Admin. Buy Full Product.
Salesforce EXAM - ADM-211 Administration Essentials for Experienced Admin Buy Full Product http://www.examskey.com/adm-211.html Examskey Salesforce ADM-211 exam demo product is here for you to test the
More informationDevOps CICD for VNF a NetOps Approach
DevOps CICD for VNF a NetOps Approach Renato Fichmann Senior Solutions Architect Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationData Access User Needs Study A User Needs Assessment for the Colorado DOT (CDOT)
Data Access User Needs Study A User Needs Assessment for the Colorado DOT (CDOT) Lou Henefeld, GIS Support Unit Manager, Colorado DOT Louis.henefeld@dot.state.co.us Allen Ibaugh, CEO, Data Transfer Solutions
More informationMcAfee VirusScan and McAfee epolicy Orchestrator Administration Course
McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration
More informationWHITEPAPER A Selection Guide to Binary Tree s Directory Synchronization Software
WHITEPAPER A Selection Guide to Binary Tree s Directory Synchronization Software Table of Contents Introduction... 3 Binary Tree Directory Synchronization Software Products... 4 Directory Sync Pro... 4
More informationWell Lifecycle: Workflow Automation
2017 Well Lifecycle: Workflow Automation STEVE COOPER, PRESIDENT This document is the property of EnergyIQ and may not be distributed either in part or in whole without the prior written consent of EnergyIQ.
More informationIBM Best Practices Working With Multiple CCM Applications Draft
Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices
More informationThe Salesforce Migration Playbook
The Salesforce Migration Playbook By Capstorm Table of Contents Salesforce Migration Overview...1 Step 1: Extract Data Into A Staging Environment...3 Step 2: Transform Data Into the Target Salesforce Schema...5
More informationSailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities
SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust
More informationMagnolia Community Edition vs. Enterprise Edition. Non-Functional Features. Magnolia EE. Magnolia CE. Topic. Good value for money.
Community Edition vs. Enterprise Edition Non-Functional Features Good value for money Enterprise Edition is based on an Open Source business model that minimizes sales effort and cost without sacrificing
More informationCisco 5G Now! Product Announcements. February, 2018
Cisco 5G Now! Product Announcements February, 2018 Mobile Cloud Services 2017 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Access (%) Displacing Legacy, Mobile
More informationDiscover Best of Show März 2016, Düsseldorf
Discover Best of Show 2016 2. - 3. März 2016, Düsseldorf Transformation Area: Database Application Optimisation & Archiving mit Structured Data Manager Matthias Binder, Technical Consultant Hewlett Packard
More informationManage Change With Confidence: Upgrading to Oracle Database 11g with Oracle Real Application Testing
Manage Change With Confidence: Upgrading to Oracle Database 11g with Oracle Real Application Testing The following is intended to outline our general product direction. It is intended for information purposes
More informationNext-Generation Standards Management with IHS Engineering Workbench
ENGINEERING & PRODUCT DESIGN Next-Generation Standards Management with IHS Engineering Workbench The addition of standards management capabilities in IHS Engineering Workbench provides IHS Standards Expert
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationWHITEPAPER. Embracing Containers & Microservices for future-proof application modernization
WHITEPAPER Embracing Containers & Microservices for future-proof application modernization The need for application modernization: Legacy applications are typically based on a monolithic design, which
More informationIPv6 Enablement for Enterprises. Waliur Rahman Managing Principal, Global Solutions April, 2011
IPv6 Enablement for Enterprises Waliur Rahman Managing Principal, Global Solutions April, 2011 PROPRIETARY STATEMENT This document and any attached materials are the sole property of Verizon and are not
More informationCONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS
SOLUTION OVERVIEW CONFIDENTLY INTEGRATE VMWARE WITH INTELLIGENT OPERATIONS VMware Cloud TM on AWS brings VMware s enterprise class Software-Defined Data Center (SDDC) software to the AWS Cloud, with optimized
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationEMC Documentum xdb. High-performance native XML database optimized for storing and querying large volumes of XML content
DATA SHEET EMC Documentum xdb High-performance native XML database optimized for storing and querying large volumes of XML content The Big Picture Ideal for content-oriented applications like dynamic publishing
More informationCAPABILITY STATEMENT
CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationF5 Reference Architecture for Cisco ACI
F5 Reference Architecture for Cisco ACI Today s businesses face complex challenges to stay efficient and competitive. Together, F5 and Cisco enable organizations to dramatically reduce time to value on
More informationMcAfee epolicy Orchestrator Release Notes
Revision B McAfee epolicy Orchestrator 5.3.3 Release Notes Contents About this release Enhancements Resolved issues Known issues Installation instructions Getting product information by email Find product
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value
All Are Trying, Some Are Benefiting; Few Are Maximizing Value Latin America Findings September 2016 Executive Summary Cloud adoption has increased 49% from last year, with 78% of companies in Latin America
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationThe ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery
The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Digital Transformation Is Changing the Way that Applications Are Managed and Delivered To meet the growing challenges of a competitive
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationWHITE PAPER. Moving Fragmented Test Data Management Towards a Centralized Approach. Abstract
WHITE PAPER Moving Fragmented Test Data Management Towards a Centralized Approach Abstract Test Data Management (TDM) ensures managing test data requests in an automated way to ensure a high degree of
More informationAPI Best Practices. Managing APIs holistically across the enterprise
API Best Practices Managing APIs holistically across the enterprise APIs are critical to evolving application architectures Public clouds Microservices Distributed apps μservice μservice μservice μservice
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationWR2QTP: Semantic Translator of WinRunner Scripts to QTP
WR2QTP: Semantic Translator of WinRunner Scripts to QTP BACKGROUND Automatic testing of Graphical User Interfaces (GUI) is critical, as software is increasingly becoming web-based and operated through
More informationmonolith to micro-services? event sourcing can help Doug
monolith to micro-services? event sourcing can help Doug legacy Client Culture Amp (2012-2015) Rails App (Murmur) Read-write Query Server Read-only DB Our journey Our meandering path to CQRS & event sourcing
More informationWhat is database continuous integration?
What is database continuous integration? Database continuous integration (CI) is the rapid integration of database schema and logic changes into application development efforts and to provide immediate
More informationXerox Mobile Link App
Software Version 2.1.01 Version 1.0 Xerox Mobile Link App Information Assurance Disclosure 2017 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, Xerox Extensible Interface Platform are
More informationNTAF IN PRACTICE. White Paper
White Paper NTAF IN PRACTICE How NTAF can help manage the complexity of the test lab by providing interoperability and integration in heterogeneous network test environments. November 2012 Network Test
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationDeveloping and Deploying an Interactive Community Dashboard: An Empirical Window into Homelessness
: An Empirical Window into Homelessness Learning Objectives Developing and Deploying an Interactive Community Dashboard Attendes will Learn options and strategies to address the challenges and complexities
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationMigrating to the P8 5.2 Component Manager Framework
Migrating to the P8 5.2 Component Manager Framework Contents Migrating to the P8 5.2 Component Manager Framework... 1 Introduction... 1 Revision History:... 2 Comparing the Two Component Manager Frameworks...
More informationTHE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD
OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings
More informationMicrosoft SharePoint Server
Developing Microsoft SharePoint Server 2013 Core Solutions Course: 20488 Course Details Audience(s): Developers Technology: Duration: Microsoft SharePoint Server 40 Hours ABOUT THIS COURSE In this course,
More informationCASE STUDY Application Migration and optimization on AWS
CASE STUDY Application Migration and optimization on AWS Newt Global Consulting LLC. AMERICAS INDIA HQ Address: www.newtglobal.com/contactus 2018 Newt Global Consulting. All rights reserved. Referred products/
More informationCourse 20488A: Developing Microsoft SharePoint Server 2013 Core Solutions
Course 20488A: Developing SharePoint Server 2013 Core Solutions Delivery Method: Instructor-led (classroom) Duration: 5 Days Level: 300 COURSE OVERVIEW About this Course In this course, students learn
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More informationImproved Database Development using SQL Compare
Improved Database Development using SQL Compare By David Atkinson and Brian Harris, Red Gate Software. October 2007 Introduction This white paper surveys several different methodologies of database development,
More informationThe ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery. Citrix.com ebook Align Cloud Strategy to Business Goals 1
The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Citrix.com ebook Align Cloud Strategy to Business Goals 1 Contents Digital transformation is changing the way that applications are
More informationDevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY
DevOps Anti-Patterns Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! 31 Anti-Pattern: Throw it Over the Wall Development Operations 32 Anti-Pattern: DevOps Team Silo
More informationClosing the Hybrid Cloud Security Gap with Cavirin
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More information<Insert Picture Here> Oracle Policy Automation Connector For Siebel Features and Benefits
Oracle Policy Automation Connector For Siebel 10.3.0 Features and Benefits September 2011 Using OPA with Siebel Why? Keep business logic separate from Siebel: Make rule changes while
More informationGet a Second Opinion: Enterprise GIS Health Checks. David Crosby Esri Southeast Regional Professional Services Charlotte, NC
Get a Second Opinion: Enterprise GIS Health Checks David Crosby Esri Southeast Regional Professional Services Charlotte, NC E M E R A L D S A P P H I R E T H A N K Y O U T O O UR SPONSORS What is an Enterprise
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationCBRN Data Import/Export Tool (CDIET) Presented by: Darius Munshi
CBRN Data Import/Export Tool (CDIET) Presented by: Darius Munshi 1 Cubic Company Proprietary 2 Presentation Outline Introduction to CDIET Benefits provided to user Scope Statement Timeline for development
More informationRoadmap. Mike Chtchelkonogov Founder & Chief Technology Officer Acumatica
Roadmap Mike Chtchelkonogov Founder & Chief Technology Officer Acumatica mik@acumatica.com Andrew Boulanov Head of Platform Development Acumatica aboulanov@acumatica.com Acumatica xrp Priorities Platform
More informationCisco Prime Home 5.1 Technical
Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new
More informationReinvent Your 2013 Security Management Strategy
Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for
More informationMigrating Complex Oracle Forms Applications to APEX: Utopia or Reality?
Migrating Complex Oracle Forms Applications to APEX: Utopia or Reality? A step-by-step journey to successfully modernizing legacy Oracle Forms applications to Oracle Application Express PITSS.CON 11.0.0
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationOpenADN: A Case for Open Application Delivery Networking
OpenADN: A Case for Open Application Delivery Networking Subharthi Paul, Raj Jain, Jianli Pan Washington University in Saint Louis {Pauls, jain, jp10}@cse.wustl.edu International Conference on Computer
More informationMObile. end. complexity
Go MObile end complexity overview Today s average user has two or more mobile devices connected to the network. This mobile mindset is transforming business processes and requires strategic planning to
More informationSustainable Security Operations
Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,
More informationCitrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.
Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications
More informationOracle Applications in a Changing Business World. Legacy Oracle Applications Won't Be Around Forever. Will You?
Oracle Applications in a Changing Business World Legacy Oracle Applications Won't Be Around Forever. Will You? Ross Smith Chief Architect July 7, 2017 2 Oracle Applications in a Changing Business World
More informationConvergeOne WHITE PAPER. Revolutionizing QoS Across Cisco UC Networks
ConvergeOne WHITE PAPER Revolutionizing QoS Across Cisco UC Networks 1 Nectar Evolution Enabling Real-time UC Network Orchestration ConvergeOne Abstract Improvements in voice, video, messaging, presence
More informationSecond OMG Workshop on Web Services Modeling. Easy Development of Scalable Web Services Based on Model-Driven Process Management
Second OMG Workshop on Web Services Modeling Easy Development of Scalable Web Services Based on Model-Driven Process Management 88 solutions Chief Technology Officer 2003 Outline! Introduction to Web Services!
More informationDIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM
OMB No. 3137 0071, Exp. Date: 09/30/2015 DIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM Introduction: IMLS is committed to expanding public access to IMLS-funded research, data and other digital products:
More informationPega Product Composer for Healthcare
Pega Product Composer for Healthcare IMPLEMENTATION GUIDE 7.31 2017 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationThe Journey to Globalization: Building a Successful and Scalable S1000D Authoring and Data Delivery Methodology
It shall not be communicated to any third party without the owner s written consent. All rights reserved. The Journey to Globalization: Building a Successful and Scalable S1000D Authoring and Data Delivery
More informationDELL EMC VSCALE FABRIC
NETWORK DATA SHEET DELL EMC VSCALE FABRIC FIELD-PROVEN BENEFITS Increased utilization and ROI Create shared resource pools (compute, storage, and data protection) that connect to a common, automated network
More informationSiebel Server Sync Guide. Siebel Innovation Pack 2015 May 2015
Siebel Server Sync Guide Siebel Innovation Pack 2015 May 2015 Copyright 2005, 2015 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value
All Are Trying, Some Are Benefiting; Few Are Maximizing Value Germany Findings September 2016 Executive Summary Cloud adoption has increased 70% from last year, with 71% of companies in Germany pursuing
More informationA Cloud Gateway - A Large Scale Company s First Line of Defense. Mikey Cohen Manager - Edge Gateway Netflix
A Cloud - A Large Scale Company s First Line of Defense Mikey Cohen Manager - Edge Netflix Today, more than 36% of North America s internet traffic is controlled by systems in the Amazon Cloud Global
More information