Space ship depots continue to come online, with launches to the Moon occurring daily. The moon bases
have been stabilized, and humans are beginning to settle in.
Not surprisingly, many island nations fared better than expected during the outbreak. Their isolation could
be very valuable if we face a third round of infection before the earth has been evacuated. We need to get
them back on the grid as soon as possible. Japan, Madagascar, and Iceland are first on the list for
building infrastructures. Local teams have managed to get some equipment, but all you’ll have to start
with is one repository and blank hardware. As we’ve learned while building the depots, travel is
dangerous and difficult. You will need to create your infrastructure in a lab first, to ensure it will be able to
be quickly deployed by a local team. Once the process has been deemed successful, we will establish a
satellite link to the islands to get everything we need to the local repositories
VSAN is a new storage solution from VMware that is fully integrated with vSphere. It automatically aggregates server disks in a cluster to create shared storage that can be rapidly provisioned from VMware vCenter during VM creation.
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
This document provides guidance for architects on designing and implementing a VMware vCloud environment. It discusses vCloud components and logical architecture, including the management cluster, resource groups, and vCloud Director constructs. It also covers establishing provider and organization virtual datacenters, networking options, templates, policies, and access. Guidelines are provided for monitoring, logging, security, availability, and sizing considerations. The intended audience is VMware-certified professionals familiar with vSphere and vCloud Director.
This document provides an overview and instructions for installing, configuring, securing and using Hudson, an open source continuous integration server. It covers downloading and installing Hudson on various operating systems like Ubuntu, Red Hat and OpenSUSE. It also describes configuring global settings, plugins, projects and jobs in Hudson as well as securing Hudson through authentication and authorization. The document is intended as a manual for getting started with and managing Hudson.
This document provides a practical guide to installing and configuring Tivoli SANergy. It begins with an introduction to SANergy and its benefits for sharing data on a SAN. It then provides step-by-step instructions for setting up SANergy with both Windows and UNIX management domains controllers (MDCs). Additional chapters cover advanced topics like performance tuning, high availability configurations, and integrating SANergy with other Tivoli applications like Tivoli Storage Manager. The document is intended to help readers successfully implement and use SANergy in their own environments.
This document is the administrator's guide for Citrix XenServer 5.6 Feature Pack 1. It provides information on managing users and authentication using Active Directory, configuring resource pools and high availability, managing storage repositories and virtual disk images, and using Role Based Access Control (RBAC) to manage access permissions. The guide contains information on XenServer concepts like hosts, pools, virtual block devices (VBDs), and virtual disk data formats (VHD and LUN-based). It also describes features like storage management, host power on configuration, and auditing.
RDB Synchronization, Transcoding and LDAP Directory Services ...Videoguy
This document provides an overview and instructions for synchronizing data between mobile databases and back-end databases using IBM WebSphere Everyplace Access Version 4.1.1. It also covers using transcoding technologies to adapt portlet content for different devices. The key topics covered include:
- Configuring database synchronization between DB2 Everyplace and backend DB2 or Oracle databases
- Using transcoding technologies like XML stylesheets and annotations to customize content for devices
- A sample application demonstrating how to clip content from documents using internal and external annotation
This document provides guidance on deploying IBM Tivoli Composite Application Manager for WebSphere (ITCAM for WebSphere). It includes sample code, installation instructions, and assistance with scope development for a services engagement with ITCAM for WebSphere. The document covers planning the engagement, demonstrating the key capabilities of ITCAM for WebSphere through a sample implementation, and implementing the full ITCAM for WebSphere solution. It also discusses complementary solutions that can be bundled with an ITCAM for WebSphere engagement.
VSAN is a new storage solution from VMware that is fully integrated with vSphere. It automatically aggregates server disks in a cluster to create shared storage that can be rapidly provisioned from VMware vCenter during VM creation.
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
This document provides guidance for architects on designing and implementing a VMware vCloud environment. It discusses vCloud components and logical architecture, including the management cluster, resource groups, and vCloud Director constructs. It also covers establishing provider and organization virtual datacenters, networking options, templates, policies, and access. Guidelines are provided for monitoring, logging, security, availability, and sizing considerations. The intended audience is VMware-certified professionals familiar with vSphere and vCloud Director.
This document provides an overview and instructions for installing, configuring, securing and using Hudson, an open source continuous integration server. It covers downloading and installing Hudson on various operating systems like Ubuntu, Red Hat and OpenSUSE. It also describes configuring global settings, plugins, projects and jobs in Hudson as well as securing Hudson through authentication and authorization. The document is intended as a manual for getting started with and managing Hudson.
This document provides a practical guide to installing and configuring Tivoli SANergy. It begins with an introduction to SANergy and its benefits for sharing data on a SAN. It then provides step-by-step instructions for setting up SANergy with both Windows and UNIX management domains controllers (MDCs). Additional chapters cover advanced topics like performance tuning, high availability configurations, and integrating SANergy with other Tivoli applications like Tivoli Storage Manager. The document is intended to help readers successfully implement and use SANergy in their own environments.
This document is the administrator's guide for Citrix XenServer 5.6 Feature Pack 1. It provides information on managing users and authentication using Active Directory, configuring resource pools and high availability, managing storage repositories and virtual disk images, and using Role Based Access Control (RBAC) to manage access permissions. The guide contains information on XenServer concepts like hosts, pools, virtual block devices (VBDs), and virtual disk data formats (VHD and LUN-based). It also describes features like storage management, host power on configuration, and auditing.
RDB Synchronization, Transcoding and LDAP Directory Services ...Videoguy
This document provides an overview and instructions for synchronizing data between mobile databases and back-end databases using IBM WebSphere Everyplace Access Version 4.1.1. It also covers using transcoding technologies to adapt portlet content for different devices. The key topics covered include:
- Configuring database synchronization between DB2 Everyplace and backend DB2 or Oracle databases
- Using transcoding technologies like XML stylesheets and annotations to customize content for devices
- A sample application demonstrating how to clip content from documents using internal and external annotation
This document provides guidance on deploying IBM Tivoli Composite Application Manager for WebSphere (ITCAM for WebSphere). It includes sample code, installation instructions, and assistance with scope development for a services engagement with ITCAM for WebSphere. The document covers planning the engagement, demonstrating the key capabilities of ITCAM for WebSphere through a sample implementation, and implementing the full ITCAM for WebSphere solution. It also discusses complementary solutions that can be bundled with an ITCAM for WebSphere engagement.
This document provides a reference manual for customizing AVEVA software. It includes:
- An overview of object types, members, and methods that can be used for customization.
- Syntax graphs showing how to set up properties of different gadget types like position, anchoring, and sizing.
- Details on the members and methods for specific object types like forms, buttons, databases and more.
- Information is provided on customizing objects, properties, and behaviors within the AVEVA software.
This document is the administrator's guide for Zimbra Collaboration Server (ZCS) 8.0 Open Source Edition. It provides information on installing and configuring the core components of ZCS, including the mailbox server, LDAP service, mail transfer agent, and proxy server. It also covers using the administration console and managing configuration settings at the global, domain, and server level.
AK: Anchorage: Low Impact Development Design Guidance ManualSotirakou964
This document provides guidance for designing low impact development (LID) elements like rain gardens, infiltration trenches, soak-away pits, and filter strips. It discusses evaluating sites for these elements based on soil infiltration rates, groundwater depth, and other factors. Design approaches are presented for each LID element, covering preliminary site evaluation and design considerations, pretreatment where needed, and final design details. Construction and maintenance guidelines are also provided. The overall aim is to help plan and implement LID techniques that reduce stormwater runoff impacts.
This document is the OpenStack Beginner's Guide for Ubuntu Precise edition. It provides an introduction to OpenStack components including Nova, Glance, Swift, Keystone and Horizon. It then describes how to install and configure these components on an Ubuntu server, including installing databases, configuring Keystone, Glance, Nova, Swift and Horizon.
Auto dialer Newfies-dialer documentation for latest version 3.9.2.
Newfies-Dialer is an Voice broadcasting solution built to support cloud based servers and can also work on standalone servers.
This document provides an overview of Ajax and how to build rich internet applications with it. It discusses how Ajax works and how to create interactive maps like Google Maps using Ajax techniques. It also covers Ajax frameworks, debugging Ajax applications, and the future of Ajax.
Good news from the Worldwide Consulting Desktop & Apps (DnA) team! We’ve just finished updating theVirtual Desktop Handbook for XenDesktop 7, StoreFront 2.0 and XenServer 6.2.
The Virtual Desktop Handbook is an architect’s guide to desktop virtualization. It provides you with the methodology, experience and best practices you need to successfully design your own desktop virtualization solution.
Updates in this release include:
Resource requirements for Windows 8 and Server 2012
XD controller sizing
XenDesktop 7 policy guidelines
Database sizing for XenDesktop 7
SQL 2012 chapter
StoreFront 2.0 chapter
32-bit or 64-bit desktop OS guidance
Desktop group & StoreFront integration
In addition, we’ve also included a Citrix policy quick reference spreadsheet so that you can quickly identify default, baseline and template settings from XenDesktop 5 / XenApp 6 all the way up to XenDesktop 7. Thanks go out to Michael Havens, Maria Chang and Uzair Ali for creating this great reference spreadsheet.
I hope you find this handbook useful during your next desktop virtualization project.
And we’re not done yet, future updates will include:
Bandwidth
Hyper-V 2012
PVS 7
User data
And more …
The Virtual Desktop Handbook is not the only resource to guide you through your desktop virtualization journey. Citrix also provides Project Accelerator; an interactive online tool creating customized sizing and design recommendations based on the methodology, best practices and expert advice identified within this handbook.
You can still reach the XenDesktop 5 handbook using the old URL – CTX136546
Andy Baker – Architect
Worldwide Consulting
Desktop & Apps Team
http://blogs.citrix.com/2013/10/10/new-xendesktop-7-handbook-published/
Plesk is a hosting automation solution that manages third-party software like web servers, FTP servers, DNS servers, databases, and more. It provides control panels for hosting providers, resellers, and customers to easily manage websites, email, and other hosting services. Plesk's user account hierarchy includes client accounts for resellers, domain administrator accounts for individual websites, and email user accounts. This allows resellers to host sites and provide hosting services to their own customers.
Newfies-Dialer : Autodialer software - Documentation version 1.1.0Areski Belaid
Newfies-Dialer is an open source autodialer application designed and built to automate the delivery of interactive phone calls to contacts, clients and the general public.
http://www.newfies-dialer.org
This document is the CUDA API Reference Manual for version 5.0. It provides documentation on the CUDA API, including sections that describe the synchronization behavior of functions like memcpy and kernel launches. It also includes indexes of deprecated functions, modules, and data structures. The majority of the document consists of in-depth documentation of the functions within each CUDA API module, including parameters, return values, and usage examples.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
This document provides an overview and introduction to using JDBC (Java Database Connectivity) to connect Java applications to databases. It discusses establishing a connection via a JDBC URL, interacting with databases using statements and result sets, and mapping between SQL and Java data types. The document is a guide for developers to get started using JDBC.
This document describes the software architecture design for ProjectPlace. It outlines a three-tier architecture with modules for the client applet, server, logger, common room, project room, and plugins. The document scope is the architecture design and product scope is ProjectPlace. It provides high-level descriptions of each module and their inputs/outputs.
This document provides guidance on planning and deploying IBM Tivoli Composite Application Manager for Web Resources V6.2 (ITCAM) to monitor Web application server performance. It discusses the ITCAM architecture and how it interconnects with J2EE and WebSphere data collectors. It also covers hardware and software prerequisites, typical deployment environments, and provides a sample project plan for setting up ITCAM with tasks such as environment preparation, software installation, and customizing the product.
This document is the Administrator's Guide for Palo Alto Networks firewalls running PAN-OS version 3.1. It provides information and instructions for administrators on key tasks such as:
- Configuring the firewall interfaces, virtual systems, high availability, and user identification agents
- Managing device settings like authentication profiles, logging, and licenses
- Performing administrative functions like software upgrades, certificate management, and viewing support information
The guide is organized into chapters covering topics like device management, network configuration, security policies, and more. It includes details on navigation, settings, and procedures for common firewall administration and configuration tasks.
This document discusses strategies for improving the robustness and availability of Tivoli Directory Integrator 7.0 solutions. Potential sources of failures that could impact solutions are identified as the network, data sources/targets, runtime environments, and unexpected data. The document then recommends various architectural patterns that can be implemented using Tivoli Directory Integrator to increase availability, such as duplication, external job scheduling, message queues, and monitoring systems. It also provides guidance on error handling, failover configurations, change data capture, and general best practices for designing and implementing robust Tivoli Directory Integrator solutions.
Ben Klock is a renowned German techno DJ and producer who is known for his long sets at Berghain club in Berlin, where he helped develop the raw and underground techno sound. He discusses his career path from his early experiences with acid house to developing his reputation for marathon sets at Berghain. The interviews provide insight into Klock's musical influences, career highlights, and role in shaping the Berlin techno scene.
Rob Nelson - Challenge 2 - Virtual Design Mastervdmchallenge
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
The Factor Usability on Location Based Services in the Retail EnvironmentRoxane Koitz
The document discusses a usability study of a location-based retail mobile application called aisle411. A remote usability test was conducted with 28 smartphone users in the US. Most tasks like downloading the app, creating a shopping list, and finding nearby stores were completed by over 90% of participants. However, some tasks like scanning barcodes had completion rates below 90% due to unclear icons. The study identified several usability issues around navigation accuracy and inconsistent branding. Overall, participants felt the core functions were easy to use but improvements could be made to icons and position accuracy. Future testing of prototypes was recommended.
Anthony Chow - Challenge 1 - Virtual Design Mastervdmchallenge
We need a completely orchestrated infrastructure that is highly reliable and easily
deployable. We must ensure these sites are up and running as soon as possible.
We are expecting a design that includes the complete solution stack, from the infrastructure layer to the application layer.
The application that controls the depot has the following requirement: (Hint: These should be scalable)
Сергей Переслегин.
Презентация-сборка с занятия 26 апреля 2015 г.
Онтологический верстак: Эпистемиологическое знание.
Анонс мероприятия: http://sociosoft.ru/news/OV_19_apr
This document provides a reference manual for customizing AVEVA software. It includes:
- An overview of object types, members, and methods that can be used for customization.
- Syntax graphs showing how to set up properties of different gadget types like position, anchoring, and sizing.
- Details on the members and methods for specific object types like forms, buttons, databases and more.
- Information is provided on customizing objects, properties, and behaviors within the AVEVA software.
This document is the administrator's guide for Zimbra Collaboration Server (ZCS) 8.0 Open Source Edition. It provides information on installing and configuring the core components of ZCS, including the mailbox server, LDAP service, mail transfer agent, and proxy server. It also covers using the administration console and managing configuration settings at the global, domain, and server level.
AK: Anchorage: Low Impact Development Design Guidance ManualSotirakou964
This document provides guidance for designing low impact development (LID) elements like rain gardens, infiltration trenches, soak-away pits, and filter strips. It discusses evaluating sites for these elements based on soil infiltration rates, groundwater depth, and other factors. Design approaches are presented for each LID element, covering preliminary site evaluation and design considerations, pretreatment where needed, and final design details. Construction and maintenance guidelines are also provided. The overall aim is to help plan and implement LID techniques that reduce stormwater runoff impacts.
This document is the OpenStack Beginner's Guide for Ubuntu Precise edition. It provides an introduction to OpenStack components including Nova, Glance, Swift, Keystone and Horizon. It then describes how to install and configure these components on an Ubuntu server, including installing databases, configuring Keystone, Glance, Nova, Swift and Horizon.
Auto dialer Newfies-dialer documentation for latest version 3.9.2.
Newfies-Dialer is an Voice broadcasting solution built to support cloud based servers and can also work on standalone servers.
This document provides an overview of Ajax and how to build rich internet applications with it. It discusses how Ajax works and how to create interactive maps like Google Maps using Ajax techniques. It also covers Ajax frameworks, debugging Ajax applications, and the future of Ajax.
Good news from the Worldwide Consulting Desktop & Apps (DnA) team! We’ve just finished updating theVirtual Desktop Handbook for XenDesktop 7, StoreFront 2.0 and XenServer 6.2.
The Virtual Desktop Handbook is an architect’s guide to desktop virtualization. It provides you with the methodology, experience and best practices you need to successfully design your own desktop virtualization solution.
Updates in this release include:
Resource requirements for Windows 8 and Server 2012
XD controller sizing
XenDesktop 7 policy guidelines
Database sizing for XenDesktop 7
SQL 2012 chapter
StoreFront 2.0 chapter
32-bit or 64-bit desktop OS guidance
Desktop group & StoreFront integration
In addition, we’ve also included a Citrix policy quick reference spreadsheet so that you can quickly identify default, baseline and template settings from XenDesktop 5 / XenApp 6 all the way up to XenDesktop 7. Thanks go out to Michael Havens, Maria Chang and Uzair Ali for creating this great reference spreadsheet.
I hope you find this handbook useful during your next desktop virtualization project.
And we’re not done yet, future updates will include:
Bandwidth
Hyper-V 2012
PVS 7
User data
And more …
The Virtual Desktop Handbook is not the only resource to guide you through your desktop virtualization journey. Citrix also provides Project Accelerator; an interactive online tool creating customized sizing and design recommendations based on the methodology, best practices and expert advice identified within this handbook.
You can still reach the XenDesktop 5 handbook using the old URL – CTX136546
Andy Baker – Architect
Worldwide Consulting
Desktop & Apps Team
http://blogs.citrix.com/2013/10/10/new-xendesktop-7-handbook-published/
Plesk is a hosting automation solution that manages third-party software like web servers, FTP servers, DNS servers, databases, and more. It provides control panels for hosting providers, resellers, and customers to easily manage websites, email, and other hosting services. Plesk's user account hierarchy includes client accounts for resellers, domain administrator accounts for individual websites, and email user accounts. This allows resellers to host sites and provide hosting services to their own customers.
Newfies-Dialer : Autodialer software - Documentation version 1.1.0Areski Belaid
Newfies-Dialer is an open source autodialer application designed and built to automate the delivery of interactive phone calls to contacts, clients and the general public.
http://www.newfies-dialer.org
This document is the CUDA API Reference Manual for version 5.0. It provides documentation on the CUDA API, including sections that describe the synchronization behavior of functions like memcpy and kernel launches. It also includes indexes of deprecated functions, modules, and data structures. The majority of the document consists of in-depth documentation of the functions within each CUDA API module, including parameters, return values, and usage examples.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
This document provides an overview and introduction to using JDBC (Java Database Connectivity) to connect Java applications to databases. It discusses establishing a connection via a JDBC URL, interacting with databases using statements and result sets, and mapping between SQL and Java data types. The document is a guide for developers to get started using JDBC.
This document describes the software architecture design for ProjectPlace. It outlines a three-tier architecture with modules for the client applet, server, logger, common room, project room, and plugins. The document scope is the architecture design and product scope is ProjectPlace. It provides high-level descriptions of each module and their inputs/outputs.
This document provides guidance on planning and deploying IBM Tivoli Composite Application Manager for Web Resources V6.2 (ITCAM) to monitor Web application server performance. It discusses the ITCAM architecture and how it interconnects with J2EE and WebSphere data collectors. It also covers hardware and software prerequisites, typical deployment environments, and provides a sample project plan for setting up ITCAM with tasks such as environment preparation, software installation, and customizing the product.
This document is the Administrator's Guide for Palo Alto Networks firewalls running PAN-OS version 3.1. It provides information and instructions for administrators on key tasks such as:
- Configuring the firewall interfaces, virtual systems, high availability, and user identification agents
- Managing device settings like authentication profiles, logging, and licenses
- Performing administrative functions like software upgrades, certificate management, and viewing support information
The guide is organized into chapters covering topics like device management, network configuration, security policies, and more. It includes details on navigation, settings, and procedures for common firewall administration and configuration tasks.
This document discusses strategies for improving the robustness and availability of Tivoli Directory Integrator 7.0 solutions. Potential sources of failures that could impact solutions are identified as the network, data sources/targets, runtime environments, and unexpected data. The document then recommends various architectural patterns that can be implemented using Tivoli Directory Integrator to increase availability, such as duplication, external job scheduling, message queues, and monitoring systems. It also provides guidance on error handling, failover configurations, change data capture, and general best practices for designing and implementing robust Tivoli Directory Integrator solutions.
Ben Klock is a renowned German techno DJ and producer who is known for his long sets at Berghain club in Berlin, where he helped develop the raw and underground techno sound. He discusses his career path from his early experiences with acid house to developing his reputation for marathon sets at Berghain. The interviews provide insight into Klock's musical influences, career highlights, and role in shaping the Berlin techno scene.
Rob Nelson - Challenge 2 - Virtual Design Mastervdmchallenge
Challenge 2 – Adaptation and Constraints
The Depot at Cape Canaveral is almost online, and the depots in the Netherlands, Australia, and New Zealand will be coming online soon as well.
Our next obstacle is the infrastructure for the base on the moon. The Moon will be used as stopping point on the way to Mars, in addition to serving as the human race’s new home until the colony on Mars is finished.
Due to the way the base was constructed, we have serious power, cooling, and space limitations. You must scale the design down to fit into half of a datacenter rack, or 21U. In addition, we also only have IPV6 network infrastructure on the moon. You must use the same vendors of the design you will be working with, but you can use different product lines. You must tell us what the configuration maximums for the new design are (for example, maximum hosts, VMs, storage capacity), and what your failure tolerance is.
The Factor Usability on Location Based Services in the Retail EnvironmentRoxane Koitz
The document discusses a usability study of a location-based retail mobile application called aisle411. A remote usability test was conducted with 28 smartphone users in the US. Most tasks like downloading the app, creating a shopping list, and finding nearby stores were completed by over 90% of participants. However, some tasks like scanning barcodes had completion rates below 90% due to unclear icons. The study identified several usability issues around navigation accuracy and inconsistent branding. Overall, participants felt the core functions were easy to use but improvements could be made to icons and position accuracy. Future testing of prototypes was recommended.
Anthony Chow - Challenge 1 - Virtual Design Mastervdmchallenge
We need a completely orchestrated infrastructure that is highly reliable and easily
deployable. We must ensure these sites are up and running as soon as possible.
We are expecting a design that includes the complete solution stack, from the infrastructure layer to the application layer.
The application that controls the depot has the following requirement: (Hint: These should be scalable)
Сергей Переслегин.
Презентация-сборка с занятия 26 апреля 2015 г.
Онтологический верстак: Эпистемиологическое знание.
Анонс мероприятия: http://sociosoft.ru/news/OV_19_apr
Space ship depots continue to come online, with launches to the Moon occurring daily. The moon bases
have been stabilized, and humans are beginning to settle in.
Not surprisingly, many island nations fared better than expected during the outbreak. Their isolation could
be very valuable if we face a third round of infection before the earth has been evacuated. We need to get
them back on the grid as soon as possible. Japan, Madagascar, and Iceland are first on the list for
building infrastructures. Local teams have managed to get some equipment, but all you’ll have to start
with is one repository and blank hardware. As we’ve learned while building the depots, travel is
dangerous and difficult. You will need to create your infrastructure in a lab first, to ensure it will be able to
be quickly deployed by a local team. Once the process has been deemed successful, we will establish a
satellite link to the islands to get everything we need to the local repositories
The document summarizes the opening title sequence for a horror media product. It describes how sound and minimal colors were used to set an eerie tone. The sequence begins with an unusual tracking shot to intrigue audiences. Different music styles were tested, ultimately choosing guitars and drums to match modernized shots. Voices were added and slowed down to appeal to the horror genre. The setting was initially a forest for isolation, but was replaced by an unrelated cafe scene.
Rob Nelson - Challenge 1 - Virtual Design Master vdmchallenge
Establish a design for the manufacture and launch of Foundation colony ships and the supporting infrastructure. The infrastructure needs to be highly reliable and easy to deploy in future locations to maximize the number of launch facilities. The design emphasizes orchestration and automation to ensure manufacturing processes require minimal human input, increase overall efficiency and decrease defects in the material outputs.
This document provides information about designing an indoor learning environment for young children. It describes the key areas and facilities that should be included, such as low tables and chairs, bulletin boards at child height, and accessible storage. An evaluation found the proposed indoor area would be suitable for young children. The document then focuses on the cooking learning area, outlining skills kids ages 5 can learn like following instructions and measuring. It describes how cooking helps children develop math, social skills, health/safety knowledge, and literacy. Lastly, it proposes redesigning the space to accommodate 30 children aged 5 and details each area including a dance room, art room, playground, and kitchen.
This document discusses various digital audio workstation tools for editing music tracks, including tracks that allow controlling instrument volumes and playing multiple instruments together at different volumes, loops that let users select instrument sounds to drag into the track editor, a track editor for modifying notes and pitches either digitally or as sheet music, bars that let users move notes between sections of a soundtrack by cutting, joining, or placing them side by side, and loops that let users select a section of the soundtrack to repeat indefinitely while ignoring the rest.
Иной органон, или Кризис Бэконовской парадигмы познанияlukoshka
Иной Органон, или Кризис Бэконовской парадигмы познания.
Выступление Сергея Переслегина 17 февраля 2015 г.
Заседание Ученого совета СПбФ Института истории естествознания и техники РАН.
Презентация во многом перекликается и дублирует материал Бекасово 2014г.: http://www.slideshare.net/lukoshka/ss-34556042
Видео доклада: http://www.youtube.com/watch?v=Y1jWg0u3lXw
The document describes the Solar System and its components. It begins by stating that the Solar System is part of the Milky Way galaxy. It then lists and provides brief descriptions of the eight planets in our Solar System - Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, and Neptune. The document concludes by defining other celestial bodies that can be found in our galaxy, including stars, satellites, comets, and asteroids.
In last season we were in the aftermath of a pandemic zombie virus outbreak, which had destroyed most of the worlds civilization. The virus spread was in remission, thus allowing us to start rebuilding core infrastructure as hardware became available. Internet connectivity was restored and multi-site topologies were established.
This season, on Virtual Design Master, we’ve been dealing with the aftermath of a second round of the zombie outbreak. We’ve designed the systems to build spaceships, which are evacuating what’s left of the human race from the earth. We’ve built the infrastructure to support our new civilization on the moon. We’ve also tried to prepare what’s left of the earth in case there is another round of the outbreak, by fortifying islands across the world by deploying infrastructure remotely.
This document provides a draft summary of an IBM reference architecture for virtualized environments using IBM System Storage N series storage platforms. It includes chapters on architecture, Clustered Data ONTAP 8.2 features, VMware vSphere integration, and Microsoft Hyper-V integration. The document discusses storage configuration, provisioning, cloning, snapshots, and other topics to understand how to design scalable cloud solutions using N series storage and Clustered Data ONTAP.
This document provides information about planning and deploying IBM TotalStorage Productivity Center for Data, including:
- An overview of the product, its features, architecture and supported levels
- Planning considerations for hardware, software, databases, user IDs and security
- Steps for installing the Agent Manager and other components on Windows and Linux
This document is a feasibility study report submitted by Benjamin Kremer for the MSc Computer Science degree at University College London. The report examines the feasibility of constructing a system to verify and quantify collaborative work using blockchain architecture. The project aimed to address the problem of student disengagement by developing an API and mobile application to interact with a blockchain that records collaborative task and team data. While the project did not fully establish a way to verify and quantify collaboration, it demonstrated the concept is feasible with more time and blockchain expertise. The report describes the background, requirements, design, implementation, and testing of the prototype system developed as a proof of concept.
This document provides an overview of robust data synchronization with IBM Tivoli Directory Integrator. It discusses business drivers for data synchronization and different architectural approaches. It also describes the components of Tivoli Directory Integrator, including AssemblyLines, Connectors, Parsers and other elements. Finally, it covers best practices for designing, implementing, administering and monitoring an enterprise data synchronization solution with Tivoli Directory Integrator.
This document provides an overview of robust data synchronization with IBM Tivoli Directory Integrator. It discusses business drivers for data synchronization and different architectural approaches. It also describes the components of Tivoli Directory Integrator, including AssemblyLines, Connectors, Parsers and other elements. Finally, it covers best practices for designing, implementing, administering and monitoring an enterprise data synchronization solution with Tivoli Directory Integrator.
This document provides guidance on deploying IBM Tivoli Composite Application Manager for Web Resources V6.2. It begins with an overview of the solution and its architecture. It then discusses planning the deployment, including required hardware, software, and typical environment sizes. The document also includes guidance on installing and configuring the various components as well as usage scenarios once deployed.
The VMware Cloud Infrastructure Architecture Case Study Series was developed to provide an understanding of the various components of the VMware Cloud Infrastructure Suite. The goal is to explain how these components can be used in specific scenarios, which are based on real-world customer examples and therefore contain real-world requirements and constraints. The VMware Cloud Infrastructure Suite consists of five technologies that together expand the capabilities and value that customers can realize from a virtualized infrastructure. This case study focuses on vSphere 5.0 and vShield App 5.0
This document provides an introduction to the IBM GDPS family of offerings. It discusses business resilience requirements and how GDPS supports IT resilience through technologies like disk replication and automation. The document covers GDPS/PPRC, which uses IBM's Peer-to-Peer Remote Copy (PPRC) technology for continuous availability and disaster recovery. It also addresses infrastructure planning considerations for GDPS implementations.
Ibm web sphere datapower b2b appliance xb60 revealednetmotshop
This document provides an overview of IBM WebSphere DataPower B2B Appliance XB60. It discusses business-to-business integration concepts and technologies. It then describes the XB60 appliance, how it facilitates B2B integration using industry standards, and how data flows through its B2B Gateway service. The document also covers device setup and administrative tasks for the XB60, including initializing the device, defining the base configuration, and configuring domains, groups and users.
This chapter discusses setting up your development environment for SAS Infrastructure for Risk Management. It describes installing the Python scripting client, which allows you to create and run parallel programs on the platform. Example code is provided to interact with a sample federated area where data and tasks can be stored.
This software manual provides instructions for using DEXIS dental imaging software. It covers installing the software, setting preferences, taking and managing x-ray and photographic images, and administrative functions. The manual includes details on hardware requirements, user interfaces, image tools and security, and integrating with other practice management programs.
This document provides an architectural design for a collaborative problem solving software called ProjectPlace. It describes the modules, data structures, databases and interfaces that will be used to implement the project. The design uses a three-tier architecture pattern with modules for the client applet, server, logger, common room, project room, and plugins. It also describes the data dependencies and use cases like login, chatting, project creation, and more.
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...EnriqueJoseCaleroGal
This document provides an overview and instructions for planning and implementing OpenScape Contact Center Enterprise V10. It discusses the processing flow, database configuration, initial Manager setup, and user interface. Configuration topics include users, templates, profiles, permissions, contact handling, media settings, thresholds, reports, and security. The document contains detailed information on designing an implementation and configuring various Contact Center resources and components.
This document provides instructions for installing and configuring IBM's Tivoli Intelligent ThinkDynamic Orchestrator software. It guides the reader through planning a demonstration of the software, installing necessary components on Windows systems, designing a sample data center model using XML, and loading and testing the model. The final chapter describes demonstrating the software's capabilities to monitor and manage resources and applications in the simulated data center.
BOOK - IBM Z vse using db2 on linux for system zSatya Harish
The document is a technical guide about using DB2 on Linux for System z. It provides information on planning, setting up, and customizing a DB2 environment where some data is hosted on z/VSE and accessed using DB2 on Linux for System z. The guide covers topics like hardware planning, database considerations, installing and configuring DB2 and related software, and setting up networking and connectivity between the z/VSE and Linux systems.
This document describes a project to design and implement an OFDM-based wireless transmitter compliant with the IEEE 802.11g standard on an FPGA. The transmitter was modeled using Simulink and the model was tested through cosimulation and using EDA tools. Testing showed the design met timing requirements and error measurements were satisfactory, demonstrating a successful OFDM transmitter design using a model-based approach.
This document provides an overview of IBM InfoSphere Streams V3.0, which is a stream computing platform for performing real-time analytics on big data. It discusses key concepts of stream computing and InfoSphere Streams architecture. New features in V3.0 include improved configuration, administration, integration capabilities, and analytics toolkits. The document also covers deployment planning and creating Streams instances.
Similar to Daemon Behr - Challenge 3 - Virtual Design Master (20)
#VirtualDesignMaster 3 Challenge 3 - Steven Viljoenvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 – James Brownvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 - Dennis Georgevdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 3 - Abdullah Abdullahvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
#VirtualDesignMaster 3 Challenge 2 - Steven Viljoenvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 – James Brownvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 - Dennis Georgevdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 2 - Abdullah Abdullahvdmchallenge
We’ve examined how we can rebuild inrastucture from scratch, but now let’s think outside the box, and inside the clouds. Before the zombie apocalypse began, many organizations were beginning to leverage public cloud infrastructures for a number of reasons.
#VirtualDesignMaster 3 Challenge 1 - Abdullah Abdullahvdmchallenge
We are now settled on Mars, and ready to build a more permanent infrastructure. Keep in mind that power, cooling, and space are extremely expensive resources on Mars.
#VirtualDesignMaster 3 Challenge 1 - Dennis Georgevdmchallenge
Millionaire philanthropists Richard M. and Elon B., have teamed up to work towards humanity’s survival after the outbreak of the virus, that lead to the zombie apocalypse and evacuation of what was left of the human species from earth.
The objective of this design is to supportfirst of its kind humancoloniesin Marsuntila more permanent infrastructurewill be built. Alsobuild amessaging and collaboration infrastructure on top of it for developinga warning systemto give a more human touch to residents in Mars.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
3.
3
@VMUG_VANCOUVER
Design Subject Matter Experts
The following people provided key input into this design.
Name Email Address Role/Comments
Daemon Behr daemonbehr@gmail.com Infrastructure Architect
7.
7
@VMUG_VANCOUVER
1. Purpose and Overview
1.1 Executive Summary
Space ship depots continue to come online, with launches to the Moon occurring daily. The moon
bases have been stabilized, and humans are beginning to settle in.
Many island nations fared better than expected during the outbreak. Their isolation could be very
valuable if we face a third round of infection before the earth has been evacuated.
We need to get them back on the grid as soon as possible. Japan, Madagascar, and Iceland are first
on the list for building infrastructures. Local teams have managed to get some equipment, but all you’ll
have to start with is one repository and blank hardware. As we’ve learned while building the depots,
travel is dangerous and difficult. You will need to create your infrastructure in a lab first, to ensure it will
be able to be quickly deployed by a local team. Once the process has been deemed successful, we will
establish a satellite link to the islands to get everything we need to the local repositories.
The infrastructure must be built from scratch using a VMware cluster including shared storage, HA,
DRS and OpenStack must manage it.
Deployment of instances will be done by using the OpenStack Horizon dashboard only. OpenStack Ice
House will be used with the overlay network Neutron.
The VM images will include one Linux and one Windows instance. In order to remove single points of
failure due to the availability of human resources, a second hypervisor will be integrated. Two VM
images will be hosted by this hypervisor, one Linux and one Windows.
Documentation of the topology and provide visual proof of working deployments using video are
required.
1.2 Summary Analysis
The purpose of this design is to build a robust and open infrastructure with multiple hypervisors and an
automation and management engine (Openstack). This infrastructure will need to be configured and
tested beforehand and then deployed remotely. These Island sites are being used as repositories for
the existing knowledge of humanity. They will not have high compute requirements, but will have large
storage requirements.
1.3 Design Interpretation
There are few key constraints to the deployment of the infrastructure. The hardware that will be used
cannot be preconfigured because it has to be deployed by local teams on the island nations. There are
three zones, with datacenters located at the Universities of Tokyo, Reykjavik and Madagascar. Zone 3
(Tokyo) will have the Openstack management cluster for all the zones because of the greater
availability of technical staff.
8.
8
@VMUG_VANCOUVER
1.4 Intended Audience
This document is meant for the key stakeholders in the project as well as technical staff leads required
for a successful deployment.
1.5 Requirements
Below are the requirements as defined by the scenario document as well as additional communication
with judges and creators in clarification emails.
1.5.1 Availability
Availability can be defined as “the proportion of the operating time in which an entity
meets its in-service functional and performance requirements in its intended
environment”. The criticality of the environment requires 100% availability as a service
level objective (SLO).
Availability can be understood by understanding the relationship of Maintainability and
Reliability. The chance a system will fail is based on Reliability. How quickly it can be
fixed is due to it’s Maintainability. The combination of those two provide us with:
MTBF – Mean Time Between Failures (Reliability)
MTTR – Mean Time To Repair (Maintainability)
Availability is equal to MTTR/MTBF over the period evaluated.
R001 Production systems require a 99% availability SLO
1.5.2 Maintainability
Maintainability is defined as “the ability of an entity to facilitate its diagnosis and repair”. This is
a key factor in availability.
R002 The infrastructure must be quickly diagnosed and easily repaired
R003 The infrastructure must be managed by Openstack
R004 The infrastructure must use multiple hypervisors
9.
9
@VMUG_VANCOUVER
1.5.3 Integrity
System integrity is defined as “when an information system performs its function in an
unimpaired manner, free from deliberate or inadvertent manipulation of the system”. In
this context, it means that adds / moves / changes are not done on production systems.
R005 The infrastructure must have adequate protection to avoid any data loss
1.5.4 Reliability
Reliability can be defined by having an absence of errors. Errors in a code base do
occur, but there must be a method to ensure that they are tested, identified and resolved
before they are put in production. This prevents the errors from affecting the overall
application infrastructure.
In addition, infrastructure component configuration errors can cause reliability issues and
faults. A method must be in place to ensure that all component configurations are
correct.
R006 A system must be in place to identify errors in real time
1.5.5 Scalability
Although the scope of the scalability has not been defined, the ability for it to occur with
minimal additional design required.
R007 The system must be scalable
1.6 Constraints
C001 The infrastructure is not physically accessible by design staff
Designs need to be tested and validated before they are deployed
C002 Knowledgeable technical staff must be available during the deployment period.
Without the required staff, the mission will be delayed.
10.
10
@VMUG_VANCOUVER
C003 Communications are limited between core facilities and island facilities
Internet connectivity is limited and unreliable when using wireless communication.
C004 Automation must be used for initial deployment.
In order accommodate the needs of all the other requirements, automation and
orchestration is required for deployment.
1.7 Risks
R001 The virus spread may occur more quickly than anticipated.
Time to prep would be reduced and facility security would need to be increased.
R002 Lack of resources may delay timelines
Delays will cost human lives.
R003 Adequate power may not be available
This would impact the ability to scale
R004 Staffing levels may not be adequate
This would put more strain on available staff and increase possibility of human errors
when tired.
R005 Staff may not have the skill to manage the environment
This may reduce the manageability of the environment.
1.8 Assumptions
A001 The required staff will be available and have been trained to support the
environment and work as a team.
The minimum required is indicated in D006
A002 All required hardware for scalability is available
This should be in a facility nearby that is accessible by the technical staff and secure
from zombies. All tools required for deployment are also available.
A003 Adequate power is available
11.
11
@VMUG_VANCOUVER
This includes clean power, multiple UPS battery banks and redundant generators
equivalent to a tier3 data center.
A004 All staff in Primary roles have adequate supporting supplies
This consists of a large stockpile of high-quality coffee. Lack of this may cost human
lives.
A005 All staff in Secondary roles have adequate protective equipment
This should consist of standard equipment: 12 gauge shotgun with 24 shell bandolier,
flamethrower (2 per 8 person shift), concussion grenades (8), high power rifle (
7.62mm round) with 5 x 30 round magazines. An adequate number of chainsaws
Katanas should also be made available.
A006 All equipment in this design is new and has been burn-in tested
A period of 1 week was used and all tests were passed without issue.
A007 All component firmware is at the identical revision
This is for each component type.
2. Architecture Design
2.1 Design Decisions
The architecture is described by a logical design, which is independent of hardware-
specific details.
The following design decisions are presented with their justification.
D001 The system will have the fewest number of logical components possible
Complexity needs to be reduced to allow for easier maintainability and quicker
diagnosis of issues.
D002 Automation will be done via Openstack. Heat will not be used
This relates back to D001. The fewest number of components possible
.
D003 There will be 3 availability zones
This is for Tokyo, Reykjavik and Madagascar. Each zone will have an identical copy of
the infrastructure.
D004 The facility will be fortified
12.
12
@VMUG_VANCOUVER
Fortification will be done, where possible and where staffing permits.
D005 Continuous Integration and Continuous Delivery will be implemented
Iterations of the infrastructure will evolve over time. Changes will need to be
maintained and scheduled between all zones.
D003 There will be three availability zones
This is to meet the requirements of R003 and R004
D004 The facility will be fortified
There were two possible methods to meet R007. Fortify the facility, or distribute the
infrastructure between several sites. Fortification was the decided on method because
it reduces complexity and requires less staff and time.
D005 Continuous Integration and Continuous Delivery will be implemented
Iteration of application code builds and infrastructure designs will occur hourly. This is
not to say that changes will occur every hour, but it does mean that adds / moves /
changes will occur at that time.
2.2 Conceptual Design
OpenStack APIs allow users to customize and configure down to the network level.
VMware NSX is one of the most advanced and feature rich SDN solutions available
today working seamlessly with OpenStack, ESXi and KVM.
This solution provides an end-to-end architecture with Cisco, Canonical Ubuntu, VMware
vSphere and OpenStack technologies including Cinder and Swift for storage. Along with
NetApp, these demonstrate high availability and redundancy along with ease of
deployment and use.
13.
13
@VMUG_VANCOUVER
The following are the components used for the design and deployment:
• Cisco Unified Compute System (UCS) 2.2(1c)
• Cisco B-series Unified Computing System servers for compute and storage needs
• Cisco UCS VIC adapters
• Cisco Nexus 5000 series switches
• Canonical Ubuntu 12.04 LTS
• VMware vSphere 5.5
• OpenStack IceHouse architecture
The solution is designed to host scalable, mixed application workloads. The scope of this
design is limited to the infrastructure pieces of the solution; the design does not address
the vast area of OpenStack components and multiple configuration choices available
there.
The components being used are listed below:
• Keystone – Identity service
• Horizon – Web GUI
• Nova – Compute service
• Glance – Image service
• Neutron – Network services (formerly called Quantum)
• Cinder – Block storage service
• Swift – Object storage service
The Cisco Unified Computing System is a next-generation data center platform that unites
computing, network, storage access, and virtualization into a single cohesive system.
The main components of the Cisco UCS are:
• Computing—Blade servers based on Intel Xeon E5-2600 V2 Series Processors.
• Network—The system is integrated onto a low-latency, lossless, 10-Gbps network fabric.
The NetApp filers are high performance storage devices that are able to scale up and
scale out. This deployment will make use of Clustered Data OnTap 8.2.1 on FAS3250
units.
14.
14
@VMUG_VANCOUVER
2.3 Logical Design
The Logical Design provides a more detailed view of the Conceptual Design
components to meet the requirements. The architecture building blocks are defined
without the mapping of specific technologies.
Below is the logical design for the 3 regions. Each region will have an identical
configuration of hardware. There are 4 availability zones:
AZ1 – vSphere MGMT
AZ2 – Openstack MGMT
AZ3 – vSphere Compute
AZ4 – KVM Compute.
17.
17
@VMUG_VANCOUVER
The active Keystone and Horizon instances will be hosted in AZ2, Region 3 (Tokyo).
They will manage the other 2 regions centrally. Since all Openstack management
components are running as VMware virtual machines, they can be replicated from site to
site using NetApp snapmirror.
Snapmirror will replicate images located in Glance, and created volumes. All other
Openstack management components will only run locally. In the case of a DR situation,
the VMs just need to be registered and started in vSphere at the other sites.
2.3.3 vSphere cluster Logical Design
All management VMs will run in HA/DRS clusters within vSphere. Management clusters
are physically separated from compute clusters. Each region will have one vCenter
server.
18.
18
@VMUG_VANCOUVER
2.3.4 Openstack to KVM Logical Design
Each region will be provisioned with a 2 cabinet pod of blade chassis and 3 cabinets of
storage. Each compute cabinet will contain 5 chassis. Each chassis will have 8 blade
servers. In vSphere there will be 2 x 8 host clusters for management and 2 x 32 host
clusters for compute. The clusters will be spanned across chassis and cabinets. As seen
in the diagram below, this allows for no more than 50% cluster resource failure from a
chassis malfunction on the smaller clusters, or 25% on large cluster. A single host failure
is 12.5% for the 8 host cluster and 3% for a 32 host cluster.
19.
19
@VMUG_VANCOUVER
The chassis will uplink via fabric extenders to the fabric switches. The fabric switches will
work in HA and can support a maximum of 20 chassis per pod. Each chassis will 2 fabric
extenders, each having 2 x 10GbE uplinks to it’s associated switch. The blades will use
an onboard 10GbE adapter as well as a 10GbE Mezzanine card. The aggregate
bandwidth of each chassis is 20Gbps per fabric. The aggregate bandwidth of the blade
servers within the chassis is 80GbE per fabric. Therefore the over-subscription ratio is
4/1.
The network is converged, carrying both storage and data traffic within the same
physical devices. Connectivity from the chassis FEXs will be aggregated in a port
channel with the fabric switches. The fabric switches will aggregate bandwidth via a
virtual port channel across both access switches. The access switches have a LAG
group between then to accommodate interswitch traffic. The fabric extenders connected
directly to the access switches provide 1Gbs connectivity for any users that need direct
connectivity. Otherwise user access will be routed through the upstream switch stack.
20.
20
@VMUG_VANCOUVER
Storage will be comprised of clustered nodes in a scale out model. Each node will have
active / active controllers. Nodes will be responsible for their own disks, but they can
take over the disks of another node in the event of a failure.
Virtual storage containers are spanned across the aggregates of “like” performance tiers
in each node cluster. This allows for expandability and performance. Volumes will be
defined within the containers.
An additional storage tier exists outside of the clustered SAN environment. That is server
side caching by making use of internal SLC SSDs within the blades.
The vSphere virtualization layer consists of the following components; a hypervisor, an
infrastructure management system, configuration management, deployment automation
and monitoring.
21.
21
@VMUG_VANCOUVER
2.4 Physical Design
The physical design will be examined from first a datacenter row, then cabinet, then the
technology area. The logical design for the divisional pod will be mapped to a row.
23.
23
@VMUG_VANCOUVER
2.4.1 Physical rack layout of region pod
Above is the rack diagram for region3 site 1
The Cisco UCS infrastructure was chosen for the compute and network environment
because of the ease of management, deployment and scalability.
NetApp was chosen for the shared storage because of the resiliency and scalability
when using Clustered OnTap.
The server side caching will be done by PernixData FVP, making use of the SLC SSDs
in the blades.
24.
24
@VMUG_VANCOUVER
2.4.2 Cisco UCS Architecture
The Cisco Unified Computing System is a data center server platform composed of
computing hardware, virtualization support, switching fabric, and management software.
The Cisco 6200 Series switch (called a "Fabric Interconnect") provides network
connectivity for the chassis, blade servers and rack servers connected to it through 10
Gigabit converged network adapter.
The Cisco UCS Manager software is embedded in the 6200 series Fabric Interconnect
handles. The administrator accesses the interface via a web browser.
A key benefit is the concept of Stateless Computing, where each compute node has no
set configuration. MAC addresses, UUIDs, firmware and BIOS settings for example, are
all configured on the UCS manager in a Service Profile and applied to the servers.
25.
25
@VMUG_VANCOUVER
In the diagram above you are able to see how to scale chassis in a UCS domain.
There is a maximum of 20 chassis per UCS domain. To scale beyond that, UCS central
will be used to manage (n) domains.
26.
26
@VMUG_VANCOUVER
The above cabling diagram shows an example connectivity map with 7 chassis
connecting to UCS 6248 Fabric Interconnects. The FIs then have a virtual port channel
with the Nexus 5548 switches and then LAG connections with the fabric extenders.
The networking within the blade server is as below:
27.
27
@VMUG_VANCOUVER
2.4.3 NetApp Architecture
The NetApp OnTap Cluster-Mode OS a horizontal scale out architecture. In the diagram
above, you will see several cluster nodes. These nodes have the ability to span the
filesystem across multiple aggregates and HA-Pairs by use of an SVM (Storage Virtual
Machine). The SVM acts as a storage hypervisor and turns all the disks into resource
pools that can be expanded and contracted as required.
By doing this, the system resilience and scalability has been increased. There is a risk
that if not managed correctly that the storage system can start sprawling and
troubleshooting performance issues is more time consuming due to the added
complexity.
An example of the architecture is seen below.
28.
28
@VMUG_VANCOUVER
Detailed configuration guides for Cisco UCS, Cluster-Mode NetApp and Nexus switching
can be reviewed in the Cisco Validated Designs (UCS_CVDs).
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/UCS_CVDs/esxi51_ucsm2
_Clusterdeploy.html
2.4.4 PernixData Architecture
PernixData FVP virtualizes server-side caching that enables IT administrators to scale
storage performance independent of capacity. Each server in the FVP Flash Cluster will
make use of local SLC SSDs to cache read and write I/O of the storage system.
The VMs that require the extra IOPs will be placed on the FVP accelerated datastores.
29.
29
@VMUG_VANCOUVER
2.5 Virtualization Network Layer
2.5.1 High Level Network Design Network Segmentation and VLANs
Within the Cisco UCS blades there are 2 VICs ( virtual interface cards), an mLOM and a
Mezzanine card. One is embedded in the server, the other is an add on card. These
VICs then virtualize the physical NICs in the blade server so that any host OS running on
the baremetal will see it as configured. In this design, we have presented 8 NICs to the
host. These will be divided into the following VLANs and port groups.
VLAN 1011 – Management
VLAN 1020 – Storage Communication (data channel)
VLAN 1030 – vMotion
VLAN 2001-2999 – VM networks
Out of band (OOB) communication will be done on the Management network
30.
30
@VMUG_VANCOUVER
The VIC to VNIC mapping is as follows:
VNIC0 – mLOM – Fabric A
VNIC1 - mLOM – Fabric B
VNIC2 - mLOM – Fabric A
VNIC3 - mLOM – Fabric B
VNIC4 - Mezz – Fabric A
VNIC5 - Mezz – Fabric B
VNIC6- Mezz – Fabric A
VNIC7- Mezz – Fabric B
2.5.2 Virtual Switches & Virtual Distributed Switches
There will be 2 vSwitches; a standard vSwitch for host management and a distributed
vSwitch for all other communication. The uplinks will be as follows:
vSwitch0 is a VSS. Uplinks are:
VNIC0
VNIC5
There will be one management port group named VSS-1011-MGMT and one VMkernel, both on VLAN
1011
This is for interface redundancy. One is on the mLOM and the other is on the Mezzanine adapter.
vSwitch 1 is a VDS. Uplinks are
VNIC1
VNIC2
VNIC3
VNIC4
VNIC6
VNIC7
The VDS will have uplinks defined per port group.
The following port groups will be defined:
Name VLAN Purpose Uplinks
VDS-1020-Storage 1020 Storage Connectivity 1,4
VDS-1030-vMotion 1030 vMotion 2,6
VDS-2001-VM 2001 VM Network 3,7
VM Network VLANs will span from VLAN 2001 to 2999 as required.
There is a VMKernel on VLAN 1020 for connectivity to the datastores and another on VLAN 1030 for
vMotion.
31.
31
@VMUG_VANCOUVER
2.5.3 NIC Teaming
The uplinks will be in active / standby configuration
2.5.4 Network I/O Control
Network IO control will not be applied on the VDS as there is already segmentation with
the separate virtual interfaces in UCS. QoS will be applied at the UCS level by the Class
of Service. Management will be Bronze, VM Data is Best Effort, and NFS is Gold. This is
applied to the specific interfaces within UCS.
2.5.5 Physical Switches
The physical switches will be:
- Cisco UCS 6296 for the fabric interconnects
- Nexus 5548 for the upstream switches
- Nexus 2232 Fabric Extenders for any devices that require 1GB connectivity to the environment
- Nexus 5596 for the NetApp cluster Interconnects
2.5.6 DNS and Naming Conventions
Domain will be zombee.local
Hostnames will be constructed by region, site, role, numerical ID.
Example:
Region: Japan
Location: Tokyo University, Site1
Role: ESXi server
Numeric ID: 001
FQDN: JPN-TKY1-ESXi-001.zombee.local
32.
32
@VMUG_VANCOUVER
2.6 ESXi Host Design
2.6.1 ESXi Host Hardware Requirements
Each blade server will have:
2 sockets with intel E52600 series CPUs (8 core).
512GB RAM
2 x 600GB SLC SSD drives
Cisco VIC1280 Mezzanine Card
The first blade in every chassis will have dual SD cards to boot ESXi from. This for the
eventuality that a total power loss occurs and the vCenter server does not start. vCenter will
have DRS affinity rules to those hosts.
2.6.2 Virtual Data Center Design
Each division will have it’s own vCenter instance, named as per the naming conventions,
ie: JPN-TKY1-VC-001
There will be one datacenter defined by the division name.
2.6.3 vSphere Single Sign On
Single Sign-on will be used and authenticated to Active Directory
2.6.4 vCenter Server and Database Systems (include vCenter Update
Manager)
The vCenter Server Appliance (VCSA) will be used, as the total number of hosts is
within the maximums. Update Manager will be deployed on it’s own VM.
2.6.5 vCenter Server Database Design
The embedded database will be used for the vCenter server. A separate Windows
server 2008 R2 server with SQL 2008 standard will be used for the shared database for
other components, such as VUM.
2.6.6 vCenter AutoDeploy
vCenter AutoDeploy will be used to deploy all hosts in the compute cluster. All
management clusters will be booting from SD cards.
2.6.7 Clusters and Resource Pools
There will be 3 clusters spanned across the 2 UCS cabinets and 10 chassis. 8 hosts will
be in the 2 smaller clusters and 32 hosts will be in the larger cluster.
33.
33
@VMUG_VANCOUVER
a. Enhanced vMotion Compatibility
2.6.8 Fault Tolerance (FT)
FT will not be used.
2.7 DRS Clusters
HA and DRS will be enabled and set to aggressive.
vCenter will have affinity rules to the first server in the chassis for the cluster it is in.
Any clustered application servers or databases will have anti-host affinity or if required, anti-chassis
affinity rules.
HA admission control will be set to 25% tolerance.
2.7.1 Multiple vSphere HA and DRS Clusters
Each cluster will have the same roles, so the rules will stay the same. The only
exception is where vCenter is located, which is cluster-01
2.7.2 Resource Pools
Resource pools will not be used unless required.
2.8 Management Layer Logical Design
2.8.1 vCenter Server Logical Design
The vCenter server will be on the VCSA with 32GB of RAM allocated to support all the
hosts. Active directory will be installed on a VM named JPN-TKY1-DC-001. A shared
SQL server for VUM will be located on a VM named JPN-TKY1-SQL-001. vCenter
Update manager will be named JPN-TKY1-VUM-001.
2.8.2 Management and Monitoring
vCenter Operations Manager will be used to monitor the environment in detail.
Log insight will be used to provide real-time analysis and speedy root cause analysis.
2.9 Virtual Machine Design
2.9.1 Virtual Machine Design Considerations
Operating systems will be comprised of a system volume and one or more data volumes.
System volumes will not be larger than 100GB in size and will be thin provisioned by default.
Swap files for all VMs will be located on a swap datastore.
No RDMs will be used.
34.
34
@VMUG_VANCOUVER
Virtual Hardware Version 10 will be used by default.
All operating systems that support VMXNET3 will use it as the network adapter of choice.
2.9.2 Guest Operating System Considerations
All VMs will be provisioned from templates and configuration policies applied afterwards.
No configuration changes will be applied manually.
2.9.3 General Management Design Guidelines
All management of the environment will be done by authorized personnel only, from a
dedicated VM named JPN-TKY1-MGMT-001. All actions will be audited and reviewed.
2.9.4 Host Management Considerations
The UCS servers have a built in IP KVM in their management framework. The UCS
plugin will be added to vCenter so that baremetal host management can occur from
there.
2.9.5 vCenter Server Users and Groups
Active Directory will be used as the user management system. Roles based on access
levels and job function will be applied to the appropriate groups.
2.9.6 Management Cluster
Cluster 1 will be the management cluster. All VMs for management purposes, whether
virtual infrastructure, storage or otherwise, will run on cluster 1.
2.9.7 Management Server Redundancy
vCenter server is protected by HA across the cluster. In a worst case scenario, the
blades with SD cards will still be able to boot and start the vCenter server if the storage
is accessible.
2.9.8 Templates
All virtual machines will be spawned from a master image in Openstack. Using VAAI,
rapid cloning of virtual machines can be done.
2.9.9 Updating Hosts, Virtual Machines, and Virtual Appliances
vCenter update manager will be used to update hosts, VMs and appliances.
2.9.10 Time Synchronization
A GPS synced time server will be used for accurate time measurement. All hosts will
connect to that NTP server. Active Directory VMs will be set to obtain the time of their
hosts, then provide it to network computers.
35.
35
@VMUG_VANCOUVER
2.9.11 Snapshot Management
VM snapshots will use a 10% volume reserve and occur 30min intervals. Retention will
be hourly, daily, weekly and monthly. 10 snapshots for each type will be used.
2.10.1 Performance Monitoring
Performance monitoring will be done by vCOPs for the infrastructure and vFabric
Hyperic for application analysis.
2.10.2 Alarms
All default vCenter alarms are enabled and the recipient is set to an internal email user.
2.10.3 Logging Design Considerations
Log insight will be deployed as well as the dump collector. Logs will be configured to go
to a shared datastore.
2.11 Infrastructure Backup and Restore
2.11.1 Compute (ESXi) Host Backup and Restore
Host configuration will be maintain in a single host profile and backed up with a PowerCli
script.
2.11.2 vSphere Replication
vSphere replication will not be used, at this time.
2.11.3 vSphere Distributed Switch Backup and Restore
The VDS config will be backed up from the vSphere client
2.11.4 vCenter Databases
vCenter uses the internal VCSA database. The other components that require external
databases are using JPN-TKY1-SQL-001
2.12. Application provisioning automation
All VMs will be provisioned from templates then puppet will apply the appropriate
configuration. For custom-built applications, the vFabric Suite will be used.
36.
36
@VMUG_VANCOUVER
2.12.1 vFabric Overview
vFabric is a development and automation framework for creating multi-tier application
and managing code release cycles. With the combination of vFabric Hyperic, (for testing
application performance) and vFabric Application Director (for scaling and deployment
automation), complex applications can be created, tested and deployed using a
Continuous Integration and Continuous Deployment model.