The University of Chicago implemented a centralized IT monitoring approach using CA UIM to monitor all of their IT systems, applications, networks, phones, and infrastructure from a single pane of glass. They took a phased approach, first implementing "ping only" monitoring to get visibility of all devices, then moving to hardware-based SNMP monitoring to become more proactive. This reduced outages by 300% and led to improved hardware uptime. The final phase will focus on service-level monitoring aligned with business services. Taking a broad approach helped break down organizational silos and improved collaboration between teams.
Assuring the Delivery of Business Transactions and ServicesCA Technologies
The Operations Center is where IT ties everything together, every link in the service delivery chain-applications, systems, networks, mobility, storage, data center—and where IT strives to ensure business services are performing as intended to support all business processes and consistently deliver successful customer interactions. In this opening keynote address, John Smith, GM of the Enterprise Management solution group responsible for the CA application performance and infrastructure businesses, welcomes you to the Opscenter, provides insight into innovations his team will showcase and gives you guidance on must-do activities at CA World 2014.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Girish Dambal has over 20 years of experience in information security, compliance, and IT project management. He currently works as a Process & Compliance Manager and CISO, where he manages security compliance for over 100 customers. Previously he was a Tower Manager for UNIX & Messaging and also served as CISO. He has expertise in areas such as risk mitigation, strategic planning, audits and compliance, and project management.
20180529 scaf and cosmic presentaiton s rajagopalCharles Symons
This document discusses estimating the costs of cyber projects and identifying key cost drivers for cyber hygiene. It defines cyber security and information security. Software maintenance and obsolescence are important factors for cyber hygiene. Key cost drivers for software maintenance include software supply chains, support costs, and testing. Software obsolescence can occur due to changes in hardware, software, or environments. Managing proactive software maintenance and obsolescence can help mitigate cyber threats and breaches in a cost effective manner. Identifying relevant cost drivers aids in budget planning for cyber projects.
DevSecOps: Security and Compliance at the Speed of Continuous DeliveryDag Rowe
Tehama delivers privileged technical services over the internet with transparency, security and auditability. They ensure trust while enabling quick onboarding and connectivity. Tehama decided early on that obtaining SOC2 compliance was mandatory to build trust with clients by demonstrating robust security practices via a third party audit. DevSecOps uses DevOps practices to deliver and run systems in a secure and reliable way by bringing security and compliance into the focus on operations. Security and compliance are addressed as release, test and monitoring problems by leveraging security expertise in building secure systems.
Marian K. Fields is an experienced IT leader with over 30 years of experience managing multi-million dollar projects on time and under budget. She has a proven track record of leading engineering teams to deliver technical solutions and business strategies. Her areas of expertise include enterprise communications, ITIL processes, operations management, and project planning.
Marian K. Fields is an experienced leader with over 25 years in the telecommunications industry managing multi-million dollar projects. She has a proven track record of directing engineering teams to deliver solutions on time and under budget. Fields has expertise in areas such as network engineering, IT operations, project management, and quality assurance.
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...TheAnfieldGroup
The presentation discussed leveraging technology to enhance security, reliability, and compliance with NERC CIP Version 5 standards. It covered an overview of the Version 5 requirements, challenges utilities face in compliance, and steps some companies have taken regarding personnel and resource implications. A case study of Southern Company's approach was presented, including how it addresses disparate cyber assets across its system. Benefits of taking an integrated approach that leverages technology for asset management, a common operating environment, data aggregation, secure access, enhanced reliability, risk management, validation and compliance were discussed.
Assuring the Delivery of Business Transactions and ServicesCA Technologies
The Operations Center is where IT ties everything together, every link in the service delivery chain-applications, systems, networks, mobility, storage, data center—and where IT strives to ensure business services are performing as intended to support all business processes and consistently deliver successful customer interactions. In this opening keynote address, John Smith, GM of the Enterprise Management solution group responsible for the CA application performance and infrastructure businesses, welcomes you to the Opscenter, provides insight into innovations his team will showcase and gives you guidance on must-do activities at CA World 2014.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Girish Dambal has over 20 years of experience in information security, compliance, and IT project management. He currently works as a Process & Compliance Manager and CISO, where he manages security compliance for over 100 customers. Previously he was a Tower Manager for UNIX & Messaging and also served as CISO. He has expertise in areas such as risk mitigation, strategic planning, audits and compliance, and project management.
20180529 scaf and cosmic presentaiton s rajagopalCharles Symons
This document discusses estimating the costs of cyber projects and identifying key cost drivers for cyber hygiene. It defines cyber security and information security. Software maintenance and obsolescence are important factors for cyber hygiene. Key cost drivers for software maintenance include software supply chains, support costs, and testing. Software obsolescence can occur due to changes in hardware, software, or environments. Managing proactive software maintenance and obsolescence can help mitigate cyber threats and breaches in a cost effective manner. Identifying relevant cost drivers aids in budget planning for cyber projects.
DevSecOps: Security and Compliance at the Speed of Continuous DeliveryDag Rowe
Tehama delivers privileged technical services over the internet with transparency, security and auditability. They ensure trust while enabling quick onboarding and connectivity. Tehama decided early on that obtaining SOC2 compliance was mandatory to build trust with clients by demonstrating robust security practices via a third party audit. DevSecOps uses DevOps practices to deliver and run systems in a secure and reliable way by bringing security and compliance into the focus on operations. Security and compliance are addressed as release, test and monitoring problems by leveraging security expertise in building secure systems.
Marian K. Fields is an experienced IT leader with over 30 years of experience managing multi-million dollar projects on time and under budget. She has a proven track record of leading engineering teams to deliver technical solutions and business strategies. Her areas of expertise include enterprise communications, ITIL processes, operations management, and project planning.
Marian K. Fields is an experienced leader with over 25 years in the telecommunications industry managing multi-million dollar projects. She has a proven track record of directing engineering teams to deliver solutions on time and under budget. Fields has expertise in areas such as network engineering, IT operations, project management, and quality assurance.
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...TheAnfieldGroup
The presentation discussed leveraging technology to enhance security, reliability, and compliance with NERC CIP Version 5 standards. It covered an overview of the Version 5 requirements, challenges utilities face in compliance, and steps some companies have taken regarding personnel and resource implications. A case study of Southern Company's approach was presented, including how it addresses disparate cyber assets across its system. Benefits of taking an integrated approach that leverages technology for asset management, a common operating environment, data aggregation, secure access, enhanced reliability, risk management, validation and compliance were discussed.
Software engineering, Secure software engineering trainingBryan Len
Software security is the approach of engineering software to let it continues to function perfectly under infectious attack.
This is essential to stop:
Damage & loss of data
Premature leaks of data
Preventing resources downtime
Why do you need secure software engineering ?
Software fault can always lead to security vulnerabilities, which are costing businesses millions of dollars every year.
That is why, software must be trusted, reliable and secure; able to generate trustable and reproducible scientific results. The main objective of the secure software engineer is to integrate security all through the software development process.
Business perspectives for software engineering :
From a business view, well-structured security software may require an immense initial outlay of capitol,
But in the long run it saves organization money by preventing incredibly costly breeches as well as costly patches and security-related updates every time a new malware or vulnerability is discovered.
Secure Software Engineering Training :
Tonex presents Introduction To Secure Software Engineering Training,
This is a 2-day course that benefits all the participants to understand a wide range of software engineering agendas such as software engineering steps and metrics, real time, distribution, structural and object focusing software.
Other Relevant courses include:
—Software Security Training:
A 2-day course that presents a variety of topics in software security such as secure programming techniques, web security, risk management techniques.
—Software Testing Training:
A 2-day course that focuses on powerful tools and techniques to reduce software defects, improve the quality.
All the courses are recommended for :
Software developers,
Software engineers,
System engineers,
Test engineers,
Project managers,
Testing, verification project managers
Validation and configuration project managers.
Request more information. Visit tonex.com for software engineering courses and workshop detail.
Software engineering, Secure software engineering training
https://www.tonex.com/secure-software-engineering-training/
This document contains the resume of Susan L. Walser, an information security analyst with over 25 years of experience in information technology system administration. She has expertise in mainframe security tools like RACF, ACF2, and zSecure Admin. Her experience includes firewall deployment, VPN configuration, auditing and compliance activities, and writing security policies and procedures. She aims to ensure the confidentiality, integrity and availability of company assets through proper security practices.
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
Regulated entities should consider the RSAW templates when preparing evidence of compliance with the NERC CIP Standards. There are a number of implicit requirements in CIP v5 which an entity needs to fulfill to be compliant, which are not specifically identified in the actual requirements.
In this webinar, our experts will discuss such implicit requirements. Key learning's from this session would be:
RSAW format
Implicit requirements of CIP RSAWs
Leveraging technology for RSAW management
Cyber Security in Energy & Utilities IndustryProlifics
In September 2011, Prolifics & IBM hosted a speaking session at a Cyber Security Summit in California. The presentation focused on the importance of Identity and Access Management in the Energy & Utilities industry as well as today's critical regulatory requirements.
The document discusses the principles and practices of DevSecOps. It begins with an agenda that covers DevSecOps prerequisites, foundations, roles and responsibilities, and practical tips. It discusses concepts like shifting security left, continuous integration/delivery pipelines, and the importance of collaboration across roles. It provides overviews of risk management, static and dynamic testing, feature toggles, and recommends DevSecOps training and tools from Cprime. The presentation aims to help organizations adopt DevSecOps practices to improve security and deployment processes.
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
Presenter: Joseph Loomis, Southwest Research Institute (SwRI)
Asset Owners face challenges as they strive towards implementing the NERC-CIP V5 requirements. Meeting the requirements often require documentation and technical knowledge of how an asset operates that can only be provided by a Vendor. Vendors, likewise, may be unclear about how the NERC-CIP requirements affect them, and are unsure about how to meet the technical requirements. In this presentation we detail the lessons learned from a recent project where SwRI worked with a Vendor to determine how the requirements apply to them and what the Vendor needs to have to help support an Asset Owner in an audit.
Christopher Rose has over 20 years of experience in systems engineering, technical leadership, and project management. He is seeking a technical director role in a growing company, especially in the satellite or digital communications industry. His experience includes managing engineering teams, developing new products, and leading recovery efforts for troubled projects with tight schedules. He has a master's degree in electrical engineering and certificates in project management.
This document provides an overview of Terry Rodgers' presentation on managing, monitoring, and controlling building systems. The presentation covers various types of monitoring and control systems like DDC, DCS, PLC, and SCADA. It discusses challenges in deploying these systems and differentiating between controls and monitoring. Key aspects of alarm management, filtering, escalation, maintenance, standard operating procedures, and commissioning of monitoring and control systems are summarized. The document encourages participation in ASHRAE and completing an evaluation form.
This document discusses best practices for migrating distributed control systems (DCS). It covers why migrations are necessary due to issues like aging systems, loss of support, and high maintenance costs. Selection criteria for new systems include taking advantage of new technologies, long-term supplier support, accommodating advanced applications, and minimizing costs, risks, and downtime. Common migration approaches like bulldozing, cabling solutions, transition solutions, and I/O replacement are presented along with their benefits and challenges. Critical implementation guidelines emphasize planning with clear objectives and timeframes, using standards, involving operations teams early, and preparing with a project timeframe shorter than the outage period.
The document discusses common pitfalls in implementing an Information Security Management System (ISMS) based on ISO/IEC 27001 from an auditor's perspective. It outlines the evolution of the ISO/IEC 27001 standard and describes common implementation issues organizations face in several domains covered by the standard, including scope definition, security policies, risk assessment, statement of applicability, monitoring, auditing, management review, improvement, and asset management. The implementation issues discussed indicate weaknesses in properly establishing, implementing, operating, monitoring, reviewing, maintaining and improving the ISMS based on the requirements of ISO/IEC 27001.
This lecture provides an overview of software engineering concepts including definitions of software, what software engineering is, and the major shifts in software development approaches over time. It discusses the differences between student projects and industrial strength software in terms of quality, cost, and development time. The lecture also covers problems commonly encountered in software projects such as not meeting user needs, going over budget, missing deadlines, and being unreliable or unusable. The goal of software engineering is to provide techniques to help resolve these problems and achieve high quality software delivery on time and within budget.
The Architects Guide to Sun Control ProductsRuskin Company
Not only are sunshades a great way to put your mark on a building as an architect, but they are also an ideal way
to accumulate LEED® points. Sunshades reduce solar heat gained through glazing and they also provide aesthetic appeal to the building exterior. Learn more here: http://www.ruskin.com/catalog/category/481~Sun-Control-Sunshades
Alfa Engineering Products is a Pakistani company established in 1996 that specializes in aluminum products for facades, doors, windows, and more. They fabricate products like curtain walls, louvers, retractable enclosures, and fire doors using aluminum. Alfa works with aluminum extruders and glass processors to customize products for various commercial and residential applications. They have experience in facade design, windows, doors, louvers, and retractable structures. Their aim is to provide high quality, durable aluminum solutions within clients' budgets.
The document provides tips for designing effective presentation visuals, including making each visual focus on one main point, keeping visuals simple and uncluttered, limiting words and using large fonts, diligently editing for errors, writing attention-grabbing titles, highlighting key words and graphics, using colors sparingly, and avoiding overdesign.
Traditional Indian construction methods were highly energy efficient. Buildings were oriented and sited carefully, used thick insulating walls, incorporated verandahs, courtyards, and landscaping for natural cooling and ventilation. Roofs had slopes and waterproofing for drainage, and used locally available materials. Elements like domes, bungalow designs, and traditional attire required minimal energy for cooling or heating.
This document provides information about insulating glass units (IGUs) with integrated cord-free louvers. It discusses how these IGUs can improve energy efficiency and control heat gain by managing light transmission and reducing solar heat gain. Example projects are described that utilize these IGUs for daylighting, sound control, vision and privacy control, and infection control. Controls, profiles and finishes for the louvers are also outlined.
The document compares solar protection simulations for single and double pane windows with awning sunshades. It finds that using a triple pane window and awning sunshade reduces maximum cooling and heating loads compared to other configurations. Specifically, it decreases cooling load by 9W and heating load by 36W. The use of sunshades in summer reduces energy usage by 45-50% for both windows, but in winter their use should be avoided as it decreases energy usage by around 30%.
Designing with Data: Creating Visualizations to Tell Your StoryDominic Prestifilippo
The document provides an overview of a presentation on designing with data. It outlines the agenda which includes introductions to general theories, quantitative and qualitative data, details of visualization design, and a critique section. The document then delves into each section, providing examples and explanations of concepts like storytelling with data, different graph types, using statistics, qualitative methods, details of design, and suggestions for further references.
Software engineering, Secure software engineering trainingBryan Len
Software security is the approach of engineering software to let it continues to function perfectly under infectious attack.
This is essential to stop:
Damage & loss of data
Premature leaks of data
Preventing resources downtime
Why do you need secure software engineering ?
Software fault can always lead to security vulnerabilities, which are costing businesses millions of dollars every year.
That is why, software must be trusted, reliable and secure; able to generate trustable and reproducible scientific results. The main objective of the secure software engineer is to integrate security all through the software development process.
Business perspectives for software engineering :
From a business view, well-structured security software may require an immense initial outlay of capitol,
But in the long run it saves organization money by preventing incredibly costly breeches as well as costly patches and security-related updates every time a new malware or vulnerability is discovered.
Secure Software Engineering Training :
Tonex presents Introduction To Secure Software Engineering Training,
This is a 2-day course that benefits all the participants to understand a wide range of software engineering agendas such as software engineering steps and metrics, real time, distribution, structural and object focusing software.
Other Relevant courses include:
—Software Security Training:
A 2-day course that presents a variety of topics in software security such as secure programming techniques, web security, risk management techniques.
—Software Testing Training:
A 2-day course that focuses on powerful tools and techniques to reduce software defects, improve the quality.
All the courses are recommended for :
Software developers,
Software engineers,
System engineers,
Test engineers,
Project managers,
Testing, verification project managers
Validation and configuration project managers.
Request more information. Visit tonex.com for software engineering courses and workshop detail.
Software engineering, Secure software engineering training
https://www.tonex.com/secure-software-engineering-training/
This document contains the resume of Susan L. Walser, an information security analyst with over 25 years of experience in information technology system administration. She has expertise in mainframe security tools like RACF, ACF2, and zSecure Admin. Her experience includes firewall deployment, VPN configuration, auditing and compliance activities, and writing security policies and procedures. She aims to ensure the confidentiality, integrity and availability of company assets through proper security practices.
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
Regulated entities should consider the RSAW templates when preparing evidence of compliance with the NERC CIP Standards. There are a number of implicit requirements in CIP v5 which an entity needs to fulfill to be compliant, which are not specifically identified in the actual requirements.
In this webinar, our experts will discuss such implicit requirements. Key learning's from this session would be:
RSAW format
Implicit requirements of CIP RSAWs
Leveraging technology for RSAW management
Cyber Security in Energy & Utilities IndustryProlifics
In September 2011, Prolifics & IBM hosted a speaking session at a Cyber Security Summit in California. The presentation focused on the importance of Identity and Access Management in the Energy & Utilities industry as well as today's critical regulatory requirements.
The document discusses the principles and practices of DevSecOps. It begins with an agenda that covers DevSecOps prerequisites, foundations, roles and responsibilities, and practical tips. It discusses concepts like shifting security left, continuous integration/delivery pipelines, and the importance of collaboration across roles. It provides overviews of risk management, static and dynamic testing, feature toggles, and recommends DevSecOps training and tools from Cprime. The presentation aims to help organizations adopt DevSecOps practices to improve security and deployment processes.
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
Presenter: Joseph Loomis, Southwest Research Institute (SwRI)
Asset Owners face challenges as they strive towards implementing the NERC-CIP V5 requirements. Meeting the requirements often require documentation and technical knowledge of how an asset operates that can only be provided by a Vendor. Vendors, likewise, may be unclear about how the NERC-CIP requirements affect them, and are unsure about how to meet the technical requirements. In this presentation we detail the lessons learned from a recent project where SwRI worked with a Vendor to determine how the requirements apply to them and what the Vendor needs to have to help support an Asset Owner in an audit.
Christopher Rose has over 20 years of experience in systems engineering, technical leadership, and project management. He is seeking a technical director role in a growing company, especially in the satellite or digital communications industry. His experience includes managing engineering teams, developing new products, and leading recovery efforts for troubled projects with tight schedules. He has a master's degree in electrical engineering and certificates in project management.
This document provides an overview of Terry Rodgers' presentation on managing, monitoring, and controlling building systems. The presentation covers various types of monitoring and control systems like DDC, DCS, PLC, and SCADA. It discusses challenges in deploying these systems and differentiating between controls and monitoring. Key aspects of alarm management, filtering, escalation, maintenance, standard operating procedures, and commissioning of monitoring and control systems are summarized. The document encourages participation in ASHRAE and completing an evaluation form.
This document discusses best practices for migrating distributed control systems (DCS). It covers why migrations are necessary due to issues like aging systems, loss of support, and high maintenance costs. Selection criteria for new systems include taking advantage of new technologies, long-term supplier support, accommodating advanced applications, and minimizing costs, risks, and downtime. Common migration approaches like bulldozing, cabling solutions, transition solutions, and I/O replacement are presented along with their benefits and challenges. Critical implementation guidelines emphasize planning with clear objectives and timeframes, using standards, involving operations teams early, and preparing with a project timeframe shorter than the outage period.
The document discusses common pitfalls in implementing an Information Security Management System (ISMS) based on ISO/IEC 27001 from an auditor's perspective. It outlines the evolution of the ISO/IEC 27001 standard and describes common implementation issues organizations face in several domains covered by the standard, including scope definition, security policies, risk assessment, statement of applicability, monitoring, auditing, management review, improvement, and asset management. The implementation issues discussed indicate weaknesses in properly establishing, implementing, operating, monitoring, reviewing, maintaining and improving the ISMS based on the requirements of ISO/IEC 27001.
This lecture provides an overview of software engineering concepts including definitions of software, what software engineering is, and the major shifts in software development approaches over time. It discusses the differences between student projects and industrial strength software in terms of quality, cost, and development time. The lecture also covers problems commonly encountered in software projects such as not meeting user needs, going over budget, missing deadlines, and being unreliable or unusable. The goal of software engineering is to provide techniques to help resolve these problems and achieve high quality software delivery on time and within budget.
The Architects Guide to Sun Control ProductsRuskin Company
Not only are sunshades a great way to put your mark on a building as an architect, but they are also an ideal way
to accumulate LEED® points. Sunshades reduce solar heat gained through glazing and they also provide aesthetic appeal to the building exterior. Learn more here: http://www.ruskin.com/catalog/category/481~Sun-Control-Sunshades
Alfa Engineering Products is a Pakistani company established in 1996 that specializes in aluminum products for facades, doors, windows, and more. They fabricate products like curtain walls, louvers, retractable enclosures, and fire doors using aluminum. Alfa works with aluminum extruders and glass processors to customize products for various commercial and residential applications. They have experience in facade design, windows, doors, louvers, and retractable structures. Their aim is to provide high quality, durable aluminum solutions within clients' budgets.
The document provides tips for designing effective presentation visuals, including making each visual focus on one main point, keeping visuals simple and uncluttered, limiting words and using large fonts, diligently editing for errors, writing attention-grabbing titles, highlighting key words and graphics, using colors sparingly, and avoiding overdesign.
Traditional Indian construction methods were highly energy efficient. Buildings were oriented and sited carefully, used thick insulating walls, incorporated verandahs, courtyards, and landscaping for natural cooling and ventilation. Roofs had slopes and waterproofing for drainage, and used locally available materials. Elements like domes, bungalow designs, and traditional attire required minimal energy for cooling or heating.
This document provides information about insulating glass units (IGUs) with integrated cord-free louvers. It discusses how these IGUs can improve energy efficiency and control heat gain by managing light transmission and reducing solar heat gain. Example projects are described that utilize these IGUs for daylighting, sound control, vision and privacy control, and infection control. Controls, profiles and finishes for the louvers are also outlined.
The document compares solar protection simulations for single and double pane windows with awning sunshades. It finds that using a triple pane window and awning sunshade reduces maximum cooling and heating loads compared to other configurations. Specifically, it decreases cooling load by 9W and heating load by 36W. The use of sunshades in summer reduces energy usage by 45-50% for both windows, but in winter their use should be avoided as it decreases energy usage by around 30%.
Designing with Data: Creating Visualizations to Tell Your StoryDominic Prestifilippo
The document provides an overview of a presentation on designing with data. It outlines the agenda which includes introductions to general theories, quantitative and qualitative data, details of visualization design, and a critique section. The document then delves into each section, providing examples and explanations of concepts like storytelling with data, different graph types, using statistics, qualitative methods, details of design, and suggestions for further references.
This document discusses sunshades and their ability to reduce energy costs and improve building performance. It notes that commercial buildings consume a large portion of energy and that sun controls can help lower that usage. The document lists various sunshade products that are effective at sun control and mentions their ability to increase occupant comfort while decreasing costs. It also references the LEED program and how sunshades can help earn credits related to energy usage.
Custom Components Company Sales Presentationdjanosz
Custom Components Company is a manufacturer and supplier of architectural products including railings, office fronts, doors, and sun control devices. They have offices in Dallas, San Diego, and Tampa and produce high-quality standard and custom aluminum, glass, and stainless steel solutions. Custom Components prides itself on creative custom design and strong engineering to translate designs into finished products within budgets.
THE DESIGN OF LOUVERS AS SHADING DEVICE & FAÇADE TREATMENT TO OPTIMIZE DAYLI...Zhao Wei Kim
In the tropical climate, it is challenging when dealing with glaring and hot sunlight. Louvers had become one of the strategies to overcome the heat and glare.
The document describes the Punjab Mandi Bhawan in Mohali, designed by architect Sarbjit Singh Bahga. The building serves as the new headquarters for the Punjab State Agricultural Marketing Board. Bahga employed several energy-efficient design strategies, including orienting the building along a north-south axis to maximize natural light, minimizing solar heat gain through vertical louvers and overhangs, and using high-performance glass and building materials. The six-floor building emphasizes natural lighting and includes skylights over a central atrium. Bahga's design achieved the client's goals of a modern, efficient office building that demonstrates innovative energy-efficient architecture.
Case Studies that related to Solar Oriented Design Principles, environmental responsive, in tropical climate. It was done as a group assignment, thus credits go to my group members as well.
The document provides tips for designing effective PowerPoint presentations. It recommends making slides big, simple, clear, progressive and consistent. Specifically, it suggests using large font sizes, simple language and visuals, clear contrasts and focal points, focusing on key points progressively, and maintaining consistency in design elements. The document also provides tips for presenting, such as speaking loudly and making eye contact with the audience.
Case Study: University of Chicago Achieves High Availability through a Centr...CA Technologies
Learn how the IT operations team at University of Chicago built a centralized and service centric approach to IT infrastructure monitoring. The University of Chicago is using CA Unified Infrastructure Management (CA UIM) to implement a central, integrated approach for monitoring IT systems, applications, networks, VoIP phones, data center infrastructure and business services. Be it PBX phones or data center water chillers, they are monitoring it all centrally. As breaking down organizational silos is critical to success in this approach, learn insights and tips on how to overcome this barrier. In additional, we will talk about the experience of moving to CA UIM from CA eHealth.
For more information, please visit http://cainc.to/Nv2VOe
GTRI Splunk Case Studies - Splunk Tech DayZivaro Inc
This document contains summaries of multiple case studies involving the use of Splunk software for security and compliance purposes. The first case study involves a large multi-national company that implemented Splunk across 140 global data centers to address accountability, auditing, security and compliance concerns. The second case study outlines how a private aerospace firm used Splunk to create a centralized security incident and event management solution across multiple US data centers. The third case study describes how a US federal agency implemented Splunk and hired staff to fully enable a new 24/7 Security Operations Center. Additional brief case studies describe how Denver Water and the University of Texas at Austin also utilize Splunk.
Chan Siu Keung - CV IBM Mainframe Production Control & Senior Lead Operation ...Ricky Chan
This document contains the resume of Chan Siu Keung. It summarizes his experience working in information technology roles for over 20 years, primarily focused on mainframe operations. It details his expertise in areas like batch scheduling, monitoring, and problem resolution. His experience includes roles at IBM, UBS, and other financial institutions, where he supported global projects and led teams responsible for ensuring smooth daily operations.
This document provides a summary of Santhi Vinnakota's career and qualifications. She has over 15 years of experience in operations management and technical roles in the telecommunications industry. Her technical skills include Cisco UCCE, IVR, VXML, and contact center applications. She is currently an Operations Manager at Symantec, where she manages global voice applications and ensures zero SLA breaches.
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...Yokogawa1
Overall shift team effectiveness is critical, but especially shift handover activities. Shift teams are at the point of manufacture and hold the keys to plant and equipment safety, reliability, production and product quality, as well as operational discipline. Shift handovers take just 5% of operational time, but account for around 40% of plant incidents. So if you want your digital transformation (DX) initiatives to succeed, you need to think like an operator–to empathize and gain credibility with those on the shop floor–and to translate the DX agenda into their language. Only through this can a true changing of ways occur. This session will showcase a proven shift team effectiveness model comprising four key areas and sub-components–organizational capability, work environment, information and technology, and operating practices–and how they all need to work in tandem with each other. A case study will demonstrate how these areas should be leveraged to ensure safety, reliability and production information effortlessly flow in, and out, of the shift team to the various support departments.
Cisco has developed a comprehensive approach, the Mass Scale Networking (MSN) Transformation Journey, that covers both aspects. On the technology front, technologies such as Segment Routing, EVPN, orchestration, automation, HW/SW disaggregation are covered. On the operating model side, the use of advanced APIs, model driven operations, Infrastructure as Code (IaC), and others are also covered. The primary objective of this session being to create a methodical and structured approach to drive an SP’s MSN Journey.
Somasekhara has over 5 years of experience in IT monitoring and administration. He has worked with tools like SolarWinds Orion, CA Nimsoft, NetQoS, Splunk, and ServiceNow. His responsibilities have included monitoring networks and applications, configuring monitoring tools, creating alerts and reports, and troubleshooting issues. He currently works as a senior infrastructure developer at Cognizant, where he monitors tools and infrastructure, generates reports, and follows ITIL processes.
MineExcellence Drilling a cloud and mobile-based Platform to store, manage, document and retrieve drill related information.
ONE SYSTEM TO RUN YOUR ENTIRE DRILLING BUSINESS
• Daily Electronic Plod Reports / Daily Activity• Pre-Start Checklist• Drill Logs
• Safety Checklists
Additional Features
Basic Payroll
Invoicing
Asset Management
Costing
Price/ Insurances
Maintenance
Bills / Expenses
Summary Costs
This document provides a summary of qualifications for Toy O. Slaughter Jr., including over 20 years of progressive experience in IT and telecommunications management. He has extensive experience in areas such as workforce planning, client relations, business operations, and project management. Slaughter also has technical skills including networking, security, cloud applications and telecommunications systems. His professional experience includes management roles at several large companies providing services such as network support, operations management, and technical project management.
On the Application of AI for Failure Management: Problems, Solutions and Algo...Jorge Cardoso
Artificial Intelligence for IT Operations (AIOps) is a class of software which targets the automation of operational tasks through machine learning technologies. ML algorithms are typically used to support tasks such as anomaly detection, root-causes analysis, failure prevention, failure prediction, and system remediation. AIOps is gaining an increasing interest from the industry due to the exponential growth of IT operations and the complexity of new technology. Modern applications are assembled from hundreds of dependent microservices distributed across many cloud platforms, leading to extremely complex software systems. Studies show that cloud environments are now too complex to be managed solely by humans. This talk discusses various AIOps problems we have addressed over the years and gives a sketch of the solutions and algorithms we have implemented. Interesting problems include hypervisor anomaly detection, root-cause analysis of software service failures using application logs, multi-modal anomaly detection, root-cause analysis using distributed traces, and verification of virtual private cloud networks.
This document discusses Fluke Connect Condition Based Maintenance, which pairs Fluke hardware with predictive software and monitoring tools. It provides 5 key benefits: 1) It allows users to start implementing CBM solutions easily without IT hurdles or specialized skills; 2) Electronic data collection improves ROI analysis; 3) The scalable system can grow over time; 4) It optimizes labor and equipment lifespan; 5) The solution works across different equipment and facility types.
The differing ways to monitor and instrumentJonah Kowall
FullStack London July 15th, 2016
Monitoring is complicated, and in most organizations consists of far too many tools owned by many teams. These tools consist of monitoring tools each looking at a component myopically. These tools metrics and logs from devices and software emitting them. Increasingly modern companies are creating their own instrumentation, but there is a large base of generic instrumentation of software. Fixing monitoring issues requires people, process, and technology. In this talk we will cover many common issues seen in the real world. For example decisions on what should be monitored or collected from a technology and a business perspective. This requires process and coordination.
We will investigate what instrumentation is most scalable and effective across languages this includes the commonly used APIs and possibilities to capture data from common languages like Java, .NET and PHP, but we’ll also go into methods which work with Python, Node.js, and golang. We will cover browser and mobile instrumentation techniques. How these are done? which APIs are being used? What open source tools and frameworks can be leveraged? Most importantly how to coordinate and communicate requirements across your organization.
Attendees of this session will walk away with a clear understanding of:
What is instrumentation, and what do I instrument, collect, and store?
The understanding of overhead and how this can be accomplished on common software stacks?
How to work with application owners to collect business data.
How correlation works in custom open source or packaged monitoring tools.
G.R.NARENDRA has over 7 years of experience in network management, IT project management, and service delivery. He currently works as an Associate Manager at HCL Technologies, where he manages a team that handles network incident calls. Prior to this, he held several roles in network engineering at companies like Hewlett Packard and Aircel Business Solutions, where he was responsible for tasks like troubleshooting connectivity issues, managing network changes, and monitoring networks. He has technical expertise in areas like routing, switching, firewalls, and network protocols.
The document summarizes a webinar about how Infuse and Kumoco collaborated to build a quality engineering framework. They used business process modeling to generate test designs that increased test coverage by 50% and speed by 80%. This allowed generating 30-50 automated tests per day, a 15x increase in productivity. The approach democratized testing by enabling business users to utilize the automation. A demo showed generating tests from process models and integrating them into test management and automation tools. Benefits included increased coverage, speed, and productivity as well as democratized testing.
This document discusses the benefits of integrating security systems on a university campus. It outlines the challenges of maintaining independent, aging security systems across multiple locations. The university integrated its access control, video surveillance, police communications, and other systems. This allowed operators to focus on exceptions and support all locations virtually from a new emergency communications center. The implementation process and improvements are described, including increased effectiveness and efficiency. Key considerations for choosing technology and an integrator are provided. The importance of ongoing analysis, testing, and improvements is stressed.
NERC CIP - Top Testing & Compliance Challenges, How to Address ThemInflectra
The North American Electric Reliability Corporation's (NERC) Critical Infrastructure Protection plan is a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this webinar, we will discuss the key challenges in testing and compliance with NERC-CIP and highlight best practices to comprehensively address these challenges. We will dedicate a portion of our conversation to discussing the tools and technology that can help increase the effectiveness of your NERC-CIP compliance efforts.
Kaseya: Managing Remote IT Systems from Your Office: 5 Tips for Education IT Directors
Jared Henry, IT Director
Wills Point Independent School District
Gary Frenkel, IT Support Specialist
The Wharton School - Graduate Division
The document discusses performance testing and optimization for web and mobile applications. It emphasizes the importance of integrating performance testing into the development process through continuous performance integration. This includes performing load tests with each release to identify issues, monitoring real user behavior and performance in production, and using performance data to iteratively improve applications. The document also outlines best practices like keeping testing environments similar to production, understanding user scenarios, and investing in performance monitoring and research.
Similar to DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422 (20)
1. Case Study: University of Chicago Achieves High
Availability through a Centralized and Service
Centric Approach to IT Monitoring
Erik Giles
DevOps: Agile Ops
The University of Chicago
Command Center Manager
DO5T17S
@ErikGiles
Abe Shaker
The University of Chicago
IT Monitoring Engineer
5. Background University Of Chicago
– Founded by Rockefeller in 1890
– ~6k Undergrads, ~10k Graduate Students, ~8K Staff and Researchers
– 89 Nobel Prize winners
– 1st Heisman Winner in 1935 (Jay Berwanger) [anyone know the original
name?]
– Campus extensions in New Deli, Paris, London, and Honk Kong
6. Background Erik Giles & Abe Shaker
• Erik Giles
– Univ. of Chicago Command Center Manager (SM Best Practice Consultant)
– Running Command Centers (and their tools since 2004)
– In technology since 1996 with MS in Engineering & MBA from USC
– Worked in Technical Leadership at Boeing, Orbits, Publicis, IL Tollway
• Abe Shaker
– Lead Reporting & Monitoring Engineer for Univ. of Chicago
– Working in monitoring tool management since 2010
– In technology since 1998 with degree in Electronics
– Worked at State Farm, Motorola, Dept. of Veterans Affairs, DeVry
7. CA UIM @ University Of Chicago
Ensures IT services availability and reliability
• Our environment at a glance
– Running UIM since June 2011
– Currently Monitor over 5,000 devices across the globe
(35K alarms)
– Integrate 6 “other” monitoring tools into common window
– Watched 24/7/365 by the Command Center Team
– Working with 13 Infrastructure Teams
8. SNMP, ICMP
HTTP, HTTPS
HTTP, HTTPS
VPAPI
University of Chicago CA Spectrum & Nimsoft Architecture DRAFT
spectrum-test.uchicago.edu
10.50.36.97
ca-srm.uchicago.edu
10.50.39.99
Firewall
VPAPI
PRIMARY
STANDBY
specrptr.uchicago.edu
10.50.36.104
OneClick WebServer
PRIMARY STANDBY
spectrptr2.uchicago.edu
10.135.2.135
OneClick WebServer
HTTP, HTTPS
HTTP, HTTPSClient PCs
Client PCs
Firewall
Firewall
Notes:
HTTP, HTTPS = Connection protocols to OneClick
VPAPI = Syncing protocol for application cluster
SNMP, SDM, SSH, TELNET = Monitoring protocols
spectrum1.uchicago.edu
10.50.36.96
SpectroServer
spectrum3.uchicago.edu
10.135.2.134
SpectroServer
SNMP
SDM
SSH
TELNET
SNMP
SDM
SSH
TELNET
Monitored
Network Nodes
Servers,
Switches,
Routers,
Access Points,
etc...
Monitored
Network Nodes
Servers,
Switches,
Routers,
Access Points,
etc...
PRIMARY
STANDBY
nimsoft01.uchiago.edu
10.50.36.125
nimsoft02.uchicago.edu
10.50.36.129
nimsoftdb01.uchicago.edu
10.50.36.127
Oracle DB Server
nimsoftrpt01.uchicago.edu
10.50.36.128
Nimsoft Reporting Server
Spectrum To Nimsoft
SB Gateway Integration
Nimsoft SNMP Probe Robot
10.50.36.100
CA UIM & CA Spectrum Architecture Diagram
Since Q1FY14, Spectrum has been upgraded twice from 8.6 to the newest version, 9.4.0
CA UIM servers were installed on RHEL 6.6 and were upgraded to the newest version 8.0.
9. Broad vs Deep
• We have been following a strategy that brings all devices
into monitoring and then slowly increases the fidelity of that
monitoring in phases.
• This is a trade off. Do you…
1. Get early wins by working with one supportive team to show how
much can be done with a strong Enterprise Monitoring tool (such as
Network or Windows).
2. Build a foundation for a complete integrated monitoring solution by
building in all devices at the same time and operationalizing it as
everyone comes on board.
10. We Chose #2 - Here Is Why
• We can see everything in our environment.
• We never have to rework or go back on
something to make a new technology work.
• Our culture and technology can evolve at
the same time.
• All the infrastructure teams have skin in the
game and learn from each other.
11. Phased Approach
• To do “broad then deep” you have to have a clear set of phases.
1. “Ping Only” to start to get everything in the system. (five months for us)
2. Hardware based SNMP Model to get proactive. (16 months for us)
3. Service based solution to align to management and customers. (just started)
• Each phase has the following
– Unique Team across leadership and technical elements
– Very Specific Outcomes and Objectives (hard metrics)
– A plan with templated deliverables and management commitments
– Standing meetings: Steering Committee (mthly), Leadership (wkly), and technical (wkly)
• Must complete each phase in order (no matter how long it takes)
• Tip: Tie project to Outage reduction and SM Metric Improvements
12. Seven Quarters of Outages*
0
5
10
15
20
25
Q1FY14 Q2FY14 Q3FY14 Q4FY14 Q1FY15 Q2FY15 Q3FY15
xMail Email/Calendar
Wireless Data Networking
Windows
Voicemail and Unified Messaging
UPS
UChicago Time (aka Time and Attendance)
Telephone Service
Storage
Specialty Voice Services
Service Desk
Remote Site Connectivity
Physical Network Connections
Phones & Internet Connections
Mainframe Job Scheduling
Mainframe
Gargoyle - Student Information System
Employee Self Service (ESS, Benefits Management)
DNS Management
Desktop Support
Delphi Planning
Database Management
cVPN (VPN) Virtual Private Network
ComEd Power
Cisco (VoIP)
Chalk Learning Management System
Call Center
AURA - Grants Reporting (Research/Business Objects)
Averaging an Outage a week
as we had for years up until
the monitoring effort
Phase I Monitoring catching
many more events and our
numbers go up
As we do the work for
Phase II Outages are
dropping considerably
Phase I
Production
Phase II
Development
Phase II
Production
Phase I
Development
This slide is that sold leadership on the approach
13. 3 Nines of Hardware Uptime (last two quarters)
13
99.600%
99.620%
99.640%
99.660%
99.680%
99.700%
99.720%
99.740%
99.760%
99.780%
99.800%
99.820%
99.840%
99.860%
99.880%
99.900%
99.920%
99.940%
99.960%
99.980%
100.000%
Q3FY15 Hardware Uptime (to date)
Average Uptime – 99.954%
99.600%
99.620%
99.640%
99.660%
99.680%
99.700%
99.720%
99.740%
99.760%
99.780%
99.800%
99.820%
99.840%
99.860%
99.880%
99.900%
99.920%
99.940%
99.960%
99.980%
100.000%
Q2FY15 Hardware Uptime
Average Uptime – 99.960%
This slide is that sold the technical teams
14. All In! (Phase 1 – Connectivity)
• Our Goal was to just get every device into spectrum via a simple Ping.
• Objectives and Outcomes
– Capture 95% of Outages in Monitoring
– Monitor all uChicago Hardware
– Operationalize Monitoring with 24/7 Staff
– Report on Hardware uptime and alarm counts
• Business Notes
– We exceeded our outage capture targets (98% outages captured on ping only)
– Getting all the hardware integrated was much harder than you’d think
– Letting an operational team monitor other team’s hardware was a BIG cultural shift
– Spent a lot of time getting the operational side right (and consistent)
– Avoid politics by focusing on the data (always have data!)
15. Connectivity Technical Strategy
• Top Five Technical Notes
– Hardware Firewall Issues
• ICMP blocked in most locations across campus
– Software Firewall Issues
• IPTABLE rules needed to be put in place to allow communication from our SpectroSever
– Network ACLs
• ACLs had to be updated on our entire distribution layer to account for the source traffic from
Spectrum
– Non-routable IP space
• Lots of private IP space required the setup of VPNs to allow communication
– Used IPs and old DNS entries
• We noticed a lot of discrepancies between the list of systems to be monitored and how
Spectrum was discovering them. Large blocks of re-used IPs w/ out the proper update to DNS
16. Getting Proactive(Phase II – SNMP)
• The goal was to get as many devices on SNMP as we had licenses and integrate the rest so
that we could be proactive at a hardware level.
• Objectives and Outcomes
– Reduce Outages by 50%
– Reduce Severity 1-3 Incidents by 50% overall
– Operationalize responses to non-Outage events (adding Major/Minor Alarms)
– Real-time dashboards and reports for all hardware teams
• Business Notes
– We far exceeded our outage goals with a 300% reduction in Outages (before we finished)
– Zero teams wanted to commit to this goal (management intervention required)
– Huge emphasis on cleaning up technical debt and following processes
– Even technical folks didn’t understand the difference between “events” and “utilization”
– Best work was done with technical folks worked with each other (without management)
17. SNMP Technical Strategy
• Top Eleven Technical Notes
1. The same challenges experienced w/ ICMP across all of Phase I had to be re-visited w/ SNMP
2. SNMP Device Certification of custom models
3. Lack of SNMP support
• Encountered some critical devices that either didn’t support SNMP or had it disabled
4. NATd IPs
• Had issues getting NATd models monitored
5. No use of agents
• Agents were not allowed on certain servers which limited our monitoring options
6. Lots and lots of 3rd party monitoring system integrations
• Instead of natively monitoring models we have a large number of third party integrations. This presented us
w/ a new set of challenges
– Mapping alarm and event fields between applications
– Auto-clearing
– Dynamic Alarm fields
– Mapping of severities
– Two-way communication for note entries and the ACK check mark
18. SNMP Technical Strategy (continued)
7. Technical challenges in dealing w/ the increase of monitoring from just ICMP to SNMP
• Server and Network load
– Massive Increase in events
8. Architectural Diagram
• Ran into issues during upgrades as OneClick was installed on our SRM server (w/ out knowing)
9. LDAP Issues
• Had to abandon direct Spectrum to LDAP solution as we were having that hung-session/time-out problem.
Instead EEM was upgraded and re-integrated
10.Uniformity Across User Accounts
• We initially had different views for different techs in the command center which led to some alarms getting
missed. Locked the initial view down on their user preferences to resolve.
• Noticed there were far too many user groups w/ each having their own set of permissions. Simplified
permissions to better match the logical grouping of the University
11.The local_policy.jar file
• We have a number of non-technical users who do not have admin rights to their computers. The Spectrum
upgrade requiring the local_policy.jar file to be placed into the Java security folder required elevated
permissions.
18
19. Service Centric (Phase III – Service View)
• Our goal here is to go from a hardware centric view to a services centric view by regrouping all the
hardware by service and then monitor and measure by service.
• Objectives and Outcomes
– Three 9’s (99.9%) of uptime for all uChicago IT Services (44 minutes of downtime a month)
– Command Center actually monitoring “services” not just the hardware
– Vanity Dashboards by Service for Customers and Management
• Business Notes
– (can’t give you outcomes yet because we are just starting this phase)
• Our hardware is already at Four 9’s
– Application Teams are very supportive of doing this work and active participants
• BUT… any shortcuts you took with Hardware at SNMP will now bite you in the a__!
– Having a CMDB makes this easier but if not you’ll end up building a lot of the basics of it
– People are obsessed with Synthetic Transaction Monitoring (without understanding it)
– With a totally new team it feels a lot like starting over from a “buy-in” perspective
20. CA eHealth to CA UIM
• Business Advantages
– Provides far greater monitoring capability with improved scalability
– Significantly improved look and feel with lots of dashboard customization options
– Better quality and “current-ness” of technical support
– Clearly the futureproof option with the CA product
• Technical Challenges
– There was a lot of effort into getting FW rules and ACLs updated to allow SNMP polling from the new Nimsoft servers
– Currently the EEM (single sign on) solution w/ eHealth allowed Spectrum users to view eHealth content from OneClick w/ out
having to re-authenticate. No single sign on solution exists yet.
• Note, Nimsoft doesn’t support Unix/Linux based LDAP authentication. Windows AD or eDirectory only
– Migration of any monitoring setup in eHealth (i.e. network or disk utilization) to Nimsoft
– Nimsoft’s architecture is different than eHealth which could lead to a larger application footprint
• Suggested setup could have 4 different servers at the minimum
– Two UIM servers (primary/standby)
– External DB server (SQL or Oracle)
– UMP Server (Webserver)
– We have our SNMP collector housed on a separate server as well
– Work will have to be put in to duplicate any reports generated in eHealth as the default/out-of-the-box reports in Nimsoft differ
– A learning curve will be present as you’ll have to get use to a new interface, setup procedure, application maintenance, etc…
21. Synthetic Transaction Monitoring
• Synthetic Transaction Monitoring is the “cool thing” in monitoring and you cannot implement an
Integrated Central solution on local enterprise systems without getting feedback that if we just did STM
then none of this would mater and it’d all be easier. (usually from your cloud loving app folks)
• STM does have its place and can be a key element of your strategy
– It WILL find more things than traditional monitoring will do.
– It WILL give you a better understanding of the customer experience.
– It IS easier to setup and get started right away.
• But STM is not really a complete solution and here is why
– It WON’T tell you what is actually wrong with your systems, including where the problem is.
– It WON’T actually end up being cheaper because to come even close to the amount of data you can get from a traditional
monitoring solution would be 5X as expensive.
– It ISN’T a complete solution unless all you are looking for is connectivity and latency.
• We DO plan to use STM down the line (Phase IV)
– It will improve our enterprise solution by identifying issues for which we didn’t configure (yet)
– It will give us a solution for Cloud-Based solution that we cannot monitor traditionally
– It will show us the customer experience (connectivity and latency)
22. Achievements by uChicago
Three 9’sAvailability
Reduced Outages by
300%
ENHANCED
VISIBILTY
ACROSS THE
ORGANIZATION
BETTER
SERVICE
QUALITY
IMPROVED
SCALABILTIY
FUTURE PROOF