Systems that meet stringent service availability (SA) and high availability (HA) requirements have been around for decades, but diverse segments use varied terminology to describe the same concepts. This session will provide a high-level technical overview of the Service Availability Forum standards and the support of those standards within OpenSAF, allowing those familiar with HA concepts to map their terminology to SA Forum and OpenSAF terminology.
The session will also help those relatively new to OpenSAF or the HA domain to familiarize themselves with the terms and concepts. This session will lay the technical foundation for the remainder of the symposium so that attendees get the most out of the more detailed presentations that follow.
OpenSAF involves a number of complex ideas and is designed to work in many different environments. In order to make it easy for new users to get started, we will also detail options that new users have to educate themselves about OpenSAF and relevant environments for using the code base and interacting with the community.
OpenSAF Symposium_Architecture_and_Roadmap_Update9.19.11OpenSAF Foundation
OpenSAF is a mature platform that has undergone a series of architectural improvements and changes, making it the leading solution in the commercial-off-the-shelf (COTS) HA middleware industry. In particular, Release 4.0, released in mid 2010, is the biggest step to date in the direction of implementing a full suite of SA Forum services. This session will provide an overview of the OpenSAF architecture and specifically shed light on a series of improvements for Release 4.1 and the upcoming Release 4.2 that make OpenSAF the most scalable, robust and comprehensive implementation of the SA Forum standards. Lastly, this session will survey the OpenSAF roadmap and discuss the key priorities for OpenSAF over the next year.
There are a number of emerging hardware and software technologies that impact the usage and designs of highly available systems. OpenSAF-based service availability middleware is very complementary to virtualization, multi-core and many other advanced hardware and software technologies. This session will explain the broader technology landscape and will educate on how high availability (HA) fits in.
Python bindings for SAF-AIS APIs offer many advantages to middleware developers, application developers, tool developers and testers. The bindings help to speed up the software development lifecycle and enable rapid deployment of architecture-independent components and services. This session will describe main principles guiding Python bindings implementation, and will have extensive in-depth application Python code examples using SAF-AIS services.
Systems that meet stringent service availability (SA) and high availability (HA) requirements have been around for decades, but diverse segments use varied terminology to describe the same concepts. This session will provide a high-level technical overview of the Service Availability™ Forum standards and the support of those standards within OpenSAF, allowing those familiar with HA concepts to map their terminology to SA Forum and OpenSAF terminology.
The session will also help those relatively new to OpenSAF or the HA domain to familiarize themselves with the terms and concepts. This session will lay the technical foundation for the remainder of the conference so that attendees get the most out of the more detailed presentations that follow.
OpenSAF involves a number of complex ideas and is designed to work in many different environments. In order to make it easy for new users to get started, we will also detail options that new users have to educate themselves about OpenSAF and relevant environments for using the code base and interacting with the community.
great, th
Quattor is an open-source tool aimed at efficient management of fabrics with hundred or thousand of Linux machines, still being easy enough to manage smaller clusters. It has been originally developed during the European Data Grid (EDG) project. It is now in use at more than 50 grid sites running gLite middleware, ranging from small EGEE/LCG T3 to very large one like CERN.
Quattor ability to factorize common part of description configuration and advanced features of PAN language used to do this description allowed to build and maintain a common set of templates that any site can just import and customize without editing them. This resulted in the so-called QWG templates, a complete set of standard templates to configure OS and gLite middleware. This results in a very efficient sharing of installation and configuration tasks around the world. This could be extended to many service configuration other than grid services and is already available for standard services like mail, web servers... with a support for configuring virtual machines.
This presentation, in addition to Quattor specific features, will introduce how the project is managed by the community and plans for the long-term sustainability of the product.
SWIM MasterClass - Building SWIM B2B web services using Open StandardsDebbie Wilson
The document discusses building SWIM B2B web services using open standards to enable the interoperable exchange of ATM data. It describes creating a prototype that reduces the costs of creating and consuming SWIM services by implementing them using OGC web services and providing flexible, open APIs. The prototype connects to existing EAUP services and publishes the data through WFS, RESTful APIs, and a SOAP wrapper to demonstrate how standards-based services can encourage sharing of ATM data.
Safe and Reliable Embedded Linux Programming: How to Get ThereAdaCore
The talk provides an overview of techniques to design and implement reliable embedded applications. The goal is to achieve safe and analyzable behavior by construction, including handling parallel multiprocessor systems in an efficient and predictable way. The means to attain this objective is to statically configure the application to run on embedded linux platforms, and then to use run-time support to enforce constraints imposed to the system.
OpenSAF Symposium_Architecture_and_Roadmap_Update9.19.11OpenSAF Foundation
OpenSAF is a mature platform that has undergone a series of architectural improvements and changes, making it the leading solution in the commercial-off-the-shelf (COTS) HA middleware industry. In particular, Release 4.0, released in mid 2010, is the biggest step to date in the direction of implementing a full suite of SA Forum services. This session will provide an overview of the OpenSAF architecture and specifically shed light on a series of improvements for Release 4.1 and the upcoming Release 4.2 that make OpenSAF the most scalable, robust and comprehensive implementation of the SA Forum standards. Lastly, this session will survey the OpenSAF roadmap and discuss the key priorities for OpenSAF over the next year.
There are a number of emerging hardware and software technologies that impact the usage and designs of highly available systems. OpenSAF-based service availability middleware is very complementary to virtualization, multi-core and many other advanced hardware and software technologies. This session will explain the broader technology landscape and will educate on how high availability (HA) fits in.
Python bindings for SAF-AIS APIs offer many advantages to middleware developers, application developers, tool developers and testers. The bindings help to speed up the software development lifecycle and enable rapid deployment of architecture-independent components and services. This session will describe main principles guiding Python bindings implementation, and will have extensive in-depth application Python code examples using SAF-AIS services.
Systems that meet stringent service availability (SA) and high availability (HA) requirements have been around for decades, but diverse segments use varied terminology to describe the same concepts. This session will provide a high-level technical overview of the Service Availability™ Forum standards and the support of those standards within OpenSAF, allowing those familiar with HA concepts to map their terminology to SA Forum and OpenSAF terminology.
The session will also help those relatively new to OpenSAF or the HA domain to familiarize themselves with the terms and concepts. This session will lay the technical foundation for the remainder of the conference so that attendees get the most out of the more detailed presentations that follow.
OpenSAF involves a number of complex ideas and is designed to work in many different environments. In order to make it easy for new users to get started, we will also detail options that new users have to educate themselves about OpenSAF and relevant environments for using the code base and interacting with the community.
great, th
Quattor is an open-source tool aimed at efficient management of fabrics with hundred or thousand of Linux machines, still being easy enough to manage smaller clusters. It has been originally developed during the European Data Grid (EDG) project. It is now in use at more than 50 grid sites running gLite middleware, ranging from small EGEE/LCG T3 to very large one like CERN.
Quattor ability to factorize common part of description configuration and advanced features of PAN language used to do this description allowed to build and maintain a common set of templates that any site can just import and customize without editing them. This resulted in the so-called QWG templates, a complete set of standard templates to configure OS and gLite middleware. This results in a very efficient sharing of installation and configuration tasks around the world. This could be extended to many service configuration other than grid services and is already available for standard services like mail, web servers... with a support for configuring virtual machines.
This presentation, in addition to Quattor specific features, will introduce how the project is managed by the community and plans for the long-term sustainability of the product.
SWIM MasterClass - Building SWIM B2B web services using Open StandardsDebbie Wilson
The document discusses building SWIM B2B web services using open standards to enable the interoperable exchange of ATM data. It describes creating a prototype that reduces the costs of creating and consuming SWIM services by implementing them using OGC web services and providing flexible, open APIs. The prototype connects to existing EAUP services and publishes the data through WFS, RESTful APIs, and a SOAP wrapper to demonstrate how standards-based services can encourage sharing of ATM data.
Safe and Reliable Embedded Linux Programming: How to Get ThereAdaCore
The talk provides an overview of techniques to design and implement reliable embedded applications. The goal is to achieve safe and analyzable behavior by construction, including handling parallel multiprocessor systems in an efficient and predictable way. The means to attain this objective is to statically configure the application to run on embedded linux platforms, and then to use run-time support to enforce constraints imposed to the system.
Vampir and VampirServer provide interactive visualization and analysis of trace data from parallel applications to help identify performance bottlenecks, with intuitive displays for browsing timeline, communication, and computation data across different levels of a parallel application from global to process to function. The toolset includes the VampirTrace instrumentation library and supports large trace files and high parallelism through a client-server architecture.
The document discusses various aspects of configuring and managing high availability applications in an Oracle RAC environment. It covers creating an application VIP, registering an application as a cluster resource, defining dependencies, and scheduling methods. Specific examples provided include configuring HP Data Protector for high availability and creating an HA instance of Apache Tomcat.
The paper presents a new scheduler for Xen that better supports soft real-time tasks in a mixed workload environment. The scheduler uses laxity values to prioritize real-time tasks, boosts tasks on I/O events, and employs load balancing techniques between CPUs. Evaluation shows the scheduler improves performance for an IP telephony media server workload by meeting real-time task deadlines and fully utilizing CPU resources, while not starving other tasks.
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1Serena Software
The document summarizes the agenda and announcements for a Mainframe VUG meeting held on October 15, 2014 by Serena Software Inc. It provides information on upcoming events and trainings, as well as an overview of the new features and enhancements in ZMF 8.1, including improvements to administrative functions, deployment and release capabilities, usability, security, and support for additional programming languages. A demonstration of the new ZMF 8.1 features was also included on the agenda.
Overview of Connmove Software Solutions for SAP and Microsoft
Manage your SAP Systems based on Microsoft tools - professional easy with less effort.
cmWatcher: Monitor your SAP Systems with Microsoft System Center Operation Manager
EasyCloud: Manage SAP Systems with Microsoft PowerShell.
Some Use-Cases:
- SAP Homogeneous System copy in virtual or physical environment
- Automatic Patch of Windows operation system, SAP Kernel and SQL Server
- Automatic deployment of SAP systems
More Details: www.connmove.eu
Plugin-able POS Solutions by Javascript @HDM9 TaiwanRack Lin
This document discusses the author's experience developing point-of-sale (POS) systems using JavaScript and XULRunner. It describes building a POS SDK called VIVIPOS using JavaScript, XUL, and XPCOM to provide a cross-platform solution. Key components of the SDK included GREUTLs for utilities, GeckoJS for an MVC framework, and XBL components for reusable UI elements. The document emphasizes building a flexible, component-based system to facilitate customization for different customers rather than a single monolithic product.
This document summarizes a simulation of a multi-ton sheet steel coil production facility conducted by Systems Navigator. The simulation modeled the facility's temper line, galvanizing lines, storage areas, cranes and other equipment to analyze throughput, cycle times, asset utilization, waiting times and other key performance indicators. The simulation provided valuable insights on automation, crane speeds, failures and more. It showed that storage areas were approaching capacity limits and identified opportunities to reduce truck and coil waiting times through automated cranes and truck loading.
The document discusses different cloud architectures and lessons learned from 100 CloudStack deployments. It outlines a process for defining a cloud architecture, describing the basic building blocks of a computing cloud. The document differentiates between traditional and cloud workloads, noting that workload reliability requirements drive unique architectural needs. It provides examples of architectures for traditional server virtualization and Amazon-style availability zones.
The Top 5 Practices of a Highly Successful ChangeMan ZMF AdministratorSerena Software
The summary provides an overview of the Serena Software mainframe virtual user group meeting in October 2015. It discusses product updates to ChangeMan ZMF, Comparex, and ChangeMan SSM. It also covers best practices for highly successful ChangeMan ZMF administrators, including saying no to processes outside of ChangeMan, treating ChangeMan like a production system, taking upgrades seriously as projects, communicating with development, and continuing education. The meeting concluded with an opportunity for questions.
This document outlines a project to optimize an existing service monitoring console (SMC) within a service-oriented architecture framework. The objectives are to investigate data loss issues, compare SMC to an alternative console (TMC), and design an optimized monitoring solution. Key activities include tuning data storage scripts, comparing consoles quantitatively, mapping SMC features to TMC, and improving performance. The timeline outlines tasks like analyzing existing code, creating sample services, and developing enhancements over 16 weeks.
The document discusses verification challenges for modern wireless system-on-chips (SoCs). It describes how SoCs now include multiple processors, modems, multimedia components, and peripherals, making verification much more complex. Traditional "golden vector" verification is insufficient, as it lacks reactivity, coverage metrics, and visibility into hardware-software interactions. The document advocates for model-based verification using system models, constraints, assertions and other techniques to achieve a higher level of integration and achieve full functional coverage. This modern approach allows testing across different levels of abstraction and integration.
Presentation at FreedomHEC 2012 Conference. 0xlab extends DMTCP (Distributed Multi-Threaded CheckPointing) to enable Android checkpointing, which leads to resume to stored state for faster Android boot time and make better product field trial experience.
The document discusses designing highly available voice over internet protocol (VOIP) systems. It covers establishing system requirements, determining deployment configurations, and mapping middleware capabilities to solutions. Key aspects include essential and management services, hardware platforms, functional blocks, and redundancy policies like N+1 models. The GoAhead software platform enables developing and deploying available network elements using open standards.
TOSCA - Topology and Orchestration Specification for Cloud Applicationssdmoser
TOSCA (Topology and Orchestration Specification for Cloud Applications) provides a standard way to describe cloud applications and their infrastructure through topology and orchestration. It describes the structure and relationships between application components and infrastructure resources, as well as operational behaviors like deploy, patch, and shutdown. This enables portability across compliant clouds while maintaining requirements. TOSCA extends existing standards for virtualization, infrastructure management, and service composition to provide portability and orchestration across applications and infrastructure. The goal is to establish TOSCA as an industry standard through the OASIS technical committee.
This document provides an overview of Microsoft Private Cloud. It discusses objectives like Private Cloud infrastructure, virtualization, management and monitoring. Key concepts covered include Infrastructure as a Service (IaaS) using Windows Server 2008 R2 and Hyper-V virtualization. It demonstrates managing virtual infrastructure with System Center Virtual Machine Manager and monitoring with System Center Operations Manager. The presentation emphasizes automating virtual machine lifecycles and incident response using System Center capabilities to improve efficiency and service levels in a Private Cloud.
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Sverige
Enfo Zystems smarta managerade övervakningstjänster som använder sig av Tivoli Live är en hybrid mellan molnteknologi levererad av IBM och ett tjänstepaket kring övervakning av Enfo Zystems. Stephan Seliger kommer att berätta om vilket mervärde dessa flexibla lösningar medför för Enfo Zystems kunder avseende kompetens, kostnadskontroll och skalbarhet. Enfo Zystems har under flera år byggt upp spetskompetens inom området Tivoli Monitoring med inriktning på SOA management och monitorering vilket har gjort det möjligt att på kort tid sätta upp ett tjänstepaket kring IBM’s lösning och kunna erbjuda den som en ”Pay-as-you-go” tjänst.
Talare: Stephan Seliger, Director at Enfo Zystems
Besök http://smarterbusiness.se för mer information.
The document discusses various architectural styles and patterns. It describes architectural styles like layered, call/return, virtual machine, data-flow, data-centered, and independent components. It also discusses architectural patterns within these styles, such as main program/subroutine, object-oriented, layered, blackboard, microkernel, and middleware. Common middleware architectures like CORBA and COM are also summarized.
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...mfrancis
This document discusses enabling technologies for branded wireless services. It addresses challenges like increased demand for functionality within hardware limitations. A solution is a modular software platform that allows for deep UI and service postponement. This decouples software lifecycles from devices through standards-based device management. It leverages open standards and technologies like Linux, Java, OSGi, and OMA to provide dynamic services, rich applications, and superior customer care through features like over-the-air updates. The platform aims to reduce costs and time to market while allowing flexible, branded experiences for operators. It emphasizes modularity, security, and standards compliance to enable sophisticated wireless services.
The document discusses requirements and expectations for modern combat management systems (CMS), including real-time features, network centricity, interoperability, and open architectures. It proposes MilSOFT's new generation CMS as a solution, which is based on open architecture standards and technologies. The CMS provides a common, scalable and modular infrastructure for different platforms, along with integrated functionality and compliance with standards.
Vampir and VampirServer provide interactive visualization and analysis of trace data from parallel applications to help identify performance bottlenecks, with intuitive displays for browsing timeline, communication, and computation data across different levels of a parallel application from global to process to function. The toolset includes the VampirTrace instrumentation library and supports large trace files and high parallelism through a client-server architecture.
The document discusses various aspects of configuring and managing high availability applications in an Oracle RAC environment. It covers creating an application VIP, registering an application as a cluster resource, defining dependencies, and scheduling methods. Specific examples provided include configuring HP Data Protector for high availability and creating an HA instance of Apache Tomcat.
The paper presents a new scheduler for Xen that better supports soft real-time tasks in a mixed workload environment. The scheduler uses laxity values to prioritize real-time tasks, boosts tasks on I/O events, and employs load balancing techniques between CPUs. Evaluation shows the scheduler improves performance for an IP telephony media server workload by meeting real-time task deadlines and fully utilizing CPU resources, while not starving other tasks.
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1Serena Software
The document summarizes the agenda and announcements for a Mainframe VUG meeting held on October 15, 2014 by Serena Software Inc. It provides information on upcoming events and trainings, as well as an overview of the new features and enhancements in ZMF 8.1, including improvements to administrative functions, deployment and release capabilities, usability, security, and support for additional programming languages. A demonstration of the new ZMF 8.1 features was also included on the agenda.
Overview of Connmove Software Solutions for SAP and Microsoft
Manage your SAP Systems based on Microsoft tools - professional easy with less effort.
cmWatcher: Monitor your SAP Systems with Microsoft System Center Operation Manager
EasyCloud: Manage SAP Systems with Microsoft PowerShell.
Some Use-Cases:
- SAP Homogeneous System copy in virtual or physical environment
- Automatic Patch of Windows operation system, SAP Kernel and SQL Server
- Automatic deployment of SAP systems
More Details: www.connmove.eu
Plugin-able POS Solutions by Javascript @HDM9 TaiwanRack Lin
This document discusses the author's experience developing point-of-sale (POS) systems using JavaScript and XULRunner. It describes building a POS SDK called VIVIPOS using JavaScript, XUL, and XPCOM to provide a cross-platform solution. Key components of the SDK included GREUTLs for utilities, GeckoJS for an MVC framework, and XBL components for reusable UI elements. The document emphasizes building a flexible, component-based system to facilitate customization for different customers rather than a single monolithic product.
This document summarizes a simulation of a multi-ton sheet steel coil production facility conducted by Systems Navigator. The simulation modeled the facility's temper line, galvanizing lines, storage areas, cranes and other equipment to analyze throughput, cycle times, asset utilization, waiting times and other key performance indicators. The simulation provided valuable insights on automation, crane speeds, failures and more. It showed that storage areas were approaching capacity limits and identified opportunities to reduce truck and coil waiting times through automated cranes and truck loading.
The document discusses different cloud architectures and lessons learned from 100 CloudStack deployments. It outlines a process for defining a cloud architecture, describing the basic building blocks of a computing cloud. The document differentiates between traditional and cloud workloads, noting that workload reliability requirements drive unique architectural needs. It provides examples of architectures for traditional server virtualization and Amazon-style availability zones.
The Top 5 Practices of a Highly Successful ChangeMan ZMF AdministratorSerena Software
The summary provides an overview of the Serena Software mainframe virtual user group meeting in October 2015. It discusses product updates to ChangeMan ZMF, Comparex, and ChangeMan SSM. It also covers best practices for highly successful ChangeMan ZMF administrators, including saying no to processes outside of ChangeMan, treating ChangeMan like a production system, taking upgrades seriously as projects, communicating with development, and continuing education. The meeting concluded with an opportunity for questions.
This document outlines a project to optimize an existing service monitoring console (SMC) within a service-oriented architecture framework. The objectives are to investigate data loss issues, compare SMC to an alternative console (TMC), and design an optimized monitoring solution. Key activities include tuning data storage scripts, comparing consoles quantitatively, mapping SMC features to TMC, and improving performance. The timeline outlines tasks like analyzing existing code, creating sample services, and developing enhancements over 16 weeks.
The document discusses verification challenges for modern wireless system-on-chips (SoCs). It describes how SoCs now include multiple processors, modems, multimedia components, and peripherals, making verification much more complex. Traditional "golden vector" verification is insufficient, as it lacks reactivity, coverage metrics, and visibility into hardware-software interactions. The document advocates for model-based verification using system models, constraints, assertions and other techniques to achieve a higher level of integration and achieve full functional coverage. This modern approach allows testing across different levels of abstraction and integration.
Presentation at FreedomHEC 2012 Conference. 0xlab extends DMTCP (Distributed Multi-Threaded CheckPointing) to enable Android checkpointing, which leads to resume to stored state for faster Android boot time and make better product field trial experience.
The document discusses designing highly available voice over internet protocol (VOIP) systems. It covers establishing system requirements, determining deployment configurations, and mapping middleware capabilities to solutions. Key aspects include essential and management services, hardware platforms, functional blocks, and redundancy policies like N+1 models. The GoAhead software platform enables developing and deploying available network elements using open standards.
TOSCA - Topology and Orchestration Specification for Cloud Applicationssdmoser
TOSCA (Topology and Orchestration Specification for Cloud Applications) provides a standard way to describe cloud applications and their infrastructure through topology and orchestration. It describes the structure and relationships between application components and infrastructure resources, as well as operational behaviors like deploy, patch, and shutdown. This enables portability across compliant clouds while maintaining requirements. TOSCA extends existing standards for virtualization, infrastructure management, and service composition to provide portability and orchestration across applications and infrastructure. The goal is to establish TOSCA as an industry standard through the OASIS technical committee.
This document provides an overview of Microsoft Private Cloud. It discusses objectives like Private Cloud infrastructure, virtualization, management and monitoring. Key concepts covered include Infrastructure as a Service (IaaS) using Windows Server 2008 R2 and Hyper-V virtualization. It demonstrates managing virtual infrastructure with System Center Virtual Machine Manager and monitoring with System Center Operations Manager. The presentation emphasizes automating virtual machine lifecycles and incident response using System Center capabilities to improve efficiency and service levels in a Private Cloud.
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Sverige
Enfo Zystems smarta managerade övervakningstjänster som använder sig av Tivoli Live är en hybrid mellan molnteknologi levererad av IBM och ett tjänstepaket kring övervakning av Enfo Zystems. Stephan Seliger kommer att berätta om vilket mervärde dessa flexibla lösningar medför för Enfo Zystems kunder avseende kompetens, kostnadskontroll och skalbarhet. Enfo Zystems har under flera år byggt upp spetskompetens inom området Tivoli Monitoring med inriktning på SOA management och monitorering vilket har gjort det möjligt att på kort tid sätta upp ett tjänstepaket kring IBM’s lösning och kunna erbjuda den som en ”Pay-as-you-go” tjänst.
Talare: Stephan Seliger, Director at Enfo Zystems
Besök http://smarterbusiness.se för mer information.
The document discusses various architectural styles and patterns. It describes architectural styles like layered, call/return, virtual machine, data-flow, data-centered, and independent components. It also discusses architectural patterns within these styles, such as main program/subroutine, object-oriented, layered, blackboard, microkernel, and middleware. Common middleware architectures like CORBA and COM are also summarized.
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...mfrancis
This document discusses enabling technologies for branded wireless services. It addresses challenges like increased demand for functionality within hardware limitations. A solution is a modular software platform that allows for deep UI and service postponement. This decouples software lifecycles from devices through standards-based device management. It leverages open standards and technologies like Linux, Java, OSGi, and OMA to provide dynamic services, rich applications, and superior customer care through features like over-the-air updates. The platform aims to reduce costs and time to market while allowing flexible, branded experiences for operators. It emphasizes modularity, security, and standards compliance to enable sophisticated wireless services.
The document discusses requirements and expectations for modern combat management systems (CMS), including real-time features, network centricity, interoperability, and open architectures. It proposes MilSOFT's new generation CMS as a solution, which is based on open architecture standards and technologies. The CMS provides a common, scalable and modular infrastructure for different platforms, along with integrated functionality and compliance with standards.
During the CXL Forum at OCP Global Summit, Jeff Hilland of HPE explained what CXL, PCI SIG, DMTF, OFA, OCP, and SNIA are doing to make CXL fabric, memory and device management interoperable.
Pepperweed Consulting discusses the latest capabilities of NNMi 9 and when properly implemented how NNMi can give you the visibility, control and performance metrics for your constantly changing network infrastructure whether virtual or physical. HP's Network Node Manager i (NNMi) software, combined with packaged implementation services from Pepperweed Consulting, can enable you to significantly reduce network downtime. Welcome to Pepperweed’s NNMi E-Paks.
21st Century Service Oriented ArchitectureBob Rhubart
Service Oriented Architecture has evolved from concept to reality in the last decade. The right methodology coupled with mature SOA technologies has helped customers demonstrate success in both innovation and ROI. In this session you will learn how Oracle SOA Suite’s orchestration, virtualization, and governance capabilities provide the infrastructure to run mission critical business and system applications. And we’ll take a special look at the convergence of SOA & BPM using Oracle’s Unified technology stack.
(As presented by Samrat Ray at Oracle Technology Network Architect Day in Chicago, October 24, 2011.)
This document discusses the key success factors for automating the migration of large business applications from Cobol to Java. It describes Eranea's process for automatically transcoding Cobol code into semantically equivalent Java code using their NeaTranscoder tool. Testing ensures the legacy and new systems perform identically. A progressive migration allows switching components incrementally while maintaining full functionality. Automation, iso-functionality testing, and progressive migration are identified as key success factors for large-scale automated migration projects.
The document discusses several mobile operating system platforms including Java ME, Symbian OS, Windows Mobile, iPhone OS, and Google Android. It describes the structure and features of each platform, highlighting their differences from desktop operating systems due to mobile devices' limited resources. Key aspects covered include multitasking, memory management, security features, and each platform's software stack and architecture.
SOA Summer School: Best of SOA Summer School – Encore Session WSO2
This wrap-up session of WSO2's SOA Summer School brings you the best of all sessions conducted over the past 8 weeks. Enterprise architects, developers, consultants and business analysts can now gain an overall understanding of SOA concepts and implementations of end-to-end SOA solutions.
The wrap-up session agenda covered several SOA patterns and use cases:
1. It discussed service broker pattern, pipes and filters, trusted subsystems, and functional decomposition for connecting a service client to backend services while allowing changes.
2. It explored aggregating data from multiple time tracking applications into a single report view using aggregated data and logical flows patterns.
3. BPM and SOA integration was examined to coordinate long-running processes across services.
4. Metadata management patterns like shared repository and version identification were presented for governance.
5. High performance and C++ integration into SOA was listed as a use case.
This document provides an overview of cloud computing and Microsoft's System Center products, including:
- Windows Azure allows for scalable apps and services in the cloud with a choice of platforms.
- System Center provides unified management of virtual and cloud resources through products like Virtual Machine Manager, Operations Manager, and Service Manager.
- Demos are shown of monitoring services in Operations Manager and enabling self-service requests in Service Manager with help from Orchestrator.
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...New Lease
The document discusses Microsoft's cloud computing strategy and services. It highlights that Microsoft has 14,000 SPLA partners, that 96% of its revenue comes from partners, and that it has offered cloud services for over 10 years. It also provides an overview of Microsoft's infrastructure and platform services, including Software as a Service, Platform as a Service, and Infrastructure as a Service offerings. Finally, it discusses Microsoft's datacenter strategy and evolution towards modular pre-assembled components to improve scalability, sustainability and time to market.
This document discusses enterprise application integration (EAI) and workflow management systems (WfMS). It defines EAI as providing a means to share data between different applications without custom interfaces. It describes the typical components of an EAI system and WfMS, including message brokers, adapters, workflow engines, and monitoring tools. The document outlines the benefits of EAI and WfMS, such as lower costs, faster integration, and more efficient processes.
Similar to OpenSAF Symposium - Intro to OpenSAF_9.13.11 (20)
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
2. Introduction to OpenSAF
• Service availability and high availability systems and
concepts have been around for decades
• However, HA terminology tends to vary from industry to
industry and company to company
• Goals of this session:
– High-level technical overview of the Service Availability™ Forum
standards
– Overview of the support of those standards within OpenSAF
– Allow you to:
• Familiarize yourself with general HA concepts and terminology
OR
• Map the HA concepts and terminology with which you are
familiar to the SA Forum and OpenSAF versions
– Resources for getting started with OpenSAF
3. SA Forum Interfaces: AIS & HPI
Applications
Application Interface Specifications (AIS)
Service Availability Middleware
System Management
SAF Software Mgmt Availability Lock (LCK)
Framework (SMF) Management
Standards Framework (AMF)
Implemented Information Checkpoint (CKPT)
by OpenSAF Model Mgmt (IMM)
Cluster Membership (CLM)
Event (EVT)
Notification (NTF)
Log (LOG) Platform Mgmt (PLM) Message (MSG)
Operating System
Virtualization
Hardware Platform Interface (HPI)
Hardware Hardware Hardware Hardware
Platform A Platform B Platform C Platform D
4. But how to make sense of the
SA Forum “acronym soup”?
5. AIS Service Groupings
• First, understand that the AIS services fall into three
logical groupings*:
System Management Resource Availability Application Services
Services Management Services
Information Availability Checkpoint (CKPT)
Model Mgmt (IMM) Management
Framework (AMF)
Event (EVT)
Software Mgmt
Framework (SMF)
Cluster Membership (CLM)
Message (MSG)
Notification (NTF)
Platform Mgmt (PLM) Lock (LCK)
Log (LOG)
Services that manage central Services that manage and Optional services to support
system capabilities commonly monitor the state of key system application operations such as:
resources that affect availability: • Inter-process
used by both: • Hardware / Operating communication
• AIS services system • State replication
• Applications • Cluster nodes • Shared resource access
• Applications control
* - Not official SA Forum AIS service groupings
6. Fault Management Cycle
• Second, AIS services that
manage availability are
designed around a standard
fault management cycle
– Detection Detection
• E.g. component
healthchecks
– Isolation
• E.g. blade power off
– Recovery Repair Notification Isolation
• E.g. failover of workload
assignments to associated
standby resources
– Repair
Recovery
• E.g. automatic restart of
failed resource
– Notification
• E.g. state change
notifications sent by service
managing the resource
7. Resource Dependencies
• Third, Availability Management in the AIS world is
Managed
driven by a detailed understanding of the availability Applications
management dependencies across all resource types
– Managed Applications
• Simple to complex dependencies and relationships can be
modeled between the various software elements
• Dependency on a particular node also modeled AMF Node
– AMF Node
• Represents a node where AMF services are provided
• Depends on a CLM node
– CLM Node CLM Node
• Represents a cluster node where AIS services are
provided
• Depends on an Execution Environment (optional)
– Platform Resource
• Containment and logical dependencies represented Platform
between platform resources Resource
• Execution Environment (EE)
– Represents an operating system instance (standalone or
virtual)
• Hardware Element (HE) Hardware Execution
– Represents a physical hardware resource in the system Element Environment
8. Common Design Patterns
• Fourth, the AIS services follow common design
patterns:
– API
• Common library lifecycle
• Naming conventions
– Resource managed by service Managed object
• Typically with associated state model
• Managed objects stored in common information model
– Administrative operations
• X.731 style administrative operations for resources which
affect availability
– Notifications automatically generated by AIS services for
significant system events (alarms, state changes, etc.)
9. Resource Availability Management Services
• Availability Management Framework (AMF)
– Manages the lifecycle and monitors the state of the managed
applications within the system
– More detail in upcoming slides
• Cluster Membership (CLM)
AMF
– Provides cluster membership change notifications to AIS services
and interested applications
– OpenSAF CLM implements cluster management protocol dealing
with:
• Cluster formation CLM
• Active controller selection & failover
• Node failure detection
• Platform Management (PLM)
– Manages the state of modeled hardware elements and execution
environments (operating system instances) PLM
– Hardware element states and events accessed through Hardware
Platform Interface (HPI)
– Manages graceful blade extraction / de-activation cases
– Supports hardware element controls (power on/off and reset)
– Optional service within OpenSAF
10. Availability Management Framework (AMF)
AMF Logical Entities
• Structural Entities AMF
– AMF Application Application
• Represents the highest-level 1..*
service(s) provided by the
system
– Service Group (SG) Service
Group
• Represents a group of like
logical resources that provide
the same service(s)
• Associated redundancy model 1..*
(e.g. 1+1)
– Service Unit (SU) Service
Unit
• Aggregates a set of resources
which when combined provide
a higher-level service 1..*
– Component
Component
• Represents one or more
resources that perform a
function within the system
11. Availability Management Framework (AMF)
AMF Logical Entities
• Workload Entities AMF
Application
– Service Instance (SI)
1..*
• Represents a workload to be
supported by the system Service
Service
Service
Group Protected by
• Has associated redundancy Group
Group
requirements (1+1, N+M, etc.)
• Protected by an identified SG
• Assigned to one or more SUs 1..* 1..*
with an HA state of active,
Service
standby, quiescing or Service
Service1
Unit Assigned Service
quiesced Unit 1
Unit Instance
– Component Service Instance
(CSI) 1..*
1..*
• Represents a more granular
Assigned Component
workload that needs to be Component
Component
Component Service
supported by the system Instance
• Assigned to one or more
components
12. Availability Management Framework (AMF)
AMF Logical Entities
• Common Characteristics
– Well-defined state model for each logical
entity type
• Operational
• Administrative
• Etc.
– X.731 style administrative operations
• Lock
• Unlock CLC-CLI
• Shutdown Lifecycle
Scripts
• Etc. mgmt
AMF comp
process
• Common AMF Component Types AMF
HA state
assignment
AMF
Library
– SA-aware
– Non-proxied, non-SA-aware SA-aware Component Example
– Proxied, non-SA-aware
13. Availability Management Framework (AMF)
Service Group Redundancy Models
• Key redundancy model characteristics
– Preferred SI assignment model
• # of active resource(s)
• # of standby resource(s)
– Allowed concurrent HA state assignments
for SUs
– # of assignable SUs SI1
• Redundancy model options
– 2N A S
• Most common redundancy model
• 1 active resource and 1 standby SU1 SU2
resource per SI
A S
• SUs can have either all active or all Node1 Node2
standby SI assignments
– N+M
– No Redundancy SI2
– N-way
– N-way active 2N Service Group Example
14. Availability Management Framework (AMF)
Error Recovery Policies
• Pre-defined AMF component error recovery policies
– Configurable
– Can be overridden at runtime
• Up to 3 actions per policy
– Isolation
– Recovery
– Repair
• Recovery policy scopes
– Component
– Service Unit
– Node
• Recovery policy types
– Restart
– Failover
– Failfast
• Recovery escalation policies
15. System Management Services
Information Model Management (IMM)
• Information Model Highlights
– Based on pre-defined object classes
(including AIS classes)
– Holds both configuration and runtime
objects
– Used by AIS services to store current
configuration and runtime state info
– Can be used by applications as well
• Object Management API
– Object class management
– Access object attribute values
– Search information model
– Configuration change requests
– Administrative operation invocation
• Object Implementer API
– Runtime object management
– CCB validation and application
– Administrative operation handling
• OpenSAF Implementation
– Persistence of information model
managed through Persistence BackEnd
(PBE) feature
– Replicated to multiple cluster nodes
16. System Management Services
Software Management Framework (SMF)
• SMF controls migration
from one deployment Upgrade
“Upgrade
configuration to another Instructions” Campaign
Definition
• Upgrade methods
– Rolling upgrade Software
– Single step upgrade Management Adaptation commands
• [De-]Activation Unit Scope Framework (SMF config object)
– AMF Node
Install / remove - Admin operations
– Service Unit
software bundles - Read/Create/Delete/Update
• During the migration SMF on target nodes objects
– Maintains the campaign state
change model
– Takes measures to enable
error recovery
– Monitors for potential errors
caused by the migration Software Information
– Deploys error recovery
procedures Repository Model
17. System Management Services
• Notification (NTF)
– Publish-and-subscribe semantics for system-level notifications
– Syntax and semantics for ITU X.73x notifications:
• Alarm / security alarm / state change / object create/ delete /
attribute change
– Alarm and security alarm notifications automatically logged
through LOG service
• Log (LOG)
– Flexible, centralized, system-wide logging mechanism
– Pre-defined log streams: alarm, notification, system
– Multiple, custom application log streams allowed
– Configurable log stream characteristics including:
• log file full action: halt, wrap, and rotate
18. Application Services
• Checkpoint (CKPT)
– Intended as a state replication mechanism for distributed
applications
– Can be used for all standby “temperature levels”
• Cold
• Warm
• Hot
– Through OpenSAF CKPT service API extension
– Semantics of a checkpoint
• Arbitrary set of sections containing opaque data
• Stored in one or more replicas distributed across cluster
• Reads and writes occur against the active replica
– Both synchronous and asynchronous replication options
available
– Collocated checkpoint option provided for highest performance
19. Application Services
• Event (EVT)
– Publish-and-subscribe communication paradigm
– Flexible event channel, pattern, and filtering definition
– Subscriber event queue maintained within app process
• Message (MSG)
– Messages sent to and read from message queues
– Single message queue owner at a time
– Message queue maintained outside app process
– Message queues can be logically grouped
• Messages can be sent to a message queue group
• Associated distribution policy (round-robin, broadcast, etc.)
• Lock (LCK)
– Cluster-wide, distributed lock service
– Can be used to control access to cluster-level shared resources
20. Getting Started with OpenSAF
• OpenSAF Technical Educational Resources
– Developer Wiki [http://devel.opensaf.org/wiki]
– OpenSAF Developers blog [http://devel.opensaf.org/blog]
– OpenSAF mailing lists [Subscribe: http://list.opensaf.org/maillist/listinfo/]
• Users [Archive: http://list.opensaf.org/pipermail/users/]
• Development [Archive: http://list.opensaf.org/pipermail/devel/]
• Announce [Archive: http://list.opensaf.org/pipermail/announce/]
– Latest documentation [http://devel.opensaf.org/hg/opensaf-4.x-
documentation/archive/tip.tar.gz]
– FAQ
[http://www.opensaf.org/HOA/assn14944/images/FREQUENTLY%20ASKED%20QUESTIONS%20ABOUT%20OPENSAF%20RE
LEASE%204%20Final%20for%20publication.docx]
– README files in source code repository
• SA Forum Application Interface Specifications
[http://www.saforum.org/Service-Availability-Forum:-Application-Interface-Specification-
~217404~16627.htm]