SlideShare a Scribd company logo
IBM SmartCloud Camp 2011 Presentation Team 3: Terry Chang Deepak Wai Phyo Kyaw Charlotte Ng Desmond See
Scenario 1: Problem Definition To design 3-tier Application with features: load balancing failover redundancy scalability secure Solve single point of failure in our systems
Scenario 1: Architectural Design IBM HTTP SERVER with WAS Plugin IBM HTTP SERVER with WAS Plugin LOADBALANCER LOADBALANCER INTERNET Websphere Application Server Cluster App: Clone 1 App: Clone 2 Node 1 FIREWALL App: Clone 3 App: Clone 4 IBM DB2 Server Cluster IBM SAN (Redundant Disks: RAID 10) Instance 1 Node 2 stores data Instance 2 Deployment Manager *instances will be created in different data centres around the world
Scenario 1: Configuration in Instances Assign Virtual IP  Install Pacemaker Configure Heartbeat communication layer Provision at least 2 number of VMs instances and get ready In time of failure: Reconfigure Virtual IP for the alive instance Automatic direct traffic to the alive nodes Fault-tolerance, fast recovery times, session replication
Scenario 1: Advantages of IBM Cloud Systems What and how did we leverage IBM Technologies? IBM HTTP Server Workload Management + Loadbalancer IBM Websphere Application Server  Clustering, Automatic failover IBM DB2 (with HADR/v9.5+) Database Client Nodes Clustering with HADR SQL Replication, Shared Disks/SAN Support DB2 HA: DB2 High Availability Instance Configuration Utility (db2haicu) IBM Storage Area Network SAN: RAID 1 or RAID 10 (not RAID 5) Shared Disk redundancy
Scenario 1: Design Considerations Different Physical Locations of Instances Automatic Trigger, Notification and Configuration Data integrity after recovery/during failover/in SAN Security in configuring/writing scripts
Scenario 1: Project Management Scope & Deliverables: Complete implementation of high availability data recovery three-tier application on SCE : from architecture to scripting configurations Configure WAS, DB2 instances and SAN nodes? Configure automated scripts, Provision monitoring instances Proposed Timeline: 100 man hours 5 persons team Resource Estimation: 2 x firewall+loadbalancer, 2x IBM HTTP Server, 2x WAS Nodes, 2x DB2 Instances, 2x SAN Sites Test Plan Test instances failure (kill the services), Test recovery process (automation, time, data integrity)
Scenario 1: Project Risks Technical Configured incorrectly during failover and recovery Data integrity issues, session not replicated, data not copied properly SCE issues? Recovery time exceeds minimum as stated in SLA Team Inadequate skills, inexperience Manpower shortage
Scenario 2: Problem Definition To build a scalable and multi-tenancy web portal as a platform Customer self-management portal system To provide SaaS to customer as an Independent Software Vendor Simplified and standardized technical setup of the software for the customers
Scenario 2: Intended Design New User Registration/Login APIs - our own Business Logic (authentication, creating new account in DB)
Scenario 2: Intended Design Dashboard for Customer ** First, Create DeveloperCloudClient to execute requests against the Cloud | DeveloperCloudClientgetClient()
Scenario 2: Intended Design Billing information
Scenario 2: Project Management Scope Web portal DB2 – (customer authentication and data storage) Proxy server Business logic Deliverables Create portal system with fully functioning interface Create database integrated system + a relational database Add security features to protect customers’ data Modularized and loosely coupled system(Use of RESTful Services)
Scenario 2: Test Process Create multiple same Customer IDs Create > 5 instances of VM which is over the limitation  Create Failover at either the SCE side or Proxy server. Give wrong user credentials Accuracy of the billings
Scenario 2: Project Risks Technical Security – authentication between users and proxy server or proxy server and SCE Failover and workload balance at SCE, proxy server Connection timeout between client, proxy and SCE Configuration error in creating the instances of the vm or application. SCE unable to create instances or access Team Skill and knowledge inadequate Illness, MC Underestimation of projected timeline Service level agreement
Scenario 2: Advantages of Cloud Systems Low total cost of ownership of the equipment Flexible usage of the services : Pay Per Use, Utility Billing High availability Handle Variable Demand (Dynamic Load) Pervasiveness (Anytime, anywhere)
Scenario 2: Design Considerations Customers information security Standardization and automation User friendly interfaces Cost saving
Scenario 3: Problem Definition Aim: Provide information to managers and identifying poor/well-performing branches (acc to branch, then country, then continent) Business problem: Unable to make adequate decisions because data is confusing and not presented in a readable format for further analysis
Scenario 3: Dummy Data Extracted, transformed and selected data from OLTP (ETL Process)
Scenario 3: How Cognos can help Rainbow Food Shopping experience: Identify, report on and analyze trends  Use predictive models and association rules Gain insight into customer perceptions of service, store, products and merchandising Promotion and merchandise planning: Optimize merchandise levels and inventory Conduct market basket analysis Develop plans for key financial indicators Smarter operations: Set, measure and monitor key performance metrics based on standard financial statements. Use predictive models to improve recruitment and optimize staffing decisions. Gain visibility into key metrics across the chain: sales, labor, inventory and promotions Monitor turnover and employee productivity
Scenario 3: Generated Reports  Expense and Revenue across Shifts Product Sales over Five Years
Scenario 3: Generated Reports	 Geospatial analysis of performance of Rainbow Food outlets for products, for staffing
Scenario 3: Intelligence Staff underutilization: understand which area is understaffed during particular shifts with maps and other outlets’ realtime data, we can relocate staff instead of retrenching or letting them idle Non-selling products:  different regions have different tastes varies from time to time as well remove unpopular food items from menu analyze new food trends Mashup (interconnected) intelligence: import external datasets (eating habits, demographics, research agencies)
Scenario 3: Leveraging Cloud Systems Why Cognos, instead of Excel? can handle large datasets can draw data from different sources real-time multiple parties can gain insights at the same time, share data all stakeholders can access anytime anywhere use LotusLive for collaboration (sharing of reports) more transparency
Scenario 3: Project Management Scope: Create intelligent reports based on fusion of diverse data Deliverables: User-friendly, collaborative, interactive reports Timeline: 1 week (training) + 2 weeks (collection) + 1 weeks (report design) + 2 weeks (validation of reports) Resources: Reliable datasets, BI Training and Tools, Commitment of analysts Risks: Unfamiliar with Cognos, Garbage data, Context of data (food poisoning)
Thank you :)

More Related Content

Similar to Presentation

Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Prolifics
 
O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...
Pvrtechnologies Nellore
 
High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...
Silvio Sangineto
 
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMsScaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
Matei Zaharia
 
Bootstrapping - Session 1 - Your First Week with Amazon EC2
Bootstrapping - Session 1 - Your First Week with Amazon EC2Bootstrapping - Session 1 - Your First Week with Amazon EC2
Bootstrapping - Session 1 - Your First Week with Amazon EC2
Amazon Web Services
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptx
Michel Burger
 
Lessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksLessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at Databricks
Matei Zaharia
 
Using Grid Technologies in the Cloud for High Scalability
Using Grid Technologies in the Cloud for High ScalabilityUsing Grid Technologies in the Cloud for High Scalability
Using Grid Technologies in the Cloud for High Scalability
mabuhr
 
Sameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
allan sam
 
Unleashing Apache Kafka and TensorFlow in the Cloud

Unleashing Apache Kafka and TensorFlow in the Cloud
Unleashing Apache Kafka and TensorFlow in the Cloud

Unleashing Apache Kafka and TensorFlow in the Cloud

Kai Wähner
 
TechTalk_Cloud Performance Testing_0.6
TechTalk_Cloud Performance Testing_0.6TechTalk_Cloud Performance Testing_0.6
TechTalk_Cloud Performance Testing_0.6Sravanthi N
 
Spring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour DallasSpring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour Dallas
VMware Tanzu
 
It's a Dangerous World
It's a Dangerous World It's a Dangerous World
It's a Dangerous World
MongoDB
 
Muves3 Elastic Grid Java One2009 Final
Muves3 Elastic Grid Java One2009 FinalMuves3 Elastic Grid Java One2009 Final
Muves3 Elastic Grid Java One2009 FinalElastic Grid, LLC.
 
WSO2 Complex Event Processor - Product Overview
WSO2 Complex Event Processor - Product OverviewWSO2 Complex Event Processor - Product Overview
WSO2 Complex Event Processor - Product Overview
WSO2
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
acijjournal
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
sibidlegend
 
Towards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryTowards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI Story
IT Expert Club
 

Similar to Presentation (20)

Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
 
O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...
 
High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...High-throughput computing and opportunistic computing for matchmaking process...
High-throughput computing and opportunistic computing for matchmaking process...
 
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMsScaling Databricks to Run Data and ML Workloads on Millions of VMs
Scaling Databricks to Run Data and ML Workloads on Millions of VMs
 
Bootstrapping - Session 1 - Your First Week with Amazon EC2
Bootstrapping - Session 1 - Your First Week with Amazon EC2Bootstrapping - Session 1 - Your First Week with Amazon EC2
Bootstrapping - Session 1 - Your First Week with Amazon EC2
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptx
 
Lessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksLessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at Databricks
 
Using Grid Technologies in the Cloud for High Scalability
Using Grid Technologies in the Cloud for High ScalabilityUsing Grid Technologies in the Cloud for High Scalability
Using Grid Technologies in the Cloud for High Scalability
 
Sameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model types
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Unleashing Apache Kafka and TensorFlow in the Cloud

Unleashing Apache Kafka and TensorFlow in the Cloud
Unleashing Apache Kafka and TensorFlow in the Cloud

Unleashing Apache Kafka and TensorFlow in the Cloud

 
TechTalk_Cloud Performance Testing_0.6
TechTalk_Cloud Performance Testing_0.6TechTalk_Cloud Performance Testing_0.6
TechTalk_Cloud Performance Testing_0.6
 
Spring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour DallasSpring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour Dallas
 
It's a Dangerous World
It's a Dangerous World It's a Dangerous World
It's a Dangerous World
 
Muves3 Elastic Grid Java One2009 Final
Muves3 Elastic Grid Java One2009 FinalMuves3 Elastic Grid Java One2009 Final
Muves3 Elastic Grid Java One2009 Final
 
WSO2 Complex Event Processor - Product Overview
WSO2 Complex Event Processor - Product OverviewWSO2 Complex Event Processor - Product Overview
WSO2 Complex Event Processor - Product Overview
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Towards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI StoryTowards the Cloud: Architecture Patterns and VDI Story
Towards the Cloud: Architecture Patterns and VDI Story
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Presentation

  • 1. IBM SmartCloud Camp 2011 Presentation Team 3: Terry Chang Deepak Wai Phyo Kyaw Charlotte Ng Desmond See
  • 2. Scenario 1: Problem Definition To design 3-tier Application with features: load balancing failover redundancy scalability secure Solve single point of failure in our systems
  • 3. Scenario 1: Architectural Design IBM HTTP SERVER with WAS Plugin IBM HTTP SERVER with WAS Plugin LOADBALANCER LOADBALANCER INTERNET Websphere Application Server Cluster App: Clone 1 App: Clone 2 Node 1 FIREWALL App: Clone 3 App: Clone 4 IBM DB2 Server Cluster IBM SAN (Redundant Disks: RAID 10) Instance 1 Node 2 stores data Instance 2 Deployment Manager *instances will be created in different data centres around the world
  • 4. Scenario 1: Configuration in Instances Assign Virtual IP Install Pacemaker Configure Heartbeat communication layer Provision at least 2 number of VMs instances and get ready In time of failure: Reconfigure Virtual IP for the alive instance Automatic direct traffic to the alive nodes Fault-tolerance, fast recovery times, session replication
  • 5. Scenario 1: Advantages of IBM Cloud Systems What and how did we leverage IBM Technologies? IBM HTTP Server Workload Management + Loadbalancer IBM Websphere Application Server Clustering, Automatic failover IBM DB2 (with HADR/v9.5+) Database Client Nodes Clustering with HADR SQL Replication, Shared Disks/SAN Support DB2 HA: DB2 High Availability Instance Configuration Utility (db2haicu) IBM Storage Area Network SAN: RAID 1 or RAID 10 (not RAID 5) Shared Disk redundancy
  • 6. Scenario 1: Design Considerations Different Physical Locations of Instances Automatic Trigger, Notification and Configuration Data integrity after recovery/during failover/in SAN Security in configuring/writing scripts
  • 7. Scenario 1: Project Management Scope & Deliverables: Complete implementation of high availability data recovery three-tier application on SCE : from architecture to scripting configurations Configure WAS, DB2 instances and SAN nodes? Configure automated scripts, Provision monitoring instances Proposed Timeline: 100 man hours 5 persons team Resource Estimation: 2 x firewall+loadbalancer, 2x IBM HTTP Server, 2x WAS Nodes, 2x DB2 Instances, 2x SAN Sites Test Plan Test instances failure (kill the services), Test recovery process (automation, time, data integrity)
  • 8. Scenario 1: Project Risks Technical Configured incorrectly during failover and recovery Data integrity issues, session not replicated, data not copied properly SCE issues? Recovery time exceeds minimum as stated in SLA Team Inadequate skills, inexperience Manpower shortage
  • 9. Scenario 2: Problem Definition To build a scalable and multi-tenancy web portal as a platform Customer self-management portal system To provide SaaS to customer as an Independent Software Vendor Simplified and standardized technical setup of the software for the customers
  • 10. Scenario 2: Intended Design New User Registration/Login APIs - our own Business Logic (authentication, creating new account in DB)
  • 11. Scenario 2: Intended Design Dashboard for Customer ** First, Create DeveloperCloudClient to execute requests against the Cloud | DeveloperCloudClientgetClient()
  • 12.
  • 13. Scenario 2: Intended Design Billing information
  • 14. Scenario 2: Project Management Scope Web portal DB2 – (customer authentication and data storage) Proxy server Business logic Deliverables Create portal system with fully functioning interface Create database integrated system + a relational database Add security features to protect customers’ data Modularized and loosely coupled system(Use of RESTful Services)
  • 15. Scenario 2: Test Process Create multiple same Customer IDs Create > 5 instances of VM which is over the limitation Create Failover at either the SCE side or Proxy server. Give wrong user credentials Accuracy of the billings
  • 16. Scenario 2: Project Risks Technical Security – authentication between users and proxy server or proxy server and SCE Failover and workload balance at SCE, proxy server Connection timeout between client, proxy and SCE Configuration error in creating the instances of the vm or application. SCE unable to create instances or access Team Skill and knowledge inadequate Illness, MC Underestimation of projected timeline Service level agreement
  • 17. Scenario 2: Advantages of Cloud Systems Low total cost of ownership of the equipment Flexible usage of the services : Pay Per Use, Utility Billing High availability Handle Variable Demand (Dynamic Load) Pervasiveness (Anytime, anywhere)
  • 18. Scenario 2: Design Considerations Customers information security Standardization and automation User friendly interfaces Cost saving
  • 19. Scenario 3: Problem Definition Aim: Provide information to managers and identifying poor/well-performing branches (acc to branch, then country, then continent) Business problem: Unable to make adequate decisions because data is confusing and not presented in a readable format for further analysis
  • 20. Scenario 3: Dummy Data Extracted, transformed and selected data from OLTP (ETL Process)
  • 21. Scenario 3: How Cognos can help Rainbow Food Shopping experience: Identify, report on and analyze trends Use predictive models and association rules Gain insight into customer perceptions of service, store, products and merchandising Promotion and merchandise planning: Optimize merchandise levels and inventory Conduct market basket analysis Develop plans for key financial indicators Smarter operations: Set, measure and monitor key performance metrics based on standard financial statements. Use predictive models to improve recruitment and optimize staffing decisions. Gain visibility into key metrics across the chain: sales, labor, inventory and promotions Monitor turnover and employee productivity
  • 22. Scenario 3: Generated Reports Expense and Revenue across Shifts Product Sales over Five Years
  • 23. Scenario 3: Generated Reports Geospatial analysis of performance of Rainbow Food outlets for products, for staffing
  • 24. Scenario 3: Intelligence Staff underutilization: understand which area is understaffed during particular shifts with maps and other outlets’ realtime data, we can relocate staff instead of retrenching or letting them idle Non-selling products: different regions have different tastes varies from time to time as well remove unpopular food items from menu analyze new food trends Mashup (interconnected) intelligence: import external datasets (eating habits, demographics, research agencies)
  • 25. Scenario 3: Leveraging Cloud Systems Why Cognos, instead of Excel? can handle large datasets can draw data from different sources real-time multiple parties can gain insights at the same time, share data all stakeholders can access anytime anywhere use LotusLive for collaboration (sharing of reports) more transparency
  • 26. Scenario 3: Project Management Scope: Create intelligent reports based on fusion of diverse data Deliverables: User-friendly, collaborative, interactive reports Timeline: 1 week (training) + 2 weeks (collection) + 1 weeks (report design) + 2 weeks (validation of reports) Resources: Reliable datasets, BI Training and Tools, Commitment of analysts Risks: Unfamiliar with Cognos, Garbage data, Context of data (food poisoning)