SlideShare a Scribd company logo
Ruler
Accelerating rule-management
David Subiros and Luis M. Vaquero
Rule-based Systems
2
Main Idea: to capture the knowledge of a human expert in a specialized domain and embody it within a
software system.
Knowledge is stored as rules of the form IF condition THEN action: If income < 1000 THEN deny-
mortgage
• The UK’s NHS Direct adviser https://www.nhs.uk/symptom-checker/
• Ikea online assistant – an RBS with a chatbox interface
http://www.ikea.com/ms/en_GB/customer_service/contact_us/contact.html
• American Express Authorizer’s Assistant – developed in 1988, but still in use today - processes credit
requests, deciding whether to authorise or deny - very large: around 35,000 rules
• The iptables rules in all the machines and VMs in your data centre
• The technical analysis rules used by your pension schema manager
• At HPE: ArcSight, NFV Director, Helion … rely on rules
3
Problem
4
Corruptissima re publica plurimae leges. Tacitus
• Experts introduce 8% overlapped rules in firewall configs (beginners up to 27%) [1]
• Situation worsened by the presence of many (siloed) automatic management (configuration churn)
• Detecting conflicting/overlapped rules is
o Slow
o Error prone
o Tedious
o Not scalable
• Heavily relying on expert knowledge
• Hard to debug
• Severely impacts performance
[1] Al-Shaer and Hamed. Modeling and management of firewall rules.
Challenges
1. Define generic rule similarity metrics
– Combinatorial explosion at a semantic level
– Curse of dimensionality
2. Visual representation of rules
3. Rule execution optimisation
Challenges
1. Define generic rule similarity metrics
– Combinatorial explosion at a semantic level
– Curse of dimensionality
2. Visual representation of rules
3. Rule execution optimisation
Example: X<-12 AND Y in [-5,0] AND Z in {cat, dog, 3.4} OR X in (-8, 5.01] AND Y in [-7,2)
z
x
-inf. …
y
-7
2
5.01
{cat, dog, 3.4}
{all z elements}
-8-12
Limited by
Dimension
-5
Rule Similarity
2 patents filed on this idea
Rule Similarity
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
0 200 400 600 800 1000 1200
Timetoaddanewrule[sec]
Number of intersections between the new rule and existing
rules
Rule Similarity
Number of rules in the system
Timetoaddanewrule[sec]
New rule mapped
to
4 hyperrectangles
New rule mapped
to
2 hyperrectangles
New rule maped to
1 hyperrectangle
Challenges
1. Define generic rule similarity metrics
– Combinatorial explosion at a semantic level
– Curse of dimensionality
2. Visual representation of rules
3. Rule execution optimisation
Visual Representation
11
Challenges
1. Define generic rule similarity metrics
– Combinatorial explosion at a semantic level
– Curse of dimensionality
2. Visual representation of rules
3. Rule execution optimisation
Execution Optimisation
13
&& &&R1
R2
R3 ¦¦
R4
Logical View of the Rules
Execution Optimisation
14
Execution View
Execution Optimisation
15
Execution View (II)
Event1
Execution Optimisation
16
Execution View (II)
True
True
False
False
Execution Optimisation
17
Exec results
Execution Optimisation
18
&& &&R1
R2
R3 ¦¦
R4
Logical View Reconstruction
Exec results
hank you
Contact: Luis M. Vaquero luis.vaquero@hpe.com

More Related Content

Similar to Ruler duplication detector

How your very large databases can work in the cloud computing world?
How your very large databases can work in the cloud computing world?How your very large databases can work in the cloud computing world?
How your very large databases can work in the cloud computing world?
Moshe Kaplan
 
1 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 2009
1 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 20091 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 2009
1 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 2009
Moshe Kaplan
 
17 2 expert systems
17 2 expert systems17 2 expert systems
17 2 expert systems
Tianlu Wang
 
Extract The Traffic From The Db
Extract The Traffic From The DbExtract The Traffic From The Db
Extract The Traffic From The Db
Moshe Kaplan
 
A practical look at how to build & run IoT business logic
A practical look at how to build & run IoT business logicA practical look at how to build & run IoT business logic
A practical look at how to build & run IoT business logic
Veselin Pizurica
 
Rule based expert system
Rule based expert systemRule based expert system
Rule based expert system
Abhishek Kori
 
OPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoringOPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT TECHNOLOGIES
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
CloudPassage
 
Final Master's Defense Presentation : Policy-driven Security Management in Ga...
Final Master's Defense Presentation : Policy-driven Security Management in Ga...Final Master's Defense Presentation : Policy-driven Security Management in Ga...
Final Master's Defense Presentation : Policy-driven Security Management in Ga...
Clinton DSouza
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
IMPULSE_TECHNOLOGY
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
IMPULSE_TECHNOLOGY
 
Expert systems from rk
Expert systems from rkExpert systems from rk
Expert systems from rk
ramaslide
 
Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
tlerell
 
Artificial Intelligence for Automated Decision Support Project
Artificial Intelligence for Automated Decision Support ProjectArtificial Intelligence for Automated Decision Support Project
Artificial Intelligence for Automated Decision Support Project
Valerii Klymchuk
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
ManageEngine, Zoho Corporation
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
catheryncouper
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
eSAT Journals
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
eSAT Publishing House
 
201810003 201750007project report
201810003 201750007project report201810003 201750007project report
201810003 201750007project report
ssuser219889
 
FIWARE Policy Manager - Bosun
FIWARE Policy Manager - BosunFIWARE Policy Manager - Bosun
FIWARE Policy Manager - Bosun
Guillermo Jimenez Prieto
 

Similar to Ruler duplication detector (20)

How your very large databases can work in the cloud computing world?
How your very large databases can work in the cloud computing world?How your very large databases can work in the cloud computing world?
How your very large databases can work in the cloud computing world?
 
1 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 2009
1 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 20091 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 2009
1 Billion Events per Day, Israel 3rd Java Technology Day, June 22, 2009
 
17 2 expert systems
17 2 expert systems17 2 expert systems
17 2 expert systems
 
Extract The Traffic From The Db
Extract The Traffic From The DbExtract The Traffic From The Db
Extract The Traffic From The Db
 
A practical look at how to build & run IoT business logic
A practical look at how to build & run IoT business logicA practical look at how to build & run IoT business logic
A practical look at how to build & run IoT business logic
 
Rule based expert system
Rule based expert systemRule based expert system
Rule based expert system
 
OPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoringOPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoring
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Final Master's Defense Presentation : Policy-driven Security Management in Ga...
Final Master's Defense Presentation : Policy-driven Security Management in Ga...Final Master's Defense Presentation : Policy-driven Security Management in Ga...
Final Master's Defense Presentation : Policy-driven Security Management in Ga...
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 
Expert systems from rk
Expert systems from rkExpert systems from rk
Expert systems from rk
 
Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
 
Artificial Intelligence for Automated Decision Support Project
Artificial Intelligence for Automated Decision Support ProjectArtificial Intelligence for Automated Decision Support Project
Artificial Intelligence for Automated Decision Support Project
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
 
201810003 201750007project report
201810003 201750007project report201810003 201750007project report
201810003 201750007project report
 
FIWARE Policy Manager - Bosun
FIWARE Policy Manager - BosunFIWARE Policy Manager - Bosun
FIWARE Policy Manager - Bosun
 

Recently uploaded

zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
AnkitaPandya11
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
NishanthaBulumulla1
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 

Recently uploaded (20)

zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.fiscal year variant fiscal year variant.
fiscal year variant fiscal year variant.
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 

Ruler duplication detector

  • 2. Rule-based Systems 2 Main Idea: to capture the knowledge of a human expert in a specialized domain and embody it within a software system. Knowledge is stored as rules of the form IF condition THEN action: If income < 1000 THEN deny- mortgage • The UK’s NHS Direct adviser https://www.nhs.uk/symptom-checker/ • Ikea online assistant – an RBS with a chatbox interface http://www.ikea.com/ms/en_GB/customer_service/contact_us/contact.html • American Express Authorizer’s Assistant – developed in 1988, but still in use today - processes credit requests, deciding whether to authorise or deny - very large: around 35,000 rules • The iptables rules in all the machines and VMs in your data centre • The technical analysis rules used by your pension schema manager • At HPE: ArcSight, NFV Director, Helion … rely on rules
  • 3. 3
  • 4. Problem 4 Corruptissima re publica plurimae leges. Tacitus • Experts introduce 8% overlapped rules in firewall configs (beginners up to 27%) [1] • Situation worsened by the presence of many (siloed) automatic management (configuration churn) • Detecting conflicting/overlapped rules is o Slow o Error prone o Tedious o Not scalable • Heavily relying on expert knowledge • Hard to debug • Severely impacts performance [1] Al-Shaer and Hamed. Modeling and management of firewall rules.
  • 5. Challenges 1. Define generic rule similarity metrics – Combinatorial explosion at a semantic level – Curse of dimensionality 2. Visual representation of rules 3. Rule execution optimisation
  • 6. Challenges 1. Define generic rule similarity metrics – Combinatorial explosion at a semantic level – Curse of dimensionality 2. Visual representation of rules 3. Rule execution optimisation
  • 7. Example: X<-12 AND Y in [-5,0] AND Z in {cat, dog, 3.4} OR X in (-8, 5.01] AND Y in [-7,2) z x -inf. … y -7 2 5.01 {cat, dog, 3.4} {all z elements} -8-12 Limited by Dimension -5 Rule Similarity 2 patents filed on this idea
  • 8. Rule Similarity 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.2 0 200 400 600 800 1000 1200 Timetoaddanewrule[sec] Number of intersections between the new rule and existing rules
  • 9. Rule Similarity Number of rules in the system Timetoaddanewrule[sec] New rule mapped to 4 hyperrectangles New rule mapped to 2 hyperrectangles New rule maped to 1 hyperrectangle
  • 10. Challenges 1. Define generic rule similarity metrics – Combinatorial explosion at a semantic level – Curse of dimensionality 2. Visual representation of rules 3. Rule execution optimisation
  • 12. Challenges 1. Define generic rule similarity metrics – Combinatorial explosion at a semantic level – Curse of dimensionality 2. Visual representation of rules 3. Rule execution optimisation
  • 13. Execution Optimisation 13 && &&R1 R2 R3 ¦¦ R4 Logical View of the Rules
  • 16. Execution Optimisation 16 Execution View (II) True True False False
  • 18. Execution Optimisation 18 && &&R1 R2 R3 ¦¦ R4 Logical View Reconstruction Exec results
  • 19. hank you Contact: Luis M. Vaquero luis.vaquero@hpe.com

Editor's Notes

  1. This is a sample Multi-level Organization Chart (without pictures), ideal for complex and larger groups. This chart is supplemental to the simplified organization charts included in this template. This organization chart is built with PowerPoint shapes. When customizing, please keep in mind the following: Use the primary and neutral color palettes for organization charts, and do not use any effects or accent colors. Unused chart elements may be removed, such as additional levels or photo placeholders. Follow the chart key to accurately label and identify each member and report level. To add additional levels or information, manually copy and paste the template shapes to maintain formatting. The shape and text may need to be resized to accommodate additional levels of reports or labels.
  2. This is a sample Multi-level Organization Chart (without pictures), ideal for complex and larger groups. This chart is supplemental to the simplified organization charts included in this template. This organization chart is built with PowerPoint shapes. When customizing, please keep in mind the following: Use the primary and neutral color palettes for organization charts, and do not use any effects or accent colors. Unused chart elements may be removed, such as additional levels or photo placeholders. Follow the chart key to accurately label and identify each member and report level. To add additional levels or information, manually copy and paste the template shapes to maintain formatting. The shape and text may need to be resized to accommodate additional levels of reports or labels.
  3. This is a sample Multi-level Organization Chart (without pictures), ideal for complex and larger groups. This chart is supplemental to the simplified organization charts included in this template. This organization chart is built with PowerPoint shapes. When customizing, please keep in mind the following: Use the primary and neutral color palettes for organization charts, and do not use any effects or accent colors. Unused chart elements may be removed, such as additional levels or photo placeholders. Follow the chart key to accurately label and identify each member and report level. To add additional levels or information, manually copy and paste the template shapes to maintain formatting. The shape and text may need to be resized to accommodate additional levels of reports or labels.
  4. This is a sample Multi-level Organization Chart (without pictures), ideal for complex and larger groups. This chart is supplemental to the simplified organization charts included in this template. This organization chart is built with PowerPoint shapes. When customizing, please keep in mind the following: Use the primary and neutral color palettes for organization charts, and do not use any effects or accent colors. Unused chart elements may be removed, such as additional levels or photo placeholders. Follow the chart key to accurately label and identify each member and report level. To add additional levels or information, manually copy and paste the template shapes to maintain formatting. The shape and text may need to be resized to accommodate additional levels of reports or labels.
  5. This is a sample Multi-level Organization Chart (without pictures), ideal for complex and larger groups. This chart is supplemental to the simplified organization charts included in this template. This organization chart is built with PowerPoint shapes. When customizing, please keep in mind the following: Use the primary and neutral color palettes for organization charts, and do not use any effects or accent colors. Unused chart elements may be removed, such as additional levels or photo placeholders. Follow the chart key to accurately label and identify each member and report level. To add additional levels or information, manually copy and paste the template shapes to maintain formatting. The shape and text may need to be resized to accommodate additional levels of reports or labels.
  6. This is a sample Multi-level Organization Chart (without pictures), ideal for complex and larger groups. This chart is supplemental to the simplified organization charts included in this template. This organization chart is built with PowerPoint shapes. When customizing, please keep in mind the following: Use the primary and neutral color palettes for organization charts, and do not use any effects or accent colors. Unused chart elements may be removed, such as additional levels or photo placeholders. Follow the chart key to accurately label and identify each member and report level. To add additional levels or information, manually copy and paste the template shapes to maintain formatting. The shape and text may need to be resized to accommodate additional levels of reports or labels.