1) The company provides software and services to over 1,000 financial institutions and was struggling to backup extremely large volumes of sensitive customer data from its production facility to a disaster recovery site within narrow 15 minute windows due to bandwidth limitations over its T1 link.
2) The company deployed Silver Peak NX-3500 appliances in both locations, which reduced WAN bandwidth usage by 50x during peaks and 15x on average through data deduplication and compression. This allowed full backups to complete in under a minute.
3) The Silver Peak solution provided security benefits through hardware-based AES encryption and improved the company's disaster recovery capabilities while reducing costs associated with database resynchronization issues, providing a rapid ROI.
Delivering New Building Blocks for Construction Faster with HP Client Virtual...jerianasmith
There was more happening in the U.S. after World War II than Elvis Presley, hamburger joints, and big-finned American cars. The postwar era’s rapid population expansion led to a massive need for increased housing.
Distinguishing, Evaluating, and Selecting Cloud Service ProvidersGartnerJessica
This presentation is focused on addressing the broad category of Cloud Service Providers. Gartner will provide a overview of how Cloud Service Providers are being defined and how they different from traditional providers of outsourcing or products. And more importantly, what are they offering that is different, new and seeks to solve business problems for the enterprise. This session will provide an overview of these areas and begin the discussion of how do clients develop the business case for certain cloud services offerings.
Topics Discussed
Gartner analysts discussed with participants the following topics:
What is a cloud service provider and how does it differ from traditional outsourcing providers?
How will the approaches to evaluate and select among these providers differ?
How does the business case analysis differ?
Why would you should trust Stack Harbor with your Data
The Most performance and security oriented Canadian cloud company.
Learn more about our all SSD instances comparable and outperforming AWS, Azure, soft layer, iWeb etc..
Delivering New Building Blocks for Construction Faster with HP Client Virtual...jerianasmith
There was more happening in the U.S. after World War II than Elvis Presley, hamburger joints, and big-finned American cars. The postwar era’s rapid population expansion led to a massive need for increased housing.
Distinguishing, Evaluating, and Selecting Cloud Service ProvidersGartnerJessica
This presentation is focused on addressing the broad category of Cloud Service Providers. Gartner will provide a overview of how Cloud Service Providers are being defined and how they different from traditional providers of outsourcing or products. And more importantly, what are they offering that is different, new and seeks to solve business problems for the enterprise. This session will provide an overview of these areas and begin the discussion of how do clients develop the business case for certain cloud services offerings.
Topics Discussed
Gartner analysts discussed with participants the following topics:
What is a cloud service provider and how does it differ from traditional outsourcing providers?
How will the approaches to evaluate and select among these providers differ?
How does the business case analysis differ?
Why would you should trust Stack Harbor with your Data
The Most performance and security oriented Canadian cloud company.
Learn more about our all SSD instances comparable and outperforming AWS, Azure, soft layer, iWeb etc..
InfoSphere Streams is an advanced computing platform that can quickly ingest, analyze and correlate information as it arrives from thousands of real-time sources.
IT professionals are being asked to do more with less and highly skilled resources are in demand. As streaming applications play a growing role in critical applications so does the need for simplicity. InfoSphere Streams empowers IT users of all types and skill levels to have deeper insights into operations and performance. In today’s engaged world, a five minute delay means business goes elsewhere. A new administration console, a Java Management Extensions (JMX) management and monitoring application programming interface (API), simpler security and adoption of Apache Zookeeper are now available in InfoSphere Streams
Digital Transformation today is recreating business models, disrupting how customers and employees function and altering whole industries. Social and business value surges when people, devices and resources are digitally connected, digitalized knowledge becomes a commonly shared asset and artificial intelligence is leveraged to yield new insights.
The Third Platform: Paul Maritz is breeding new technology for a new IT eraVMware Tanzu
Paul Maritz sits down for an interview to discuss his viewpoints on the third platform and explains how open systems are critical for the future of IT.
Internap’s Adam Weissmuller and Michael Carman of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a provider.
A comprehensive introduction to Cloud Computing. Learn what it is, how it works, where it might be applicable, and when to avoid it. Presented by C3 / Cloud Computing Concepts Managing Partner, Rick Mancinelli.
CIOs and CTOs are now increasingly in step with CEOs’ top priorities. Some long-held assumptions remain true as well. Every CTO still has to deliver excellence in the fundamentals: the secure and reliable delivery of information technology is one example. IBM Aspera High Speed Data Center and Cloud Sync solutions help CTOs and their organizations innovate and accelerate their data migration and sync activities.
Electrical power – it surrounds us wherever we go. In our homes, we have a seemingly endless supply
of electricity. Every electrical outlet represents another dynamic source of energy to power our many devices. A new air conditioner – plug it in. A new TV – plug it in. A new microwave oven – plug it in.
Moreover, we are constantly on a quest for more – an Xbox here, a surround sound system there. Of
course, there are limits to the amount of electricity that you can put on any one circuit in your home before
the circuit breaker trips and everything on that circuit stops. That is why we have multiple circuits; it
enables us to plug in even more devices until we reach the limit of energy being supplied to us. Unfortunately,
we do not have a dedicated power source for our homes; it is more like a 1940’s telephone party
line: we must share it with all of our neighbors.
Internap’s John Freimuth and Steve LeClair of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a provider to meet your virtualization goals.
Internap’s Adam Weissmuller and Michael Carman of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a pro
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
(Presented by CoreSite) The cloud-enabled data center sits at the center of IT transformation. It facilitates the interconnection and communities that come together, propelling growth for both buyers and sellers. Learn how CoreSite is bringing together best-of-breed partners through the Open Cloud Exchange, resulting in public, private, and hybrid IT interconnection and management as well as integration of AWS Direct Connect.
InfoSphere Streams is an advanced computing platform that can quickly ingest, analyze and correlate information as it arrives from thousands of real-time sources.
IT professionals are being asked to do more with less and highly skilled resources are in demand. As streaming applications play a growing role in critical applications so does the need for simplicity. InfoSphere Streams empowers IT users of all types and skill levels to have deeper insights into operations and performance. In today’s engaged world, a five minute delay means business goes elsewhere. A new administration console, a Java Management Extensions (JMX) management and monitoring application programming interface (API), simpler security and adoption of Apache Zookeeper are now available in InfoSphere Streams
Digital Transformation today is recreating business models, disrupting how customers and employees function and altering whole industries. Social and business value surges when people, devices and resources are digitally connected, digitalized knowledge becomes a commonly shared asset and artificial intelligence is leveraged to yield new insights.
The Third Platform: Paul Maritz is breeding new technology for a new IT eraVMware Tanzu
Paul Maritz sits down for an interview to discuss his viewpoints on the third platform and explains how open systems are critical for the future of IT.
Internap’s Adam Weissmuller and Michael Carman of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a provider.
A comprehensive introduction to Cloud Computing. Learn what it is, how it works, where it might be applicable, and when to avoid it. Presented by C3 / Cloud Computing Concepts Managing Partner, Rick Mancinelli.
CIOs and CTOs are now increasingly in step with CEOs’ top priorities. Some long-held assumptions remain true as well. Every CTO still has to deliver excellence in the fundamentals: the secure and reliable delivery of information technology is one example. IBM Aspera High Speed Data Center and Cloud Sync solutions help CTOs and their organizations innovate and accelerate their data migration and sync activities.
Electrical power – it surrounds us wherever we go. In our homes, we have a seemingly endless supply
of electricity. Every electrical outlet represents another dynamic source of energy to power our many devices. A new air conditioner – plug it in. A new TV – plug it in. A new microwave oven – plug it in.
Moreover, we are constantly on a quest for more – an Xbox here, a surround sound system there. Of
course, there are limits to the amount of electricity that you can put on any one circuit in your home before
the circuit breaker trips and everything on that circuit stops. That is why we have multiple circuits; it
enables us to plug in even more devices until we reach the limit of energy being supplied to us. Unfortunately,
we do not have a dedicated power source for our homes; it is more like a 1940’s telephone party
line: we must share it with all of our neighbors.
Internap’s John Freimuth and Steve LeClair of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a provider to meet your virtualization goals.
Internap’s Adam Weissmuller and Michael Carman of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a pro
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
(Presented by CoreSite) The cloud-enabled data center sits at the center of IT transformation. It facilitates the interconnection and communities that come together, propelling growth for both buyers and sellers. Learn how CoreSite is bringing together best-of-breed partners through the Open Cloud Exchange, resulting in public, private, and hybrid IT interconnection and management as well as integration of AWS Direct Connect.
The dynamic nature of SaaS applications can slow performance due to the distance between the cloud and users. Riverbed accelerates the delivery of SaaS applications by up to 33x. Join us for this session to find out how you can accelerate applications and manage the delivery of business-critical data and content from your SaaS provider overcoming application latency, control quality of service, remove loss of visibility and bandwidth constraints. http://rvbd.ly/2hpKls6
Inspire Creativity with Immersive Learning ExperiencesHP
The Sprout Pro by HP with Intel (TM) i7 Processor (R) provides technology that will empower staff and students and enrich technology experiences in any community.
We interviewed thirty of today's top thinkers in artificial intelligence to get a glimpse of what's coming next - the direction technology and applications will take over the next ten years.
In this session, you'll learn what’s new and hot with AWS Lambda. Come learn about what we’ve been working on and what we are planning for the future. You'll get a hands-on demonstration of some our newest features.
Customer Name: WIND
Industry: Service Provider
Location: Italy
Number of Employees: 8000
Challenge
• Reduce capital expenditure
• Improve efficiency, productivity, and application response time
• Reduce time to implement new contact center site or add agents
Solution
• 1200 agents supporting 22.7 million mobile and broadband customers with new Cisco Desktop Virtualization solution based on the Cisco Unified Computing System
Results
• Average call-waiting time reduced by 40 percent
• Agent productivity increased by 20 percent
• Customer relationship management workflow cut by 40 percent, normal service requests completed 35 percent faster
Real World Use Cases and Success Stories for In-Memory Data Grids (TIBCO Acti...Kai Wähner
A lot of data grid products are available. TIBCO ActiveSpaces, Oracle Coherence, Infinispan, IBM WebSphere eXtreme Scale, Hazelcast, Gigaspaces, GridGain, Pivotal Gemfire to name most of the important ones. Not SAP HANA!
The goal of my talk was not very technical. Instead, I discussed several different real world use cases and success stories for using in-memory data grids. Here is the abstract for my talk:
NoSQL is not just about different storage alternatives such as document store, key value store, graphs or column-based databases. The hardware is also getting much more important. Besides common disks and SSDs, enterprises begin to use in-memory storages more and more because a distributed in-memory data grid provides very fast data access and update. While its performance will vary depending on multiple factors, it is not uncommon to be 100 times faster than corresponding database implementations. For this reason and others described in this session, in-memory computing is a great solution for lifting the burden of big data, reducing reliance on costly transactional systems, and building highly scalable, fault-tolerant applications.The session begins with a short introduction to in-memory computing. Afterwards, different frameworks and product alternatives are discussed for implementing in-memory solutions. Finally, the main part of this session shows several different real world uses cases where in-memory computing delivers business value by supercharging the infrastructure.
Why Application Delivery matters in the Digital economyCitrix
Develop Apps. Deploy Apps. But how good is your Application Delivery? See why high-quality application delivery matters, and how organizations tackle the challenge.
Learn more: http://bit.ly/1SoU7X3
Halkbank Serves Customers 24/7 Across Channels and Meets Business Continuity ...NetApp
The Challenge
Decrease overhead, speed time to market for new products, and safeguard customers’ financial data, all while supporting data growth rates of 50% annually.
The Solution
Enable disaster recovery and provide continuous, multichannel customer service with NetApp, Cisco, and VMware.
Ομιλία – Παρουσίαση: Παναγιώτης Μαστρογιάννης, Manager, IT, Distributed Systems, New SIA Greece
Τίτλος παρουσίασης: «New SIA Greece Automates Data Movement and Distribution with IBM Watson Supply Chain MFT Solution»
Taxonomy and Terminology: The Crossroad of Controlled VocabularyContent Rules, Inc.
Many people are confused about taxonomy and terminology. And with good reason. Both taxonomy and terminology use words – often the same words. They are both ways of controlling your vocabulary. However, taxonomy and terminology are used for different purposes. In this presentation, we define taxonomy and terminology. We examine how they are different and where they intersect. We also cover some best practices for managing them both.
Taking Your Content to Global Proportinos - Global Website Best PracticesContent Rules, Inc.
This half-day workshop looks at the good, the bad, and the ugly of global websites. Along the way, we discuss best practices, see some stellar examples, and analyze some disasters.
Personas are person-driven stereotypes that we use to create personalized content. However, personas are specific to a culture. If your company sells to a global marketplace, creating personas for every target customer, in every culture, in every language does not scale. This presentation presents Hofstede's cultural dimensions as an alternative framework for creating culture-specific content for the global marketplace.
Got words? I bet you do. This presentation covers managing your terminology - your source terminology, to be specific. It discusses why terminology management is important, what happens if you don't care, the benefits in translation if you do, and how to go about managing your source terminology.
This is the presentation I gave at the first meeting of the San Francisco Content Strategy / Content Marketing Pros Meetup group. In it, I discuss the seven components of a global content strategy. I also cover issues that are likely to arise as you embark on internationalizing your content
Your Brain on XML: Structured Content and Operational EfficiencyContent Rules, Inc.
If your brain was on XML, it would be organized. You'd be able to access any memory, conversation, and so on. You'd be able to find memories because they'd be semantically tagged.
But alas, only content can be on XML. In this presentation, we talk about how structured content effects operational efficiency and what you can do to your content to make using it more efficient.
WikiProject Medicine: Breaking Down Barriers to Save LivesContent Rules, Inc.
Imagine a world in which every single person is given free access to the sum of all medical knowledge. In their own language. That's what we're doing.
UCSF Medical School, WikiMedia Foundation, and Translators without Borders have teamed to make this vision a reality.
But, it takes more than interested people doing good things for the world. It also takes technology to provide the infrastructure and mechanisms to make this happen.
This presentation describes the efforts of hundreds of people and the technologies they are using to overcome various barriers that we face in order to save lives throughout the world.
Are you translating your content? Are you looking for ways to make your translations better, cheaper, and faster? Look no further. What you need is global-ready content.
It's a fact. If you fix your source content one time, prior to translation, your translations will be more accurate. They will also be less expensive. And your in-country reviewers will need to iterate with each translator far fewer times.
This presentation introduces Content Rules and describes our global readiness service and why you should care.
P03 swisher val_developing a global content strategy_swisherContent Rules, Inc.
If you want to deliver the right information to the right people, at the right time, in the right format and language, you must start with a content strategy. Attend this full-day workshop to learn how to get started. We will teach attendees the seven components of global content strategy, how to conduct a content inventory and content audit, and we will share a useful mix of global content strategy best practices. Attendees will break off into groups and participate in real-world, hands-on exercises including working on actual website content. They’ll participate in an online global website content inventory and audit (using a web-based tool) and share their recommendations with the group.
Everyone's talking about global content strategy these days. But few actually show you how to do it. In this presentation, you learn about the seven components of a global content strategy.
Using Language to Change the World - Translators Without BordersContent Rules, Inc.
Knowledge is power. It saves lives, lifts people out of poverty, ensures better health and nutrition, creates and maintains economies.
Access to information is critical. Language barriers cost lives. Aid groups working in crisis-situations face a mission-critical challenge in disseminating knowledge in the language of those that who need it.
Translators Without Borders is a humanitarian non-profit. Our mission is to promote the transfer of knowledge from one language to another by creating and managing a community of NGOs who need translations and professional, vetted translators who volunteer their time to help.
Thinking Strategically About Content Destined for Machine TranslationContent Rules, Inc.
Are you treating your content as a strategic asset? If not, you should. This presentation looks at the history of content creation and translation, how we create and translate content today, and how the quality of your source content effects the output of machine translation.
Learn about how to get the most from your content by focusing on the efficient of your terminology. Terminology affects structured authoring, translation, and more. Find out the dirty little secret about corporate style guides. Learn what you need to do to maintain your brand without losing your mind.
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...Content Rules, Inc.
This presentation covers the effect of source content terminology on three distinct areas of a global content strategy:
- Structured authoring
- Translation
- Global Mobile
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Free Complete Python - A step towards Data Science
Silver Peak Case Study
1. FI NANCIAL
SE R V ICES
CUSTOM E R P ROFI LE
BANKING ON SILVER PEAK for secure
RELIABLE DISASTER RECOVERY
QUick facts
»
Leading software development
shop and application service
provider to financial industry;
serving over 1,000 clients for over
twenty years
» High volumes of data and limited bandwidth
made it difficult to perform remote backup
during allocated transaction windows
» Silver Peak NX-3500 appliances deployed
in production data center and disaster
recovery location
RESULTS
» 50x reduction in WAN bandwidth (peak);
15x data reduction on average
» Transfers reduced from 15 minutes to
less than a minute
» Sensitive client information protected
using hardware based, 128 bit AES
encryption
» Solution taken out of box,
configured, and deployed
in less than an hour
Background
For more than twenty years, this software development shop and application service
provider, has been focused on the financial services and banking industry, delivering
integrated solutions that address business process needs. The company developed the
first integrated relationship management solution for bankers, and was the first to offer
common platforms for loan origination across the lending process. The company’s clients,
which include more than 1,100 banking, credit union and financial services institutions,
draw on the company’s business expertise to improve critical processes, and leverage
its commercial loan origination and customer management solutions as their enabling
technologies.
“Before, we were struggling to keep pace with our
growing disaster recovery needs. Now, we have no
problem backing up extremely large volumes of
data throughout the day.”
— Senior Network Administrator
Recently, this company was acquired by
a global leader in providing value-added
information solutions to organizations
and consumers. The new company works
with more than 50,000 clients across
diverse industries, including financial
services, telecommunications, health care,
insurance, retail and catalog, automotive,
manufacturing, leisure, utilities, ecommerce, property and government.
so much data to backup,
so little time
As a leading software development
shop and application service provider
for numerous financial institutions, the
company handles large volumes of sensitive
information
For a variety of clients distributed
throughout the US, Europe, Asia, and
Australia, not surprisingly, disaster recovery
is a major priority.
Client information is backed up hourly
from a production facility in Carmel,
Indiana to a disaster recovery site near
Indianapolis. Four backup jobs are run
every hour, from 5 AM to 11 PM every
day. These sites are connected via a T1
link, which quickly becomes saturated as
large volumes of SQL transactions are
required to synchronize client databases
across both locations.
2. FI NANCIAL
SE R V ICES
“We believed
that there had
to be a way to
more efficiently
utilize the
bandwidth we
had, rather than
falling into the
endless trap
of constantly
adding more
bandwidth.”
“Each of our customers requires
their own database. As a result, our
disaster recovery system has become
a victim of the company’s success,”
said the company’s Senior Network
Administrator. “As volumes of data
increased over time, we rapidly saw
our T1 link become saturated at peak
transfer times.”
fast, secure, reliable,
and flexible
The company evaluated a variety
of different vendors to find an
application delivery solution that
could meet their networking needs
and business requirements. They
concentrated their evaluation criteria
into the following key decision areas:
The company began experiencing
instances where they could not get all
information form one site to the other
during allocated 15 minute windows.
This would cause the databases at
each location to get out of synch. The
only way to fix this was to go to the
disaster recovery site and load the
updated data from scratch, which was
not very scalable, or cost effective.
This problem, which sometimes
occurred as often as every two weeks,
would take approximately 8 hours to
fix – a major distraction for a busy IT
group.
» Reduce replication time —
First and foremost the company
required a solution that would
enable them to complete all
backup transactions within their
allotted half hour window.
» Security — The company commonly
deals with private information when
performing projects for its financial
clients. As the company could not
risk exposing this information to
unauthorized access, data protection
was a very important decision criteria.
» Support for a wide breadth of
With the pending acquisition, the
company did not want to upgrade
the T1 link between their sites in
Indiana. Furthermore, they questioned
whether throwing bandwidth at the
problem was the right long term
solution.
current and future applications —
In addition to their immediate
need to support disaster recovery,
the company required that their
application delivery solution be
compatible with future applications.
» Appliance scalability —
“Most of the data that was saturating
the T1 link was repetitive information.
It was already located in the disaster
recovery site, but we had to send
it again each time a database was
backed up,” said Beasely. “We
believed that there had to be a way to
more efficiently utilize the bandwidth
we had, rather than falling into the
endless trap of constantly adding more
bandwidth.”
2
The company had plans to
eventually upgrade their existing
T1 link to a higher capacity link as
disaster recovery facilities migrated
to new locations. They required
a solution that could grow with
the company as their application
delivery needs increased.
CUSTOM E R P ROFI LE
the solution —
Silver Peak NX Series
Appliances
The company evaluated a variety
of different solutions from multiple
vendors, before ultimately choosing
and implementing Silver Peak NXSeries appliances in their network.
The company deployed Silver Peak
NX-3500 appliances in both the
Carmel and Indianapolis locations
as a cost effective and secure way
of providing an order of magnitude
performance improvement for their
backup operations.
The primary reason the company
chose the NX-3500 was for Silver
Peak’s innovative Network Memory™
technology. Network memory uses
advanced fingerprinting technology to
inspect bytestreams of information as
they are sent between the company’s
facilities, and store this information
in local data repositories on each
NX Series appliance. If repetitive
information is detected by the near
end Silver Peak appliance, it will
instruct the far end appliance to
deliver the information locally, rather
than transmit it across the WAN. If
“similar” information is detected,
Network Memory would identify
the variation and transmit just the
“delta” across the WAN. This process
conserves precious WAN bandwidth,
while dramatically reducing application
response times – enabling the
company to easily backup up their
growing volume of client databases in
short transaction windows.