The document summarizes how a county 911 call center leveraged VMware technology to improve the survivability and continuity of its emergency dispatch operations. Key points:
- The center virtualized its critical systems using VMware to enable dispatch to continue even if the primary location went down. This included virtualizing the computer-aided dispatch system and 911 databases.
- VMware high availability and VMotion allowed the center to survive various infrastructure failures like partial network outages and application or database faults with no disruption to emergency response.
- The new virtualized environment achieved the goals of ensuring the center could respond to emergencies under any foreseeable circumstance and creating a structure for maximum uptime.
Webmetrics offers web performance management solutions including external monitoring and load testing to help customers ensure their websites and applications are performing properly and providing a positive user experience. The solutions provide visibility into performance and availability from an end user perspective along with reports and alerts. Key benefits include peace of mind that performance and uptime issues will be identified and resolved before impacting customers.
Siemens Industry Services
provide the lifecycle services
and the suitable hardware
and software components for
your virtualization solution -
all perfectly compatible and
from a single source
Understand how to monitor different components of your business infrastructure such as application servers, databases, big data stores, web servers, ERP software, middleware and messaging components, as well as virtual and cloud resources. Also see how to assign threshold values, configure alerts, automate corrective actions, generate reports, and create custom dashboards.
The document outlines the implementation of three management systems - fault, inventory, and performance - on the Cramer platform for a client. It involved collecting logical and physical inventory data, migrating existing inventory data, and developing scripts to load the data into Cramer. This provided network resource information, enabled provisioning and testing support, and delivered benefits like reduced data load times and ensured quality data loads into Cramer. Over 7,500 devices and 25,000 circuits were mapped into the system allowing for automated network provisioning and inventory utilization reporting.
Projects and Achievements at GosNIIAS - Victor BerenshteynVictor Berenshteyn
Victor Berenshteyn worked as a Systems/Network Engineer and IT Team Leader at GosNIIAS, a software development company. Over many years, he led several projects to modernize and improve the company's IT infrastructure, including establishing a new centralized server room, implementing virtualization, upgrading networking equipment, and deploying security and backup solutions. These projects helped optimize hardware usage, reduce costs, improve performance, and ensure the reliability of business critical systems and data. Through learning new technologies and skills, effective planning and change management, he developed the company's network into a secure, efficient and flexible IT environment that supported the business as it grew.
Are Your Mission Critical Applications Really Performing?ManageEngine
This presentation will help you implement a best practice approach to capacity management of your applications. Use the strategies suggested to baseline, monitor, develop, test, and assure that your mission-critical applications are always ready for business.
Managed Service Provider Deployment Options for SolarWinds Network & Server M...SolarWinds
1. The document discusses deployment options for SolarWinds network and server management products for managed service providers. It describes centralized, decentralized, and hybrid deployment models.
2. Centralized deployment involves monitoring remote nodes from a single central SolarWinds server, either directly via WMI/SNMP or by deploying pollers to remote sites. Decentralized deployment uses independent SolarWinds servers at each remote site with an Enterprise Operations Console for a centralized view.
3. A hybrid approach implements some products with centralized and some with decentralized models to leverage benefits of both. The document promotes SolarWinds solutions for helping MSPs manage customers and operations.
Webmetrics offers web performance management solutions including external monitoring and load testing to help customers ensure their websites and applications are performing properly and providing a positive user experience. The solutions provide visibility into performance and availability from an end user perspective along with reports and alerts. Key benefits include peace of mind that performance and uptime issues will be identified and resolved before impacting customers.
Siemens Industry Services
provide the lifecycle services
and the suitable hardware
and software components for
your virtualization solution -
all perfectly compatible and
from a single source
Understand how to monitor different components of your business infrastructure such as application servers, databases, big data stores, web servers, ERP software, middleware and messaging components, as well as virtual and cloud resources. Also see how to assign threshold values, configure alerts, automate corrective actions, generate reports, and create custom dashboards.
The document outlines the implementation of three management systems - fault, inventory, and performance - on the Cramer platform for a client. It involved collecting logical and physical inventory data, migrating existing inventory data, and developing scripts to load the data into Cramer. This provided network resource information, enabled provisioning and testing support, and delivered benefits like reduced data load times and ensured quality data loads into Cramer. Over 7,500 devices and 25,000 circuits were mapped into the system allowing for automated network provisioning and inventory utilization reporting.
Projects and Achievements at GosNIIAS - Victor BerenshteynVictor Berenshteyn
Victor Berenshteyn worked as a Systems/Network Engineer and IT Team Leader at GosNIIAS, a software development company. Over many years, he led several projects to modernize and improve the company's IT infrastructure, including establishing a new centralized server room, implementing virtualization, upgrading networking equipment, and deploying security and backup solutions. These projects helped optimize hardware usage, reduce costs, improve performance, and ensure the reliability of business critical systems and data. Through learning new technologies and skills, effective planning and change management, he developed the company's network into a secure, efficient and flexible IT environment that supported the business as it grew.
Are Your Mission Critical Applications Really Performing?ManageEngine
This presentation will help you implement a best practice approach to capacity management of your applications. Use the strategies suggested to baseline, monitor, develop, test, and assure that your mission-critical applications are always ready for business.
Managed Service Provider Deployment Options for SolarWinds Network & Server M...SolarWinds
1. The document discusses deployment options for SolarWinds network and server management products for managed service providers. It describes centralized, decentralized, and hybrid deployment models.
2. Centralized deployment involves monitoring remote nodes from a single central SolarWinds server, either directly via WMI/SNMP or by deploying pollers to remote sites. Decentralized deployment uses independent SolarWinds servers at each remote site with an Enterprise Operations Console for a centralized view.
3. A hybrid approach implements some products with centralized and some with decentralized models to leverage benefits of both. The document promotes SolarWinds solutions for helping MSPs manage customers and operations.
The document describes the NxRay software solution for measuring quality of experience from end users' perspectives. The solution includes NxRay client software on users' devices that collects data passive and actively, an NxRay server that stores logged data, and an NxRay web interface for viewing reports. The solution provides insights into network, device, and application performance as well as subscribers' quality of experience. It also features a customer care expert module to help operators efficiently resolve users' issues.
CIP Version 5 makes several changes from Version 3, including revising the classification of protected assets, consolidating requirements, and adding new requirements for things like vulnerability assessments, patching, and incident response. Some of the key changes are a revised approach to classifying BES Cyber Systems and associated assets, breaking requirements out into a table format, using language focused on self-identification and correction of deficiencies, and reducing the total number of requirements from 166 to 129. The changes impact several existing domains and also include new domains for topics like configuration management and information protection. Entities will need to review all changes and update programs and documentation accordingly to comply with CIP Version 5.
This document discusses change management and security processes for an agile development team. It describes how the team worked with their Quality Assurance team to conduct their own security scans, which found issues like parameter validation, error page sanitization, and exception handling. The team is looking for ways to streamline security processes like integrating inline security tools and code reviews to better support their agile workflow.
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsPraveen Yalagandula
Continuous delivery is becoming increasingly critical, however, its implementation remains a hard problem many enterprises struggle with. Canary upgrades and Blue/Green deployment are the two commonly used patterns to implement continuous delivery. In Canary upgrades, a small portion of the production traffic is sent to the new version under test. In Blue/Green deployments, all the traffic is switched to the new version.
We will show how to fully automate the above steps to achieve true continuous delivery in K8s. We will show how to use analytics to express and automate application evaluation and ML-based traffic switching without any downtime.
IBM Endpoint Manager v9.0 provides enhanced security, expanded platform support, improved software distribution capabilities, and expanded mobile device management. Key enhancements include new encryption and internet security options, support for additional operating systems and agents, more robust patching, imaging and remote control functions, and consolidated management for Android, iOS, and other mobile devices. The release further strengthens capabilities for software usage analysis, security and compliance management, and server automation.
This document discusses key functions and challenges related to order tracking, rating processes, billing, system health checks, reporting, and log analysis. The core capabilities outlined are real-time order tracking, rating process initiation and throughput monitoring, one-touch billing and invoice formatting, database and system health checks, automated report generation, and log analysis. Current challenges include the lack of integration across systems, difficulties managing processes and resources, and the need for automated analytics and reporting.
Know what makes the performance monitoring different from a physical servers Vs. virtual servers and what are the essential must have monitors for VMware performance monitoring.
The document is a resume for Karpagam Arunachalam summarizing her professional experience and qualifications. In 3 sentences:
Karpagam has over 10 years of experience in IT roles such as system administrator, data center administrator, and middleware support lead. She currently works as a middleware application support lead at Tata Consultancy Services supporting Deutsche Bank. Her skills include AIX, Linux, Solaris administration and experience with tools such as Remedy, ServiceNow, Geneos, and Axway Sentinel.
The document discusses Asset Insight, a solution for monitoring and managing assets. It provides functionality for asset management, risk management, reliability analysis, condition monitoring and capacity management. Recent deployments include projects with ICR involving 6 datacenters and 11 colocation sites. The Co-operative Group deployment involves monitoring 240 critical assets. What clients say highlights benefits like preventing downtime by detecting changes in asset operation.
This document discusses different options for supporting an Adobe Experience Manager (AEM) implementation after launch. It presents the benefits and challenges of using full-time employees (FTEs), contractors, managed hosting, and ROM (a third-party vendor) for AEM support. The ROM option is highlighted as providing deep AEM expertise, 24/7 support with service level agreements, application monitoring, and other services to ensure high uptime. The last sections provide an overview of ROM's delivery architecture and implementation process.
Role of OpManager in event and fault managementManageEngine
Managing Event and Fault are not new to any IT managers. However if not implemented properly, this could be the most daunting of network monitoring and network management tasks.
Check out this presentation, to understand
# The basics of Event and Fault Management &
# How ManageEngine OpManager helps in effective Fault Management
The Cio And Crisis Leadership, An Examinationdbriner
The document discusses the role of the CIO in crisis leadership and management. It defines a crisis as a crucial point involving abrupt change. The CIO is responsible for managing reliability and complexity in systems to ensure success. Systems will inevitably fail, and the CIO must plan for reliable recovery through redundant systems and resources to minimize downtime. The document outlines the Incident Command System structure the CIO should employ to effectively manage a crisis through communication, planning, accountability and resource coordination. Mitigation, restoration and prevention are key priorities for the CIO after a crisis to ensure it does not reoccur.
Group 4 submitted 14 photo titles with information on the photographer, date taken, and location. The photos covered a range of topics from weddings to international events to landscapes. The group included submissions from Brittany, Jill, Alyssa, and Jason with photos found on personal blogs and photo sharing websites.
The document summarizes the learning experience and process of creating a magazine media project. Some key points:
1) The preliminary task provided time to learn new Photoshop skills that facilitated completing the full project.
2) Creating media products requires planning, time, and effort but is achievable.
3) Gathering reader feedback through surveys helped tailor the magazine's style and distribution channels to its target teenage audience.
4) The magazine would be distributed in newsagents and at concerts to match its target readers who enjoy live music.
The poem describes a man who lives on one side of a river, observing a woman who lives on the other side. Nature is prominently featured throughout the poem, with the man comparing himself to natural elements like the moon, stars, and branches. Various poetic techniques like similes, metaphors, personification, alliteration, and repetition are used to help the reader visualize the scenes and enhance the flow of the language. The two main themes are love between the two individuals separated by the river, and the man's connection to nature.
South West RDA Board Member John Savage talks to SWO delegates about the how to practically realise prosperity - including case studies from South Bristol.
O documento contém orikis (cânticos de louvor) dedicados a Oxalá. As três primeiras frases são: "Grande pai, marido de Iyemowo", "O lugar feliz é onde ele está assentado", "Grande Òrìsà salvador".
Slides from Kevin Trowbridge's panel presentation "Social Media for Living and Learning: Unique Campus Perspectives" at Social Media for Teaching & Learning in Boston, MA. Oct. 18.
Patricia and diana drama and role plays in the efl classroomdescobar24
1. Drama and role plays are very important for children acquiring their first language and can also benefit older language learners acquiring a second language. Drama allows students to practice language in context and explore different cultural traditions.
2. Using drama in the classroom has many advantages. It improves students' speaking fluency, pronunciation, and ability to work cooperatively. Through role plays, students can reduce anxiety around speaking and explore solutions to real-world problems.
3. Warm-up activities through storytelling and drama help build trust and lower inhibitions among students. Overall, drama creates an engaging environment for meaningful language practice.
The document describes the NxRay software solution for measuring quality of experience from end users' perspectives. The solution includes NxRay client software on users' devices that collects data passive and actively, an NxRay server that stores logged data, and an NxRay web interface for viewing reports. The solution provides insights into network, device, and application performance as well as subscribers' quality of experience. It also features a customer care expert module to help operators efficiently resolve users' issues.
CIP Version 5 makes several changes from Version 3, including revising the classification of protected assets, consolidating requirements, and adding new requirements for things like vulnerability assessments, patching, and incident response. Some of the key changes are a revised approach to classifying BES Cyber Systems and associated assets, breaking requirements out into a table format, using language focused on self-identification and correction of deficiencies, and reducing the total number of requirements from 166 to 129. The changes impact several existing domains and also include new domains for topics like configuration management and information protection. Entities will need to review all changes and update programs and documentation accordingly to comply with CIP Version 5.
This document discusses change management and security processes for an agile development team. It describes how the team worked with their Quality Assurance team to conduct their own security scans, which found issues like parameter validation, error page sanitization, and exception handling. The team is looking for ways to streamline security processes like integrating inline security tools and code reviews to better support their agile workflow.
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsPraveen Yalagandula
Continuous delivery is becoming increasingly critical, however, its implementation remains a hard problem many enterprises struggle with. Canary upgrades and Blue/Green deployment are the two commonly used patterns to implement continuous delivery. In Canary upgrades, a small portion of the production traffic is sent to the new version under test. In Blue/Green deployments, all the traffic is switched to the new version.
We will show how to fully automate the above steps to achieve true continuous delivery in K8s. We will show how to use analytics to express and automate application evaluation and ML-based traffic switching without any downtime.
IBM Endpoint Manager v9.0 provides enhanced security, expanded platform support, improved software distribution capabilities, and expanded mobile device management. Key enhancements include new encryption and internet security options, support for additional operating systems and agents, more robust patching, imaging and remote control functions, and consolidated management for Android, iOS, and other mobile devices. The release further strengthens capabilities for software usage analysis, security and compliance management, and server automation.
This document discusses key functions and challenges related to order tracking, rating processes, billing, system health checks, reporting, and log analysis. The core capabilities outlined are real-time order tracking, rating process initiation and throughput monitoring, one-touch billing and invoice formatting, database and system health checks, automated report generation, and log analysis. Current challenges include the lack of integration across systems, difficulties managing processes and resources, and the need for automated analytics and reporting.
Know what makes the performance monitoring different from a physical servers Vs. virtual servers and what are the essential must have monitors for VMware performance monitoring.
The document is a resume for Karpagam Arunachalam summarizing her professional experience and qualifications. In 3 sentences:
Karpagam has over 10 years of experience in IT roles such as system administrator, data center administrator, and middleware support lead. She currently works as a middleware application support lead at Tata Consultancy Services supporting Deutsche Bank. Her skills include AIX, Linux, Solaris administration and experience with tools such as Remedy, ServiceNow, Geneos, and Axway Sentinel.
The document discusses Asset Insight, a solution for monitoring and managing assets. It provides functionality for asset management, risk management, reliability analysis, condition monitoring and capacity management. Recent deployments include projects with ICR involving 6 datacenters and 11 colocation sites. The Co-operative Group deployment involves monitoring 240 critical assets. What clients say highlights benefits like preventing downtime by detecting changes in asset operation.
This document discusses different options for supporting an Adobe Experience Manager (AEM) implementation after launch. It presents the benefits and challenges of using full-time employees (FTEs), contractors, managed hosting, and ROM (a third-party vendor) for AEM support. The ROM option is highlighted as providing deep AEM expertise, 24/7 support with service level agreements, application monitoring, and other services to ensure high uptime. The last sections provide an overview of ROM's delivery architecture and implementation process.
Role of OpManager in event and fault managementManageEngine
Managing Event and Fault are not new to any IT managers. However if not implemented properly, this could be the most daunting of network monitoring and network management tasks.
Check out this presentation, to understand
# The basics of Event and Fault Management &
# How ManageEngine OpManager helps in effective Fault Management
The Cio And Crisis Leadership, An Examinationdbriner
The document discusses the role of the CIO in crisis leadership and management. It defines a crisis as a crucial point involving abrupt change. The CIO is responsible for managing reliability and complexity in systems to ensure success. Systems will inevitably fail, and the CIO must plan for reliable recovery through redundant systems and resources to minimize downtime. The document outlines the Incident Command System structure the CIO should employ to effectively manage a crisis through communication, planning, accountability and resource coordination. Mitigation, restoration and prevention are key priorities for the CIO after a crisis to ensure it does not reoccur.
Group 4 submitted 14 photo titles with information on the photographer, date taken, and location. The photos covered a range of topics from weddings to international events to landscapes. The group included submissions from Brittany, Jill, Alyssa, and Jason with photos found on personal blogs and photo sharing websites.
The document summarizes the learning experience and process of creating a magazine media project. Some key points:
1) The preliminary task provided time to learn new Photoshop skills that facilitated completing the full project.
2) Creating media products requires planning, time, and effort but is achievable.
3) Gathering reader feedback through surveys helped tailor the magazine's style and distribution channels to its target teenage audience.
4) The magazine would be distributed in newsagents and at concerts to match its target readers who enjoy live music.
The poem describes a man who lives on one side of a river, observing a woman who lives on the other side. Nature is prominently featured throughout the poem, with the man comparing himself to natural elements like the moon, stars, and branches. Various poetic techniques like similes, metaphors, personification, alliteration, and repetition are used to help the reader visualize the scenes and enhance the flow of the language. The two main themes are love between the two individuals separated by the river, and the man's connection to nature.
South West RDA Board Member John Savage talks to SWO delegates about the how to practically realise prosperity - including case studies from South Bristol.
O documento contém orikis (cânticos de louvor) dedicados a Oxalá. As três primeiras frases são: "Grande pai, marido de Iyemowo", "O lugar feliz é onde ele está assentado", "Grande Òrìsà salvador".
Slides from Kevin Trowbridge's panel presentation "Social Media for Living and Learning: Unique Campus Perspectives" at Social Media for Teaching & Learning in Boston, MA. Oct. 18.
Patricia and diana drama and role plays in the efl classroomdescobar24
1. Drama and role plays are very important for children acquiring their first language and can also benefit older language learners acquiring a second language. Drama allows students to practice language in context and explore different cultural traditions.
2. Using drama in the classroom has many advantages. It improves students' speaking fluency, pronunciation, and ability to work cooperatively. Through role plays, students can reduce anxiety around speaking and explore solutions to real-world problems.
3. Warm-up activities through storytelling and drama help build trust and lower inhibitions among students. Overall, drama creates an engaging environment for meaningful language practice.
The document provides instructions for using Synergy, a routing system used by Southeastern Freight Lines, to plan routes and optimize stop sequences. Key steps include reloading daily billing data, geocoding customer locations, selecting inbound trailers, balancing routes by resequencing stops, and using maps to review routes. The goal is to minimize delivery miles while meeting customer requirements like appointment times.
The events of the Cold War including the civilian "Duck and Cover", propaganda film and the many books and movies about the Cold War. Discussion of Nuclear Arms Race and Nuclear Treaties and current status of Nuclear Weapons Stockpiles. Lists of the Nuclear Tests and the damages an Atomic Bomb can cause.
Adjunct Professor Joe Boisvert
Federalism involves the sharing of power between the federal/national government and state governments. Some key aspects of federalism include:
1) The federal government has expressed powers that are specifically enumerated in the Constitution like coining money and regulating interstate commerce. It also has implied powers that are suggested though not expressly stated, like establishing a national bank.
2) States have reserved powers over areas not given to the federal government like education, welfare, and family law.
3) Both the federal and state governments have concurrent powers like taxation and establishing courts. The Supremacy Clause establishes that federal authority overrides state authority.
The document discusses scanning photos and documents using an MP Navigator EX software. It provides instructions on opening the software, scanning items placed on the platen, and editing scanned images using tools to rotate, select parts of images, or select multiple images at once.
This document summarizes a playbook for competency-based education (CBE) programs. It finds that over 150 institutions currently offer CBE programs, with strong expected growth to 750 institutions and 500,000 students by 2020. Key drivers of CBE growth are the rising cost of higher education, demand for flexible learning options, and employer emphasis on skills. The playbook helps institutions address challenges like strategy, organization, program development, student success, technology, management, and marketing across the CBE lifecycle from planning to implementation to improvement. It provides a framework to align efforts, avoid pitfalls, and evaluate options tailored to each institution.
15th National Conference on Volunteering, presentation for State Library of South Australia about the projects we are coordinating that have volunteer involvement.
The document provides information about using Windows Live Movie Maker to create movies from photos and videos, including adding media, customizing movies with effects and music, and sharing movies by publishing them to YouTube, saving to the computer, or burning to a DVD. Key features covered include easily making an auto-generated movie, previewing at any time, and installing additional plug-ins to publish movies to other websites.
The document discusses how VMware products like NSX, vRealize Operations, and vRealize Log Insight can provide monitoring, logging, and security capabilities for Pivotal Cloud Foundry environments. It highlights how NSX delivers inherently secure infrastructure, high performance distributed networking, and availability for PaaS. The document also notes how NSX can help organizations run things cheaper and be more efficient through improved data center operations and reduced CapEx.
As Enterprises increasingly span their workloads across on-premises data centers and cloud environments, it is becoming significantly complex for IT teams to enable better workload portability and create consistent application delivery and networking services.
In this webinar, you will learn how VMware NSX Advanced Load Balancer facilitates seamless application delivery and provides choices to deploy your applications across on-premises data centers and Oracle Cloud Virtual Services (OCVS) while enabling:
Modern Application Delivery: Consider consistency, elastic scalability, cloud-native automation, and built-in end-to-end observability when choosing load balancing across hybrid environments.
Data-center Extension: Ensure continuous operations while providing elastic L4-L7 load balancing, security, and real-time application analytics for VMware-based apps running in Google Cloud.
Lift-and-Shift: When migrating to OCVS from an on-premises data center, operationalize uninterrupted enterprise-grade features, including GSLB and WAF.
Presentation business critical applications in a virtual envsolarisyourep
This document discusses virtualizing business critical applications. It begins by explaining why IT operations and application owners sometimes differ on virtualization, with the former wanting infrastructure efficiency and the latter concerned about performance and support. The document then shows trends of increasing virtualization for various workloads. It outlines operational benefits and new features in vSphere 5 that further reduce barriers to 100% virtualization. The rest of the document focuses on how virtualization can improve quality of service, availability, and time-to-market for applications through features like dynamic resource allocation, high availability, disaster recovery, and faster test/development cycles. It also addresses specific application information and licensing models. In the end it provides recommendations for getting started with virtualizing critical applications.
The document discusses VMware's strategy and solutions for virtualization. It highlights virtualization as the top strategic technology for 2009 according to Gartner. It outlines VMware's virtualization solutions like server consolidation, virtual desktop infrastructure, and disaster recovery. It also discusses VMware's strategy to evolve its virtualization platform into a "Virtual Datacenter Operating System" to provide services and automation across the entire datacenter.
Introduction To Server Virtualisation Planning And Implementing A Virtualisat...Alan McSweeney
The document provides an overview of planning and implementing a server virtualization project. It discusses analyzing infrastructure needs, designing a virtualization platform using VMware, migrating physical servers to virtual machines, implementing backup and monitoring, and establishing ongoing management processes. The goal is to consolidate servers, improve flexibility, reduce costs, and ensure high availability through virtualization.
VMworld 2013: Practicing What We Preach: VMware IT on vCenter Operations Mana...VMworld
VMworld 2013
Shreekant Ankala, VMware
Sreekanth Indireddy, VMware
Prafull Kumar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
The document discusses three case studies of Fusionstorm helping clients virtualize their data centers and optimize infrastructure:
1) A company with 200 physical servers was able to implement a virtualized disaster recovery solution using PlateSpin and EMC replication, reducing their DR footprint and costs.
2) A company relocating their data center was able to do so with minimal downtime using PlateSpin migration and VMware virtual desktops for contractors. Infrastructure upgrades improved efficiency.
3) A company with servers in 12 branches consolidated to two servers per site using VMware replication and Cisco WAN acceleration between regional hubs and branches.
VMworld 2013: How to Replace Websphere Application Server (WAS) with TCserver VMworld
VMworld 2013
Kaushik Bhattacharya, Pivotal
Michel Bond, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
E’ un’estensione di VMware vCenter che fornisce ai professionisti IT la possibilità di disaster recovery, migrazione di siti e funzionalità di test non distruttive.
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratusAli Kafel
This white paper makes the case for:
Why Resiliency Management Needs to be in the Software Infrastructure. It Covers:
- Fault Management and Resiliency Management
- Seamless Protection for Faster and Simpler Devl
- Multiple Levels of Availability
- Speed of Service Restoration & Redundancy Restoration
- State Management
- Demonstrating Carrier Grade Availability and Resiliency
V sphere overview srm-your cloud-3-1-2011Kris Walsh
This document provides an overview of VMware vSphere and the journey to cloud computing. It discusses the phases of VMware virtualization from hosted virtualization to the server hypervisor and virtual infrastructure. The document highlights features of vSphere like dynamic computing, high availability, storage vMotion, and fault tolerance. It also discusses Site Recovery Manager for disaster recovery and automation. Finally, the document argues that vSphere provides a clear path to creating a private cloud and discusses VMware's adoption across various industries.
Client Presentation - IBM Cloud for VMware Solutions (3).PPTXRajesh Anbalagan
IBM Cloud for VMware Solutions provides a hybrid cloud platform for running VMware workloads on IBM's public cloud infrastructure. It allows organizations to extend their on-premises VMware environments to the cloud for capacity needs, disaster recovery, and application modernization. Key benefits include infrastructure consistency, high availability, security, and compliance capabilities to address the requirements of enterprise workloads. Common use cases include data center consolidation/extension, workload migration and transformation, data protection, and enabling SAP applications on IBM Cloud.
VMworld 2013: Extend VMware’s Cloud Automation Solution with vCenter Orchestr...VMworld
VMworld 2013
Terry Lyons, VMware
Meena Nagarajan, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
This document summarizes concepts related to disaster recovery including objectives, concepts, targets, risks, opportunities, and solutions. The objectives are to review disaster recovery basics, explore customer business risks, and discover opportunities through awareness services and technology. Concepts discussed include disaster recovery, business continuity, availability, recovery time objectives, and costs of downtime. Target audiences are those with mission critical applications. Business risks include various physical events, user errors, hardware/software failures, and security threats. Opportunities discussed include Ricoh consulting and managed services as well as partner solutions for networking, hosting, storage, and data protection. Specific disaster recovery deep dives focus on solutions from SonicWALL, Dell, and IBM that can be combined
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Centerdavehill99
In his article Virtualization 2.0 Is Your On-Ramp to the Cloud published on SIliconANGLE, VMware Cloud Strategist David Hill, writes, “Many companies today are recognizing value in the cloud even though they have no plans to mothball their own data centers. To them, the cloud represents both an extension of their on-premises infrastructures and the latest chapter in the ongoing evolution of their IT practice.”
David goes on to describe this latest chapter as “Virtualization 2.0,” because just as virtualization untethered workloads from servers, this stage is about untethering those same workloads from the data center itself, enabling apps to freely move between clouds the way they can move between servers today.
VMworld 2013: Protect vCenter Server with vCenter Server Heartbeat Deep Dive VMworld
VMworld 2013
Shawn Gordon, Neverfail
Donna Reineck, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
This document discusses how VMware vSphere 4.0 can help businesses manage risk, costs, and change by increasing IT infrastructure efficiency, control, and choice. It outlines how vSphere allows businesses to build high-performance, cost-efficient data centers and realize fiscal advantages through consolidation and cost reductions. It also enables increased flexibility without sacrificing security and delivers applications as dynamic, cost-efficient IT services.
VMworld 2013: The Missing Link: Storage Visibility In Virtualized Environments VMworld
VMworld 2013
Matt Cowger, EMC
Mahesh Kumar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Welcome to Session BC2520. We are going to talk about a little project we have been working on for a few years then revolves around a 911 Call Center in Pennsylvania.
synergIT and Washington County Public Safety have no control of how you may use information obtained from this presentation and does not intend this material to be a template for all 911 Public Safety environments. Each 911 center is highly unique and requires advance analysis and risk identification before any affect on life saving systems be undertaken.
“ The project team was made up of a joint effort but the success of this project lies squarely on the shoulders of the Public Safety team in Washington County. It was their vision to think outside the box, unwavering dedication that has resulted in the quality of the solution that exists today. It is unfortunate that those folks are not able to be with us today” Speakers: Dan Briner, Washington County Public Safety, Director of Information Technology (CIO) – heavily involved in the project and played pivotal role in the initial conception of the project. Dan has had a 30+ year IT career in private industry prior to joining Washington County. Extensive banking, healthcare and IT consulting experience, Dan is an State certified EMT, holds an Extra Class amateur radio license. This led him to pursue the initial concept of the virtualized call center. Keith Martin, Senior System Engineer synergIT, since 1990. Currently, Keith applies his expertise as a consultant on installation, troubleshooting and support of local &wide area networks, enterprise systems. Keith’s dedication to his projects as well as client concerns have award him with the highest compliments from clients and partners. Keith has over 15 years of experience with HP /Compaq file server and blade server hardware. Keith has nearly 10 years experience as a search and recovery diver in addition to his IT carreer. Bob Walker is currently serving as the Director of Enterprise Services with synergIT where he applies broad expertise across a variety of client projects ranging from virtualization & network assessments through, Business Process Re-engineering and general project management. Bob also manages a software development practice that provides unique solutions to our clients centered around customer applications integrated with MS SharePoint. Since joining synergIT, Bob has project managed many of the largest projects in the firms history and most recently served as the Project Manager and engineer for the 911 Technology Refresh project that we are discussion here today.
Good afternoon, I am Dan Briner the CIO of Washington County PA. I would like to set the stage for our presentation with a short history of the 911 Project. This has been a long project – but I will keep the history lesson short, it began in the later part of 2003 when Greg Clark the Operations Manager of the PSAP (Public Safety Answering Point), Jeff Yates the Public Safety Director and I sat down to begin the planning to get the County ready for the Phase II Wireless requirements. That is being able to receive and work with GPS information that was becoming available from the newer cell phones. PEMA (Pennsylvania’s little brother to FEMA) had asked the various PSAP’s for plans to address the Phase II requirements. We considered several approaches to refreshing the PSAP’s capabilities but after lots of discussion decided to beginning with a clean sheet of paper and base our approach on the guidelines for the Next Generation 9-1-1, or NG9-1-1. We presented our proposal to PEMA and asked for funding (this comes from the monthly charge on cell phone in PA) To our surprise they fully funded our plan and the County agreed to pickup any unfunded costs. And thus in 2005 began our approximately 14 million dollar adventure, that could not have even begun with out VMware at the core. One of our design goals was to develop a NG9-1-1 based system that had a 7x 9 system reliability. That was about 3 seconds of system unavailability a year. Lofty goals you say! Why 7x 9’s?
Heartbeat clip playing in background…. Dan: More than 900 people a day die because a defibrillator did not arrive within 5-7 minutes of a cardiac arrest. 1,300 people a year die from choking. And a delay of 1 minute in emergency response reduces survival by 7% to 10% and significant brain damage can occur after 3-4 minutes without oxygen. That is why we have a goal of 7x 9’s for the system, and consider VMware the lynch pin of our whole system. *** It is the first bullet (last to appear) that is at the core of what this project was about, and largely the justification for the use of VMWare
Background Southwestern Pennsylvania’s Washington County has a population of 208,000 within its land area of 863.6 square miles. First formed in 1781, the county today boasts a major university, three colleges, three premier hospitals, a racetrack, casino, outlet mall and several large mixed use technology centers as well as efficient access to all cultural, retail and sports activities in the Pittsburgh region. The junction of I70 and I79 interstates in the center of the county increases the Public Safety responsibilities with a high volume of traffic and the associated problems. Washington County’s public safety call center handles roughly 800-1000 calls per day, and is responsible for dispatching all fire, police, and emergency medical services, for the entire county 24 hours a day, seven days per week. As part of its vision for evolving its public safety services, the county sought to upgrade the datacenter in its 911 facilities by transitioning from physical servers to a virtual IT infrastructure powered by solutions like VMware Infrastructure 3. Performing this upgrade was easier said than done, however. “ The biggest constraint was the fact that we were not constructing a new building—this was an in-place upgrade,” “ That meant we couldn’t just shut things down and move people into another facility while we were performing the upgrade; the call center needed to stay up and running while the upgrade occurred.” . The 9-1-1 center has one supervisor position, two call taking positions, and seven dispatching positions. The center has the capability of communicating on fifteen different frequencies, with full cross-patch and telephone-patch capabilities. The 9-1-1 Center also provides 24 hour monitoring of several Emergency Management systems. Project started in 05, officially kicked off in 06 and much of the design was born right here at VMWorld in discussions with key folks around possibilities and our goals. All inclusive This upgrade covered everything from physical building improvements to complete technology replacement – while answering live 911 calls – “ You’ll get more details in a few slides about the unique roles that VMware virtualization playing in the project but its key to call out here that the use of Virtualization technology and specifically Vmotion, allowed the project to runs several concurrent tracks. We were deploying the initial proof of concept equipment while the physical building was be radically transformed to support the new systems. Electrical capacity (street power, Generator and UPS systems), cooling, structural changes, ..all performed in live environment with 911 calls being taken …. extreme risk handled without a single missed call For wireless: Phase I and Phase II Phase I conveys call back number + Pseudo-ANI (cell face identifier) to PSAP Phase II provides caller location (e.g., via GPS or TOA)
Call Flow Person dials 911 either from a cell phone or a traditional wireline phone Telco switch sends ANI to 911 tandem via ES trunk group Tandem looks up the ESN for the calling number Based on ESN, call is routed to the appropriate PSAP via EM trunk group (same basic flow for Cell calls with GPS) ANI/ALI data is retrieved and sent to PSAP by ALI computer and displayed on dispatcher’s phone and CAD consoles Intergraph CAD system shows/maps caller location and recommends to dispatcher response plan and tracks incident (SAN, Servers, VMware) Dispatcher notifies responders and works the incident with coordination of responders and escalation as required. T The core of the PSAP operation is the CAD (Computer Aided Dispatch) system – it ties every thing together and tracks the emergency start to finish. When we began this project our first step was to select a full time project manager to work with us to implement our vision for the Washington County NG9-1-1 Center. It was a critical decision for us and happy it has worked out well. I would like to turn the presentation over to Bob Walker of synergyIT who severed as our Overall Project Manager who put our plans to work.
We will come back to these goals later in our discussion and see how we did….
We’ve mentioned the goal was to build a state of the art emergency response center around VMware technology, and we have mentioned that much of the initial concept was honed from discussions rooted right here at VMworld: We have talked about the 1000 calls per day and the risk involved with a complete in-place overhaul of 24x7x365 center (that had NO backup/redundancy). What I hope to share with you in the next few slides is specific to the initial goal of Ensuring the 911 center could continue to respond to emergencies under all foreseeable circumstance.
Bob The use of VMware went from a proof of concept to being the production life line and in record time. VMware played a larger role than anyone imagined. (while dispatching live 911 calls!). This was accomplished without a single interruption to the ability to dispatch Police/Fire/EMS. VMware provided the means to migrate the back office services to the alternate site (again, with live 911 calls being dispatched). To this center, VMware = "Survivability" We jumped in to the project with a bold purchase of HP gear and VMware for a proof of concept. During the upgrade and moving forward, the center had to be able to remain online during outages of: Lost of an entire site Any SAN outage A failure of a blade chassis A failure of any server Loss or outage of a entire call taker position or individual software component
Its not the concept of virtualization that made the most risky and challenging parts of the upgrade possibly but the maturity and sphere of the tool set that make up VMware. VMware played a significant part in nearly every aspect of the upgrade. Power : Monitoring system work Power (both street, UPS and generator) were virtualized HVAC: All software controls for both the primary and secondary site were converted to run a virtual machines Network: Network Monitoring, alerting and much of the security systems are virtual SAN connectivity provided the common storage as well
600 KW Generator, 550 KVA UPS, 40 Ton of N+1 cooling Redundant phone, data, power to each dispatch position 2 cisco 6500 series switches and 2 3750 switches in Site B ESX deployed to HP Blade via Rapid Deployment Pack Using RDP allows Drag & Drop Patching Virtual Center, HP ILO Customized SolarWinds Orion Network Performance monitor and Application Performance monitor customer tuned for Vmware and SQL database mirroring Each Cluster consists of an HP Blade Chassis of 16 ESX servers in Site A and another chassis/16 in Site B. Total of xxx ESX Servers – xx per site Each Cluster Consists of Workstation 16 Workstation Blades…. HP Blade Servers Workstation Blades, Thin Clients Synchronous Data Replication Virtualization Benefits CAD, SQL, WEB, Document Management, AD impacting core vendors to adopt architecture Continue efforts with HP and core vendors to drive solutions beyond current audio limitations VMware Provides Unique Workflow Otherwise Not Possible VMware Provides Unique Workflow Otherwise Not Possible
2 VMware Clusters with redundant disk groups spread across both datacenters
2 VMware Clusters with redundant disk groups spread across both datacenters
The rate or new technology was incredible and in of itself presented significant risks. The complexity of the new technology identified early on as a major hurdle that would need to be overcome. The Public Safety team showed amazing dedication and ability to master the complex in record time. The time to recovery of the center has been reduced and continues to fall.
Sanitized slice of Enterprise Monitoring Framework highly customized around ESX hosts and Virtual Machines.
Overall Design. The overall design of the 911 center consists of a primary and secondary data center. Each data center contains a blade server chassis, and a workstation blade chassis. The server chassis in each data center contain both Windows servers and ESX hosts. There is a physical Windows domain controller in each data center. Each domain controller also functions as a DNS server, and standard Windows timing has been implemented with the domain controller containing the PDC emulator role pulling time from a local atomic clock. The ESX hosts are configured in two HA/DRS clusters with cluster members residing in each data center. Each data center also contains a 40 TB SAN. All of the virtual machines reside on SAN storage and the majority of the hardware based Windows servers are SAN boot, with a few exceptions. The primary data center also contains the imaging server, and the SAN management server. A second SAN management server is planned for the secondary data center only to be used if the primary management server becomes unavailable. We have an ancillary data center that houses our enterprise backup system and the UPS system for the primary data center. In addition, not depicted here, there are two separate generator rooms, one for each data center, and another UPS room dedicated to the secondary data center. The secondary data center shares floor space with the county network systems as well. However, the county domain and the 911 domain are two separate domains, there are no trust relationships between them. Several members of the county IT staff have accounts in the 911 domain, allowing login for administration. Access into the 911 domain from the county side is controlled by redundant firewalls allowing only limited inbound administrator access. The firewalls are also configured to permit outbound SMTP traffic from select systems for email alerting, outbound Internet access for a limited number of systems, and access for the CAD system, and for terminal emulators at each station, to the State Police NCIC system.
A closer look at the storage architecture. We’ll refer to the primary data center as “site A” and the secondary as “site B”. There are ESX hosts dedicated to each cluster that reside in each site, but when it comes to storage for the clusters, cluster A’s primary storage is in Site A on SAN A. That data is synchronously replicated to the SAN in site B. Cluster A contains the majority of our primary systems, the primary print server, our primary SAM database and Web servers and our GIS database. Cluster A also contains a number of ancillary systems as well. SAN A also contains storage for the majority of the physical Windows servers as well, including our primary CAD, primary CAD communications and primary 911-phone servers. Of these three physical servers, the 911-phone system is physically based due to hard serial connections, and the internal systems are fully redundant from the vendor, the 911 CAD communication server is physical due to serial and modem connections. It’s secondary server, CAD-Comm(cold) resides on SAN B (not SAN A) and is THE ONLY COLD failover system in the environment. The primary CAD server is physical only by the requirement of the vendor, even though we had the system running as a VM for over a year during the proof-of-concept phase. Site B, SAN B houses the storage for Cluster B. The VMs running in cluster B are our secondary or failover servers. They consist of a number of system, but the critical systems are the 2 nd SAM Web server, SAM DB failover, 2 nd print server and the CAD failover server. Our two cluster design was put in place to maximize redundancy and immediate state-full failover. The cost of failure in this environment couldn’t be any higher, if it fails people can die! As far as Windows servers, the only hardware based Windows server with primary storage on SAN B is the secondary CAD comm server. Our enterprise backup solutions consists of two physical servers for HP Data Protector and Vmware Consolidated Backup.
examples (several slides each) on why this would NOT have been possible without the tools that VMware technology provided to meet the needs project - 2 specific occasions where the design was put into action to save a life (one while still in proof of concept phase!)
Share stories where VMware was used CAD – Vmotion many times to site B during facilities upgrades (SQL DB Mirroring heavy player here as well) Electrical upgrades over 2 years. Active center ran CAD, GIS and all AD file/print/Web services from VMs that would ‘float’ as needed between the Sites Snapshots, used heavily to test & restore In general, the multiple levels of redundancy (Electrical, cooling, network, server, SAN Chassis, Host to VM) allows the flexibility required. There are some growth areas with specific aspects that will continue to be evolve as we work with vendors and the public safety industry. … .regardless of location (see next slide) 911 Calls, GIS data, Dispatch records and audio logs are fully integrated VMWare provided (and continues to provide) Test, training environments outside production cluster.
Graphic showing failure of disk group in site A (CAD outage) Entire room is designed for redundancy ½ of the stations are connected to completely separate network gear served by redundant back office services residing in VMs split across disks groups with the ability to fail over to the secondary site blades as a unit or an individual station.
A couple of the road blocks that we had to contend with were vendor push back in using or supporting a full Vmware solution and/or Windows clustering. Either would have been helpful. Our initial implementation had data for all of the systems residing on SAN A. We quickly realized that was going to be a problem when we had to perform one of several firmware upgrades which forced us to migrate primary data from SAN A to SAN B forcing the reboot of every SAN attached system. This migration or failover was a manual process and time consuming. Our solution, as state previously, was to create the second cluster, migrate all of our secondary systems to cluster B and have its storage reside on SAN B, replicating back to SAN A. Now if we have a failure in SAN A, causing the loss of functionality in Cluster A and the physical servers on cluster A, database processing fails over to SAN B through the use of SQL mirroring. Call processing continues from Cluster B now, and we are able to move the storage for cluster A and the physical servers on SAN A over to SAN B and again restore some level of redundancy. By having the second cluster reside on SAN B in Site B, and using database mirroring failover is immediate and transparent to the operator. In February of this year we had to perform firmware upgrades to both SANs. Although the firmware upgrades can be done with the SANs online there is about a two minute window where the SAN controllers have to reboot. At that point you have basically lost all communications with the SAN so there is no way that dispatching can continue. With the twp cluster configuration we were able upgrade the firmware first on SAN B, then manually failover the critical primary systems to their secondary counterparts residing in Cluster B on SAN B, and upgrade the firmware on SAN A. The process took a couple of days because we wanted to be sure that the firmware upgrade to SAN B were OK before doing them on SAN A, but we were able to move systems between the data centers without losing dispatching capabilities.
As I mentioned earlier, our clusters don’t completely reside in site A or Site B, but are spanned between the sites. Therefore with any loss of an ESX host in site A, HA will move the system to another ESX host, or if we lose all of the hosts in Site A they will be moved to hosts within the cluster in site B. Similarly with cluster B, processing will move to site A should anything happen to hosts in Site B. This configuration not only comes in handy in the case of a failure, but also for maintenance. In June we found out that we had to perform a complete firmware upgrade to all of the blades and interconnect modules in the blade chassis due to some issues we had been experiencing. We were able to manually failover the appropriate systems from one data center to the other, upgrade firmware, update drivers, reboot servers and drop portions of the network without ever losing dispatching capabilities. The process had to basically be choreographed and took a few days, but was accomplished without incident.
A closer look at the CAD failover process, and we keep going back to CAD because it encompasses just about all of our redundant techniques, hardware, VM/HA and database mirroring. Also, of the three primary systems in the center, Phone, CAD and Radio, the CAD system was the biggest challenge because it doesn’t have it’s own built-in hardware based redundancy, whereas the phone and the radio do. So a call comes in to the center, the 911 operator is actively working the call – let’s say it’s an EMS call, the EMS operator may not be the first operator to take the call, but they are immediately notified through the system and they begin the process of dispatching EMS. All of a sudden something happens to the primary CAD server, could be a hardware failure, a blue-screen…yes they happen in a 911 center too…whatever the case may be, that server is no longer available. Processing immediately fails over to the secondary CAD server, and within one or two packets the stations all begin processing on the secondary CAD server. No loss of dispatch capability is experienced. Now the CAD system is running from a VM and HA and Vmotion are now an option for redundancy as well. It was our intention to keep both the primary and secondary CAD servers in VMs, but again the vendor was reluctant to support that configuration and wanted at least the primary server to be hardware based. However, we have experienced these seamless failovers several times without a problem and in fact have run the CAD system in a VM for extended period without issues. I’m now going to turn the presentation back over to Dan.
May 2009 CAD based dispatch via Command vehicle – mobile dispatch terminal reaching into VM based 911 GIS dispatch application
3 take always from this session? -Migration facilitator - Survivability of the business – VMware is a key player! - Drive towards the best solution for your business “ Keep Moving Forward” - Big goals continue to 9-1-1 Next Generation - Taking it on the road. Leveraging a custom built state of that art command vehicle as a rolling datacenter, online/offline access. Mobile VMware servers, solid state disks…previous slide shows The Mobile Command Prost getting ready for deployment to support Allegheny County for the September G20 Summit. The command post can support direct dispatch as though the operator is sitting in the PSAP. Fully functional with VoIP and CAD and a whole host of capabilities designed to be seamlessly integrated with other County’s command posts.