...Search Worldwide [change] Log In Account Register My CiscoClick to open High Availability Disaster Recovery: Best Practices HOME SUPPORT TECHNOLOGY SUPPORT AVAILABILITY HIGH AVAILABILITY TECHNOLOGY INFORMATION TECHNOLOGY WHITE PAPER Disaster Recovery: Best Practices Downloads Disaster Recovery: Best Practices Contents 1 Executive Summary 2 Disaster Recovery Planning 2.1 Identification and Analysis of Disaster Risks/Threats 2.2 Classification of Risks Based on Relative Weights 2.2.1 External Risks 2.2.2 Facility Risks 2.2.3 Data Systems Risks 2.2.4 Departmental Risks 2.2.5 Desk-Level Risks 2.3 Building the Risk Assessment 2.4 Determining the Effects of Disasters 2.4.1 List of Disaster Affected Entities 2.4.2 Downtime Tolerance Limits 2.4.3 Cost of Downtime 2.4.4 Interdependencies 2.5 Evaluation of Disaster Recovery Mechanisms 2.6 Disaster Recovery Committee 3 Disaster Recovery Phases 3.1 Activation Phase 3.1.1 Notification Procedures 3.1.2 Damage Assessment 3.1.3 Activation Planning 3.2 Execution Phase 3.2.1 Sequence of Recovery Activities 3.2.2 Recovery Procedures 3.3 Reconstitution Phase 4 The Disaster Recovery Plan Document 4.1 Document Contents 4.2 Document Maintenance 5 Reference 1 Executive Summary Disasters are inevitable but mostly unpredictable, and they vary in type...
Words: 5950 - Pages: 24
...like other R/3 applications, is itself written in ABAP. Application Servers R/3 programs run on application servers. They are an important component of the R/3 System. The following sections describe application servers in more detail. Structure of an Application Server The application layer of an R/3 System is made up of the application servers and the message server. Application programs in an R/3 System are run on application servers. The application servers communicate with the presentation components, the database, and also with each other, using the message server. The following diagram shows the structure of an application server: [pic] The individual components are: Work Processes An application server contains work processes, which are components that can run an application. Each work process is linked to a memory area containing the context of the application being run. The context contains the current data for the application program. This needs to be available in each dialog step. Dispatcher Each application server contains a dispatcher. The dispatcher is the link between the work processes and the users logged onto the application server. Its task is to receive requests for dialog steps from the SAPgui and direct them to a free work process. In the same way, it directs screen output resulting from the dialog step back to the appropriate user. Gateway Each application server contains a gateway. This is the interface for the R/3 communication protocols...
Words: 2346 - Pages: 10
...layout 6 2 1. Infrastructure and Security 3 2. Network 5 2.1 Current Network 5 2.2 Planned network 6 3. Security Policy 7 3.1 Process Policy 7 3.2 Employee Policy 8 Table of Figures Figure 1: Current physical layout 5 Figure 2: Current logical layout 5 Figure 3: Planned physical layout 6 Figure 4: Planned Logical layout 6 1. Infrastructure and Security The network infrastructure is critical to the success of business. Day in and day out, users rely on the network to do their jobs well. Network uptime is crucial to the company’s operation and is becoming even more important as technology advances. Network infrastructure refers to the grouping of physical hardware and logical components which are needed to provide a number of features for the network, such as connectivity, routing and switching capabilities, network security, and access control. The physical infrastructure of the network refers to the physical design of the network together with the hardware components. The logical infrastructure of the network consists of all the software components required to enable connectivity between devices, and to provide network security. The network's logical infrastructure consists of software products and networking protocols and services. At a minimum, the network infrastructure should be capable of high availability to the three 9s (99.9%) of uptime. This equates to 8.76 hours of downtime per year for planned maintenance. Even more the network infrastructure...
Words: 1515 - Pages: 7
...PROEJCT MANAGEMENT AIR-EURO – RELOCATION OF HEAD OFFICE 1. Reviewing the Project Scope It has been decided that relocation of the Head Office must be in the Zaanstad area which is about 29 kilometers away from the Schiphol Airport. Since building rents and leasing costs are lower in Zaanstad, it is much more attractive to the company. The following requirements were outlined in the project scope. 1.1. Project Statement Relocation of Air-Euro Head Office at Zaanstad; Location: At or near Zaanstad Area; Accommodation for: 300 persons; Number of Square Meters (Floor area): 500; must be tiled; Car park: For 400 vehicles; Rent: Around US$ 25,000 per month; Lease period: 5 years (subject to renewal on mutual agreement) and Amenities & Provisions: All important amenities must be available including running water supply, hot and cold water facility, electricity, centrally air-conditioned building, central heating, overhead water tank with sufficient capacity, a conference hall, a spacious room for board meetings, appropriately partitioned, well-fitted bathrooms and toilets and well renovated if it is necessary (Itrelo.net, 2014). 1.2. Preferences Preferences: A shady grove or a location of boulevards is preferred. Access roads must be open 24 hours a day. Schools, churches and other such public places like parks are better avoided. Busy intersections and streets of high intensity traffic must also be avoided. The building ought to be fairly new and well...
Words: 3781 - Pages: 16
...| Edexcel Level 7EDSMLASSESSMENT ACTIVITY | | Unit Name: | STRATEGIC CHANGE MANAGEMENT | Unit Number: | 03 | Credits: | 10 | Assessor: | Prof. Krishna Mohan .M | Internal Verifier: | | Aim: Strategic change impacts on the human resources structure of the organization and this often means a restructuring of the workforce or changes in working practices. Almost inevitably, change will generate resistance from some, particularly those who feel that the change will have no positive benefits for them. Other people may resist change simply because they prefer status quo. Organizations need to ensure that they have strategies in place to manage resistance to change and this should be part of the overall model that they adopt for managing the change. Once in place, progress towards change will need to be monitored. Strategic change management is most effective when an organization actively seeks the participation of all relevant stakeholders. A change management strategy will be effective only if it has the support of all stakeholders. If they are to have a sense of ownership, stakeholders need to have the opportunity to contribute to the development of the change strategy. Learners will develop an understanding of the models of strategic change and the role that stakeholders play in this process. They will then examine the need for change in a selected organization and plan the implementation of a model for change. Summary of learning outcomes To achieve...
Words: 2836 - Pages: 12
...PART ONE Introduction to Discrete-Event System Simulation 1 Introduction to Simulation A simulation is the imitation of the operation of a real-world process or system over time. Whether done by hand or on a computer, simulation involves the generation of an artificial history of a system, and the observation of that artificial history to draw inferences concerning the operating characteristics of the real system. The behavior of a system as it evolves over time is studied by developing a simulation model. This model usually takes the form of a set of assumptions concerning the operation of the system. These assumptions are expressed in mathematical, logical, and symbolic relationships between the entities, or objects of interest, of the system. Once developed and validated, a model can be used to investigate a wide variety of “what-if” questions about the realworld system. Potential changes to the system can first be simulated in order to predict their impact on system performance. Simulation can also be used to study systems in the design stage, before such systems are built. Thus, simulation modeling can be used both as an analysis tool for predicting the effect of changes to existing systems, and as a design tool to predict the performance of new systems under varying sets of circumstances. In some instances, a model can be developed which is simple enough to be “solved” by mathematical methods. Such solutions may be found by the use of differential calculus, probability...
Words: 33852 - Pages: 136
...SOFTWARE REQUIREMENTS SPECIFICATION For Library Management System Prepared by:- Soumili Sen Nayan Patil Neha Singh Anita Singh Academic Year: 2013-2014 1. Introduction 1.1 Purpose The main objective of this document is to illustrate the requirements of the project Library Management system. The document gives the detailed description of the both functional and non-functional requirements proposed by the client. The purpose of this project is to provide a friendly environment to maintain the details of books and library members. The main purpose of this project is to maintain easy circulation system using computers and to provide different reports. This project describes the hardware and software interface requirements using ER diagrams and UML diagrams. 1.2 Document Conventions * Entire document should be justified. * Convention for Main title * Font face: Times New Roman * Font style: Bold * Font Size: 14 * Convention for Sub title * Font face: Times New Roman * Font style: Bold * Font Size: 12 * Convention for body * Font face: Times New Roman * Font Size: 12 1.3 Scope of Development Project Library Management System is basically updating the manual library system into an internet-based application so that the users can know the details of their accounts, availability of books and maximum limit for borrowing. The project is specifically designed for the use of librarians and library users...
Words: 2807 - Pages: 12
............. 6 1.1 .. PURPOSE .................................................................................................................. 6 1.2 .. SCOPE ....................................................................................................................... 6 1.3 .. DEFINITIONS, ACRONYMS AND ABBREVIATIONS .................................................. 7 1.4 .. REFERENCES............................................................................................................ 8 1.5 .. OVERVIEW................................................................................................................. 9 2. OVERALL DESCRIPTION ............................................................................. 10 2.1 PRODUCT PERSPECTIVE ......................................................................................... 10 2.1.1 SYSTEM INTERFACES .....................................................................................................10 2.1.2 USER INTERFACES ..........................................................................................................10 2.1.3 HARDWARE INTERFACES ...............................................................................................13 2.1.4 SOFTWARE...
Words: 5433 - Pages: 22
...Practical 1 Practical 1.1 : Basic of Cluster Computing 1. INTRODUCTION 1.1 Background study Parallel computing has seen many changes since the days of the highly expensive and proprietary super computers. Changes and improvements in performance have also been seen in the area of mainframe computing for many environments. But these compute environments may not be the most cost effective and flexible solution for a problem. Over the past decade, cluster technologies have been developed that allow multiple low cost computers to work in a coordinated fashion to process applications. The economics, performance and flexibility of compute clusters makes cluster computing an attractive alternative to centralized computing models and the attendant to cost, inflexibility, and scalability issues inherent to these models. Many enterprises are now looking at clusters of high-performance, low cost computers to provide increased application performance, high availability, and ease of scaling within the data center. Interest in and deployment of computer clusters has largely been driven by the increase in the performance of off-the-shelf commodity computers, high-speed, low-latency network switches and the maturity of the software components. Application performance continues to be of significant concern for various entities including governments, military, education, scientific and now enterprise organizations. This document provides a review of cluster computing, the various types...
Words: 5312 - Pages: 22
...UCSB Computer Science Technical Report 2010-05. Who’s Driving this Cloud? Towards Efficient Migration for Elastic and Autonomic Multitenant Databases Aaron Elmore Sudipto Das Divyakant Agrawal Amr El Abbadi Department of Computer Science University of California, Santa Barbara, CA, USA {aelmore, sudipto, agrawal, amr}@cs.ucsb.edu Abstract The success of cloud computing as a platform for deploying webapplications has led to a deluge of applications characterized by small data footprints but unpredictable access patterns. An autonomic and scalable multitenant database management system (DBMS) is therefore an important component of the software stack for platforms supporting these applications. Elastic load balancing is a key requirement for effective resource utilization and operational cost minimization. Efficient techniques for database migration are thus essential for elasticity in a multitenant DBMS. Our vision is a DBMS where multitenancy is viewed as virtualization in the database layer, and migration is a first class notion with the same stature as scalability, availability etc. This paper serves as the first step in this direction. We analyze the various models of database multitenancy, formalize the forms of migration, evaluate the offthe-shelf migration techniques, and identify the design space and research goals for an autonomic and elastic multitenant database. Categories and Subject Descriptors H.2.4 [Database Management]: Systems—Relational...
Words: 5142 - Pages: 21
...Business Case THE A-TEAM IIS Network & Communications Infrastructure Plan March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett | Table of Contents | | | Executive Summary 2 Project Overview 3 1.1 Project Overview 3 1.2 Project Description 3 1.3 Alternatives Considered 3 1.4 Recommended Solution 3 1.5 Risks 3 Project Description 4 2.1 Project Background and Opportunity 4 2.2 Business Needs 4 2.3 Project Objectives 4 2.4 Organizational Benefits 15 2.5 Project Scope 5 2.6 Out of Scope 5 Alternatives and Cost/Benefit Analysis 6 3.1 [Possible Solution 1] 7 3.2 [Possible Solution 2] 7 3.3 [Possible Solution 3] 7 3.4 Comparison 7 3.5 Recommended Alternative 7 Project Risk Assessment 8 REFERENCES 9 Executive Summary | | IIS Network & Communications Infrastructure Design Plan IIS prides itself as an industry leader with product lines such as the revolutionary “” Thinking Navigator, which is a first of its kind to integrate GIS and real-time satellite imagery data with proprietary software algorithms. IIS is currently comprised of two division; Consumer and Military Defense Divisions with Corporate headquarters in Dallas and branch offices in Fairfax, Shanghai and London. The Military...
Words: 4121 - Pages: 17
...Online Sales System Master of Science Thesis [in the Programme Software Engineering & Technology] Haseeb Zulfiqar Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering Göteborg, Sweden, March 2011 Online Sales System The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Online Sales System Haseeb Zulfiqar © Haseeb Zulfiqar, March 2011. Examiner: Sven-Arne Andreasson Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 A Sales System is an online web application of sells forest products, paper in particular, around...
Words: 12011 - Pages: 49
...Human Resources Data Migration Project Implementation Plan Human Resources Data Migration Project Implementation Plan Project Group 1: Information Technology Group March 4, 2013 Project Group 1: Information Technology Group March 4, 2013 VERSION HISTORY Version # | ImplementedBy | RevisionDate | RequestedBy | ApprovedBy | Description of Change | 1.0 | student | 03-04-2013 | | | Preliminary draft | | | | | | | | | | | | | | | | | | | Table of Contents 1.1 Purpose 4 1.2 System Overview 4 1.2.1 System Description 4 1.2.2 Assumptions and Constraints 4 1.2.3 System Organization 5 2 Management Overview 5 2.1 Problem Statement 5 2.2 Description of Implementation 6 2.3 Points-of-Contact 6 2.4 Major Tasks 7 2.4.1 Project Tasks 7 2.4.2 MS Access to Oracle Tasks 7 2.4.3 Oracle to Mongo Tasks 7 2.5 Implementation Schedule 8 2.6 Security and Privacy 8 2.6.1 System Security Features 8 2.6.2 Security Set Up During Implementation 8 3 Implementation Support 8 3.1 Hardware, Software, Facilities, and Materials 9 3.1.1 Hardware 9 3.1.2 Software 9 3.1.3 Facility 9 3.1.4 Materials 9 3.2 Documentation 9 3.3 Personnel 9 3.3.1 Staffing Requirements 9 3.3.2 Training of Implementation staff 9 3.4 Outstanding Issues 10 3.5 Implementation Impact 10 3.6 Communications Plan 10 3.7 Change Management 12 4 Implementation Risks and Contingencies 13 4.1 Technical Risks and Contingencies 13 5 Acceptance Criteria 14 ...
Words: 4932 - Pages: 20
...newly emerged paradigm of cloud computing can be helpful for E-Governance. IIIT, Hyderabad January 2010 CLOUD COMPUTING FOR E-GOVERNANCE January 1, 2010 Table of Contents Executive Summary....................................................................................................................................... 3 1. E-Governance Requirements ................................................................................................................ 4 1.1 2. E-Governance Other Requirements .............................................................................................. 5 Components of a typical E-Governance Application ............................................................................ 5 2.1 Challenges with Traditional Infrastructure...
Words: 4341 - Pages: 18
...Cloud Computing overview advantage and challenges Overview Silver Lining or storm ahead The future of cloud computing Effective use of cloud computing in education institutions Cloud Computing for beginner Cloud computing Challenges and future directions http://www.businesswire.com/news/home/20110622006602/en/Future-Cloud-Computing-Survey-Reveals-Drivers-Cloud Cloud Computing GAP Task Force http://inews.berkeley.edu/articles/Spring2009/cloud-computing Table of contents 2 0 Relevant Resources 4 0 Relevant Resources 4 1 General guidelines of community design 6 2 Attracting new members 7 2.1 Methods of persuasion of a potential user 7 2.2 Encouraging users to invite friends 8 2.3 Entry barrier 9 2.4 Guidance for new members 9 3 Structure of the community 12 3.1 Member profiles 12 3.2 Member connections 13 3.3 Adding connections 15 3.4 Member reputation 16 3.5 Paid membership 18 3.6 Fake members 18 3.7 Lurkers 18 4 Encouraging user participation 20 4.1 Using uniqueness 20 4.2 Using controversy 20 4.3 Using individual recognition 21 4.4 By discouraging low quality contributions (moderation) 21 4.5 Using goal setting 23 4.6 Using E-Mail notifications 24 4.7 By showing the activity of community 24 5 Stimulating Social Interactions 26 5.1 By common Interests 26 5.3 By common current life transitions 27 5.4 By shared experience 28 5.5 By shared education 29 5.6 By showing the distance 29 5.7 By service: Photo Albums 30 5.8 By service: Profile...
Words: 10086 - Pages: 41