Free Essay

Systems High Availability

In:

Submitted By misheta
Words 2163
Pages 9
Cloud Computing

Future Proof IT…
Internal Cloud External Cloud

APP

APP

Owned and Operated by IT

Rented by IT

Unlock new market based economies of scale, service and innovation beyond what currently exists today

What is Virtualization?

What is Virtualization? Physical World

Virtualized World

Hardware

Traditional x86 Architecture • Single OS image per machine • Software and hardware tightly coupled • Multiple applications often conflict • Underutilized resources

Virtualization: • Separation of OS and hardware • OS and application contained in single file • Applications are isolated from one another • Hardware independence & flexibility

Typical Consolidation: 15:1

Key Properties of Virtual Machines
•Partitioning
 Run

multiple operating systems on one physical machine system resources between virtual machines

 Divide

Key Properties of Virtual Machines
•Partitioning
 

Run multiple operating systems on one physical machine Divide system resources between virtual machines

•Isolation
 Fault

and security isolation at the hardware level resource controls preserve performance

 Advanced

Key Properties of Virtual Machines
•Partitioning
 

Run multiple operating systems on one physical machine Divide system resources between virtual machines

•Isolation
 

Fault and security isolation at the hardware level Advanced resource controls preserve performance

•Encapsulation
 Entire

state of the virtual machine can be saved to files and copy virtual machines as easily as moving and copying files

 Move

Key Properties of Virtual Machines
•Partitioning
 

Run multiple operating systems on one physical machine Divide system resources between virtual machines

•Isolation
 

Fault and security isolation at the hardware level Advanced resource controls preserve performance

•Encapsulation
 

Entire state of the virtual machine can be saved to files Move and copy virtual machines as easily as moving and copying files

•Hardware-Independence
 Provision

or migrate any virtual machine to any similar or different physical server

Reduce Excess Server Capacity
BEFORE VMware Servers Storage Network Facilities 1,000
Direct attach 3000 cables/ports 200 racks AFTER VMware

400 power whips

80 Tiered SAN and NAS 400 cables/ports 10 racks 20 power whips

vSphere Components

vSphere Components vSphere is a distributed software system with features enabled by a management server and hypervisor working together VMware vCenter Server is the management server and cluster coordinator (1 instance required) VMware ESX / ESXi is the hypervisor software running on each host (1 instance per server required)

VMware ESX / ESXi

VMware ESX / ESXi

VMware ESX / ESXi

vSphere editions are the licensed features enabled by vCenter Server working with ESX / ESXi

14

FEATURES

Availability

Security

Scalability

Scale Up Applications for Assured QoS
Scalable virtual machines Hot add of APP OS
CPU Memory

1 TB

Hot add and remove Storage devices
Network devices

Hot Extend virtual disks Zero downtime scale up of virtual machines

32 CPUs

Memory Virtualization Features

Advanced Memory Virtualization
Host system memory is usually the resource bottleneck. VMware memory management technology allows an average of 2:1 memory overcommit (or greater) Advanced Scheduler runs VMs better under load and to a greater capacity

Transparent Page Sharing

Memory ballooning

Swap File

View in slideshow

Memory Oversubscription
Citrix XenServer 5 Microsoft Hyper-V with no memory overcommit VMware ESXi with memory overcommit

ERROR ERROR

Error message after 7 VMs 6

14 VMs on VMware!

Heavy workload — 2:1 higher consolidation ratio for VMware
* SQLIOSim

Storage Features

Storage Technology and Types
VMFS

APP OS

APP OS

APP OS

ESX

Datastore Types
Storage Technology

NFS

RDM

LOCAL

SAN

iSCSI

NAS

vCompute

vStorage

vNetwork

vStorage Thin Provisioning
APP OS APP OS APP OS

ESX

Virtual machine disks consume only the amount of physical space in use
Virtual machine sees full logical disk size at all times
Full reporting and alerting on allocation and consumption

Thick 20GB

Thin 40GB

Thin 100GB

Virtual Disks

20GB 20GB 40GB

100GB

Significantly improve storage utilization
Eliminate need to overprovision virtual disks

Datastore

60GB 20GB

Reduce storage costs by up to 50%

Failover Features

The Power of Vmware High Availability
VMware HA provides better protection against server failure
Automatically restarts VMs OS and hardware independent Easy to implement and configure

X

HA Down Time

Availability

Security

Scalability

VMware Fault Tolerance
Single identical VMs running in lockstep on separate hosts Zero downtime, zero data loss failover for all virtual machines in case of hardware failures Zero downtime, zero data loss

APP

APP

APP

OS

OS

OS

VMware vSphere™

No complex clustering or specialized hardware required
Single common mechanism for all applications and OS-es

Transforming Availability Service Levels

Hardware Failure Tolerance

Continuous

VMware FT
Automated Restart

with VMware HA

Unprotected 0%

10%

100%

Application Coverage

Load Balance Features

The Power of Vmotion and Storage Vmotion
73% of VMware customers have implemented VMotion in production

VMotion enables VM migration during server maintenance without downtime for applications and users

VMotion

VMotion

VMotion Down Time

Availability

Security

Scalability

DRS Ensures Capacity on Demand

Shrink and grow of applications based on demand and priority
APP APP APP APP APP APP

OS

OS

OS

OS

OS

OS

VMware vSphere™

Dynamic and responsive load balancing

Auto Load-Balance to Avoid Storage Contention Points Storage DRS
Description
1. Aggregate datastores* into “pods” 2. Provision VM’s against pods, not datastores – SDRS chooses the best datastore for your VM 3. Auto-balance on the basis of space utilization & IO load

Benefits
• Greater performance assurance for i/o-intensive applications, even in the face of spot contention • Speed VM provisioning • Save time otherwise spent monitoring individual datastor • Drive up storage utilization

2TB

Increase operational speed and efficiency
* typically, homogeneous and similarly capable

Storage pod

500GB 500GB 500GB

500GB

datastores

vCompute

vStorage

vNetwork

Green IT with VMware vSphere™ Power Optimization features
DPM consolidates workloads onto fewer servers when the cluster needs fewer resources Places unneeded servers in standby mode
APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS

Brings servers back online as workload needs increase ESX supports Intel Speed Step/AMD Power now for individual host power optimization Minimizes power consumption while guaranteeing service levels No disruption or downtime to virtual machines

VMware vSphere™

DPM brings off DPM powers servers when server back online when requirements load lower are increases

Support with Intelligent Platform Management Interface (IPMI) or HP Integrated Lights-Out (iLO) technology.

Additional 20% Reduction in Power Costs with DPM…
DPM Savings calculated for a datacenter with 100 physical servers
$80,300
Before DPM After DPM

$63,093

16,800

13,200

Hours per Week

Dollars per Year

Assumptions: 50 out of 100 servers can be powered down for 8 hrs/day on weekdays and 16 hrs/day on weekends. Total power consumption per server ( operating power + cooling power) = 1130.625 watts/hr Cost of energy = $ 0.0813 per kWH (source: Energy Information Administration)

Always On, On Demand Data Center
As virtualization matures and becomes default, the "next big thing" will be automation.
Automated Resource Assurance

 Dynamic Balancing  Continuous Optimization

+

Increased Availability
 Automated  Across Applications

+

On Demand Capacity
 Non-disruptive Scaling  Flexible, Reconfigurable

X

Security Features

Introducing VMsafe™
Security VM

• HIPS • Firewall • IPS/IDS • Anti-Virus

Security API

ESX Server

Creates a new, stronger layer of defense – fundamentally changes protection profile for VMs running on VMware Infrastructure Protect the VM by inspection of virtual components (CPU, Memory, Network and Storage) Complete integration and awareness of VMotion, Storage VMotion, HA, etc. Provides an unprecedented level of security for the application and the data inside the VM

Availability

Security

Scalability

VMware vShield Zones
Self-learning, self-configuring firewall Service
APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS

VMotion and network-configuration aware trust zones Dynamic firewall policy using application protocol awareness

VMware vSphere™

Dynamic security capacity using infrastructure vServices Security policies auto-adapt to network reconfiguration or upgrades

Backup Features

Availability

Security

Scalability

VMware Data Recovery
Agent-less, disk-based backup and recovery of your VMs
APP OS APP OS APP OS

VM or file level restore Incremental backups and data de-dupe to save disk space

ESX

Quick, simple and complete data protection for your VMs
Centralized Management through VirtualCenter Cost Effective Storage Management
De-duplicated Storage

Copyright © 2005 VMware, Inc. All rights reserved.

vCompute

vStorage

vNetwork

vStorage APIs for Data Protection
Next generation evolution of VMware Consolidated Backup
Centralized off-host backup of virtual machines No additional software on backup server

Enables incremental, differential, and full-image backup and restore of virtual machines File-level backup support for Windows and Linux virtual machines Delivers efficient backup without loading ESX servers
* Note: vSphere 4.0 includes and supports VCB 1.5 U1. New features are only available with products supporting vStorage APIs for Data Protection

Network Features

vCompute

vStorage

vNetwork

vNetwork Distributed Switch

2009

Aggregated datacenter level virtual networking
APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS APP OS

Simplified setup and change Easy troubleshooting, monitoring and debugging Enables transparent third party management of virtual environments

vSwitch

vSwitch Cisco Nexus 1000V vNetwork Distributed Switch VMware vSphere™

vSwitch

Profile & Auto Deploy Features

vCenter Server: Host Profiles
Cluster

Reference Host

Simplified setup and change management for ESX hosts Easy detection of non-compliance with standard configurations Automated remediation

Auto Deploy Example – Initial Boot vCenter Server

Image Image Profile Image Profile Profile Rules Engine ESXi VIBs Driver VIBs

Host Profile Host Profile Host Profile

“Waiter”

OEM VIBs

Auto Deploy

TFTP

DHCP

Auto Deploy Example – Initial Boot vCenter Server

Image Image Profile Image Profile Profile Rules Engine ESXi VIBs Driver VIBs

Host Profile Host Profile Host Profile

“Waiter”

gPXE image

DHCP Request

OEM VIBs

Auto Deploy

TFTP

DHCP

Auto Deploy Example – Initial Boot vCenter Server

Image Image Profile Image Profile Profile Rules Engine ESXi VIBs Driver VIBs

Host Profile Host Profile Host Profile

“Waiter”

OEM VIBs

Auto Deploy
Cluster A Cluster B

Auto Deploy Example – Initial Boot vCenter Server

Image Image Profile Image Profile Profile Rules Engine ESXi VIBs Driver VIBs
• Image Profile X • Host Profile 1 • Cluster B

Host Profile Host Profile Host Profile

“Waiter”

OEM VIBs

Auto Deploy
Cluster A Cluster B

Auto Deploy Example – Initial Boot vCenter Server

Image Image Profile Image Profile Profile Rules Engine ESXi VIBs Driver VIBs
Image Profile Host Profile Cache

Host Profile Host Profile Host Profile

“Waiter”

OEM VIBs

Auto Deploy
Cluster A Cluster B

Auto Deploy Example – Initial Boot vCenter Server

Image Image Profile Image Profile Profile Rules Engine ESXi VIBs Driver VIBs
Image Profile Host Profile Cache

Host Profile Host Profile Host Profile

“Waiter”

OEM VIBs

Auto Deploy
Cluster A Cluster B

vSphere Performance and OS Support

ESX 4.0 Performance with SQL Server 2008
Relative Scaling Ratio
VM Native

147.24 133.12

ESX achieves 90% of native performance on 4.0 vCPU VM Workload transaction latency unchanged between ESX 4.0 and Native

94.04 79.88 51.08

45.22

1 vCPU

2 vCPU

4 vCPU

VMware vs. Microsoft vs. Citrix

VMware vSphere™: Most Comprehensive OS Support VMware vSphere™
Windows NT 4.0 Windows 2000 Windows Server 2003 Windows Server 2008 Windows Vista Windows XP RHEL5 RHEL4 RHEL3 RHEL2.1 SLES10 SLES9 SLES8 Ubuntu 7.04 Solaris 10 for x86 NetWare 6.5 NetWare 6.0 NetWare 6.1 Debian CentOS FreeBSD Asianux SCO OpenServer SCO Unixware …

MS Hyper-V
Win Server 2008 (up to 4P vSMP) Win Server 2003 SP2 (up to 2P vSMP) Win Server 2000 SP4 (1P only) SLES10 , 11 (1P only) Windows Vista SP1 Windows XP Pro SP2/SP3

vSphere == 4x Guest OS-es vSphere most guest OS-es

License

vSphere 5 Editions
`
Price per proc (license only) vRAM Entitlement per proc vCPU Features Hypervisor High Availability Data Recovery vMotion Virtual Serial Port Concentrator Hot Add vShield Zones Fault Tolerance Storage APIs for Array Integration Storage vMotion Distribute Resource Scheduler & Distributed Power Management Distributed Switch I/O Controls (Network and Storage) Host Profiles Auto deploy  Profile-Driven Storage  Storage DRS 
All editions include: Thin Provisioning, Update Manager, Storage APIs for Data Protection, Image Profile, and SLES (except Ess and Ess +)

Essentials Essentials
$83 32 GB 8 way

Essentials Plus
$749 32GB 8 way

Essentials Plus

Standard Standard
$995 32 GB 8 way

Enterprise Enterprise
$2,875 64 GB 8 way

Enterprise Plus
$3,495 96 GB 32 way

Enterprise Plus

`

vSphere 5 Acceleration Kits

Essentials
$495
6 CPUs 32 GB (192 GB max) 8 way

Essentials Essentials Plus Plus
$4,495
6 CPUs 32 GB (192 GB max) 8 way

Standard Standard AK
$10,000
8 CPUs 32 GB (256 per kit) 8 way

Enterprise Enterprise AK
$17,495
6 CPUs 64 GB (384 per kit) 8 way

Enterprise Plus Enterprise AK Plus
$21,995
6 CPUs 96 GB (576 per kit) 32 way

Price per proc (license only) Includes
• • vRAM Entitlement vCPU

Features
Hypervisor High Availability Data Recovery vMotion Virtual Serial Port Concentrator Hot Add vShield Zones Fault Tolerance Storage APIs for Array Integration

Storage vMotion
Distribute Resource Scheduler & Distributed Power Management

Distributed Switch
I/O Controls (Network and Storage) Host Profiles Auto deploy  Profile-Driven Storage  Storage DRS 

All editions include: Thin Provisioning, Update Manager, Storage APIs for Data Protection, Image Profile, and SLES (except Ess and Ess +)

Similar Documents

Free Essay

Security and Information Protection

...Q1. NAME AND DESCRIBE THREE AUTHENTICATION METHODS. Authentication is defined by Essentials Guide as is the process of determining whether someone or something is, in fact, who or what it is declared to be. Authentication means verifying the identity of someone (a user, device, or an entity) who wants to access data, resources, or applications. Validating that identity establishes a trust relationship for further interactions. Authentication is the first step in access control, and there are three common methods used for authentication: What you have method: – Examples of this method includes keys, badges, ID, pass cards/smart card, tokens. These are physical objects and go towards identifying you by what you physically “own”. A smart card is credit card sized card that has an embedded certificate used to identify the holder. The obvious problem here is that objects can be taken and are not tied or "signed" to any particular person. This makes it easy to loan your verification for temporary uses like valet parking, but objects can be stolen. Keys can be duplicated and IDs can be faked, What you are method: - DNA, fingerprints, voice match, cadence of your typing, your walk, talk, act. Your smell, shoeprints, aura, your retinal scan, your vein patterns. Anything that leaves the impression of YOU, but nothing that can come from someone else. These are things that can be taken from you. They cannot be faked but can be stolen. Secondary level of security, what you are is better...

Words: 1987 - Pages: 8

Free Essay

High Availablity Blueprints

...the Availability Digest Towards Zero Downtime: High Availability Blueprints August 2007 Vishal Rupani focuses on Microsoft Clustering in his very readable book, Towards Zero 1 Downtime: High Availability Blueprints. He first provides a high-level overview of many topics pertinent to high availability. He then devotes most of his book to Microsoft Clustering and to the proper installation of Microsoft’s Cluster Server and several of Microsoft’s cluster-aware applications. He follows this with a brief discussion of disaster-tolerant architectures, and concludes with a case study. High-Availability Topics Rupani begins with a definition of several high-availability concepts, such as planned and unplanned outages, single points of failure, mean time between failures and interruptions, fault tolerance, and redundancy. He then provides an overview of several important high-availability technologies. RAID RAID technology is the most common method to provide data resiliency. With RAID (Redundant Arrays of Independent Disks), data is redundantly stored on multiple disks such that, should one disk fail, the data can still be reconstructed. RAID arrays typically provide a hot-swappable capability so that a failed disk can be replaced without taking down the array. There are several configurations of RAID. Most stripe data across multiple disks to achieve improved performance. Mirrored disks, used by fault-tolerant systems and designated as RAID 1, provide an...

Words: 2470 - Pages: 10

Free Essay

Chapter 6

...agile organization that take advantage of every resource in the most efficient and effective way. One of the metrics that international truck could use would be system availability. System Availability is usually measured inversely as downtime, or the average amount of time a system is down and unavailable to end users and customers. International Truck's previous IT systems didn't share information easily. The SoA allowed information to flow much easier to and from different departments and systems, resulting in less problems and errors in areas such as manufacturing. Other key infrastructure-centric metrics that could be used by International Truck to justify an SoA are, Accuracy, scalability, and through put. These would be justified by the problem in shortfalls in inventory, excessive defects and returns, more timely information on assembly-plant problems, and the lack of easily shared information by their current system. Scalability is how well a system can adapt to increased demands. This is more of a conceptual metric that assesses your ability to upgrade the implemented infrastructure at minimal cost and service interruption. Accuracy is usually measured inversely as error rate or the number of errors per thousand or million in manufacturing. Throughput is the amount of information that can pass through a system in a given amount of...

Words: 263 - Pages: 2

Free Essay

Overall Equipment Effectiveness

...Startup rejection occurs during this startup time.  Scrap  Rework  These losses occurs when products 11 produced are not conforming to the specifications.  These are rejects during steady-state production.  Scrap  Rework 12  The amount of time the facility is open and 13 available for operation.  One year consists of 365 days, one day consists of 24 hours, 60 minutes in one hour, 60 seconds in one minute.  PLANT OPERATING TIME = Fully Productive Time + Quality Loss + Speed Loss + Downtime Loss + Planned Shutdown PLANT OPERATING TIME 14 PLANNED PRODUCTION TIME OPERATING TIME NET OPERATING TIME FULLY PRODUCTIVE TIME QUALITY LOSS SPEED LOSS DOWNTIME LOSS PLANNED SHUTDOWN OEE FACTORS 15  Availability represents the...

Words: 997 - Pages: 4

Premium Essay

Drexel Ct395 Assignment01

...examples of confidentiality, integrity and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirements. Confidentiality is provided by two factors: a unique access card and a PIN that functions as a password. A user must have both of these to access the system. Confidentiality is compromised by the fact that most ATM systems connect to various banks, and the source of information cannot be guaranteed to be from a proper ATM. Also, ATMs are public, and can be accessed by the entire population, allowing things like card swipe readers to be used to attack them. The importance of confidentiality is medium to high. If it is the loss of confidence in a limited number of accounts, it is medium, because it does not stop the main functions of the organization and can be corrected. It would be high if a large number of accounts were compromised. Integrity of information at the ATM is provided by the very limited interface that the machine provides to the data stored on the back end. There is no comprehensive GUI or CLI to provide a point of attack. However, the previously mentioned public access and data exchange are threats to integrity. The importance of integrity is medium to high. The alteration of a small number of accounts does not stop the main functions of the organization and can be corrected. The alteration of many could be catastrophic. Availability of the system (and the currency or information it dispenses)...

Words: 594 - Pages: 3

Free Essay

Cluster Computing

...technologies have been developed that allow multiple low cost computers to work in a coordinated fashion to process applications. The economics, performance and flexibility of compute clusters makes cluster computing an attractive alternative to centralized computing models and the attendant to cost, inflexibility, and scalability issues inherent to these models. Many enterprises are now looking at clusters of high-performance, low cost computers to provide increased application performance, high availability, and ease of scaling within the data center. Interest in and deployment of computer clusters has largely been driven by the increase in the performance of off-the-shelf commodity computers, high-speed, low-latency network switches and the maturity of the software components. Application performance continues to be of significant concern for various entities including governments, military, education, scientific and now enterprise organizations. This document provides a review of cluster computing, the various types of clusters and their associated applications. This document is a high-level informational document; it does not provide details about various cluster implementations and applications. 1.1.1 Cluster Computing Cluster computing is best characterized as the integration of a number of off-the-shelf commodity computers and resources integrated through hardware, networks, and software to behave...

Words: 5312 - Pages: 22

Free Essay

Linux/Intel Effectiveness for Running E-Business: a Case Study of Oracle E-Business Outsourcing

...Linux/Intel Effectiveness For Running E-Business: A Case Study of Oracle E-Business Outsourcing An Oracle White Paper January 2003 Linux/Intel Effectiveness For Running E-Business: A Case Study of Oracle E-Business Outsourcing Executive Overview ............................................................................................. 3 Introduction .......................................................................................................... 3 Why Linux? ........................................................................................................... 4 Price/Performance Measurement of Intel Architecture ................................. 4 UNBREAKABLE LINUX ................................................................................ 4 Architecture for E-Business outsourcing.......................................................... 5 Oracle E-Business Outsourcing Standard Infrastructure .............................. 5 effectiveness of Linux/Intel for outsourcing ................................................... 6 Reliability ............................................................................................................... 7 Reliability Advantages of Oracle E-Business Suite on Linux/Intel and RISC ........................................................................................................................7 Performance .....................................................................................................

Words: 3458 - Pages: 14

Premium Essay

Mobile Computing and Social Networking

... Mobile Computing and Social Networks Assess the effectiveness and efficiency mobile-based applications provide to capture geo-location data and customer data, and quickly upload to a processing server without users having to use a desktop system. The increasing advancement in the efficiency and availability of mobile internet and smartphone capabilities has significantly enhanced the usage, capabilities and functionality of mobile based applications. It is very convenient and easy for today's mobile users to access information, conduct transactions and do several tasks via mobile applications. The ability to access data or do certain tasks via such apps from anywhere, anytime with the mobile phones without having to wait for access to regular computer has resulted in significant convenience and efficiency for people on the move. The smartphone technology is improving day by day and mobile networks are becoming stronger and secure than before, thereby enhancing the effectiveness and efficiency of mobile-based applications. The mobile phone applications are very useful in capturing geo-location data and customer data remotely and transfer such data to the processing server without having the need to use a desktop system, which significantly enhances the convenience and reduces the time required to transfer the data. Such capabilities of mobile applications help in real time transfer and update of data over the server. The advent of mobile applications has...

Words: 1635 - Pages: 7

Premium Essay

Data Class

...compliance issues; Discuss various best practices, methodologies, and approaches that you can take with you; Do my best to answer any questions you may have on audit related issues regarding these topics. So...who am I? IT Compliance Specialist @ the Office of Information Technology at UMCP Responsible for audit and compliance initiatives within OIT Formerly employed by KPMG LLP and Grant Thornton LLP as an IS Auditor Have worked with many federal, state, and local governments as well as public companies, hospitals, and not-for-profits. Why do we want to be in compliance? No one likes audit findings; Reduces organizational risk; Processes based on best practice and widely adopted standards are more effective than ad-hoc processes; Systems and data are more secure as a result of good internal control practices. What is Data Privacy? Data Privacy - the relationship between technology and the legal right to, or public expectation of privacy in the collection and sharing of data. The U.S. has trailed the E.U. and other countries in data privacy regulations and legislation; Passed Legislation: HIPAA, Gramm-Leach-Bliley, COPPA; Proposed Legislation: Data Accountability and Trust Act, Personal Data Privacy and Security Act of 2007 (S. 495). Why Data Privacy? To protect people’s personal information under the law; We want to comply with the law; We want to be able to classify our data to adequate protect data that should be private. What is Data Classification? Data...

Words: 1305 - Pages: 6

Free Essay

Impact of Power and Politics in Dan Mart Inc. in Achieving the Firm’s

...addresses the challenges 5. Business/technical approach 6. Business process changes 7. Technology or business practices used to augment the solution 8. High-level implementation plan 9. Conclusions and overall recommendations 10. Summary of project References Abstract The purpose of this project is to identify the impact of power and politics in Dan Mart Inc management decision in choosing information technology architecture that can provide a high availability and clustering in a business environment like Dan Mart Inc, this project will also identify the limitation power and politics, advantages and cost of implementing each one so as to have a choice of choosing from them all. But for the sake of this project the use of Oracle cooperation high availability and clustering technologies will be the target. We would be discussing different types of technologies by Oracle such as real application cluster(RAC), automatic storage management (ASM), data guard, grid infrastructure, grid control, cloud control, Flash back technology, database e-memory that will be suitable for Dan Mart Inc business environment. Brief Company Background DanMart is a high volume customer oriented business organization that require 24/7 availability of their services, they handle online sales...

Words: 1737 - Pages: 7

Premium Essay

Mobile Computing & Social Networks

...Week 10: Term Paper: Mobile Computing & Social Networks Week 10: Mobile Computing & Social Networks Professor Gregory Hart Information System Decision-Making CIS500 September 9, 2012 Abstract In my paper I will talk about Mobile Computing and Social Networks and how they all work. I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Examine the challenges of developing applications that run on mobile devices because of the small screen size. Describe the methods that can be used to decide which platform to support, i. e., iPhone, iPad, Windows Phone, or Android. I will also talk about Mobile applications require high availability because end users need to have continuous access to IT and IS systems. I will discuss ways of providing high availability. Finally I will discuss mobile devices are subjected to hacking at a higher rate that non-mobile devices and discuss methods of making mobile devices more secure. Table of Contents Abstract ………………………………………………………………………………....... 2 Contents ………………………………………………………………………………….. 3 Effectiveness & Efficiency mobile-based applications to capture Geolocation data ……. 4 Benefits realized by consumers to access their own data...

Words: 2905 - Pages: 12

Premium Essay

Blue Nile

...| Cost of sales79.6 | 78.3 | 50.96 | 52.9 | 42.2 | 43.5 | OperatingIncome5.4 | 6.4 | 0.33 | -11.74 | 13.85 | 16.28 | Inventory6.4 | 6.43 | 37.3 | 41.59 | 56.2 | 52.6 | Property Equip.2.55 | 2.42 | 13.93 | 13.38 | 26.01 | 25.2 | Below table shows the attributes of the products offered by the three companies. Blue Nile | Zale | Tiffany | * Highly customized * Tries to provide high quality * Wide range of prices * Low margin * Uncertainty of demand due to wide variety of products | * Not known for brand value * Product associated with working class * Product Positioning was not clear. | * High brand value * High margin * High price * Less variety * Exclusive * Prestige, blue box equity | Below table describes the attributes of the distribution system employed by the three companies Blue Nile | Zale | Tiffany | * Centralized distribution system * Low response time * High product availability in terms of variety of products * Low product availability in terms of physical availability * Returnability can be challenging. * High transportation cost. * Wide variety of suppliers * Strong information...

Words: 746 - Pages: 3

Premium Essay

Information System Management

...This final term paper for week ten of CIS 500/Information System Management will assess the effectiveness and efficiency of mobile-based applications provide to capture geolocation and customer data, summarize the benefits realized for consumers having the ability to gain access to their own data via mobile applications, examine the challenges of developing applications that run on mobile devices because of the small screen size, describe the methods that can be used to decide which platform to support, why mobile applications require high availability because end users need to have continuous access to IT and IS systems, ways of providing high availability, why mobile devices are subjected to hacking at a higher rate that non-mobile devices, how to make mobile devices more secure. Once the reader has finished reviewing this term paper, the likely hood technology as we knew it yesterday will have evolved and there will be a new more improved mobile application to support mobile devices of all kids. There will be a new phone which is running the latest applications that cannot be run on your current phone, and thus the cycle of having to have the latest and greatest new widget and gadget continues because we as a society have become so dependent upon mobile communications. Moreover, due to the evolution of the mobile community we are losing soft skills and tend to be less personable because we don’t have to visit friends and family to stay in touch rather just sit in our living...

Words: 2906 - Pages: 12

Premium Essay

Mobile Computing and Social Networking

...mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined. Mobile based applications provide a wealth of information to the end user and businesses alike. Users on the go can download and upload information effortlessly on the go without having to boot up a traditional computer. Businesses can capture customer data...

Words: 3603 - Pages: 15

Premium Essay

Hdgjdhfszgd

...category of eBay includes 19 different platforms (e.g. skype, payPal, rent) but we'll be focusing on the search and trade platform. The other sister platforms became part of eBay due to recent acquisitions and in some cases result in architectural mismatch which would be an interesting topic for a separate case study, therefore this case study focuses on the original platform's architecture and its evolution in recent years. EBay is an eCommerce system where a user can browse to the website eBay .com and search for anything they want to buy, in auction or right away from the buyer, or to post some item for sale which other users can search for as prospective buyers. The users then arrange for payments online (using eBay's payPal system which is a separate system designed solely for that purpose and recently integrated onto the eBay platform) and receive the item by mail. Like most internet-enabled business systems, eBay is constructed using distributed object technology. It requires scalability, high performance, high availability, and security. It needs to be able to handle large volumes of requests generated by the internet community and must be able to respond to these requests in a timely fashion. In addition to the end-user application,...

Words: 4022 - Pages: 17