Marshfield Area Technical Council

Slides:



Advertisements
Similar presentations
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Advertisements

Overview of Network Management Network Architecture Fault tolerance and Alerts Data Security Performance, SLA Service Provisioning Accounting and Cost.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Government Technology Bay Area Technology Forum November 5, 2009 Presented By: Jon Fullinwider Director, Local Government Citrix Systems, Inc. Presented.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
5205 – IT Service Delivery and Support
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Chapter 1: Hierarchical Network Design
Barracuda Load Balancer Server Availability and Scalability.
Word Wide Cache Distributed Caching for the Distributed Enterprise.
Community Wireless Services Gabriel Vizzard, Marketing Director how to solve the business and economic challenges in a multi-network environment WiFi Business.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Exploring the Network.
In the name of God :).
MDC-B350: Part 1 Room: You are in it Time: Now What we introduced in SP1 recap How to setup your datacenter networking from scratch What’s new in R2.
Your Business Challenges
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
1 The Fast(est) Path to Building a Private/Hybrid Cloud October 25th, 2011 Paul Mourani RightScale.
608D CloudStack 3.0 Omer Palo Readiness Specialist, WW Tech Support Readiness May 8, 2012.
ACM 511 Introduction to Computer Networks. Computer Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
Turn Bare Metal Into Silver Lining With SCVMM 2012, Today! Mark Rhodes OBS SESSION CODE: SEC313 (c) 2011 Microsoft. All rights reserved.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
Submitted to :- Neeraj Raheja Submitted by :- Ghelib A. Shuaib (Asst. Professor) Roll No : Class :- M.Tech(CSE) 2 nd Year.
As business and traffic grows a company finds that shared hosting is inadequate to meet demands and even VPS is not sufficient. In both instances security.
Technical Documentation Joe walters Cit Spring 2014.
Chapter 1: Explore the Network
MANAGEMENT INFORMATION SYSTEMS
Lecture 6: Cloud Computing
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Chapter 1: Exploring the Network
Designing the Physical Architecture
VPN Extension Requirements for Private Clouds
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
If your customer has or wants… …and you can cross-sell
2016 Citrix presentation.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
1. Public Network - Each Rackspace Cloud Server has two networks
GlassFish in the Real World
Chapter 18 MobileApp Design
Chapter 1: Exploring the Network
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Cloud Computing.
Chapter 22: Cloud Computing Technology and Security
Designing Routing and Switching Architectures. Howard C. Berkowitz
Your Business Opportunity
What Do We Do? Managed IT services
Infrastructure, Data Center & Managed Services
Cloud Migration What to Consider When Switching Providers NAME: SYED TARIQ SHAH “WAQIF” REG NO: K1S18MCS0021 SUB: CLUSTER AND CLOUD COMPUTING.
Mobile edge computing Report by Weiqing huang.
Managing Clouds with VMM
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Network Optimizer Optimize Your Business & Cloud Networks
Design Unit 26 Design a small or home office network
Virtual Private Network
Introduction to Databases Transparencies
WHAT IS MPLS?  MPLS is a type of data-carrying protocol that manages traffic between two locations. It is mainly used in high-performing networks. 
Computers Are Your Future Twelfth Edition
Session I Cloud Introduction Session I
Dynamic WAN Selection Optimize Your Business & Cloud Networks
06 | SQL Server and the Cloud
Presentation transcript:

Marshfield Area Technical Council Software Development Marshfield Area Technical Council

Overview What is Software Development? What are some of the Concerns and how do we separate them? Functional Concerns Non-Functional Concerns

What is Software Development? Support Operations Deployment/Implementation Test Development Design Architecture Analysis/Requirements Ownership Software Development is the process of taking well understood problems and writing code that will solve those problems. It is building reliability. Software should be a repeatable process with consistent outcomes. It is understanding the customer, their problems and the solution. { You are here

Survey of Concerns Does the software solve the problems that have been identified? We depend on those Business Analysts. Does the software keep proper care of the data? Is the data stored durably as appropriate and are there reasonable semantics for the transactions that are needed? Can the correct audience use the application correctly? Do we make it convenient for authorized users? Do we properly deter unauthorized users? Is it fast enough? What are the demands for usage by the audience? Are there real-time requirements? How do we demonstrate that the software we construct is reliable when used? How do we identify software failures in production and assure that we can repair them?

Functional Concerns Does it solve the customer’s problems? Have we separated all of the concerns in our approach? What does the data layer look like? What does the business layer look like?

Non-Functional Concerns -ilities and qualities. High Availability Securable Measurable Repeatable Reliable

Marshfield Area Technical Council IT INfrastructure Marshfield Area Technical Council

overview What is IT Infrastructure? What are some of the considerations for providing IT Infrastructure? What are some of the current trends?

What is IT Infrastructure Campus Network Routing, Switching, Wireless Datacenter Servers, Storage, Network, Load Balancers Firewalls, IDS/IPS, Content Filtering Internet circuits WAN circuits Telephony and Video Communication Systems

Considerations Requirements and Compatibility Availability Operating systems, CPU, Memory Hypervisors Availability Load balancing, Clustering, Hypervisor High-Availability, Network Redundancy Backups Compliance Bandwidth and Latency What does the critical business application require? Security What’s the model for the application (3 Tier?) Who needs access to it? Cost How do we deliver this in an affordable yet reliable manner?

Trends DevOps SDx (Software Defined Networking, Software Defined Storage, SDWAN, etc) Cloud Public Private Hybrid Mobility Access to applications from anywhere