About This Template

Total Page:16

File Type:pdf, Size:1020Kb

About This Template Zero-touch network operations with AI-powered automation Transforming to a Cloud Native Operations Management Model Jim Carey Offering Management and Strategy IBM Telco Products [email protected] Telecommunications network transformation imperatives • Deliver new innovative 5G and edge services faster • Integrate AI and Automation to reduce operational costs • Improve customer experiences Telco cloud revolution is underway IBM Cloud / Date / © 2020 IBM Corporation 2 Telcos need to modernize their networks to increase agility and deliver new services Traditional proprietary, Virtual networks integrated with Telco networks become vertically integrated a general-purpose cloud cloud platforms & Network Orchestration Network & RAN Base DSL/Fiber IP Router VNF VNF App Station access node Multicloud Broadband Session Evolved Network GW Border Packet Core Control VM Containers Hybrid multicloud Proprietary, bundled network Open, unbundled, cloud-based platforms Ecosystem of partners who can elements and services help co-create new 5G-powered Edge solutions 3 “Ultimately 5G is about the move to software at the center of the network” © 2020 IBM Corporation Quote from Appledore Research Whitepaper, 2020 4 POLL QUESTION 1: Where are you in your transformation journey? 1. Still running on mostly hardware 2. Started virtualizing, but haven’t changed my processes 3. Adopting DevOps, but no closed loop operations 4. Already adopting AI based closed loop automation IBM Cloud / © 2020 IBM Corporation 5 Getting to Zero touch operations requires a transformation with new tools and new processes Zero touch + + = operations Normalized Lifecycle Intent driven Closed-Loop Model Orchestration Operations Standardized lifecycle Model the desired Apply ML and AIOps to operations for all xNFs to service operational state proactively respond in enable model-driven rather than pre- dynamic environments automation with CI/CD programming workflows toolchains IBM Cloud / © 2020 IBM Corporation 6 Automation and AI should affect every aspect of network service delivery 1 Network 2 Network Service Engineer Engineer Needs to quickly Desires to design with onboard all Normalized intent and have 1-click PNF/VNF/CNFs lifecycle model deployment Closed-loop operations Service Design and Testing 3 Site Reliability Engineer Wants to automate fixes Dynamic service Intent driven and changes with clarity assurance orchestration © 2020 IBM Corporation 7 Network Cloud Stack requires an SRE style operating model Fully automated delivery model Key operating model changes Highly scalable & repeatable for functions Fully software-defined system requires new tooling, processes & skills and services Deployment Architecture Standard, open V/CNF & virtualization & software service components definitions Ops tooling Intent-based (vs. workflow- … Fully software based) defined architecture ∞ Process SRE (Site Reliability Cloud Engineering), DevOps deployment templates Skills Software eng + admin Maintenance Closed-loop automation Vendor A PoDs Vendor B PoDs Adopting DevSecOps from Software best practices prepares the network operations and delivery teams to move quickly (Auto) Trigger snapshot build and behaviour test runs VNF/NS Project Network Function and Service Behaviour Testing Lifecycle Playbooks Fix Load behaviour tests Dev Environment Master Infrastructure Descriptor NFVO New Feature TNC Behaviour VNFM Pipeline Environment Tests Automation Orchestration Successful test runs result in release candidate Create/clean with build version environment and VIM load VNF under test and test packages SDN Controller Network Engineering collect Image Package Package all package artefacts and Snapshot-1 RC-12448 create initial package snapshot Focus on Automated and Repeatable builds of network functions and services enables rapid response in unexpected situations DevSecOps: • Build to re-Build • Automate to re-build solution with integrated testing so that solution is always in a known state • Enable quickest reaction to any problem that emerges The difference between Network Operations and Network Site Reliability Engineering Network Ops Optimize for Quick Incident Response Improve/Optimize the Process Call Specific Firehouse Network SREs Assign to SME Optimize for Incident Prevention Call 911 Call 911 sprinklers Alert NOC Alert NOC Dispatch Truck Code to respond Execute Runbook Rapidly to fires smoke detectors Fix wiring Douse Fire Restore Service Code to prevent fires • Traditional Network Operations focuses on fighting the fires • SRE fights the fires, but invests in ensuring that there won’t be another fire with the same cause • In ITIL terms, SRE do Problem Remediation. Operations does Incident Remediation Getting to a Zero Touch Operation using Closed Loop Automation requires new tools and new approaches Transform Process: • Embrace Change • Adopt Cloud Operations (DevSecOps) Model to increase agility • Adopt Site Reliability Engineering practices to deliver Closed Loop solutions that fix problems Adopt new Tools: • Flexible Automation Fit for Purpose • Robust, Intent-based Automation (avoid explicit workflows) • Embrace Change with AI/ML capabilities to integrated context • Intentional Integration with Modular Flexibility 1 2 POLL QUESTION 2: What are the biggest challenges to updating your operations model? 1. No significant challenges 2. Organizational resistance to change 3. Lack of adequate tools or cost prohibitive 4. Lack of transformational resources / skills IBM Cloud / © 2020 IBM Corporation 13 IBM Cloud Pak for Network Automation A Modular solution that supports rich automation, process transformation, nad Closed loop Assurance by design Normalized Intent-driven Service design & Dynamic service Closed-loop lifecycle modeling orchestration testing assurance operations Standardized Models the desired Automation for the Real-time view of Automated feedback operations for all service operational service itself and network and cloud loop between xNFs to enable state rather than pre- underlying resources infrastructures using assurance and model-driven programming for test, pre- AI to drive decision orchestration to automation with workflows production, and making and process enable zero touch CI/CD toolchains production automation operations environments © 2020 IBM Corporation 14 Automate, innovate and transform today to make sure your network is ready for tomorrow Network site deployment 4G/5G NFV lifecycle telco cloud platform management 5G Network Slicing vRAN / Open RAN Multi-access Edge Computing (MEC) © 2020 IBM Corporation 15 Deliver proactive telco network transformation IBM Cloud Pak for Network Automation and IBM Cloud Pak for Watson AIOps IBM Cloud Pak for IBM Cloud Pak for Network Automation Watson AIOps ⎻ Normalized lifecycle ⎻ Dynamic service ⎻ Incident resolution ⎻ Governance and compliance management assurance ⎻ Hybrid application ⎻ Cost management ⎻ Intent-driven orchestration ⎻ C losed-loop operations management ⎻ WebSphere operations ⎻ Service design and testing ⎻ Observability Automation foundation ⎻ Robotic ⎻ Natural ⎻ Process and ⎻ Event ⎻ Machine ⎻ 3rd Party ⎻ Operational Process language task mining detection learning integrations models Automation interactions IBM C loud AWS Microsoft Google VMware Private IBM Z End points Azure C loud IBM LinuxOne IBM Power Systems © 2020 IBM Corporation 16 Meet the challenges of adopting 5G and Software based networking with new tooling and process transformation Challenge Opportunity Lack of end-to-end Comprehensive full stack automation with orchestration capabilities DevOps and SRE Managing environments with both physical & virtual Hybrid solution spanning all resources resources Lack of DevOps capabilities and skills Adoption of a cloud operating model enabling a needed to innovate zero-touch solution IBM Network Automation / © 2020 IBM Corporation 17 Get started Explore and schedule a free virtual consultation with an expert With IBM Cloud Pak for Network Automation, you can evolve to zero- touch network operations with AI-powered automation Lower Costs Deploy Faster Run Anywhere Improves business process and Accelerates the delivery of Runs on any cloud, anywhere, service assurance while lowering networks and services through AI- and manages any network vendor Jim Carey operations costs powered automation infrastructure Offering Management Strategy IBM Telco Products [email protected] www.ibm.com/cloud/cloud-pak-for-network-automation IBM Security / © 2020 IBM Corporation 18 Thank you Jim Carey Offering Management Strategy IBM Telco Products — [email protected] © Copyright IBM Corporation 2020. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and ibm.com are trademarks of IBM Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available at Copyright and trademark information. IBM Cloud / Date / © 2020 IBM Corporation 19.
Recommended publications
  • IBM POWER8 High-Performance Computing Guide: IBM Power System S822LC (8335-GTB) Edition
    Front cover IBM POWER8 High-Performance Computing Guide IBM Power System S822LC (8335-GTB) Edition Dino Quintero Joseph Apuzzo John Dunham Mauricio Faria de Oliveira Markus Hilger Desnes Augusto Nunes Rosario Wainer dos Santos Moschetta Alexander Pozdneev Redbooks International Technical Support Organization IBM POWER8 High-Performance Computing Guide: IBM Power System S822LC (8335-GTB) Edition May 2017 SG24-8371-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (May 2017) This edition applies to: IBM Platform LSF Standard 10.1.0.1 IBM XL Fortran v15.1.4 and v15.1.5 compilers IBM XLC/C++ v13.1.2 and v13.1.5 compilers IBM PE Developer Edition version 2.3 Red Hat Enterprise Linux (RHEL) 7.2 and 7.3 in little-endian mode © Copyright International Business Machines Corporation 2017. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi Authors. xi Now you can become a published author, too! . xiii Comments welcome. xiv Stay connected to IBM Redbooks . xiv Chapter 1. IBM Power System S822LC for HPC server overview . 1 1.1 IBM Power System S822LC for HPC server. 2 1.1.1 IBM POWER8 processor . 3 1.1.2 NVLink . 4 1.2 HPC system hardware components . 5 1.2.1 Login nodes . 6 1.2.2 Management nodes . 6 1.2.3 Compute nodes. 7 1.2.4 Compute racks . 7 1.2.5 High-performance interconnect.
    [Show full text]
  • Deep Security 9
    trend Micro™ DeeP SeCurity 9 Comprehensive Security Platform for Physical, Virtual, and Cloud Servers Accelerate Virtualization, VDI, and Cloud ROI Virtualization and cloud computing have changed the face of today’s data center. Yet as • Provides a lighter, more manageable way to secure VMs with the industry’s first organizations move from physical environments to a mix of physical, virtual, and cloud, and only agentless security platform many have addressed the prevailing threat landscape with yesterday’s mix of legacy built for VMware environments security solutions. The results can actually threaten desired performance gains—causing • unparalleled agentless security undue operational complexity, leaving unintentional security gaps, and ultimately architecture with improved resource hindering the organization’s ability to fully invest in virtualization and cloud. efficiency via eSX scanning deduplication • Delivers significantly more efficient Trend Micro Deep Security provides a comprehensive server security platform designed resource utilization and higher VM densities of traditional security solutions to protect your virtualized data center from data breaches and business disruptions while enabling compliance. This agentless solution simplifies security operations while • Improves the manageability of security in VMware environments by reducing accelerating the ROI of virtualization and cloud projects. Tightly integrated modules the need to continually configure, easily expand the platform to ensure server, application, and data security across update, and patch agents physical, virtual, and cloud servers, as well as virtual desktops. So you can custom tailor • Secures VMware View virtual desktops your security with any combination of agentless and agent-based protection, including while in local mode with an optional agent anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log • Coordinates protection with virtual inspection.
    [Show full text]
  • Road Map for Installing the IBM Power 550 Express (8204-E8A and 9409-M50)
    Power Systems Road map for installing the IBM Power 550 Express (8204-E8A and 9409-M50) GI11-2909-02 Power Systems Road map for installing the IBM Power 550 Express (8204-E8A and 9409-M50) GI11-2909-02 Note Before using this information and the product it supports, read the information in “Notices,” on page 29, “Safety notices” on page v, the IBM Systems Safety Notices manual, G229-9054, and the IBM Environmental Notices and User Guide, Z125–5823. This edition applies to IBM Power Systems servers that contain the POWER6 processor and to all associated models. © Copyright IBM Corporation 2008, 2009. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Safety notices .................................v Chapter 1. Installing the IBM Power 550 Express: Overview .............1 Chapter 2. Installing the server into a rack .....................3 Determining the location ...............................3 Marking the location.................................4 Attaching the mounting hardware to the rack ........................5 Installing the cable-management arm ...........................12 Chapter 3. Cabling the server and setting up the console ..............15 Cabling the server with an ASCII terminal .........................15 Cabling the server to the HMC .............................16 Cabling the server and accessing Operations Console .....................18 Cabling the server and accessing the Integrated Virtualization Manager ...............19 Supporting
    [Show full text]
  • Progressive Automated Formal Verification of Memory Consistency in Parallel Processors
    Progressive Automated Formal Verification of Memory Consistency in Parallel Processors Yatin Avdhut Manerkar A Dissertation Presented to the Faculty of Princeton University in Candidacy for the Degree of Doctor of Philosophy Recommended for Acceptance by the Department of Computer Science Adviser: Professor Margaret Martonosi January 2021 © Copyright by Yatin Avdhut Manerkar, 2020. All rights reserved. Abstract In recent years, single-threaded hardware performance has stagnated due to transistor- level limitations stemming from the end of Moore's Law and Dennard scaling. Instead, today's designs improve performance through heterogeneous parallelism: the use of multiple distinct processing elements on a chip, many of which are specialised to run specific workloads. The processing elements in such architectures often communicate and synchronise with each other via loads and stores to shared memory. Memory consistency models (MCMs) specify the ordering rules for such loads and stores. MCM verification is thus critical to parallel system correctness, but is notoriously hard to conduct and requires examining a vast number of scenarios. Verification using formal methods can provide strong correctness guarantees based on mathematical proofs, and is an excellent fit for MCM verification. This dissertation makes several contributions to automated formal hardware MCM verification, bringing such techniques much closer to being able to handle real-world architectures. Firstly, my RTLCheck work enables the automatic linkage of formal models of design orderings to RTL processor implementations. This linkage helps push the correctness guarantees of design-time formal verification down to taped-out chips. The linkage doubles as a method for verifying microarchitectural model soundness against RTL. Secondly, my RealityCheck work enables scalable automated formal MCM verification of hardware designs by leveraging their structural modularity.
    [Show full text]
  • POWER8Ò Processor Technology
    IBM Power Systems 9 January 2018 IBM Power Systems Facts and Features: Enterprise and Scale-out Systems with POWER8Ò Processor Technology 1 IBM Power Systems TaBle of contents Page no. Notes 3 Why Power Systems 4 IBM Power System S812LC, S822LC for Commercial Computing, S822LC for HPC, 5 S822LC for Big Data and S821LC IBM Power System S812L and S822L 6 IBM Power System S824L 7 IBM Power System S814 and S824 8 IBM Power System S812 and S822 9 IBM Power System E850C 10 IBM Power System E850 11 IBM Power System E870C 12 IBM Power System E870 13 IBM Power System E880C 14 IBM Power System E880 15 System S Class System Unit Details 16-19 Enterprise System, E850 System Unit and E870/E880 Node & Control Unit Details 19-20 Server I/O Drawers & Attachment 21-22 Physical Planning Characteristics 23 Warranty / Installation 24 Scale-out LC Server Systems Software Support 25 System S Class Systems Software Support 26-27 Enterprise Systems Software Support 28 Performance Notes & More Information 29 IBMÒ Power Systems™ servers and IBM BladeCenter® blade servers using IBM POWER7® and POWER7+® processors are described in a separate Facts and Features report dated July 2013 (POB03022-USEN-28). IBM Power Systems servers and IBM BladeCenter® blade servers using IBM POWER6® and POWER6+™ processors are described in a separate Facts and Features report dated April 2010 (POB03004-USEN-14). 2 IBM Power Systems These notes apply to the description tables for the pages which follow: Y Standard / Supported Optional Optionally Available / Supported N/A or – n/a Not Available / Supported or Not Applicable SOD Statement of General Direction announced SLES SUSE Linux Enterprise Server RHEL Red Hat Enterprise Linux A CoD capabilities include: Capacity Upgrade on Demand option – permanent processor or memory activation, Elastic Capacity on Demand – temporary processor or memory activation by the day, Utility Capacity on Demand – temporary processor activation by the minute, and Trial Capacity on Demand.
    [Show full text]
  • IBM Power System S814 and S824 Technical Overview and Introduction
    Front cover IBM Power Systems S814 and S824 Technical Overview and Introduction Outstanding performance based on POWER8 processor technology 4U scale-out desktop and rack-mount servers Improved reliability, availability, and serviceability features Alexandre Bicas Caldeira Bartłomiej Grabowski Volker Haug Marc-Eric Kahle Andrew Laidlaw Cesar Diniz Maciel Monica Sanchez Seulgi Yoppy Sung ibm.com/redbooks Redpaper International Technical Support Organization IBM Power System S814 and S824 Technical Overview and Introduction August 2014 REDP-5097-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (August 2014) This edition applies to IBM Power System S814 (8286-41A) and IBM Power System S824 (8286-42A) systems. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . xi Comments welcome. xi Stay connected to IBM Redbooks . xii Chapter 1. General description . 1 1.1 Systems overview . 2 1.1.1 Power S814 server . 2 1.1.2 Power S824 server . 3 1.2 Operating environment . 4 1.3 Physical package . 5 1.3.1 Tower model . 5 1.3.2 Rack-mount model . 6 1.4 System features . 8 1.4.1 Power S814 system features . 8 1.4.2 Power S824 system features . 9 1.4.3 Minimum features . 10 1.4.4 Power supply features . 10 1.4.5 Processor module features .
    [Show full text]
  • IBM Power Systems S922, S914, and S924 Technical Overview and Introduction
    Front cover IBM Power Systems S922, S914, and S924 Technical Overview and Introduction Young Hoon Cho Gareth Coates Bartlomiej Grabowski Volker Haug Redpaper International Technical Support Organization IBM Power Systems S922, S914, and S924: Technical Overview and Introduction July 2018 REDP-5497-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (July 2018) This edition applies to IBM Power Systems S922, S914, and S924, machine types and model numbers 9009-22A, 9009-41A, and 9009-42A. © Copyright International Business Machines Corporation 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . .x Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. General description . 1 1.1 Systems overview . 2 1.1.1 Power S922 server . 2 1.1.2 Power S914 server . 3 1.1.3 Power S924 server . 4 1.1.4 Common features . 5 1.2 Operating environment . 6 1.3 Physical package . 8 1.3.1 Tower model . 8 1.3.2 Rack-mount model . 8 1.4 System features . 9 1.4.1 Power S922 server features . 9 1.4.2 Power S914 server features . 10 1.4.3 Power S924 server features . 11 1.4.4 Minimum features . 13 1.4.5 Power supply features . 13 1.4.6 Processor module features . 14 1.4.7 Memory features . 17 1.4.8 Peripheral Component Interconnect Express slots.
    [Show full text]
  • Managing Devices for the 8412-EAD, 9117-MMB, 9117-MMC, 9117-MMD, 9179-MHB, 9179-MHC, Or 9179-MHD
    Power Systems Managing devices for the 8412-EAD, 9117-MMB, 9117-MMC, 9117-MMD, 9179-MHB, 9179-MHC, or 9179-MHD Power Systems Managing devices for the 8412-EAD, 9117-MMB, 9117-MMC, 9117-MMD, 9179-MHB, 9179-MHC, or 9179-MHD Note Before using this information and the product it supports, read the information in “Safety notices” on page v, “Notices” on page 27, the IBM Systems Safety Notices manual, G229-9054, and the IBM Environmental Notices and User Guide, Z125–5823. This edition applies to IBM Power Systems™ servers that contain the POWER7 processor and to all associated models. © Copyright IBM Corporation 2010, 2014. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Safety notices .................................v Managing devices for the 8412-EAD, 9117-MMB, 9117-MMC, 9117-MMD, 9179-MHB, 9179-MHC, or 9179-MHD.............................1 Managing DVD drives ................................1 SATA Slimline DVD-RAM Drive (FC 5762) ........................1 SATA Slimline DVD-RAM Drive (FC 5771) ........................2 Handling and storing the DVD media ..........................2 Opening a DVD tray manually ............................3 DVD-RAM type II disc ...............................3 Managing diskette drives ...............................4 External USB 1.44 MB diskette drive (FC 2591) .......................4 Managing disk devices ................................5 Managing removable disk drives ............................5 RDX USB External Dock
    [Show full text]
  • Authorization to Sell Ibm Hardware Maintenance and Ibm Software Maintenance Services & Maintenance Management Services for General Business Program
    AUTHORIZATION TO SELL IBM HARDWARE MAINTENANCE AND IBM SOFTWARE MAINTENANCE SERVICES & MAINTENANCE MANAGEMENT SERVICES FOR GENERAL BUSINESS PROGRAM Table of Contents SECTION SUBJECT PAGE PART I Authorization to Sell IBM Hardware Maintenance and IBM Software Maintenance Services 1 Definitions 3 2 Group Classification & Requirements: Maintenance/Services 4 3 Sweep 4 4 IBM Power Systems™ 5 5 IBM System z® 6 6 IBM Point of Sale (POS) 7 7 IBM System x® 7 8 IBM System Storage™ 7 9 IBM ServicePac® vs. IBM ServiceElite 7 10 Selling Competing Maintenance on IBM Products 8 11 Renewals 8 12 Maintenance Used Equipment 10 13 Replacement Business Partner Guidelines 10 PART II Maintenance Management Services (MMS) for General Business (GB) Program 1 MMS for GB VAE Changes to MMS for GB Program 11 2 History 12 3 Program Benefits and Advantages 14 4 “High-end” IBM System Storage 16 5 Determining a Customer’s General Business Status 19 6 Program Participation Requirements 19 7 Applying for Participation in the MMS for GB Program 21 8 Assistance on the MMS for GB Program 21 2 PART I Authorization to Sell IBM Hardware Maintenance and IBM Software Maintenance Services ______________________________________________________ Significant changes to text supporting the announcement effective January 2, 2013, are identified in red: ______________________________________________________ Section 1 – Definitions Qualified IBM Hardware – Sale of a server or MES model/processor upgrade that is acquired new from IBM or an IBM Business Partner -- Systems Distributor. Qualified IBM Hardware (QIH) must still be in an available status. If the QIH is withdrawn from marketing, the sale to an end-user customer must be prior to the effective date of the withdrawal.
    [Show full text]
  • Trend Micro Deep Security
    DATASHEET Trend Micro™ DEEP SECURITY 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are Key Business Issues moving some or all of their workloads to private and public clouds. If you’re interested Virtual desktop security in taking advantage of the benefits of virtualization and cloud computing, you need to Preserve performance and consolidation ensure you have security built to protect all of your servers, whether physical, virtual, ratios with comprehensive agentless or cloud. security built specifically to maximize protection for VDI environments In addition, your security should not hinder host performance and virtual machine (VM) density or the return on investment (ROI) of virtualization and cloud computing. Virtual patching ™ ™ Trend Micro Deep Security provides comprehensive security in one solution that is Shield vulnerabilities before they can be purpose-built for virtualized and cloud environments so there are no security gaps or exploited, eliminating the operational pains performance impacts. of emergency patching, frequent patch cycles, and costly system downtime Protection from data breaches and business disruptions Deep Security—available as software or as-a-service—is designed to protect your data center Compliance and cloud workloads from data breaches and business disruptions. Deep Security helps you Demonstrate compliance with a number achieve compliance by closing gaps in protection efficiently and economically across virtual of regulatory requirements including PCI and cloud environments. DSS 3.0, HIPAA, HITECH, FISMA/NIST, NERC, SS AE 16, and more. Multiple security controls managed from a single dashboard Deep Security features integrated modules including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection to ensure server, application, and data security across physical, virtual, and cloud environments.
    [Show full text]
  • IBM Hardware and IBM Software Maintenance Services
    IBM Technology Support Services IBM Hardware and IBM Software Maintenance services Choose flexible single-source support to boost your IT availability and reduce costs Highlights Achieving high system resilience – Optimize your IT infrastructure with and application availability is preventive maintenance essential for today’s businesses. – Minimize unplanned downtime and speed time Any unplanned downtime or outage can impact your to repair organization’s business operation, reputation and customer loyalty. To confront the challenges, organizations need a – Choose from flexible maintenance solution that keeps their hybrid cloud environment committed service-level up and running. Your data center—backboned by IBM Z® options platforms, IBM Power® Systems servers, IBM® Storage systems and IBM software solutions—requires routine maintenance – Foster interoperability for optimal performance to achieve your business goals and through comprehensive accelerate your digital transformation. maintenance IBM Technology Support Services offers both IBM Hardware – Help reduce costs and Maintenance and IBM Software Maintenance services that can be ensure more predictable tailored to meet your specific needs. IBM's single-source support maintenance costs helps you optimize your IT infrastructure while helping reduce the cost of downtime. IBM offers the flexibility to purchase services – Bridge your skill gaps and during your warranty period, as a warranty service upgrade, and free in-house IT staff for even after the warranty period lapses. Using proprietary tools, more strategic tasks IBM technicians can predict and proactively address risks and exposures that may impact the availability of your hybrid cloud IT infrastructure and provide timely resolution if an incident occurs. Optimize your IT infrastructure with preventive maintenance With an IBM Hardware Maintenance or IBM Software Maintenance agreement, you gain access to IBM Support Insights, a security-rich cloud-based portal.
    [Show full text]
  • From UML Specifications to Mapping and Scheduling of Tasks Into a Noc, with Reliability Considerations
    UC Irvine UC Irvine Previously Published Works Title From UML specifications to mapping and scheduling of tasks into a NoC, with reliability considerations Permalink https://escholarship.org/uc/item/0183796p Journal Journal of Systems Architecture, 59(7) ISSN 1383-7621 Authors Bolanos, F Rivera, F Aedo, JE et al. Publication Date 2013 DOI 10.1016/j.sysarc.2013.04.009 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Journal of Systems Architecture 59 (2013) 429–440 Contents lists available at SciVerse ScienceDirect Journal of Systems Architecture journal homepage: www.elsevier.com/locate/sysarc From UML specifications to mapping and scheduling of tasks into a NoC, with reliability considerations ⇑ F. Bolanos a, , F. Rivera b, J.E. Aedo b, N. Bagherzadeh c a National University of Colombia, Medellin, Calle 59A Num. 63-20, Medellin, Colombia b University of Antioquia, Calle 70 Num. 52-21, Medellin, Colombia c The Henry Samueli School of Engineering, University of California, Irvine, CA 92697-2625, United States article info abstract Article history: This paper describes a technique for performing mapping and scheduling of tasks belonging to an execut- Received 16 August 2012 able application into a NoC-based MPSoC, starting from its UML specification. A toolchain is used in order Received in revised form 18 February 2013 to transform the high-level UML specification into a middle-level representation, which takes the form of Accepted 30 April 2013 an annotated task graph. Such an input task graph is used by an optimization engine for the sake of car- Available online 15 May 2013 rying out the design space exploration.
    [Show full text]