Professional Documents
Culture Documents
Legend
Pattern A: 5 Dedicated Environments / Hot DR
Location / Site A
In this pattern, a complete application stack --- necessary for the successful running of a single software system --- is replicated into
Location / Site B five separate, dedicated environments for the purpose of initial development, testing and quality assurance, staging software to
production, production, and disaster recovery. This pattern is recommended for all software systems at Capital Group.
NOTE: If server virtualization is employed, it is recommended that environmental integrity and tier levels be maintained on server
Development Test UAT / ITE Production DR hardware. That is, Development and QA/ITE environments should not co-exist with Production on the same box.
ADVANTAGES DISADVANTAGES
Primary Secondary
The DR environment can be utilized immediately in case there Cost
is a threat to our production business environment.
Dev BSA ARS User Dev BSA ARS User Dev BSA ARS User Dev BSA APS User Dev BSA APS User
This is a well established pattern with numerous examples both inside and outside of GIG.
Legend
Pattern B: 4 Shared Environments / Cold DR
Location / Site A In this pattern, the DR environment is shared with the integrated testing / quality assurance environment in a separate location from
Location / Site B
the remaining infrastructure.
Because the Test environment will need to be cleaned up in order for DR to occur, this pattern is not recommended unless
clustering technologies can help automate the staging and de-staging of both environments.
Development Test Production UAT / ITE DR ADVANTAGES DISADVANTAGES
Cluster-Automated Environment
Primary Secondary Staging / Destaging Better server utilization in the DR environment DR environment cannot be utilized until QA/ITE configurations
are removed.
There may be a performance impact to the QA/ITE
environment if inter-operability with external systems in a
different site is required.
Dev BSA ARS User Dev BSA ARS User Dev BSA APS User Dev BSA APS User
This is a well established pattern with numerous examples both inside and outside of GIG.
NOTE: Application stacking --- consolidating unrelated applications within a single Operating System environment --- is not
recommended due to the potential for security vulnerabilities as well as resource contention.
ADVANTAGES DISADVANTAGES
No virtualization latency May contribute to server under-utilization
May contribute to server proliferation within the enterprise
Server
This is a well established pattern with numerous examples both inside and outside of GIG.
ADVANTAGES DISADVANTAGES
hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 hp bc1500 Very high densities (i.e.., hundreds of discrete servers per Blades can exacerbate a datacenters heat distribution
rack space) are achievable problem (have high power consumption)
Blade Server Enclosure
Blades are cheaper to manufacture because they are Moving parts are harder to replace due to density
HP BladeSystem PC Blade Enclosure
(Fully Populated Blades)
with 20 RDP Licenses
simplified computers
They offer higher compute-power per square foot of
datacenter space, from traditional standalone servers
1Gb rj45 or SFP 1Gb rj45 or SFP BladeSystem PC Blade Admin 100t and Serial 1Gb rj45 or SFP 1Gb rj45 or SFP
43 44 42 45 46
OS OS
1 2
ADVANTAGES DISADVANTAGES
Cost (increased hardware utilization) May contribute to OS proliferation within the enterprise
No virtualization latency May not be able to add / remove components on the fly
True separation of duties for each subsystem (CPU, Memory, (hardware vendor and OS dependent)
CPU CPU CPU CPU CPU CPU and Disk I/O)
I/O I/O Operating systems are independent of one another, and may
be at different version levels
Hardware Partitioning
i.e., HP nPARs, Sun multi-domain servers, IBM HMC Both HPUX nPARs and Suns multi-domain servers are used extensively both inside and outside of GIG.
Pattern F: Para-Virtualization
In this pattern the lightweight Host OS utilizes a software Hypervisor with special APIs. Significantly, the Guest OS realizes it is
being virtualized, and cooperates in the virtualization process. This pattern is highly recommended for Test/Dev and QA
environments, and acceptable for DR environments. Where Production environments are involved, however, it is important to
carefully revisit performance requirements, recoverability tier levels, and general Host platform availability.
OS OS OS
1 2 3
ADVANTAGES DISADVANTAGES
Virtual Hardware API Cost (increased hardware utilization) Not all Oses (namely Windows) come with drivers to take
Virtualization Software Higher performance than in Bare Metal Virtualization advantage of the Hypervisor APIs
Allows for virtualization on non-specialized / commodity However, with some hardware assistance (i.e., Intel V and
CPU CPU CPU CPU CPU CPU
hardware AMD-V), there is less emulation and interception by the
I/O hypervisor, and even non-cooperative OSes function properly
Operating systems are independent of one another, and may
be at different version levels May contribute to OS proliferation within the enterprise
Para-Virtualization
i.e., Xen, VirtualIron Not a CG Standard. Xen is losing industry acceptance due to a proliferation of other technologies.
4
Pattern H: OS Partitioning
In this pattern the Operating System itself is responsible for erecting barriers between applications and the OS, and a single kernel
runs and manages all virtual application partitions. (No Hypervisor or third party virtualization software is involved.) This pattern is
highly recommended for Test/Dev and QA environments. Where Production environments are involved, it is important to carefully
revisit performance requirements, recoverability tier levels, and general Host platform availability.
App App App
1 2 3
ADVANTAGES DISADVANTAGES
Cost (increased hardware utilization) An OS-level update or patch affects all application containers
Very high performance / far more efficient than other
OS
virtualization types
CPU CPU CPU CPU CPU CPU
I/O
OS Partitioning
i.e., Solaris Containers, BSD Jails, Linux Vserver, Microsoft Softricity Solaris Containers are being used for Production in AFISG. GIG is developing a standard for its deployment.
OS OS OS OS
Some vendors support live migration of running virtual machines with zero downtime and continuous service availability.
ADVANTAGES DISADVANTAGES
Automatic allocation of virtual machines within resource pools Cost
Enables hardware maintenance without disruption to business
Migration Software operations / scheduled downtime
Virtualization Software Virtualization Software
Hardware Hardware
Basic clusters can be extended into larger networks to host web farms, database farms, VMware farms, etc.
ADVANTAGES DISADVANTAGES
Improved availability Increased complexity of administration
Improved performance (depending upon implementation) Generally not an option for servers across different locations
i.e., HPs MC Service Guard, Veritas Cluster Server,
Storage
Switches Microsoft Cluster Server Improved scalability
Cost effective
Storage Storage Storage Tangosols RDBMS cache clustering technology is currently utilized by the ETP and FPAC teams.
Grid can be achieved by third party middleware applications and software libraries, and are typically used for computationally-
Client intensive scientific, mathematical, and academic problems. Corporations often deploy grids on commodity hardware.
Control Server
ADVANTAGES DISADVANTAGES
All of the above-mentioned advantages Lack of a high speed interconnect
Best suited for problems which can easily be parallellized: Not suited for serial tasks or tasks which cannot be broken up
broken into smaller tasks which require little communication Grid nodes may become unavailable unpredictably
between worker threads
Grid nodes must trust the Control Server not to compromise
the integrity of other running applications, transmit private
data, etc.
Web Client
ADVANTAGES DISADVANTAGES
Hardware
Allows users to utilize services without knowledge of, Application providers must ensure their services are highly
expertise with, or control over technology infrastructure. available and scale to demand
Allows enterprises to procure IT resources as a utility, instead True utility computing may involve internationalization, while
Storage of investing in a large scale computing infrastructure. cross-border privacy and legal processes are still immature
Centralized software are easier to upgrade than distributed Traditional computers are not optimized for cloud computing,
thick client applications though new low-power and low-cost computing appliances
are emerging
1Gb rj45 or SFP 1Gb rj45 or SFP BladeSystem PC Blade Admin 100t and Serial 1Gb rj45 or SFP 1Gb rj45 or SFP
43 44 42 45 46
Switch
Unix systems utilize the X Window windows manager to implement popular desktop environments including CDE, KDE, Sun Java
Currently a CG standard, but may newer technologies be relevant for computer systems on the Trading floor.
Desktop, and Gnome. VNC, Citrix, and VMware Virtual Desktop manager are remote delivery mechanisms for Windows.
7
Legend
TCP/IP
Pattern A: Direct Attached Storage (DAS)
SCSI Cable
This pattern is pervasive in IT: the vast majority of client computers have internal hard drives, and USB drives are now prevalent.
Where servers are concerned, however, DAS refers to the addition of storage media through SCSI cabling. However, this pattern is
generally recommended for server platforms only where static web content is involved.
TCP/IP Network
Router
ADVANTAGES DISADVANTAGES
Easy Low reliability
Fast (40-160 Mbps) No re-allocate or re-deploy / Poor storage utilization
Client 1 Client 2
Known No central management
Internal Internal Internal
Secure Limited scalability
Disk 1 Disk 2 Disk 3
No additional drivers necessary Traditionally difficult to implement RAID on DAS
Maintained by System Administrators, not Storage Team
NOTE: Internal Disk 2" cannot be re-deployed easily from Client 1 to Client 2 within a secure Data Center environment.
This is a well established pattern with numerous examples both inside and outside of GIG.
Client
ADVANTAGES DISADVANTAGES
All of the above-mentioned advantages Slow (10 MBps-1 Gbps)
TCP/IP Network
Fast re-allocate and re-deploy of storage If only a portion of a file is changed, the whole file must be
Router
Good storage utilization NAS I/O slows down the network / high overhead on CSDMA
Centralized storage management (TCP/IP) networks
Name space cannot traverse NAS devices
Better reliability than DAS
Point-in-time / snapshot copies of data
NAS Head
Clients
This is a well established pattern with numerous examples both inside and outside of GIG. In the GIG LOB, see the
Capital Group uses NetApp products from the low-end FAS-2000 to higher end FAS-3000 filers. PRS application (GRIDS team) for references. In the AF LOB, see the AWD and DAVAST applications.
ADVANTAGES DISADVANTAGES
Data protection can be seamless to applications, users, and Not all RAID levels achieve data protection
A1 A2 A1 A1
operating systems Some RAID levels compromise total storage for reliability
Physical A3 A4 A2 A2
Disks A5 A6 A3
RAID 0: fast reads and writes (without redundancy) Many RAID levels are designed to hedge against a specific
A3
RAID 1: fast reads type of risk or failure, and may not mitigate actual risks
100 GB 100 GB 100 GB 100 GB encountered
RAID 5: slow writes; fast reads (good for small I/O transfers)
RAID 10: fast reads; fast writes
RAID 0: Striping RAID 1: Mirroring
CG uses a mixture of RAID 1, RAID 5, and RAID 10 on EMC and Hitachi storage arrays. Highly transactional
i.e., RAID 0, 1, 5, 0+1, 10, NetApps RAID-DP
applications at CG --- such as those within GIG and CRMC investment systems --- take advantage of RAID 1.
File /
Pattern F: Software RAID / Volume Management
Systems
/home
Volume Management is a logical storage manipulation technology used to more flexibly allocate space on mass storage devices,
than conventional disk partitioning schemes allow. Volume managers are especially used to concatenate storage across physical
Free Space Logical Volume / Logical Volume /home hard disks, write stripes across them for speed, and help manipulate the location of information while it is being used by or within
Volumes
8 GB 2 GB 20 GB computer systems. Like file systems, they are distinguished through a host of specialized features.
10 GB 10 GB 10 GB
i.e., Veritas VxVM and CVM; Solaris Volume Manager and Disk Suite; Windows LDM; HPs LVM This is a well established pattern with numerous examples both inside and outside of GIG.
9
ADVANTAGES DISADVANTAGES
Client LDAP Remote
Gateway Centralized access to information Performance may be limited to network speeds
Data
LDAP-Enabled
Directory Service Remote
Client Data
i.e., DNS, NIS+, LDAP, Microsoft Active Directory and NTDS, Red Hat Directory Server, Apples Open Directory,
Apache Directory Server, Oracle Internet Directory, OpenDS, OpenLDAP, Novells eDirectory This is a well established pattern with numerous examples both inside and outside of GIG.
RDBMS ODBMS
i.e., Versant Object Database, FastObjects, GemStone
i.e., Sybase, Microsoft SQL Server, Oracle, MySQL This is a well established pattern with numerous examples both inside and outside of GIG.
Smalltalk, db4o object, Objectivity/DB, ObjectStore
10
i.e., Oracle Tangosol This is a well established pattern used by the PRS, ETP, FPAC, and COPS applications.
Grid Node
Veritass DMP is a standard across both CRMC and GIG for SAN connectivity from Solaris clients. Likewise,
i.e., Solaris MPxIO, Veritas Dynamic Multi-Pathing (DMP), EMC PowerPath EMC PowerPath ensures that storage networking failures do not cause downtime to Sybase databases on HPUX.
i.e., Solaris UFS and ZFS SnapShots, NetApp Snapshots, Mac OS X TimeMachine
This is a well established pattern with numerous examples both inside and outside of GIG.
11
Development
Pattern M: Software Replication
In this pattern, data is replicated between servers --- regardless of storage interconnects, server location, and storage vendors --- by
Logical Volume XYZ virtue of the underlying volume manager and network I/O. Because server CPU cycles, not storage array resources, are required for
Production (Server B) this pattern, it is not recommended where high performance applications are found.
Synchronous or
Asynchronous
Logical Volume XYZ
Some applications also perform software replication (i.e., Oracle DataGuard, Sybase Replication Server, Lotus Notes).
(Server A) Local Disk
ADVANTAGES DISADVANTAGES
Server B Consumes a servers CPU cycles
Synchronous or Asynchronous replication
EMC Disk
DR Runs on all storage hardware platforms to eliminate vendor-
Server A Logical Volume XYZ specific replication limitations
(Server C) Enables hardware maintenance without disruption to business
Synchronous or
Asynchronous operations / scheduled downtime
Hitachi Disk
Host-based storage replication (VVR) is not a CG Standard, but some application-based software replication is
i.e., Veritas Volume Replicator (VVR) Server C
used. For example, the PA and NAV teams use Sybase Replication Server.
ADVANTAGES DISADVANTAGES
Synchronous or Asynchronous replication Cost
Synchronous replication guarantees zero data loss
Does not consume server CPU cycles
SAN Storage
In-System Replication
EMC BCVs, Hitachi Shadow Image GIGs CID application uses BCVs.
This pattern is recommended between multiple storage arrays to achieve remote replication for disaster recovery purposes.
ADVANTAGES DISADVANTAGES
Synchronous or Asynchronous replication Cost
Synchronous or Some asynchronous replication technologies (i.e., EMC)
Asynchronous
guarantee database consistency and restart-ability even
though data loss may occur.
Does not consume server CPU cycles
Remote Replication All investment systems at CG, including GIG and CRMC, currently use S-SRDF EMC replication. In the AFS
EMC SRDF, Hitachi TrueCopy, NetApp SnapMirror Replication line of business, the SMART application uses EMCs A-SRDF technology, as will VMware and SAP.
12
1 MB
Attachment Link
i.e., DataDomain and EMC Avamar backup products; NetApp storage replication on ??? products Not a CG Standard.
i.e., EMC Invista (storage device-), NetApp Multistore and FlexVol (appliance-), and Veritas Storage Foundation (host-based)
Pattern R: Tiered Storage / Information Lifecycle Management (ILM)
File Information Lifecycle Management refers to a wide range of strategies --- i.e., data backup, protection, disaster recovery, restoration,
and replication technologies --- for administering storage subsystems. Primarily, it is the practice of applying different policies to
effectively manage data throughout its useful life. Thus, a file may exist on an expensive storage medium when it is first created
(i.e., fibre channel disk) but reside on a very different storage tier (i.e., tape) when its usefulness has transpired, and data is ready
for archival. This pattern is especially useful for document management, archive, and retrieval systems.
pe C1
Ta C A B1 ADVANTAGES DISADVANTAGES
B A1 A2
Tape Unavailability of the ILM system may result in an impact to
Applications and data can be managed separately
Unmirrored ATA Mirrored FC Disk
Disk Efficient storage utilization multiple high criticality applications
Cost effective
Off-Site Tape Vault Tape Library
ADVANTAGES DISADVANTAGES
Cost effective use of storage for rarely-accessed data a
Circumvents the need for more hardware
Performance gains for RDBMS and their applications
Decreased backup/restore windows
Reduced risk and time for database/application upgrades
Lower licensing where costs are tied to CPU/storage
i.e., HP's Reference Information Manager (RIM, including OuterBay LiveArchive), Princeton Softech's Active Archive (renamed Helps start the ILM process
Optim), Informatica Applimation Informia Archive Not yet a CG Standard.
Helps meet compliance requirements
14
6 Data Presentation Data Representation and Encryption in a bus or star topology to connect computing nodes together. Ethernet is supported on both copper and fibre channel cabling.
TCP Communication on Ethernet networks is said to be based upon collision detection (CSMA/CD). That is, if two devices transmit at the
5 Data Session Interhost Communication same time in an Ethernet network, the signals from both devices collide, frames are lost, and re-transmission becomes necessary.
ADVANTAGES DISADVANTAGES
4 Segment Transport End-to-End Connections and Reliability A pervasive industry standard Ethernet collisions necessitate re-transmission
Inexpensive The more nodes there are in an Ethernet LAN, the more
3 Packet Network Logical Addressing: Path Determination IP TCP/IP and Ethernet are independent technologies overhead consumes all networking transactions
Media Layers
Sending Traffic from Server F to Server C Pattern B: Network Devices (Hub, Bridge, Switch, Router)
A A
A Hub is a repeater, operating on Layer 1 of the OSI model. Every node connected to the hub sees everything elses traffic.
H B H B
A Bridge works at Layer 2 of the OSI model and simply forwards data packets based upon MAC addressing. Bridges are used to
connect two segments of the same LAN, that use the same protocol. Bridges direct traffic away from unintended recipients.
A Switch is a Bridge with more than two interfaces (ports). Like all bridges, Switches provide bandwidth control.
A Router works at Layer 3 and forwards packets based on IP addressing; they isolate LANs into separate subnets. (See VLAN).
ADVANTAGES DISADVANTAGES
Bridge / These devices work to both segment and connect traffic Hubs are inefficient
G Hub C G C
Switch
Bridges, Switches, and Routers provide bandwidth control, Network devices require IT support staff
traffic control, and traffic priority control Bridges are no longer used industry-wide
F D F D
E E
A Hub forwards traffic to all nodes it connects. A Switch forwards traffic only to the intended data recipient. This is a well-established pattern with numerous examples both inside and outside of CG.
1 Hardware Router,
Pattern C: Virtual LAN (VLAN) and Traffic Fencing
3 Partitioned VLANs Virtual LANs are an infrastructure pattern closely related to virtual private networking, whereby physically networked devices are
VLAN 3 : Test / QA logically separated from one another.
Traffic fencing --- a slightly different technology based upon a routers Access Control Lists (ACLs) --- can likewise be used to keep
VLAN 1 : Development certain nodes from communicating with one another.
ADVANTAGES DISADVANTAGES
Traffic segregation These technologies are often found in commercial grade
routers. SOHO routers may not support these features.
TCP/IP Network
Router
Virtual LANs and Traffic Fencing --- when used together ---
can be difficult to maintain and troubleshoot, especially in
emergency situations.
Traffic Fencing is not as scalable as firewall-based application
VLAN 2 : Production
segmentation.
Traffic fencing is heavily utilized by the GIGs ETS and ETP Trading teams to separate Development Rendezvous
traffic from Production consumption. VLAN separation is used to segregate VOIP and data within CG.
15
Physically on Network Y,
Pattern D: Virtual Private Networking (VPN)
Logically on Network X, also
In this pattern, a computer system is logically networked to systems which are physically or logically separate from them, through the
System Running use of secure, virtual connections. These open circuits can be administered through hardware, software, or a combination thereof.
VPN Software
One common use of VPNs is to secure communication through the public Internet, though security features such as content
The Internet
encryption and authentication need not be leveraged wherever VPNs are employed.
ADVANTAGES DISADVANTAGES
VPN Tunnel VPNs enable mobility Not all applications work well over a VPN connection
Router
Firewall with VPN Option Network Y
Computer inter-networking Corporate networks can be inadvertently exposed to security
Network X (VPN Gateway)
Enables private encryption of data vulnerabilities such as viruses through the use of this
technology
Network Address Translation (NAT) problems can be difficult
to troubleshoot without specialized help
The laptop has an IP Address on both Network Y, where it physically resides, and Network X, to which it is logically connected. This is a well established pattern with numerous examples both inside and outside of CG.
LNK LNK
0 1
SLOT 0 SLOT 1
CONS AUX
PWR
SYS
RDY
0 This pattern refers to reservation and control mechanisms for specialized network hardware, in which differing priorities are assigned
to applications, users, and data flows. With QoS enabled, bit rates, delay, jitter, and packet dropping probability can be minimized,
EN
2
Priority 5
LAN Switch
This pattern is used at CG to ensure that voice, video, and data can coexist on the same TCP/IP backbone. It is
also leveraged in the application space by both the ETS application and for our FTP servers.
16
ADVANTAGES DISADVANTAGES
Network deceleration and generation products can help Network generation products may not accurately simulate
Time +250 ms predict an application latency across the WAN. traffic patterns for different parts of a work day or work week.
Network
Decelerator
Client
Time +500 ms
i.e., Network Nightmare, Itheon, and Shunra products This is a well established pattern. The IA Lab has both hardware and software network deceleration products.
The Internet This pattern is recommended for web applications, but not necessarily as a remedy for chatty applications.
ADVANTAGES DISADVANTAGES
SLOT 0 SLOT 1 SLOT 0 SLOT 1
5 0 5 0
Virtual Tunnel
Generally requires coordination of networking expertise on
Network X Network Y both the local and remote subnet
(i.e., SNO) (i.e., TKO)
If applied broadly and without adequate testing, optimization
techniques may adversely affect some business applications
while helping others
Can introduce single points for failure in the network
Cache Engines are a CG Standard for quickly delivering external internet traffic, while point-to-point WAN
i.e., Riverbed, Juniper, Blue Coat, and OrbitalData hardware; and Aspera software products optimization technologies are still emerging.
i.e., Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), and Windows Internet Name Service (WINS) This is a well established pattern both inside and outside of CG.
18
Pattern A: Application-Governed HA
In this pattern, applications are made highly available by virtue of virtual IP addressing and application state information that is
managed internally, not by the underlying infrastructure.
App App This pattern is recommended wherever possible. When implemented on commodity hardware, this pattern can result in significant
1 2 cost savings.
ADVANTAGES DISADVANTAGES
Cost Software vendors must support Application HA: it cannot be
OS OS HA is managed by application administrators, not OS imposed on stateless applications
CPU CPU CPU CPU CPU CPU CPU CPU CPU CPU CPU CPU administrators
I/O I/O
Server 1 Server 2
i.e., BEA WebLogic, Oracle Tangosol RDBMS Clustering BEA WebLogic manages application availability states internally, and is used by the OPAC, PRS, and CRD teams.
App App
1 2
C C COSC C C C C COSC C C
P P P P P P P P P P P P
U U U U U U U U U U U U
I/O I/O
Server 1 Server 2
SAN Storage
Active/Active
Networking Hardware Storage Hardware This is a well established pattern with numerous examples both inside and outside of GIG.
Networking Software Storage Software VCS is used by the ROC I&O application.
19
This pattern is not recommend, and is being phased out at CG in general and within GIG in particular.
ADVANTAGES DISADVANTAGES
Tape Inexpensive Lack of automation
Lack of vendor support
Prone to human error
Server A Server B Server A Renamed as
Server A
Before After
i.e., CGs SSR methodology for HPUX servers This is a well established pattern with numerous examples both inside and outside of GIG.
20
Application
Tier X
ADVANTAGES DISADVANTAGES
Application
Tier X+1
This is a well established pattern with numerous examples both inside and outside of GIG.
Application
Tier X
ADVANTAGES DISADVANTAGES
Application
Tier X+1
This is a well established pattern with numerous examples both inside and outside of GIG.
Application
Tier X
i.e., Hot - Warm
ADVANTAGES DISADVANTAGES
Application
Tier X+1
i.e., Active - Passive
This is a well established pattern with numerous examples both inside and outside of GIG.
21
Application
Tier X
i.e., Hot / Hot i.e., Hot / Hot
ADVANTAGES DISADVANTAGES
Application
Tier X+1
i.e., Active / Active i.e., Active / Active
This is a well established pattern with numerous examples both inside and outside of GIG.
22
A.
The AutoSys job scheduler, Tibcos Hawk monitor, and CA Wilys Introscope Java monitor currently utilize OPC Messaging. HPs SNMP used for system baseline monitoring. HPOV templates available for log file encapsulation. HP Smart
Clustering products such as VCS+GCO, MS, and HP MCSG may soon implement this, as well. Plug-Ins (SPIs) not used due to chattiness.
ADVANTAGES DISADVANTAGES
Version 0.97
- Standardized on two environments (dedicated or shared)
- Re-Did all Recoverability patterns
- Re-Did all Notification patterns
- Added ADCs to Network Pattern I: Content Load Balancers
- Miscellaneous updates to
Server & OS Pattern I: Virtual Container Migration
Storage Pattern P: Storage Virtualization
Pattern R: Tiered Storage / ILM
Pattern S: Content-Addressed Storage (CAS)
Version 0.96
Incorporated feedback from the Networking team (PXED, SFM,
CONSJS, KEVC)
Version 0.95
Incorporated feedback from the Storage team
Version 0.94
Initial distribution beyond GIG Technology Engineering