Welcome!

Java Authors: Elizabeth White, Carmen Gonzalez, Lori MacVittie, Trevor Parsons, Peter Silva

Related Topics: Java, SOA & WOA, Open Source

Java: Article

TOGAF Foundation Level Certification – Practice Test

Sample Questions

If you plan to appear for a TOGAF foundation level certification or part 1 exam, one of the difficulties you will face is a lack of free sample questions. Some questions are provided as a part of the study guide, but if you want to more practice then you will have tough time locating anything freely available on the net. Here is couple of links which I could locate:

This lack of practice multiple choice questions prompted me to create my own set. I have gone by the advice of Chris Eaton to create this paper before I take the test to avoid any issue that these questions copy the official exam questions.

If you are interested in Part 2 then this may help you: TOGAF – Preparation Aid for Part 2

[Update: TOGAF 9.1 Released – What Does It Mean To You?]

Here is one set of 40 questions:

Basic Concepts (3 questions)

1.

Which is NOT one of the seven parts of TOGAF document?

(A)

ADM Guidelines and Techniques

(B)

Architecture Content Framework

(C)

Architecture Governance

(D)

TOGAF Reference Models

(E)

Architecture Capability Framework

 

2.

What is Architecture in the Context of TOGAF?

(A)

The fundamental organization of a system, embodied in its components, their relationships to each other and the environment, and the principles governing its design and evolution

(B)

A rigorous description of the structure of an enterprise, which comprises enterprise components (business entities), the externally visible properties of those components, and the relationships (e.g. the behavior) between them

(C)

An architecture is the most important, pervasive, top-level, strategic inventions, decisions, and their associated rationales about the overall structure (i.e., essential elements and their relationships) and associated characteristics and behavior

(D)

Architecture is the use of abstractions and models to simplify and communicate complex structures and processes to improve understanding and forecasting

(E)

A formal description of a system, or a detailed plan of the system at a component level to guide its implementation or the structure of components, their inter-relationships, and the principles and guidelines governing their design and evolution over time

 

3.

Which of the following according to TOGAF is NOT a reason to use an Enterprise Architecture Framework?

(A)

It will speed up and simplify architecture development

(B)

It will ensure more complete coverage of the designed solution

(C)

It will make certain that the architecture selected allows for future growth in response to the needs of the business

(D)

Its use may be mandated by federal agencies

(E)

It will ensure compliance and protect the interest of stakeholders

 

Core Concepts (3 questions)

4.

Which are the three main categories of architectural work product does Architecture Content Framework specify?

(A)

Architecture Vision, Architecture Requirements Specification and Architecture Roadmap

(B)

Source Architecture, Target Architecture and Gap Analysis

(C)

Architecture Vision, Architecture Design Document and Transition Architecture

(D)

Building Block, Artifact and Deliverable

(E)

Request for Architecture Work, Statement of Architecture Work and Architecture Contract

 

5.

Which is NOT a part of Architecture Repository?

(A)

The organizationally tailored application of an architecture framework, including a meta-model for architecture content

(B)

The parameters, structures, and processes that support governance of the Architecture Repository

(C)

An architectural view of the building blocks that are in use within the organization today

(D)

A Stakeholder analysis and map

(E)

A record of governance activity across the enterprise

 

6.

Which of these are NOT the benefits of Architecture Governance?

(A)

Increased visibility supporting internal processes and external parties’ requirements

(B)

Greater shareholder value

(C)

Improved software development productivity

(D)

Protection of the existing asset base through maximizing re-use

(E)

Controlled risk management

 

Introduction to the ADM (3 questions)

7.

Does ADM support iteration?

(A)

Yes, you can only cycle around the ADM

(B)

Yes, you can cycle around all single individual phase

(C)

Yes, you can cycle around any combination of phases

(D)

Yes, you can cycle around ADM, iterate across specific phases or cycle through some of the phases

(E)

No, ADM is not iterative

 

8.

Which of the following statements about the relation between ADM and Architecture Repository is correct?

(A)

At relevant places throughout the ADM, there are reminders to consider which architecture assets from the Architecture Repository the architect should use

(B)

The practical implementation of the Enterprise Continuum will typically take the form of an Architecture Repository that includes reference architectures, models, and patterns mandated in TOGAF

(C)

In executing the ADM, the architect is only developing a snapshot of the enterprise at particular points in time, and populating the organization’s own Architecture Repository is outside the scope of ADM

(D)

The first execution of the ADM is simplified because of the re-use potential of the standard architecture assets available for re-use in TOGAF Architecture Repository

(E)

Architecture Repository is only accessed in the Requirement Management phase

 

9.

Which of the following is NOT a valid reason for wanting to tailor ADM for the specific need of the enterprise?

(A)

An important consideration is that the order of the phases in the ADM is to some extent dependent on the maturity of the architecture discipline within the enterprise concerned

(B)

An enterprise may wish to use or tailor the ADM in conjunction with the security best practices in use in the enterprise

(C)

The ADM is one of many corporate processes that make up the corporate governance model for an enterprise

(D)

The ADM is being mandated for use by a prime or lead contractor in an outsourcing situation, and needs to be tailored to achieve a suitable compromise between the contractor’s existing practices and the contracting enterprise’s requirements

(E)

The enterprise is a small-to-medium enterprise, and wishes to use a “cut-down” version of the ADM

 

The Enterprise Continuum and Tools (5 questions)

10.

Which of the following statements about Enterprise Continuum is NOT correct?

(A)

It is a view of the Architecture Repository that provides methods for classifying architecture and solution artifacts, both internal and external to the Architecture Repository

(B)

It is an important aid to communication and understanding, both within individual enterprises, and between customer enterprises and vendor organizations

(C)

It also represents an aid to organizing re-usable architecture and solution assets

(D)

It is a physical repository of all architecture assets models, patterns, architecture descriptions, and other artifacts produced during application of the ADM

(E)

It represents an aid to communication

 

11.

Which of the following statements is NOT correct?

(A)

The Architecture Continuum provides a consistent way to describe and understand the implementation of the assets

(B)

A Foundation Architecture supports the complete enterprise operating environment

(C)

Common Systems Architectures guide the creation of an architecture useful for building common solutions across a wide number of relevant domains

(D)

Industry Architectures guide the integration of common systems components with industry specific components

(E)

Organization-Specific Architectures describe and guide the final deployment of user-written or third-party components that constitute effective solutions for particular enterprises

 

12.

Which of the following is NOT a part of Architecture Repository?

(A)

Architecture Landscape

(B)

Standards Information Base

(C)

Architecture Metamodel

(D)

Architecture Capability

(E)

Compliance Log

 

13.

What is a Standards Information Base?

(A)

It holds guidelines, templates, patterns

(B)

It holds a set of specifications, to which architectures must conform

(C)

It defines the parameters, structures, and processes that support governance

(D)

It describes the organizationally tailored application of an architecture framework

(E)

It holds view of the building blocks that are in use within the organization today

 

14.

What of the following statements is NOT correct?

(A)

Enterprise Continuum is a virtual repository where as the Architecture Repository is a physical repository

(B)

Enterprise Continuum can be thought of as a view of the Architecture Repository

(C)

The Architecture Repository defines six classes for architectural information held in the repository

(D)

TOGAF recognizes the need to manage the content of the Enterprise Continuum using tools but does not provide any guidance on tool selection

(E)

The Solutions Continuum is a population of the architecture with reference building blocks – either purchased products or built components – that represent a solution to the enterprise’s business needs

 

ADM Phases (9 questions)

15.

In which phase does the Business Scenarios first get defined?

(A)

Preliminary phase

(B)

Phase A

(C)

Phase B

(D)

Phase C

(E)

Phase D

 

16.

Which of the following statements about Business Architecture is NOT correct?

(A)

A knowledge of the Business Architecture is a prerequisite for architecture work in any other domain

(B)

Business Architecture is often necessary as a means of demonstrating the business value of subsequent architecture work

(C)

Business Architecture looks at the Enterprise in abstraction and does not look at the relationship between people and process

(D)

Business Architecture should support the agreed Architecture Vision

(E)

Business Architecture should demonstrate how stakeholder concerns are addressed

 

17.

Which of the following is NOT in the scope of Technology Architecture documentation?

(A)

Fundamental organization of the IT system

(B)

The principles governing its design and evolution IT system

(C)

Hardware, software, and communications technology and their relationships to each other and the environment

(D)

Technical implementation architecture

(E)

Target Technology Architecture that will form the basis of the subsequent implementation and migration planning

 

18.

Which of the following is NOT an objective of phase F?

(A)

To ensure that the Implementation and Migration Plan is coordinated with the various management frameworks in use within the enterprise

(B)

To prioritize all work packages, projects, and building blocks by assigning business value to each and conducting a cost/benefit analysis

(C)

To finalize the Architecture Vision and Architecture Definition Documents, in line with the agreed implementation approach

(D)

To confirm the Transition Architectures with the relevant stakeholders

(E)

Formulate recommendations for each implementation project

 

19.

Which of the following is NOT an objective of phase H?

(A)

Assess the performance of the architecture and make recommendations for change

(B)

Mobilize supporting operations that will underpin the future working lifetime of the deployed solution

(C)

Maximize the business value from the architecture and ongoing operations

(D)

Ensure that Baseline Architectures continue to be fit-for-purpose

(E)

Establish an architecture change management process for the new enterprise architecture baseline that is achieved with completion of Phase G

 

20.

In which phase is an agreement reached on the architecture method to be adopted?

(A)

Preliminary Phase

(B)

Phase A

(C)

Phase B

(D)

Phase E

(E)

Requirement Management Phase

 

21.

How is the Transition Architecture formulated?

(A)

It emerges through phase B to D and is finalized in phase E

(B)

It is first formulated in phase E and gets refined in phase F and G

(C)

It is formulated in phase E and then split into implementation projects

(D)

Based on the implementation projects selected in phase E, Transition Architectures is arrived at in phase F

(E)

In Phase E major implementation projects grouped into Transition Architectures and they are confirmed with relevant stakeholders in phase F

 

22.

In which phase is the cost/benefit analysis done?

(A)

Preliminary Phase

(B)

Phase A

(C)

Phase B

(D)

Phase E

(E)

Phase F

 

23.

How is the Architecture Governance performed?

(A)

It is established in Phase A and operated on Phase F to H

(B)

It is established in Preliminary Phase, refined in Phase A and operated on Phase F to H

(C)

It is established in Phase A and operated on Phase E to G

(D)

It is established in Preliminary Phase and operated on Phase G and H

(E)

It is established in Preliminary Phase and operated on all subsequent phases

 

ADM Guidelines and Techniques (6 questions)

24.

Which of the following is NOT an ADM Guideline or Technique?

(A)

Architecture Principles

(B)

Usecase Modeling

(C)

Architecture Patterns

(D)

Interoperability Requirements

(E)

Capability-Based Planning

 

25.

Which of the following is NOT described by a Business Scenario?

(A)

A business process, application, or set of applications

(B)

The business and technology environment

(C)

The people and computing components who execute the scenario

(D)

The underlying business vision

(E)

The desired outcome of proper execution

 

26.

Which of the following is NOT the source of a business domain gap?

(A)

People gaps

(B)

Process gaps

(C)

Tools gaps

(D)

Information gaps

(E)

Data relationship gaps

 

27.

In which phase are the nature and security considerations of information and service exchanges determined?

(A)

Preliminary Phase

(B)

Phase A

(C)

Phase B

(D)

Phase C

(E)

Phase D

 

28.

In which Phase is the risk identification and mitigation assessment worksheets are maintained as governance artifacts and are kept up-to-date?

(A)

Phase A

(B)

Phase E

(C)

Phase F

(D)

Phase G

(E)

Phase H

 

29.

Which among the following is a technique for discovering the need for a Capability?

(A)

Gap Analysis

(B)

Architecture Patterns

(C)

Interoperability Requirements

(D)

Business Scenario

(E)

Business Transformation Readiness Assessment

 

Architecture Governance (3 questions)

30.

Which of the following is NOT a part of Architecture Governance?

(A)

Implementing a system of controls over the creation and monitoring of all architectural components and activities

(B)

Improving the maturity level of architecture discipline within the organization

(C)

Implementing a system to ensure compliance with internal and external standards and regulatory obligations

(D)

Establishing processes that support effective management of the above processes within agreed parameters

(E)

Developing practices that ensure accountability to a clearly identified stakeholder community

 

31.

What does the Conceptual Structure of Architecture Governance Framework contain?

(A)

Compliance, Business Control , Monitoring and Reporting

(B)

Process, Content, Monitoring and Reporting

(C)

Process, Content, Repository and Process Flow Control

(D)

Content, Context, Process and Reporting

(E)

Business Control, Content, Monitoring and Reporting

 

32.

Which of the following is NOT the purpose of Architecture Compliance Review?

(A)

To improve the maturity level of architecture discipline within the organization

(B)

To identify where the standards themselves may require modification

(C)

To identify services that are currently application-specific but might be provided as part of the enterprise infrastructure

(D)

To document strategies for collaboration, resource sharing, and other synergies across multiple architecture teams

(E)

To take advantage of advances in technology

 

Architecture Views, Viewpoints, and Stakeholders (2 questions)

33.

Which of the following is NOT a correct statement about concern?

(A)

Concerns determine the acceptability of the system

(B)

The terms “concern” and “requirement” are synonymous

(C)

Concerns are the root of the process of decomposition into requirements

(D)

Concerns are represented in the architecture by these requirements

(E)

Each stakeholder typically has interests in, or concerns relative to, that system

 

34.

Which steps among the following is NOT a recommended step to create the required views for a particular architecture?

(A)

Refer to any existing libraries of viewpoints

(B)

Select key stakeholders

(C)

Analyze their requirement and document them

(D)

Select appropriate viewpoints

(E)

Generate views of the system using the selected viewpoints as templates

 

Building Blocks (2 questions)

35.

Which of the following is NOT the characteristic of a good building block?

(A)

It considers implementation and usage, and evolves to exploit technology and standards

(B)

It may be assembled from other building blocks

(C)

It may be a subassembly of other building blocks

(D)

Ideally, a building block is re-usable and replaceable, and well specified with stable interfaces

(E)

It may specify implementation details

 

36.

What does Architecture Building Blocks do?

(A)

They define how the functionality will be realized through products and components

(B)

They capture architecture requirements

(C)

They define the implementation

(D)

They fulfill business requirements

(E)

They are product or vendor-aware

 

ADM Deliverables (2 questions)

37.

Which among the following is beyond the scope of governance of Architecture Contract?

(A)

Continuous monitoring to check integrity

(B)

Adherence to the principles and standards

(C)

Facilitate re-usablility

(D)

Identification of risks

(E)

Ensuring accountability, responsibility, and discipline

 

38.

In which phase is Capability Assessment carried out?

(A)

It is first carried out in Phase A and updated in Phase E

(B)

It is first carried out in Preliminary Phase and updated in Phase A to E

(C)

It is first carried out in Phase A, updated in Phase E and finalized in Phase F

(D)

It is first carried out in Preliminary Phase, updated in Phase A to E and finalized in Phase F

(E)

It is first carried out in Phase A and updated in Phase B to E

 

TOGAF Reference Models (2 questions)

39.

What is the TOGAF Technical Reference Model?

(A)

It is a reference model that focuses on the Application Software space

(B)

It is fundamentally an Application Architecture reference model – a model of the application components and application services software essential for an integrated information infrastructure

(C)

It enables each individual department to operate at maximum efficiency was for a long time accepted as the best approach to managing a large enterprise

(D)

It describes a fundamental architecture upon which other, more specific, architectures can be based

(E)

It points to rules and standards to assist in leveraging solutions and products within the value chain

 

40.

What among the following is NOT a part of the Integrated Information Infrastructure Reference Model taxonomy?

(A)

Information consumer application

(B)

Management utilities

(C)

Brokering application

(D)

Communication infrastructure interface

(E)

Information provider application

 

Answers

  1. C – Architecture Governance
  2. E – A formal description of a system, or a detailed plan of the system at a component level to guide its implementation or the structure of components, their inter-relationships, and the principles and guidelines governing their design and evolution over time
  3. E – It will ensure compliance and protect the interest of stakeholders
  4. D – Building Block, Artifact and Deliverable
  5. D – A Stakeholder analysis and map
  6. C – Improved software development productivity
  7. D – Yes, you can cycle around ADM, iterate across specific phases or cycle through some of the phases
  8. A – At relevant places throughout the ADM, there are reminders to consider which architecture assets from the Architecture Repository the architect should use
  9. B – An enterprise may wish to use or tailor the ADM in conjunction with the security best practices in use in the enterprise
  10. D – It is a physical repository of all architecture assets models, patterns, architecture descriptions, and other artifacts produced during application of the ADM
  11. A – The Architecture Continuum provides a consistent way to describe and understand the implementation of the assets
  12. E – Compliance Log
  13. B – It holds a set of specifications, to which architectures must conform
  14. D – TOGAF recognizes the need to manage the content of the Enterprise Continuum using tools but does not provide any guidance on tool selection
  15. B – Phase A
  16. C – Business Architecture looks at the Enterprise in abstraction and does not look at the relationship between people and process
  17. D – Technical implementation architecture
  18. E – Formulate recommendations for each implementation project
  19. B – Mobilize supporting operations that will underpin the future working lifetime of the deployed solution
  20. A – Preliminary Phase
  21. E – In Phase E major implementation projects grouped into Transition Architectures and they are confirmed with relevant stakeholders in phase F
  22. E – Phase F
  23. D – It is established in Preliminary Phase and operated on Phase G and H
  24. B – Usecase Modeling
  25. D – The underlying business vision
  26. E – Data relationship gaps
  27. B – Phase A
  28. D – Phase G
  29. D – Business Scenario
  30. B – Improving the maturity level of architecture discipline within the organization
  31. C – Process, Content, Repository and Process Flow Control
  32. A – To improve the maturity level of architecture discipline within the organization
  33. B – The terms “concern” and “requirement” are synonymous
  34. C – Analyze their requirement and document them
  35. E – It may specify implementation details
  36. B – They capture architecture requirements
  37. C – Facilitate re-usable
  38. A – It is first carried out in Phase A and updated in Phase E
  39. D – It describes a fundamental architecture upon which other, more specific, architectures can be based
  40. D – Communication infrastructure interface

More Stories By Udayan Banerjee

Udayan Banerjee is CTO at NIIT Technologies Ltd, an IT industry veteran with more than 30 years' experience. He blogs at http://setandbma.wordpress.com.
The blog focuses on emerging technologies like cloud computing, mobile computing, social media aka web 2.0 etc. It also contains stuff about agile methodology and trends in architecture. It is a world view seen through the lens of a software service provider based out of Bangalore and serving clients across the world. The focus is mostly on...

  • Keep the hype out and project a realistic picture
  • Uncover trends not very apparent
  • Draw conclusion from real life experience
  • Point out fallacy & discrepancy when I see them
  • Talk about trends which I find interesting
Google

@ThingsExpo Stories
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have spoken with, or attended presentations from, utilities in the United States, South America, Asia and Europe. This session will provide a look at the CREPE drivers for SmartGrids and the solution spaces used by SmartGrids today and planned for the near future. All organizations can learn from SmartGrid’s use of Predictive Maintenance, Demand Prediction, Cloud, Big Data and Customer-facing Dashboards...
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce the value of the network in helping organizations to maximize their company’s cloud experience.
IoT is still a vague buzzword for many people. In his session at Internet of @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, will discuss the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. The presentation will also discuss how IoT is perceived by investors and how venture capitalist access this space. Other topics to discuss are barriers to success, what is new, what is old, and what the future may hold.
Whether you're a startup or a 100 year old enterprise, the Internet of Things offers a variety of new capabilities for your business. IoT style solutions can help you get closer your customers, launch new product lines and take over an industry. Some companies are dipping their toes in, but many have already taken the plunge, all while dramatic new capabilities continue to emerge. In his session at Internet of @ThingsExpo, Reid Carlberg, Senior Director, Developer Evangelism at salesforce.com, to discuss real-world use cases, patterns and opportunities you can harness today.
All major researchers estimate there will be tens of billions devices – computers, smartphones, tablets, and sensors – connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!
Noted IoT expert and researcher Joseph di Paolantonio (pictured below) has joined the @ThingsExpo faculty. Joseph, who describes himself as an “Independent Thinker” from DataArchon, will speak on the topic of “Smart Grids & Managing Big Utilities.” Over his career, Joseph di Paolantonio has worked in the energy, renewables, aerospace, telecommunications, and information technology industries. His expertise is in data analysis, system engineering, Bayesian statistics, data warehouses, business intelligence, data mining, predictive methods, and very large databases (VLDB). Prior to DataArchon, he served as a VP and Principal Analyst with Constellation Group. He is a member of the Boulder (Colo.) Brain Trust, an organization with a mission “to benefit the Business Intelligence and data management industry by providing pro bono exchange of information between vendors and independent analysts on new trends and technologies and to provide vendors with constructive feedback on their of...
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation and integration; and visibility through intelligent business operations and big data.
There will be 50 billion Internet connected devices by 2020. Today, every manufacturer has a propriety protocol and an app. How do we securely integrate these "things" into our lives and businesses in a way that we can easily control and manage? Even better, how do we integrate these "things" so that they control and manage each other so our lives become more convenient or our businesses become more profitable and/or safe? We have heard that the best interface is no interface. In his session at Internet of @ThingsExpo, Chris Matthieu, Co-Founder & CTO at Octoblu, Inc., will discuss how these devices generate enough data to learn our behaviors and simplify/improve our lives. What if we could connect everything to everything? I'm not only talking about connecting things to things but also systems, cloud services, and people. Add in a little machine learning and artificial intelligence and now we have something interesting...
Last week, while in San Francisco, I used the Uber app and service four times. All four experiences were great, although one of the drivers stopped for 30 seconds and then left as I was walking up to the car. He must have realized I was a blogger. None the less, the next car was just a minute away and I suffered no pain. In this article, my colleague, Ved Sen, Global Head, Advisory Services Social, Mobile and Sensors at Cognizant shares his experiences and insights.
We are reaching the end of the beginning with WebRTC and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) irreversibly encoded. In his session at Internet of @ThingsExpo, Peter Dunkley, Technical Director at Acision, will look at how this identity problem can be solved and discuss ways to use existing web identities for real-time communication.
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT. Attendees will learn real-world benefits of WebRTC and explore future possibilities, as WebRTC and IoT intersect to improve customer service.
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at Internet of @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, will share some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder of TeleStax, an Open Source Cloud Communications company that helps the shift from legacy IN/SS7 telco networks to IP-based cloud comms. An early investor in multiple start-ups, he still finds time to code for his companies and contribute to open source projects.
The Internet of Things (IoT) promises to create new business models as significant as those that were inspired by the Internet and the smartphone 20 and 10 years ago. What business, social and practical implications will this phenomenon bring? That's the subject of "Monetizing the Internet of Things: Perspectives from the Front Lines," an e-book released today and available free of charge from Aria Systems, the leading innovator in recurring revenue management.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges.
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other machines.
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at Internet of @ThingsExpo, Erik Lagerway, Co-founder of Hookflash, will walk through the shifting landscape of traditional telephone and voice services to the modern P2P RTC era of OTT cloud assisted services.
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehension and conference efficiency.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, will discuss single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example to explain some of these concepts including when to use different storage models.
SYS-CON Events announced today that Gridstore™, the leader in software-defined storage (SDS) purpose-built for Windows Servers and Hyper-V, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Gridstore™ is the leader in software-defined storage purpose built for virtualization that is designed to accelerate applications in virtualized environments. Using its patented Server-Side Virtual Controller™ Technology (SVCT) to eliminate the I/O blender effect and accelerate applications Gridstore delivers vmOptimized™ Storage that self-optimizes to each application or VM across both virtual and physical environments. Leveraging a grid architecture, Gridstore delivers the first end-to-end storage QoS to ensure the most important App or VM performance is never compromised. The storage grid, that uses Gridstore’s performance optimized nodes or capacity optimized nodes, starts with as few a...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace. These technological reforms have not only changed computers and smartphones, but are also changing the data processing model for all information devices. In particular, in the area known as M2M (Machine-To-Machine), there are great expectations that information with a new type of value can be produced using a variety of devices and sensors saving/sharing data via the network and through large-scale cloud-type data processing. This consortium believes that attaching a huge number of devic...