Blueprint and Policy-Driven, Cloud-Independent,
Dynamic Application Lifecycle Management
C3DNA brings end-to-end Application Lifecycle Management (ALM) to
enterprise private or hybrid clouds. Existing as well as new cloud-native applications can be
on-boarded, deployed across clouds, and then managed via policies to provide application-centric
visibility and dynamic real-time management with instant cross-cloud mobility.
Migration of existing apps to the cloud
Deployment of cloud-native apps
Blueprint and Policy-driven Dynamic ALM
Instant Cross-Cloud Mobility triggered by Policies
Ensures application high availability (HA), resilience, disaster recovery (DR) and
security, all independent of infrastructure
GUI and CLI-driven interfaces with role-based access controls
Enables developers to use simple JSON or YAML-based blueprints to
define applications, compose workflows and specify intent. Application deployment and
management is automated using policies.
Post-Deployment, Run-Time Control via Dynamic Policies
Using C3DNA, deployed applications can be modified, updated,
then managed dynamically in real-time via policies.
Multi-Cloud Support with Instant Cross-Cloud Mobility
C3DNA uses its patented Cognitive Application Management
Platform (CAMP) and Application Area Network technologies to enable instant application
Transaction-Level Application Visibility
C3DNA monitors the entire application workflow, and collects
and correlates application-specific information at the transaction level from every
component of the workflow to provide users stateful or stateless migration.
Application Resilience Independent of Infrastructure
C3DNA monitors the entire application workflow and reacts to
application-specific events by state-fully relocating the relevant pieces of the
workflow without depending on infrastructure-specific management or APIs.
Role-based Graphical (GUI) and Command Line (CLI) Interfaces
C3DNA provides developers with a CLI interface and operators
and managers with a GUI interface along with the ability to enforce role-based access
controls based on applications or infrastructure.