Technologies are presented for a method and a system that is configured to receive a topology description of an existing customer deployment and a set of achieved performance metrics at a current datacenter and iterate simulations using policy settings across available service levels to find settings that match or exceed the achieved performance levels. When the primary storage system receives a write command from a primary host computer, it stores the command in the primary volume and creates a journal added with time information. The inverter current can be derived from bias sources used to bias the input stage of the comparator so that the inverter current can track the input stage bias currents. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. Bumps are formed on the UBM material layer and the lower surface of each bump is smaller than that of the opening.