Migrating Applications. to a Target Data Center. and the use of Cloud Computing

Size: px
Start display at page:

Download "Migrating Applications. to a Target Data Center. and the use of Cloud Computing"

Transcription

1 Migrating Applications to a Target Data Center and the use of Cloud Computing Created by: Tom Bronack, president Data Center Assistance Group, Inc Hamilton Drive Douglasville, Georgia Phone: (017) [email protected] Page: 1

2 Mission Statement 1. Migrate Applications from one, or many, data centers to Primary, Secondary, and/or Recovery Data Centers. 2. Reduce Costs while sustaining current, or increasing, work loads and providing continuous operations and supplementing future growth. 3. Reduce foot print, infrastructure, and locations that will no longer be needed. Sell, or donate, surplus equipment via Asset Management process. 4. Utilize latest technologies to support improved performance, reliability, and continuation of business should a disaster event occur. 5. Integrate new operations through automated forms management and control system (ITIL or similar) that will accept Work Orders and associated Purchase Orders for development, implementation, support, maintenance, and recovery services. 6. Integrate Management Reporting and Awareness to better manage the new environment. Page: 2

3 Objectives 1. Define Target environment(s) and their infrastructure, equipment, systems, and locations. 2. Establish migration process and the teams that will be needed to support the effort, then define their functional responsibilities. 3. Define Migration Life Cycle and sequence of functions to be performed. 4. Define tools needed to support migration effort and have personnel trained on new tools. Integrate tool usage within personnel functional responsibilities. 5. Identify applications to be migrated and the phase during which they will be moved to the target data center. Create a detailed Project Plan to support the migration. 6. Create Bench Mark and Performance guidelines to establish baseline and performance improvements associated with migration. 7. Implement Support, Problem, and Change Management procedures along with other system management functions needed to support applications. Page: 3

4 Example Project Goals 1. Combine Information Technology into two locations DC East and DC West. 2. Generate savings by eliminating leased facilities, back-up locations, and assets. 3. Provide internal Systems Development Life Cycle (SDLC) to migrate new and changed applications to the production environment. 4. Provide Data Synchronization between sites to support recovery operations. 5. Update Standards and Procedures and supportive documentation to represent the new organizational structure for both production and recovery operations. 6. Integrate new standards and procedures within the every day functions performed by the staff, provide training and awareness to personnel, and implement periodic testing to insure ability to process workloads in production or recovery modes. 7. Prepare a platform for future Virtualization, optimized WAN, and enhanced Data Protection going forward. 8. Achieve an efficient Information Technology environment that complies to laws and regulations (domestic and international, as needed) and enhances the company reputation thereby improving employee morale and supporting expanded sales. Page: 4

5 SCOPE OF SERVICES Migration Pathway Personnel The Conversion Specialist will be responsible for providing insight, planning, and execution of conversion activities for management systems. The conversion specialist will be responsible for: Establishing management group and reporting schedule. Creating Risk Assessment to identify compliance and security guidelines. Develop Target Environment profile. Identify applications and data to be migrated. Review Service Level Agreements for applications being migrated and insure Service Level Reporting is adequate. Define IT Security, Encryption, Real-Time / Incremental backups, and failover requirements. Incorporate Enterprise Resiliency and Corporate Certification within migration pathway. Create application migration project plan with identified resources, timeframe, and costs. Determine use of Cloud Computing (internal / external) and define backup and recovery requirements. Identify automated tools needed to support identification, migration, and tuning process like ADDM, Sharkwire / Opnet, CiRBA, Double-Talk, AIX, Tivoli and any other identified automated tools. Define migration path from selection through verification, package creation, and migration. Implement Migration Factory and other functional areas needed to perform migration duties. Perform Bench Marking of original system and migrated system and report on results. MANDATORY SKILLS/EXPERIENCE: Demonstrated depth of knowledge migrating applications. Demonstrated experience migrating / converting multiple and multi-platform legacy systems into a single system. Experience in the development of conversion cleanup reporting for use by subordinate staff during data purification. Demonstrated success managing large-scale conversion projects. Direct management of analysts and programmers coding conversion routines. Experience in required applications and technical requirements. Project Management experience. Page: 5

6 Example Migration Pathway and Goals Applications are identified, evaluated, rated, scheduled, and moved from originating site to target site Migration Path Originating Site Applications Tier 1 Tier n Applications Migration Schedule Movement Target Site Site 1 Site 2 Site 3 Site 4 Site 5 Decommission Originating Site Rate Applications for Movement by Tier / Group RTO Support Artifacts Infrastructure Needs Resource Needs Gap & Exceptions Obstacles Mitigate / Mediate Validate Ability to Move Validate Target Site Ability to Accept / Support Y N Complete? Movement Testing Quality Assurance Production Acceptance Production Vital Records Access Controls Recovery Planning Acceptance Turnover DC East DC West Page: 6

7 Migration Work Cycle / Flow Start Define Target Environment Location(s) Infrastructure Equipment Systems and Applications Perform Risk Assessment Identify Staff & Functions Suppliers and Vendors Clients Establish Migration Process Define Management and Teams Define Functional Responsibilities Define Migration Life Cycle Assign Functions Establish Reporting Cycle Obtain Tools and Train Staff Define Tool Requirements Create Migration Project Plan A Page: 7

8 Migration Work Cycle / Flow continued A Create Migration Groups & Functions Define Migration Application Groups Define Tools & Components in Migration Groups Define Migration Move Phases & Timeframes Log Migration Groups and Schedule Submit Groups to Migration Factory Benchmark Application Groups prior to move Initiate Migration Process Copy Migration Groups via Double-Take Verify Successful Migration Benchmark Migration Application Groups Report Results of Migration Phase Improvement? Compare Benchmark Results B Repeat process for all applications Page: 8

9 Asset Management Disciplines Start Dispose of Surplus equipment after Migration to Target Data Center(s) to reap profit from sales, return of equipment storage space, and personnel. Disposition = A Can be sorted by: Equipment Type, Disposition, Date, or Location Pick-Up List Equip. Type: Disp: Location: PC A Bldg 3, Rm 203 PC R Bldg 1, Rm 405 PC T Bldg 2, Rm 501 Acquire Equipment Purchase Order Install Equipment Add to Master Inventory Master Inventory Equipment is being Actively used Disposition = R N, Exceptions List Generated Re-deploy Equipment Work Order Pick-Up Inventory Compare to Master Inventory Y Warehouse Inventory Equipment is moved to new location Disposition = T Perform Services Service Order Terminate Equipment Work Order Service Order Equipment is Sold or Disposed of Ready-to-Sell Inventory Purchase Order Marketing & Sales Release Form Finance Form End Archive Page: 9

10 Updating the Standards and Procedures Manual Standards And Procedures Manual Status = R Equipment Status = D Equipment Donation Status = T Equipment Termination Procedures Update manual to Include new procedures for equipment Redeployment, Donation, and Termination in accordance with Legal, Environmental, Business, and Regulatory Requirements. Train Staff on new procedures and provide Maintenance and Support Services going forward. Redeployment Procedures Log & schedule, Pick-up, Data Wipe, Reconfigure, Package, Store, Deliver, Document, Notify, Track, History. Procedures Log & schedule, Pick-up, Data Wipe, Reconfigure, Certify, Package, Store, Donate, Document, Notify, Track, History. Log & schedule, Pick-up, Data Wipe, Reconfigure, Certify, Package, Store, Sell, Client Pick-up, Financials, Document, Notify, Track, History. Page: 10

11 Business Continuity Management Disciplines and Integration Contingency Recovery Disciplines Disaster Recovery Information Technology Protection Critical Jobs; Data Sensitivity and Access Controls; Vital Records Management; Vaulting and Data Recovery; Recovery Time Objectives; Recovery Point Objectives; and Mainframe, Mid-Range, and Servers. Contingency Planning Risk Management Risk Management Exposures (Gaps and Exceptions); Insurance; Legal / Regulatory Requirements; Cost Justification; and Vendor Agreements. Charter: Eliminate Business Interruptions; Ensure Continuity of Business; Minimize Financial Impact; and Adhere to Legal / Regulatory Requirements Business Recovery Corporate Asset Protection Inventory Control Asset Management Configuration Management Business Continuity; and Office Recovery. These four Contingency Planning Disciplines allow for logical work separation and better controls Establishing interfaces with key departments will allow for the inclusion of corporate-wide recovery procedures (Security, Salvage, and Restoration, etc.) in department specific Recovery Plans Executive Management Information Technology Contingency Planning affects every part of the organization and is separated into logical work areas along lines of responsibility. Facilities Personnel Contingency Recovery Planning Company Operations Auditing General Services Public Relations Finance Page: 11

12 Systems Management Organization Systems Management and Controls (SMC) Data Processing Environment Service Level Management Asset & Inventory Management Application Development (SDLC) Production Acceptance Contingency Management Change Management Configuration Management Application Maintenance Production Operations EDP Security Management Problem Management Capacity Management Application Testing Network Management Vital Records Management Incident Management Performance Management Quality Assurance Business Recovery Risk Management Disaster Management Page: 12

13 Systems Development Life Cycle (SDLC), Components and flow Development Testing Quality Assurance Production Acceptance End-User Request for New Product Or Service Unit and System Testing Naming, Documents, and Placement Security, Vital Records, Back-up, Recovery, Audit. On-Line Data Files BKUP On-Line Data Files End-User Defines: Business Purpose, Business Data, Ownership, Sensitivity, Criticality, Usage, Restrictions, RTO and RPO, Back-Up, and Recovery. BKUP New End-User Location Company or Client Site Update Recovery Enhance And Repair Maintenance Business Recovery Facility Version And Release Control Change Management Disaster Recovery Facility Vendor or Company Site Real-Time Security, Vital Records, Back-up, Recovery, Audit. On-Line Data Files Periodic / Incremental Production Off-Site Vault Vendor or company Site Page: 13 BKUP

14 Systems Management Controls and Workflow Service Level Reporting, Capacity Management, Performance Management, Problem Management, Inventory Management, Configuration Management. Development Testing Quality Assurance Production Acceptance Production Batch and On-Line Management Product or Service, Service Level Management, Project Life Cycle, Work Order, Purchase Order(s), Documentation. Walk Thru s, Unit Testing, System Testing, Regression, Scenarios, Scripts, Recovery Tests, Benchmarks, Post Mortem. Test Validation, Components, Naming, Placement, Functionality, Process. Batch / On-Line, Security / Encryption, Operations, Recovery, EDP Audit. Vital Records Maintenance Service Level Management, Project Life Cycle. Change Management Systems Development Life Cycle, Component & Release Management, Standards & Procedures, User Guides & Vendor Manuals, Training (CBT & Classroom), etc... Disaster Recovery Off-Site Vault Disaster Recovery Facility A Forms Management & Control System, used to originate work requests and track work until completed, will facilitate optimum staff productivity and efficiency. Mainframe and Office Recovery Page: 14

15 Quality Assurance and PLC Checkpoints Create Service Request Return to Submitter Interfaces Between Applications, QA, and Production Groups. Error Loop Perform Technical Assessment QA GROUP Perform Business Assessment APPLICATIONS GROUP CP # 1 Perform Requested Work No Checkpoints are used to review progress and make Go / N-Go decisions, update process, and better document. Application Group Testing Successful TESTING and QA Turnover Package Components: Service Form and results Assessments, Change & Release Notes, Application Group Testing Results, Test Scenarios & Scripts, Messages & Codes, and Recoveries, Data for Regression and Normal Testing, Documentation. Yes Create QA Turnover Package Perform Post- Mortem Perform Requested Work QA Review Meeting Schedule Request QA Review And Accept Error Loop No Successful CP # 3 Yes Perform User Acceptance Testing Create Production Control Turnover Package CP # 2 Submit to Production Control PRODUCTION CONTROL Turnover Package Components: Explanation and Narrative, Files to be released, Predecessor Scheduling, Special Instructions, Risk Analysis, Authorizations. Page: 15

16 SDLC Documentation Requirements and Forms Automation New Product / Service Development Request Form Life Cycle Documents are Linked to from Date Field Development Request Form Phase: Date User Information Business Justification Technical Justification Build or Buy Development (Build / Modify) Test: Unit Testing System Testing Regression Testing Documentation Link to Documents Documentation Development: Development Request Form Number Business Need Application Overview Audience (Functions and Job Descriptions) Business / Technical Review Data Cost Justification Build or Buy Decision Interfaces (Predecessor / Successor) Request Approval Testing: Data Sensitivity & Access Controls IT Security Management System Encryption Vital Records Management Data Synchronization Backup and Recovery Vaulting (Local / Remote) Disaster Recovery Business Recovery Quality Assurance Production Acceptance Production Support (Problem / Change) Maintenance (Fix, Enhancement) Documentation Recovery Awareness and Training Documentation Documentation Quality Assurance: Application Owner Documentation & Training Application Support Personnel End User Coordinators Vendors and Suppliers Recovery Coordinators Testing Results Production Acceptance Application Setup Input / Process / Output Messages and Codes Circumventions and Recovery Recovery Site Information Travel Instructions Page: 16

17 Information Accounting and Charge-Back System Concept By utilizing Work Order (WO) and Purchase Order (PO) concepts, it is possible to track and bill clients for their use of Information Technology services associated with development and maintenance services. This concept is presented below: User Name: User Division: User Identifier Work Order #: Date: For: PO for: Development Cost: $ PO for: Testing Cost: $ PO for: Quality Assurance Cost: $ PO for: Production Acceptance Costs $ PO for: Production (on-going) Cost: $ PO for: Vital Records Management Cost: $ PO for: Asset Management (Acquisition, Redeployment, Termination) Cost: $ PO for: Inventory and Configuration Management Cost: $ PO for: Information and Security Management Cost: $ PO for: Workplace Violence Prevention Cost: $ PO for: Recovery Management Cost: $ PO for: Documentation and Training Cost: $ PO for: Support and Problem Management Cost: $ PO for: Change Management Cost: $ PO for: Version and Release Management Cost: $ Total Cost: $ Bill can be generated via Forms Management, Time Accounting, or Flat Cost for Services. This system can be used to predict costs for future projects and help control expenses and personnel time management. 8/10/2013 Thomas Bronack - Application Migration Guideline Document 17

18 Intel Builds Dell x86 Chips for their Servers Target Environment Dell x86 Servers IBM AIX P7 ( Watson ) Systems using AIX VMware vsphere 5 and AIX Tivoli 1 million I/O per Sec. Double-Talk Remote Storage Local Storage Cisco Network Equipment for remote locations NetApp NAS to support Remote and Cloud Storage EMC SAN, supporting 2 channels, AIX Storage Array, up to 2 TeraBytes of Local storage VMware vsphere 5 Software Supports : vshield for Cloud Computing - security, control, and compliance. vcenter Site Recovery Manager 5. vcloud Director 5 model and activate recovery and failover. Page: 18

19 Logical Example of Enterprise Target Environment Overview of the Enterprise Information Technology Environment Physically Transported Using Tape Only Encryption Customers; Credit Bureaus; Feed-Files; and, Other Locations. Remote Tape / Data Vault Electronic Vaulting; Incremental Vaulting; and, Electronic transmission to Disaster Recovery Site Disaster Recovery Site Encrypting Data-In- Movement will protect data being transmitted to remote sites Remote Locations Electronic Transmission Local Tape / Data Vault Local Sites Open Network With Multiple Access Points Electronic Transmission Encryption of Data at Rest to Provide Total Protection Local Tape / Data Vault Local Sites Production Site #1 Cloud Computing Company Data Production Site #2 End User Work Order to create a new Product or Service Systems Development Life Cycle (SDLC) New Applications Development Testing and Quality Assurance Send Approved Applications To Production Acceptance Maintenance Problem Resolution And Enhancements Development And Maintenance Environments Page: 19

20 Fully Integrated Recovery Operations and Disciplines (End Goal) Private Sector Preparedness Act (Domestic Standard) CERT Resiliency Engineering Framework And COSO ISO22313 and ISO22318 (International Standard) National Fire Prevention Association 1600 Standard ISO27000 ISMS Security Standard Contingency Command Center (CCC) Corporate Certification Information Security Management System (ISMS) based on ISO27000 Incident Command Center (IC) Workplace Violence Prevention Emergency Operations Center (EOC) Command Centers Help Desk (HD) Operations Command Center (OCC) Lines of Business Emergency Response Management Business Continuity Management Business Integration Network Command Center (NCC) Locations, Employees, Infrastructure, Equipment, Systems, Applications, Supplies, Customers. State and Local Government., First Responders (Fire, Police, & EMT), Department of Homeland Security (DHS), Office of Emergency Management (OEM), Local Community. Risk Management, Disaster Recovery, Business Continuity, Crisis Management, Emergency Management, Workplace Violence Prevention, Audit and HR. Service Level Agreements & Reporting, Systems Development Life Cycle (SDLC), COSO, CobIT, ITIL, and FFEIC, ISO Guidelines, Six Sigma or Equivalent for Performance and Workflow Management Page: 20

21 Existing Post Office Mail Pick-up and Delivery System An IT Communications Analogy Sender Mail Pick-Up Sort Route Sort Recipient 1. Letter has Address of Recipient and Return Address of Sender. 2. Sender drops letter into Mail Box. 3. Post Office picks letter up from Mail Box and Sorts it by Recipient Address, then routes letter via best method or priority paid for. Deliver 4. Letter is resorted at Recipient Post Office and placed into Postman s Route Bag. 5. Postman delivers letter to recipient. 6. Letter is Returned to Sender if address is incorrect or refused by Recipient. 7. This example is used as the foundation for the Internet and the Internet Protocol (IP) being used. 8. Internet is currently transitioning from IPv4 (Internet of Things) to IPv6 (Internet of Everything) because IPv4 is running out of addresses (2>32 = 4.3 Billion Addresses, IPv6 2>128 = Unlimited Addresses). This will support more addresses than there are atoms on earth, so you can expect machines of all types to have IP Addresses. 8/10/2013 Thomas Bronack - Application Migration Guideline Document 21

22 Internet Protocol (IP) Delivery System (Local / Remote) An IT Communications Overview Sender posts / receives data from Internet via 7 Level Internet Service Communications method. Logical Layer Internet Protocol (IP) provides a sending and receiving address. IPv4 has 4.3 Billion addresses (IOT), which are almost gone, while IPv6 has unlimited Addresses (IOE). Sender Mail Pick-Up Sort Route Sort Deliver From PC to Application Layer (1) Physical Layer From Application Layer (1) through Presentation Layer (2), Session Layer (3), and Transportation Layer (4) for delivery to receiving site. Process is repeated until message has been successfully sent and received. This is a Handshaking operation where Data Packets are sent to receiving site and acknowledged as successfully received (ACK) or not (NAK). Failures are retransmitted until received successfully or an error notification is posted (Layer 5-7). Recipient 8/10/2013 Thomas Bronack - Application Migration Guideline Document 22

23 Problem Management and Circumvention Techniques Problem Identification and Response process Page: 23

24 VMware vsphere 5 platform and supporting components. VMware vsphere 5 Functions: VMware vsphere 5 VMware vcenter Site Recovery Manager 5 VMware vcloud Director 5 Together these tools help business: Deploy business critical applications with confidence, Respond to the needs of the business with Cloud agility, and Move to Cloud Computing with confidence. VMware vsphere 5 Features: Utilizes x86 technology to provide an infrastructureas-a-service architecture. Can support 32 Virtual CPU s with up to 1 Terabyte of memory. Support 1 million I/o per second. Provides Intelligent Policy Management by allowing a set-it and forget-it approach to managing data center resources, including server deployment and storage management through user defined profile. Profile-Driven Storage Management saves personnel administrative time. Comprehensive Cloud Infrastructure Suite, includes: vshield 5 addresses the top enterprise concerns about Cloud Computing security, control, and compliance the vshield product family overcomes the limits of traditional security solutions by delivering an adaptive, software-based security model designed for virtual and cloud environments. vshield 5 will include new Data Security capabilities that will enable IT to quickly identify risk exposures resulting from unprotected sensitive data, isolated applications with different levels of trust and migrate security policies as data and applications move between different virtual systems and apply the same policies in public clouds. vcenter Site Recovery Manager 5 Extending this proven disaster recovery solution, vcenter Site Recovery Manager 5 will introduce built-in VMware vsphere replication capabilities that will allow customers to double the number of protected applications for the same cost while supporting heterogeneous storage configurations in the primary and backup sites. New automated failback and planning migration capabilities will allow customers to orchestrate migrations for disaster avoidance and to support planned maintenance activities and data center consolidations. vcloud Director 5 Enabling a self-service model for provisioning infrastructure services across internal and external sources, VMware vcloud Director 5 will enable IT to dramatically reduce the time required to provision new servers. New Linked Clone capabilities will reduce provisioning time to as few as 5 seconds, while also reducing storage costs by as much as 60 percent, all while managing resources from a single pane of glass. Page: 24

25 Discover: BMC Atrium Discovery and Dependency Mapping (ADDM) Discover through Integrate phases Build a complete topology of your applications, software, host infrastructure and network devices and updates the profile as often as you need. Keep pace with changes in dynamic virtual environments from VMware, Sun, Microsoft, HP, and Citrix. Operate agent-free across Windows, Linux, Unix and Netware environments, using standard management protocols, such as SSH, WMI, and SNMP. Deep discovery of J2E applications and data bases (Tables, License options, etc.). Analyze: Automatically group servers that work closely together, based on an analysis of the communications between them. Highlight high-risk servers that touch a large portion of the estate. Exclude hosts from automatic grouping as needed. Manual Grouping: Identify groups of hosts to help manage them through a project. Refine automatic groups based on non-discoverable head-knowledge. Exclude sets of servers from visualization such as super-connected servers with hundreds of dependencies. Application Dependency Mapping: Automatically identify IT components and configurations, and interpret raw, discovered data from individual software processes to large-scale, distributed business applications. Use pre-populated patterns to recognize more than 400 infrastructure software products (with more added monthly). Automatically build visualizations that show configuration dependencies between switches, routers, virtual and physical hosts, software, business applications, and other business entities. Page: 25

26 BMC Atrium Discovery and Dependency Mapping Visualize and Integrate Dashboard & Reports: In seconds, create tabular reports and charts that provide answers to critical questions. Leverage pre-populated reports or create your own using the Search Engine Query Language. Organize your favorite charts into at-a-glance dashboards that display the metrics that matter most to you. Search: Perform fast, free text search of the entire data store and get the most relevant results in seconds. Narrow your searches to specific object types and use Search Query Language. Export search results in XML and CSV formats to facilitate information sharing. Host Profiles: View essential details for each host, including and analysis of the host s network traffic in an accessible, easy-to-use format. Create reports as pdf documents. , print, discuss, and annotate, as needed. Integrate Dynamic CMDB: Provides seamless flow of the vital accurate, up to date data needed to underpin BSM initiatives and processes. Continuous CMDB synchronization allows real time up date of the CMDB as Cis are discovered. Filtering allows you to control the Cis types that are synchronized with the CMDB. Page: 26

27 CiRBA Data Center Intelligence CiRBA Overview CiRBA Data Center Intelligence (DCI) is predictive analytics software that powers a revolutionary console for policy-based control of virtual and cloud infrastructure. The CiRBA Control Console CiRBA's Control Console gives you unprecedented control over the efficiency and risk of virtual and cloud infrastructure by optimizing resource allocations and workload placements. This revolutionary console shows you in a single glance which resources need attention and also provides the explicit actions required for optimization. Imagine knowing that you have the perfect amount of infrastructure to satisfy SLA and policy requirements, without having too much. And that your workloads are optimally placed and configured. This is the power of CiRBA Data Center Intelligence (DCI). CiRBA's Control Console enables you to: 1. Visualize - In a single glance, see which resources are appropriately placed, provisioned, and configured and which are at risk. 2. Control - Precise actions are derived from policies and operational data to provide IT with unprecedented control over virtual and cloud infrastructure. 3. Automate - Integrate DCI-Control with existing management systems to safely automate actions that improve efficiency and reduce risk. Page: 27

28 Wireshark Network Analyzer Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in (see for in-depth information and free download). Wireshark features include: Deep inspection of hundreds of protocols, with more being added all the time Live capture and offline analysis Standard three-pane packet browser Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility The most powerful display filters in the industry Rich VoIP analysis Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer (compressed and uncompressed), Sniffer Pro, and NetXray, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others Capture files compressed with gzip can be decompressed on the fly Live data can be read from Ethernet, IEEE , PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform) Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2 Coloring rules can be applied to the packet list for quick, intuitive analysis Output can be exported to XML, PostScript, CSV, or plain text Wireshark enables capturing and playback of transactions and network activity to benchmark / test migrated applications. Wireshark can be used to test Business Recovery Applications at the remote site to insure they work properly and within Service Level Agreement guidelines. Wireshark is a free product that can be downloaded and activated within minutes. It is an Open-Source product that can be tailored to the specific needs of your organization. Page: 28

29 Automated Tools (ITIL v3) Information Technology Information Library version 3 for Forms Management and Control to support work flow and improve productivity. AIX Unix based operating system with GUI front ends and many tools to support present and future computing needs. System Z x86, Hx5 Blades, MF / Server, Scalable, Load Balancing, manage Virtual / Real computing System P Server Manager with Power Saving features IBM System P7 (Power 7) Watson computer used for Jeopardy and is extremely Scalable, Efficient and Powerful zos MF, Server, Problem Management (Detect, Solve, Forward to Resolver, Analysis / Reporting) with extreme security Tivoli Omegamon XE, Storage Management, Tape System Optimization DS8000 Solid State to Disk Level to support priority processing, High I/O rate, Power Regulation controller DS4000 Fabric Storage Management, RAID Configuration, Configure Storage Arrays, Enclosure Drive Protection TS3500 Automated Tape / Cartridge Management System from picker to machine delivery and back Double-Take from Vision Systems and includes: Recover Now, Share, and Move modules that support: Recovery Point Objective (RPO) and Data Synchronization in virtual and real environments. Ensures aggressive Business Continuity Management over the environment and its data. Rewind Data for Continuous Data Protection, Roll-Back to Recovery Point, and Roll-Forward to pick-up point. Availability for Load Balancing, Transparent Recovery via Shut-Down, Move, Reconnect, and Restart operations. The Use of these tools and the others mentioned in this presentation can support automated and incremental recovery operations for organizations of all sizes and we recommend you research their use for your company. Page: 29

30 ITIL V3 Overview Information Technology Infrastructure Library (ITIL) ITIL Five Phase approach to IT Service Support 1. Service Strategy, 2. Service Design, 3. Service Transition, 4. Service Operation, and 5. Continual Service Improvement. ITIL Available Modules 1. Service Strategy Service Portfolio Management Financial Management 2. Service Design Service Catalogue Management Service Level Management (SLA / PKI) Risk Management Capacity Management Availability Management IT Service Continuity Management (BCM) Information Security Management (ISMS) Compliance Management (Regulatory) Architecture Management Supplier Management (Supply Chain) 3. Service Transition Change Management Project Management (Transition Planning and Support) Release and Deployment Management Service Validation and Testing Application Development and Customization Service Asset and Configuration Management Knowledge Management 4. Service Operation Event Management (Crisis) Incident Management (Incidents) Request Fulfillment (Enhancements) Access Management (Security Physical / Data) Problem Management IT Operations Management (SDLC, Support, etc.) Facilities Management Page: 30

31 IBM System Z overview Built on a scalable, secure, reliable, simplified and cost-efficient infrastructure IBM System z is the ideal platform for meeting your Business Analytics needs for today while minimizing the costs of Business Analytics tomorrow. The server platform allows you to implement a single Business Analytics standard while providing Business Analytics as a service to your organization, for better corporate compliance and greater optimization. Provide all decision-makers with complete, consistent, timely and relevant information Easily scale to meet the needs of every decision-maker, from executives and line-of-business managers, financial and business analysts, to front line managers, partners and customers. Offer a complete portfolio of business analytics on a single platform to meet business needs. Provide a more complete view of the business with greater access to real-time data. Increase user satisfaction and ROI Obtain guaranteed system performance and availability (an enterprise SLA). Provide faster time to value for the business. Enable business units to shift their focus from administrative tasks to decision-making. Reduce the cost and complexity of providing Business Analytics to your organization Centralize resources and reduce the hardware, software and facilities (power, floor space, etc.) required to manage and maintain the Business Analytics infrastructure. Significantly reduce the costs associated with Business Analytics system administration and facilities by upwards of 50% over 5 years. Realize greater economies of scale, enabling IT to deliver Business Information (BI) to a broader audience at a reduced cost. Make the high availability of your Business Analytics infrastructure a viable option for IT. Make Business Analytics deployment easier Deploy in days/weeks on System Z instead of months. Reduce the time, resources and cost of delivering BI to new divisions, departments and users. Automate and facilitate self-service provisioning. Eliminate the cost-related barriers to introducing BI to new divisions/departments. Simplify enforcement of corporate regulations and standards Ensure corporate security policies are followed. Ensure disaster recovery plans are in place. Maintain control over business processes. Page: 31

32 IBM System P overview History Processors Features It was originally a line of workstations and servers called RS/6000, but the server line was then renamed to the eserver pseries in 2000 as part of its e-server branding initiative. With the advent of the POWER5 processor in 2004 the family was rebranded the eserver p5. With the global move of the server and storage brands to the System brand with the Systems Agenda, the family was renamed yet again to System p5 in The System p5 now encompasses the IBM OpenPower product line. With the introduction of POWER6 processor models the new models are now being released under the System p brand, dropping the p5 designation. Where RS/6000 used a mix of early POWER and PowerPC processors, when pseries came along this had evolved into RS64-III and POWER3 across the board. POWER3 for its excellent floating point performance and RS64 for its scalability, throughput and integer performance. IBM developed the POWER4 processor to replace both POWER3 and the RS64 line in After that the differences between throughput and number crunching optimized systems no longer existed. Since then System p machines evolved to use the POWER5 but also PowerPC 970 for the low end and blade systems. The last System p systems used the POWER6 processor, such as the POWER6 based System p 570 and the JS22 blade. In addition IBM introduced during the SuperComputing 2007 (SC07) conference in Reno a new POWER6 based System p 575 with 32 POWER6 cores at 4.7 GHz and up to 256GB of RAM with water cooling. All IBM System p5 and IBM eserver p5 machines support DLPAR (Dynamic Logical Partitioning) with Virtual I/O and Micro-partitioning. System p generally uses the AIX operating system and, more recently, 64-bit versions of the Linux operating system. Sun Microsystems is also developing an OpenSolaris port, currently experimental.[1] Page: 32

33 What is the Power7 processor? IBM System Power 7 (P7) Watson The Power7 is the latest generation of IBM processors (chips) that are used as the CPUs in IBM mid range and high end open systems (pseries) for Unix (AIX) and Linux as well as for the iseries (aka AS400 successor). Building on previous Power series processors, the Power7 increases the performance per core (CPU) along with the number of cores per socket (chip) footprint. For example, each Power7 chip that plugs into a socket on a processor card in a server can have up to 8 cores or CPUs. Note that sometimes cores are also known as micro CPUs as well as virtual CPUs not to be confused with their presented via Hypervisor abstraction. Sometimes you may also hear the term or phrase 2 way, 4 way (not to be confused with a Cincinnati style 4 way chili) or 8 way among others that refers to the number of cores on a chip. Hence, a dual 2 way would be a pair of processor chips each with 2 cores while a quad 8 way would be 4 processors chips each with 8 cores and so on. IBM Power7 with up to eight cores per processor (chip) In addition to faster and more cores in a denser footprint, there are also energy efficiency enhancements including Energy Star for enterprise servers qualification along with intelligent power management (IPM also see here) implementation. IPM is implanted in what IBM refers to as Intelligent Energy technology for turning on or off various parts of the system along with varying processor clock speeds. The benefit is when there is work to be done, get it down quickly or if there is less work, turn some cores off or slow clock speed down. This is similar to what other industry leaders including Intel have deployed with their Nehalem series of processors that also support IPM. Additional features of the Power7 include (varies by system solutions): Energy Star for server qualified providing enhanced performance and efficiency. IBM Systems Director Express, Standard and Enterprise Editions for simplified management including virtualization capabilities across pools of Power servers as a single entity. PowerVM (Hypervisor) virtualization for AIX, iseries and Linux operating systems. ActiveMemory enables effective memory capacity to be larger than physical memory, similar to how virtual memory works within many operating systems. The benefit is to enable a partition to have access to more memory which is important for virtual machines along with the ability to support more partitions in a given physical memory footprint. TurboCore and Intelligent Threads enable workload optimization by selecting the applicable mode for the work to be done. For example, single thread per core along with simultaneous threads (2 or 4) modes per core. The trade off is to have more threads per core for concurrent processing, or, fewer threads to boost single stream performance. Page: 33

34 Major characteristics IBM zos System Overview z/os supports stable mainframe systems and standards such as CICS, IMS, DB2, RACF, SNA, WebSphere MQ, record-oriented data access methods, REXX, CLIST, SMP/E, JCL, TSO/E, and ISPF, among others. However, z/os also supports 64-bit Java, C/C++, and UNIX (Single UNIX Specification) APIs and applications through UNIX System Services. The Open Group certifies z/os as a compliant UNIX operating system with UNIX/Linux-style hierarchical HFS and zfs file systems As a result, z/os hosts a broad range of commercial and open source software of any vintage. z/os can communicate directly via TCP/IP, including IPv6, and includes standard HTTP servers (one from Lotus, the other Apache - derived) along with other common services such as FTP, NFS, and CIFS/SMB. Another central design philosophy is support for extremely high quality of service (QoS), even within a single operating system instance, although z/os has built-in support for Parallel Sysplex clustering. z/os has a unique Workload Manager (WLM) and dispatcher which automatically manages numerous concurrently hosted units of work running in separate key-protected address spaces according to dynamically adjustable business goals. This capability inherently supports multi-tenancy within a single operating system image. However, modern IBM mainframes also offer two additional levels of virtualization: LPARs and (optionally) z/vm. These new functions within the hardware, z/os, and z/vm and Linux and OpenSolaris support have encouraged development of new applications for mainframes. Many of them utilize the WebSphere Application Server for z/os middleware. Because there is only one z/os version (at least at present), releases are normally called "Release n," though more formally they are "Version 1 Release n" or "V1.n". The IBM Program Number for all z/os Version 1 releases is 5694-A01. From its inception z/os has supported tri-modal addressing (24-bit, 31-bit, and 64-bit). Up through Version 1.5, z/os itself could start in either 31-bit ESA/390 or 64-bit z/architecture mode, so it could function on older hardware albeit without 64-bit application support on those machines. (Only the newer z/architecture hardware manufactured starting in the year 2000 can run 64-bit code.) IBM support for z/os 1.5 ended on March 31, Now z/os is only supported on z/architecture mainframes and only runs in 64-bit mode. z/architecture hardware always starts running in 31-bit mode, but current z/os releases quickly switch to 64-bit mode and will not run on hardware that does not support 64-bit mode. Application programmers can still use any addressing mode: all applications, regardless of their addressing mode(s), can coexist without modification, and IBM maintains an unwavering commitment to tri-modal backward compatibility. However, increasing numbers of middleware products and applications, such as DB2 Version 8 and above, now require and exploit 64-bit addressing. IBM markets z/os as a flagship operating system, suited for continuous, high-volume operation with high security and stability. It is the most popular mainframe operating system. Page: 34

35 IBM zos System Overview (continued) z/os is available under standard license pricing as well as via System z New Application License Charges (znalc) and "System z Solution Edition," two lower priced offerings aimed at supporting newer applications ("new workloads"), U.S. standard commercial z/os pricing starts at about $125 per month, including support, for the smallest znalc installation running the base z/os product plus a typical set of optional z/os features. [ z/os introduced Variable Workload License Charges (VWLC) and Entry Workload License Charges (EWLC) which are sub-capacity billing options. VWLC and EWLC customers only pay for peak monthly z/os usage, not for full machine capacity as with the previous OS/390 operating system. VWLC and EWLC are also available for most IBM software products running on z/os, and their peaks are separately calculated but can never exceed the z/os peak. To be eligible for sub-capacity licensing, a z/os customer must be running in 64-bit mode (which requires z/architecture hardware), must have completely eliminated OS/390 from the system, and must IBM monthly subcapacity reports. Sub-capacity billing substantially reduces software charges for most IBM mainframe customers. Advanced Workload License Charges (AWLC) is the successor to VWLC on mainframe models starting with the zenterprise 196 and EAWLC is an option on zenterprise 114 models. AWLC and EAWLC offer further sub-capacity discounts. The primary development center for z/os is located at IBM's facilities in Poughkeepsie, New York, but numerous development centers in several other countries contribute substantially to z/os. As one example, IBM's center in Perth, Australia is mainly responsible for z/os's HLASM and DFSMS components. 64-bit memory support Within each address space, z/os typically only permits the placement of data above the 2GB "bar," not code. z/os enforces this distinction primarily for performance reasons. There are no architectural impediments to allowing more than 2GB of application code per address space. IBM has started to allow Java code running on z/os to execute above the 2GB bar, again for performance reasons. Memory is obtained as "Large Memory Objects" in multiples of 1MB (with the expectation that applications and middleware will manage memory allocation within these large pieces). There are three types of large memory objects: Unshared - where only the creating address space can access the memory. Shared - where the creating address space can give access to specific other address spaces. Common - where all address spaces can access the memory. (This type was introduced in z/os Release 10.) Extreme security - In 1973, IBM published a unique "Statement of Integrity" for MVS which has been updated for z/os and is still in force. Page: 35

36 IBM Tivoli System Overview Why Tivoli software A holistic approach to delivering and managing infrastructure services aligned to evolving business priorities. What Tivoli offers Visibility Control Automation An Integrated Service Delivery & Management platform optimized for: Asset and Facilities Management Improve efficiency and reduce the cost and risk of your assets, from medical devices to buildings. Business Service Management Improve customer satisfaction with increased availability of critical business services. Cloud and IT Transformation Lower the cost of your IT infrastructure and speed the delivery of innovative products and services. Data Protection and Storage Management Create a more responsive and resilient storage infrastructure. Enterprise Mobility Management Manage physical and virtual endpoints in real time and ensure compliance. Security Improve security, risk & compliance posture with automated threat protection & security controls. Page: 36

37 Abstract IBM DS8000 I/O Priority Manager Overview The DS8000 I/O Priority Manager enables more effective storage consolidation and performance management combined with the ability to align Quality of Service (QoS) levels to separate workloads in the system. With DS8000 I/O Priority Manager, the system can prioritize access to system resources to achieve the volume's desired QoS based on defined performance goals (high, medium, or low) of any volume. I/O Priority Manager constantly monitors and balances system resources to help applications meet their performance targets automatically, without operator intervention. Starting with DS8000 Licensed Machine Code (LMC) level R6.2, the DS8000 I/O Priority Manager feature supports open systems and IBM System z. DS8000 I/O Priority Manager, together with IBM z/os Workload Manager (WLM), provides more effective storage consolidation and performance management for System z systems. Now tightly integrated with Workload Manager for z/os, DS8000 I/O Priority Manager improves disk I/O performance for important workloads. It also drives I/O prioritization to the disk system by allowing WLM to give priority to the system's resources automatically when higher priority workloads are not meeting their performance goals. Integration with zwlm is exclusive to DS8000 and System z systems. This slide is aimed at those who want to get an understanding of the DS8000 I/O Priority Manager concept and its underlying design. It provides guidance and practical illustrations for users who want to exploit the capabilities of the DS8000 I/O Priority Manager. Page: 37

38 IBM DS4000 I/O Priority Manager Overview The DS4000 EXP810 is the latest disk drive enclosure in the DS4000 Series of products. This 3U enclosure has 4 Gbps Fibre Channel (FC) interfaces, and supports up to 16 disk drives. The 4 Gbps ready IBM System Storage EXP810 Storage Expansion Unit machine type ( A) offers a new 16-bay disk enclosure for attachment to selected DS4000 Midrange Disk Systems, with up to 4.8 terabytes (TB) physical capacity per expansion unit using sixteen 300 GB disk drives. The EXP810 Storage Expansion Unit is designed to accommodate the new optional 2 Gbps Fibre Channel Enhanced Disk Drive Modules (E-DDM), as well as intermix of future optional 4 Gbps Fibre Channel Enhanced Disk Drive Modules (E-DDM), all within the same enclosure. Contains redundant (AC) power and cooling modules, and ESM interfaces. The DS4000 EXP810 is available in a 19- inch rack mount package. Page: 38

39 IBM TS3500 Automated Tape Manager Overview Highlights Supports highly scalable, automated data retention on tape utilizing LTO Ultrium and IBM 3592 and TS1100 families of tape drives. Delivers extreme scalability and capacity, growing from 1 to 16 frames per library and from one to 15 libraries per library complex using the TS3500 shuttle connector. Provides up to 900 PB of automated, low-cost storage under a single library image, dramatically improving floor space utilization and reducing storage cost per terabyte. Offers optional second robotic accessor to enhance data availability and reliability. Enables data security and regulatory compliance via support for tape drive encryption and WORM cartridges. The IBM System Storage TS3500 Tape Library is designed to provide a highly scalable, automated tape library for mainframe and open systems backup and archive that can scale from midrange to enterprise environments. The TS3500 Tape Library continues to lead the industry in tape drive integration with features such as persistent World Wide Name, multipath architecture, drive/media exception reporting, remote drive/media management, and host-based path failover. The TS3500 Tape Library supports IBM System z when used with the IBM 3953 Tape System, the IBM Virtualization Engine TS7740, or the IBM System Storage Tape Controller for System z with its embedded library manager. These systems enable System z hosts to access the TS3500 Tape Library cartridge inventory and allow connection to TS1140, TS1130, TS1120 and IBM TotalStorage 3592 Model J1A Tape Drives. The TS3500 Tape Library can support up to four 3953 tape systems, up to eight IBM Virtualization Engine TS7740 subsystems per physical library, and up to sixteen IBM System Storage Tape Controllers for System z per logical library. Page: 39

40 Double-Take Software Overview Produced by Vision Systems Double-Take Availability for AIX Double-Take for AIX has simplified failover management to meet the most aggressive Recovery Time Objectives, providing high availability for the masses. Monitoring and automated failover ensures business continuity for customers, partners, and employees. Failover to local or remote nodes for reliable, affordable offsite data protection. Protects both physical and virtual AIX environments. Eliminates the IT costs and business consequences of downtime and data loss. Removes the exposure to major data loss of conventional backup and restore technologies. Double-Take RecoverNow for AIX Double-Take RecoverNow s replication technology provides superior performance that allows for a high level of system scalability and satisfies aggressive Recovery Time Objectives. Reliable, affordable offsite data protection. Supports physical and virtual environments. Real time capture of data changes and replication to a recovery system Maintains write order consistency to ensure data integrity for disaster recovery Intelligent and efficient re-sync of production and recovery systems in the event of lost connectivity In the event of a disaster, applications can be immediately restarted on the recovery system Eliminates the IT costs and business consequences of downtime and data loss Ensures business continuity for your customers, partners and employees Removes the exposure to major data loss of conventional backup and restore technologies Storage independence avoids vendor lock-in and maximizes existing storage investments Page: 40

41 Double-Take Software Overview continued Double-Take Share for AIX: Real time data replication. Reliable change data capture ensures data integrity. Built-in conflict resolution and collision monitoring. Accurate tracking and data auditing. Ensures delivery of replicated data even if the target system is unavailable. LAN/WAN friendly. Real time, integrated data from divergent sources allows for better informed decision making. Double-Take Move for AIX: With solutions for Windows, Linux, AIX and IBM I, Vision leads the way in keeping systems and applications resilient and available. Whether you need an easier, more reliable disaster recovery solution, want to manage and share data seamlessly between platforms and databases, need a better way to maintain system efficiency, or you need a comprehensive high availability solution for assured 24/7 operations, Vision Solutions has what you re looking for - including your physical environments, your virtual environments, as well as the cloud. SAN Array-Based Replication and Double-Take Availability. High Availability Deliver nonstop business continuity and boost productivity. Innovative, easy to use switching and replication solutions eliminate costly IT downtime. Disaster Recovery Protect critical information and recover lost data in a fraction of the time and effort of traditional tape backup solutions. Affordable, automated solutions deliver the power of continuous data protection and the flexibility of in-house or hosted recovery options. Data Sharing and Migration Data center consolidation and virtualization initiatives save organizations a great deal of money. Now you can move and share data with unprecedented ease and efficiency. Powerful yet flexible solutions let you unlock the maximum business value of your data. Page: 41

42 Example Data Center Migration Plan Goals Current Environment Leased PCL Primary DC Valencia, CA Back-Up Vendor Internap Back-Up DC Seattle, WA Legend: PCL = Valencia, CA Site HAL = Seattle, WA Site CCL = Client Owned Site Internap = WA Back-Up Vendor Peak 10 = Florida Back-Up Vendor Leased Owned Back-Up Vendor HAL CCL Peak 10 Primary DC Seattle, WA Back-Up DC Primary DC Miami, FL Back-Up DC Ft. Lauderdale, FL Future Environment HAL (Phase II) Migrate & Close Peak 10 (Phase III) Data Centers support production and are back-up to each other, owned by Client Company, and utilize by new products and capacity, as needed. CCL Owned CCL Owned DC West Primary DC, Valencia, CA Comprised of HAL, Peak 10, and PCL WAN DC East Primary DC, Miami, FL Comprised of CCL and Internap Migrate & Close Internap (Phase I) 8/10/2013 Thomas Bronack - Application Migration Guideline Document 42

43 Example Migration Plan Potential Problems Phase I Migrate Internap to DC East Who will back-up PCL? Make sure DC East can back-up PCL before terminating Internap contract. Consider moving PCL to DC West to support PCL production, then test recovery to DC East before migrating Internap backup support to DC East and closing contract with Internap. Phase II Migrate HAL to DC West HAL back-up is still CCL, now DC West. Who will back-up HAL and CCL during this phase. If Peak 10, then review capacity and contract with Peak 10 to make sure you can support recovery operations; Consider DC East as HAL backup, then test production and recovery for HAL. If production and recovery are successful then close HAL Seattle location and reposition CCL assets (redeployment, upgrade, Termination). Phase III Migrate Peak 10 to DC West Who will back-up CCL and HAL? Consider DC East for Back-up operations, then test CCL and HAL recovery before closing Peak 10. After Phase III Preparation for the future DC East supports designated production, while being able to recovery DC West operations. DC West can support designated production, while providing back-up to DC East. Ensure all procedures, documentation, awareness, and training are completed. Ensure adherence to recovery time objectives and compliance laws and regulations. Ensure both sites have sufficient resources to recover the other site and kept in sync. 8/10/2013 Thomas Bronack - Application Migration Guideline Document 43

44 Example Data Center Migration Plan Concerns Make sure Service and Recovery Protection is maintained at all times; Closing Recovery Sites must come after supplemental protection is achieved; Only Close site after protection is validated. Perform a financial analysis of equipment to select the products that are most economical to retain (i.e., Owned, Leased, Rented, Multiple Software Licenses, or resources no longer needed); Utilize Asset Management to Update, Relocate, or Terminate equipment; Make sure appropriate Insurance is Maintained throughout project and then going forward, so that financial considerations and management protection can be maintained; Ensure Capacity and Performance can be supported at new facilities and that all remote offices can access new data centers through the WAN without loss of transaction speed; Ensure Documentation is complete, in sync, and personnel are trained; Utilize Checkpoints to review progress, fix problems or change direction, and make go / no-go decisions; Integrate procedures within the everyday functions performed by personnel so that all records and procedures are current in adherence to Version and Release Management; Integrate Support and Maintenance procedures for resolving Problems / Incidents and implementing Enhancements going forward; and, Utilize ITIL to support operations and maintain a repository of information. 8/10/2013 Thomas Bronack - Application Migration Guideline Document 44

45 Example Data Center Migration Approach Establish a Management Reporting Structure and Status Reporting schedule; Identify Stakeholders and participants, formulate teams, train, and create project structure; Perform a Risk Assessment to identify compliance requirements; Conduct a Environmental Analysis to define current environment capacity / performance, SLA / KPI / Contract requirements, gaps & exceptions, and obstacles that prevent achieving project goals; Eliminate compliance gaps & exceptions, while eliminating obstacles preventing project success; Identify and Rate Applications to be migrated, while ensuring their ability to process successfully in both a production and recovery condition; Define IT Security, encryption, real-time / incremental back-up and recovery requirements, failover / failback for High Availability (HA) applications, Flip / Flop for Continuous Availability (CA) applications; Creation of an Applications Migration Project Plan with tasks to be performed, subject matter experts, deliverable time schedule, resource requirements, tasks to be performed, and costs; Determine if Cloud Computing and Virtualization should be incorporated into new system design; Identify target environment and automated tools needed to help achieve project goals; Define an Organization Structure for application migration, data center decommission, and testing of production and recovery procedures; Formulate Migration Path to move applications from existing data center to target data center, with personnel functional responsibilities, job descriptions, standards and procedures, and training to all personnel assigned to this project; Integrate Enterprise Resiliency and Corporate Certification when migrating applications to new site; Implement Migration Factory and other functional areas needed to perform migration duties; Benchmark applications and systems at primary site and target site, reporting results to management; and, Implement SDLC, Systems Management, Version and Release Management, and ITIL to support and maintain production operations going forward. Integrate within everyday functions to insure currency. 8/10/2013 Thomas Bronack - Application Migration Guideline Document 45

46 Example Data Center Migration Benefits Creation of Client Owned facilities to support domestic production operation, while having the ability to support recovery operations in a reciprocal manner in accordance to SLA (Service Level Agreement) and PKI (Performance Key Indicators) recovery time objectives; Elimination of Leased Facilities (PCL and HAL); Eliminate of Back-Up Vendor costs (Internap and Peak 10); Better controls over IT Operations because procedures can be tailored to Client, without having to consider leased and recovery obstacles; Implementation of Recovery Plans to protect locations, personnel, clients, and reputation; Elimination of redundant operations and procedures; Reduction is staff; Platform for Virtualization going forward; Ability to implement State-of-the-Art WAN (Wide Area Network) to support current and future communications requirements; Ability to implement State-of-the-Art Data Protection and Recovery operations through Data De-Duplication (Dedupe), Virtual Tape Library (VTL), Snapshots, Continuous Data Protection, and Automated Recovery tools; Ability to implement Continuous Availability (CA) and High Availability (HA) procedures to protect applications and business operations in accordance to contractual and regulatory requirements; and, A better trained staff will improve satisfaction and loyalty, while enhancing the company s reputation with personnel and clients. 8/10/2013 Thomas Bronack - Application Migration Guideline Document 46

Samples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages.

Samples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages. Samples of Management Consulting Assignments Performed by DCAG are Provided in the following pages. Thomas Bronack 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Cell: (917) 673-6992 Email:

More information

IBM System Storage DS5020 Express

IBM System Storage DS5020 Express IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited

More information

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures 1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Atrium Discovery for Storage. solution white paper

Atrium Discovery for Storage. solution white paper Atrium Discovery for Storage solution white paper EXECUTIVE SUMMARY As more IT systems are deployed that depend on storage infrastructure to provide business services, and with the adoption of technology

More information

EMC Data Protection Advisor 6.0

EMC Data Protection Advisor 6.0 White Paper EMC Data Protection Advisor 6.0 Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection environments, improve compliance

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

IBM Storwize Rapid Application Storage solutions

IBM Storwize Rapid Application Storage solutions IBM Storwize Rapid Application Storage solutions Efficient, integrated, pretested and powerful solutions to accelerate deployment and return on investment. Highlights Improve disk utilization by up to

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read

More information

Ultra-Scalable Storage Provides Low Cost Virtualization Solutions

Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Flexible IP NAS/iSCSI System Addresses Current Storage Needs While Offering Future Expansion According to Whatis.com, storage virtualization

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Making the hybrid world work for you: Redefining IT operations Frank Casey Group Director, Data Center Solutions & Managed Services

Making the hybrid world work for you: Redefining IT operations Frank Casey Group Director, Data Center Solutions & Managed Services Making the hybrid world work for you: Redefining IT operations Frank Casey Group Director, Data Center Solutions & Managed Services accelerate your ambition We re a USD 6.7 billion business with a remarkable

More information

How To Make A Virtual Machine Aware Of A Network On A Physical Server

How To Make A Virtual Machine Aware Of A Network On A Physical Server VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization

More information

Reduce your data storage footprint and tame the information explosion

Reduce your data storage footprint and tame the information explosion IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 [email protected] Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5

The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5 Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach

More information

IBM Storwize V7000 Unified and Storwize V7000 storage systems

IBM Storwize V7000 Unified and Storwize V7000 storage systems IBM Storwize V7000 Unified and Storwize V7000 storage systems Transforming the economics of data storage Highlights Meet changing business needs with virtualized, enterprise-class, flashoptimized modular

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

IBM Enterprise Linux Server

IBM Enterprise Linux Server IBM Systems and Technology Group February 2011 IBM Enterprise Linux Server Impressive simplification with leading scalability, high availability and security Table of Contents Executive Summary...2 Our

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5 Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5

More information

BROCADE PERFORMANCE MANAGEMENT SOLUTIONS

BROCADE PERFORMANCE MANAGEMENT SOLUTIONS Data Sheet BROCADE PERFORMANCE MANAGEMENT SOLUTIONS SOLUTIONS Managing and Optimizing the Performance of Mainframe Storage Environments HIGHLIGHTs Manage and optimize mainframe storage performance, while

More information

IBM Storwize Rapid Application Storage

IBM Storwize Rapid Application Storage IBM Storwize Rapid Application Storage Efficient, pretested, integrated and powerful solution to accelerate deployment and return on investment. Highlights Improve disk utilization by up to 30 percent

More information

How To Manage The Sas Metadata Server With Ibm Director Multiplatform

How To Manage The Sas Metadata Server With Ibm Director Multiplatform Manage SAS Metadata Server Availability with IBM Technology A SAS White Paper Table of Contents The SAS and IBM Relationship... 1 Introduction...1 Fault Tolerance of the SAS Metadata Server... 1 Monitoring

More information

UN 4013 V - Virtual Tape Libraries solutions update...

UN 4013 V - Virtual Tape Libraries solutions update... UN 4013 V - Virtual Tape Libraries solutions update... - a Unisys storage partner Key issues when considering virtual tape Connectivity is my platform supported by whom? (for Unisys environments, MCP,

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Optimizing your IT infrastructure. 2012 IBM Corporation

Optimizing your IT infrastructure. 2012 IBM Corporation Optimizing your IT infrastructure 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion.

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

UPSTREAM for Linux on System z

UPSTREAM for Linux on System z PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging

More information

Evaluation of Enterprise Data Protection using SEP Software

Evaluation of Enterprise Data Protection using SEP Software Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &

More information

Private cloud computing advances

Private cloud computing advances Building robust private cloud services infrastructures By Brian Gautreau and Gong Wang Private clouds optimize utilization and management of IT resources to heighten availability. Microsoft Private Cloud

More information

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems Simplified Management With Hitachi Command Suite By Hitachi Data Systems April 2015 Contents Executive Summary... 2 Introduction... 3 Hitachi Command Suite v8: Key Highlights... 4 Global Storage Virtualization

More information

IBM Systems and Technology Group Technical Conference

IBM Systems and Technology Group Technical Conference IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e s s - C r i t i c a l A p p l i c a t i o n s

W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e s s - C r i t i c a l A p p l i c a t i o n s Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e

More information

Exam : IBM 000-061. : IBM NEDC Technical Leader. Version : R6.1

Exam : IBM 000-061. : IBM NEDC Technical Leader. Version : R6.1 Exam : IBM 000-061 Title : IBM NEDC Technical Leader Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine

More information

Availability for your modern datacenter

Availability for your modern datacenter Availability for your modern datacenter - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable Veeam Availability protection for the Always-On Business

More information

White Paper. Recording Server Virtualization

White Paper. Recording Server Virtualization White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...

More information

MaxDeploy Ready. Hyper- Converged Virtualization Solution. With SanDisk Fusion iomemory products

MaxDeploy Ready. Hyper- Converged Virtualization Solution. With SanDisk Fusion iomemory products MaxDeploy Ready Hyper- Converged Virtualization Solution With SanDisk Fusion iomemory products MaxDeploy Ready products are configured and tested for support with Maxta software- defined storage and with

More information

Delivering Quality Service with IBM Service Management

Delivering Quality Service with IBM Service Management Delivering Quality Service with IBM Service Milos Nikolic, Global Technology Services Manager Dragan Jeremic, Technical Sales Specialist for Tivoli December 10th 2008 Innovation is the Process, Success

More information

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International Keys to Successfully Architecting your DSI9000 Virtual Tape Library By Chris Johnson Dynamic Solutions International July 2009 Section 1 Executive Summary Over the last twenty years the problem of data

More information

Microsoft SQL Server 2005 on Windows Server 2003

Microsoft SQL Server 2005 on Windows Server 2003 EMC Backup and Recovery for SAP Microsoft SQL Server 2005 on Windows Server 2003 Enabled by EMC CLARiiON CX3, EMC Disk Library, EMC Replication Manager, EMC NetWorker, and Symantec Veritas NetBackup Reference

More information

System Requirements Version 8.0 July 25, 2013

System Requirements Version 8.0 July 25, 2013 System Requirements Version 8.0 July 25, 2013 For the most recent version of this document, visit our documentation website. Table of Contents 1 System requirements 3 2 Scalable infrastructure example

More information

We look beyond IT. Cloud Offerings

We look beyond IT. Cloud Offerings Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking

More information

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization How Customers Are Cutting Costs and Building Value with Microsoft Virtualization Introduction The majority of organizations are incorporating virtualization into their IT infrastructures because of the

More information

VERITAS Backup Exec 9.0 for Windows Servers

VERITAS Backup Exec 9.0 for Windows Servers WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS

More information

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide

More information

System and Storage Virtualization For ios (AS/400) Environment

System and Storage Virtualization For ios (AS/400) Environment Date: March 10, 2011 System and Storage Virtualization For ios (AS/400) Environment How to take advantage of today s cost-saving technologies for legacy applications Copyright 2010 INFINITE Corporation.

More information

VMware Solutions for Small and Midsize Business

VMware Solutions for Small and Midsize Business SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

Address IT costs and streamline operations with IBM service desk and asset management.

Address IT costs and streamline operations with IBM service desk and asset management. Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT

More information

Simplify Data Management and Reduce Storage Costs with File Virtualization

Simplify Data Management and Reduce Storage Costs with File Virtualization What s Inside: 2 Freedom from File Storage Constraints 2 Simplifying File Access with File Virtualization 3 Simplifying Data Management with Automated Management Policies 4 True Heterogeneity 5 Data Protection

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance

More information

Private Cloud for WebSphere Virtual Enterprise Application Hosting

Private Cloud for WebSphere Virtual Enterprise Application Hosting Private Cloud for WebSphere Virtual Enterprise Application Hosting Tracy Smith Nationwide Insurance February 7, 2013 Session Number 12884 www.linkedin.com/in/tracysmith2 [email protected] Private

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

BMC Mainframe Solutions. Optimize the performance, availability and cost of complex z/os environments

BMC Mainframe Solutions. Optimize the performance, availability and cost of complex z/os environments BMC Mainframe Solutions Optimize the performance, availability and cost of complex z/os environments If you depend on your mainframe, you can rely on BMC Sof tware. Yesterday. Today. Tomorrow. You can

More information

VMware vsphere 5.0 Boot Camp

VMware vsphere 5.0 Boot Camp VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this

More information

IBM Infrastructure Suite for z/vm and Linux

IBM Infrastructure Suite for z/vm and Linux IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM [email protected] October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

XenData Archive Series Software Technical Overview

XenData Archive Series Software Technical Overview XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic

More information

Turbo Charge Your Data Protection Strategy

Turbo Charge Your Data Protection Strategy Turbo Charge Your Data Protection Strategy Data protection for the hybrid cloud 1 WAVES OF CHANGE! Data GROWTH User EXPECTATIONS Do It YOURSELF Can t Keep Up Reliability and Visibility New Choices and

More information

Paragon Protect & Restore

Paragon Protect & Restore Paragon Protect & Restore ver. 3 Centralized and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores Paragon

More information

Running Oracle Databases in a z Systems Cloud environment

Running Oracle Databases in a z Systems Cloud environment Running Oracle Databases in a z Systems Cloud environment Sam Amsavelu [email protected] ISV & Channels Technical Sales - Oracle IBM Advanced Technical Skills (ATS), America Technical University/Symposia

More information

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability

More information

System Requirements. Version 8.2 November 23, 2015. For the most recent version of this document, visit our documentation website.

System Requirements. Version 8.2 November 23, 2015. For the most recent version of this document, visit our documentation website. System Requirements Version 8.2 November 23, 2015 For the most recent version of this document, visit our documentation website. Table of Contents 1 System requirements 3 2 Scalable infrastructure example

More information

XenData Product Brief: SX-550 Series Servers for LTO Archives

XenData Product Brief: SX-550 Series Servers for LTO Archives XenData Product Brief: SX-550 Series Servers for LTO Archives The SX-550 Series of Archive Servers creates highly scalable LTO Digital Video Archives that are optimized for broadcasters, video production

More information

Lowering Storage TCO with Iomega NAS

Lowering Storage TCO with Iomega NAS Brief ing March 2002 Version 3 s Lowering Storage TCO with Iomega NAS Summary Today s organizations no longer think of storage as a device. Instead, it is an architecture constructed with storage technologies

More information

Using Live Sync to Support Disaster Recovery

Using Live Sync to Support Disaster Recovery Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification

More information

EMC BACKUP-AS-A-SERVICE

EMC BACKUP-AS-A-SERVICE Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase

More information

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management [email protected]

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management [email protected] Why Snapshots Are Useful for Backup Faster backups without taking applications

More information

Scala Storage Scale-Out Clustered Storage White Paper

Scala Storage Scale-Out Clustered Storage White Paper White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current

More information

Datasheet. FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0

Datasheet. FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0 Datasheet FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0 Central console and advanced management functions for ETERNUS DX storage environments..

More information

The Impact of PaaS on Business Transformation

The Impact of PaaS on Business Transformation The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)

More information

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture SOLUTION WHITE PAPER BMC Manages the Full Service Stack on Secure Multi-tenant Architecture Table of Contents Introduction................................................... 1 Secure Multi-tenancy Architecture...................................

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

Data Center Op+miza+on

Data Center Op+miza+on Data Center Op+miza+on Sept 2014 Jitender Sunke VP Applications, ITC Holdings Ajay Arora Sr. Director, Centroid Systems Justin Youngs Principal Architect, Oracle 1 Agenda! Introductions! Oracle VCA An

More information

OPTIMIZING SERVER VIRTUALIZATION

OPTIMIZING SERVER VIRTUALIZATION OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)

More information

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically

More information

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have

More information

Redefining Oracle Database Management

Redefining Oracle Database Management Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents

More information

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment Introduction... 2 Virtualization addresses key challenges facing IT today... 2 Introducing Virtuozzo... 2 A virtualized environment

More information