ebook A Successful Data Center Migration - Cradle to Grave

Size: px
Start display at page:

Download "ebook A Successful Data Center Migration - Cradle to Grave"

Transcription

1 ebook A Successful Data Center Migration - Cradle to Grave Given the dynamic operational environment in which today s data centers operate, wherein applications and data in the production environment is changing consistently and is being replicated to a remote DR facility on a regular basis, it becomes even more important to look at all the facets of the IT environment and carefully carve the Data Center migration strategy. This document exhibits an end to end approach to successfully migrate large data center environments to meet regulatory requirements / realize cost efficiencies / improve availability & recoverability of business IT services. Apr 2009

2 Table of Contents 1 Introduction Executive Summary 4 2 Data Center Migration - Key Drivers Scenario A Regulatory Requirements Scenario B Multiple Regional Data Centers cenario C Obsolete Data Center Facilities Infrastructure Scenario D Legacy IT infrastructure Scenario E Fully utilized, out of Capacity Scenario F Merger / De-merger Scenario G Hybrid 7 3 Application & Infrastructure Analysis Source Data Center Application & Infrastructure Contacts Application Profile Infrastructure Profile Application Interdependencies Current Facilities Profile 11 4 Business Service Reviews (BSR) Why do we need to conduct BSR? Application - Recovery Point Objective Application - Availability Objective pplication - Recovery Time Objective High Level Cost estimation ecurring Expenses One-Time Expenses 16 5 Application & Infrastructure Design Target Data Center Core Infrastructure Design Enterprise Shared Services Design Application Re-Architecture As needed Selection of Deployment Model / Patterns Infrastructure Perspective Active-passive failover: Active-active failover: Load balancing Application specific Infrastructure Design Individual Servers & Databases Associated with an application 23 2 Infosys ebook

3 5.5.2 Virtualization / Consolidation Assessment of Servers Application specific software requirements Application specific appliances Application specific LAN/ WAN & Third Party network connectivity requirements Security Requirements Network Performance / Latency Sensitivity assessment Application specific External Storage & Backup requirements Client software needed to access Enterprise shared services Facilities Requirements / Design 28 6 Move Plans Application & Infrastructure Interdependencies ime Zone Dependencies Create Move Bundle Packages Move Build Package Template (Illustrative) Application Build Package template (Illustrative) Update Disaster Recovery Plans Create Detailed Implementation plan Regulatory Considerations Enterprise Contractual considerations 35 7 Build Applications & Infrastructure - Target Data Center Core Infrastructure & Shared Services Build & Readiness Testing Pilot Applications Build & Test Build Move Bundle Packages Test Move Bundle Packages Unit Testing Shared Infrastructure Testing System Integration Testing Move Group level System Integration Testing Program level Typical Risks, Challenges & Mitigation options Build & Test Phase 38 8 Roll out & decommission Rollout / Cutover applications to Target Data Center Decommissioning Source Data Center Hardware 40 9 Appendix Virtualization Candidacy Criteria (Illustrative) Acronyms & Glossary References: 44 Infosys ebook 3

4 1 Introduction 1.1 Executive Summary Business decisions to migrate data centers can be as a result of IT cost reduction initiative, regulatory requirement, business service risk mitigation plan, a newer data center operations strategy, or other legacy data center environments incapable of hosting modern & dense IT infrastructure. Among the biggest risks organizations face when transitioning their Data Center is migrating IT systems and applications. A data center migration is a highly strategic project that must be executed without impacting business operations, Service Level Agreements, performance/availability and data protection requirements. Given the dynamic operational environment in which today s data centers operate, wherein applications and data in the production environment is changing consistently and is being replicated to a remote DR facility on a regular basis, it becomes even more important to look at all the facets of the IT environment and carefully carve the Data Center migration strategy. Every environment has its own challenges and one migration strategy does not fit every client environment. The bottom line consideration for a good migration strategy is near-zero disruption of business services. This objective drives a deeper & thorough understanding of following major subsystems of a data center. Nature & Criticality of Applications that cater to different business services Servers, Shared hosting environments, Databases that host the applications or service logic. Network that provides the access & security to information within Intranet, from Internet and VPNs. Finally, most applications require disk storage for storing data and the amount of disk space and the frequency of access varies greatly between different services/applications. Performance & Service levels requirements. By necessity, moving or migrating services from one data center to another need to consider all of these components. The level & effort for such due diligence is based on the current Data Center s application and Infrastructure portfolio, tolerance to unavailability of applications & services as well as time & budget constraints. 2 Data Center Migration - Key Drivers Below are some of the commonly seen Business-IT situations that trigger a Data Center Migration initiative. Beginning next section, we will understand a generic data center migration process flow that applies to most of the scenarios discussed in this section. However the level of focus in a specific area will differ based on scenario being addressed. 2.1 Scenario A Regulatory Requirements Scenario A Regulatory Requirements Existing Production & Disaster Recovery Data Centers are in same seismic zone / are in proximity to each other. Regulators mandate an out-of-region recoverability capability for mission critical applications. Key Considerations Relocate DR instance of all mission critical applications to another data center in a different seismic zone. Ensure that availability and recoverability of the applications is not impacted in transition Ensure that all interdependent applications are able to communicate with each other in view of mission critical applications being relocated while others being retained. Ensure optimal costs are incurred on Hardware, Software & Labor by making smart decisions on : Hardware & Software re-usability Appropriate program phases to minimize bubble period Utilization of appropriate tools & technologies Processes & best practices Deploying right resources 4 Infosys ebook

5 2.2 Scenario B Multiple Regional Data Centers Scenario B Multiple Regional Data Centers Multiple regional data centers exist in the current state, lacking standardization, efficiencies & growth scalability & unable to meet end to end Service level objectives. Key Considerations Build-out a state of the art Dual / Multiple site Data Center environment that meets required levels of resiliency and data protection Migrate all common type of business IT processes & Infrastructure services that serve the entire or most part of enterprise, to a Resilient Enterprise data center model. Retain (if needed), only the unique functionality in the regional data centers that is required specific to a region. e.g. A newspaper publishing company may want to keep all local news feeds to its regional data center but rely on Enterprise Data Center for all Shared and Core Services Ensure optimal costs are incurred on Hardware, Software & Labor by making smart decisions on : Hardware & Software re-usability Appropriate program phases to minimize bubble period Utilization of appropriate tools & technologies Processes & best practices Deploying right resources 2.3 Scenario C Obsolete Data Center Facilities Infrastructure Scenario C Obsolete Data Center Facilities Infrastructure Existing production / DR / both data centers have obsolete facilities infrastructure either in terms of high power consumption, a large chunk of legacy / unsupported equipment, or poor availability benchmarks Key Considerations (Option A) (Option B) To build-out a new data center with stateof the art facilities infrastructure while maintaining current data center environment Migrate applications to newly built data center Depending on the size & criticality of current data center infrastructure, temporarily move applications to a hosting environment and upgrade facilities infrastructure of the existing data center Relocate applications from hosted environment back to the upgraded data center infrastructure. Ensure optimal costs are incurred on Hardware, Software & Labor by making smart decisions on : Hardware & Software re-usability Appropriate program phases to minimize bubble period Utilization of appropriate tools & technologies Processes & best practices Deploying right resources Infosys ebook 5

6 2.4 Scenario D Legacy IT infrastructure Scenario D Legacy IT infrastructure Existing data center IT infrastructure is legacy & most of the Hardware & Software is nearing end-of support. Moreover, current IT infrastructure is inefficient, space taxing, and does not integrate well with modern applications and technologies. This scenario is generally seen in combination with other scenarios. Key Considerations Redesign and /or Rebuild applications on modern hardware and software technologies. Adopt virtualization & consolidation technologies, Enterprise Shared Services Model Mitigate any data integrity challenges while migrating to modern infrastructure Ensure optimal costs are incurred on Hardware, Software & Labor by making smart decisions on: Hardware & Software re-usability Appropriate program phases to minimize bubble period Utilization of appropriate tools & technologies Processes & best practices Deploying right resources 2.5 Scenario E Fully utilized, out of Capacity Scenario E Fully utilized, Out of Capacity Current data center floor space is nearly 100% utilized, needs optimization to enable growth capabilities Key Considerations / Drivers Consolidate and virtualize IT infrastructure Re-visit facilities infrastructure to ensure it is capable of providing power and cooling to high density IT infrastructure Free up Rack Space & facilities Ensure optimal costs are incurred on Hardware, Software & Labor by making smart decisions on: Hardware & Software re-usability Appropriate program phases to minimize bubble period Utilization of appropriate tools & technologies Processes & best practices Deploying right resources 2.6 Scenario F Merger / De-merger Scenario F - Merger / De-Merger Merger / De-merger of two organizations driving a newer data center strategy for the merged / split entity. Key Considerations / Drivers 6 Infosys ebook Application & Infrastructure technologies selection for the merged entity Data Center Strategy for Infrastructure consolidation / separation & standardization Build-out of Data Center Facilities in-line with new strategy Migration and relocation of infrastructure to align with new data center strategy Ensure optimal costs are incurred on Hardware, Software & Labor by making smart decisions on: Hardware & Software re-usability Appropriate program phases to minimize bubble period Utilization of appropriate tools & technologies Processes & best practices Deploying right resources

7 2.7 Scenario G Hybrid Scenario G Hybrid Hybrid Scenario This may be a combination of one or more scenarios discussed above Key Considerations / Drivers This may be a combination of one or more key considerations discussed above Hybrid Data Center Migration (Scenario A & D) So, we have seen that there can be multiple drivers that trigger a data center migration initiative. Data Center Migration methodology discussed further in this document is based on an experience with a Hybrid situation (Scenario A & D above) In view of this understanding, the scope of Data Center Migration consists of following broader steps. We will understand each of these in much deeper detail as we follow: 1. Application & Infrastructure Analysis / Design a. Source Data Center environment (From where Applications & Infrastructure needs to be migrated) b. Business Service Reviews (Capture Target Service level objectives, IT budgets) c. Target Data Center Infrastructure Planning & Design (where Applications & Infrastructure would reside finally) 2. Move Plans d. Migration options (Build New Hardware at Target Data Center./ Forklift or Truck Hardware from Source to Target Data Center / Interim Build to swing Hardware to Target Data Center) e. Create Move Bundle & Application Build Packages 3. Build & Test Applications & Infrastructure 4. Roll-out Applications at Target Data Center 5. Decommission Source Data Center Infrastructure f. Cutover users to Target Data Center g. Shutdown / Clean up corresponding source Data Center components Infosys ebook 7

8 3 Application & Infrastructure Analysis Source Data Center It appears as if moving / building infrastructure at target data center is predominantly about planning hardware infrastructure. However, in order to ensure that business services are not disrupted in an unplanned fashion, a detailed application & infrastructure assessment is needed. The purpose of Application & Infrastructure Analysis of Source Data Center environment is to create a document package for each application, with sufficient understanding about current IT footprint. Further, based on current environment s understanding & other dependencies discussed later in this document, evolve a target state design to be implemented at new data center. This includes, but not limited to: Key contacts for an application (Application Manager, Technology Delivery Manager, and System Administrator, Business continuity Manager, Architects etc.) Number & Type of Hardware devices (Servers, Network, Storage, and Security) deployed Number & type of Operating Systems, business & Enterprise software services deployed Shared hosting environments and shared database environments deployed Obsolete Hardware & Software Services that need to be refreshed along with Migration Existing Availability, Recovery Time & Recovery Point objectives of each application Architectural information, Physical and Logical diagrams exhibiting an application s deployment & geographical foot prints. Information on application & infrastructure interdependencies and affinities to assist in grouping Applications into move bundles. Current Service levels, Change Windows, Production issues. 3.1 Application & Infrastructure Contacts In a dynamic IT environment, role and responsibilities of various resources keeps changing based on Business & IT requirements. During the initial assessment phase of each application it is important to capture the names of all up-todate stakeholders that will enable in key decisions pertaining to application & infrastructure architecture & IT service management considerations for data center migration. Large enterprises maintain an inventory called Application Portfolio Management that generally maintains application profile & key contacts information. Below table illustrates useful set of information about key stakeholders for an application. These contacts will need to be interviewed for target state design activities, build and test planning activities & to seek sign-off of end of phase activities of the program. Application ID Application Name Line of Business Contact Type Contact Name Contact # 3.2 Application Profile The objective of capturing basic profile of each application is understand certain key parameters such as criticality of application, primary business area served, tolerance for downtime, time-zone sensitivity etc. of each application. This profile helps in Prioritizing & scheduling application analysis design & build activities, breakdown of program into smaller, more manageable work packages. Optimizing co-ordination effort by grouping Application Analysis, Design & Build activities that fall under common stakeholders Applying a common set of guiding principles, processes, procedure, testing methods for applications that meet a common set of criteria e.g. all applications with X RTO or Y of AO to be dealt in a specific manner. 8 Infosys ebook

9 Below table illustrates some of the key business service parameters for an application that would be helpful in further due-diligence Particular App ID App Name App Description App Type App Environment L.O.B Risk Rating Current RTO Current RPO Current AO SLA Status Weekend Down Time Max Down Time Time zone Sensitive Sunset Date Shared Environment Description Unique Application Identifier Name of the Application Brief description about the application Software only or Software w /hardware Mainframe / Distributed / both Primary Business Area Served High / Medium / Low based on criticality Existing Recovery Time Objectives Existing Recovery Point Objectives Existing Availability Objectives Service level agreement (if any) Dev / Prod / Obsolete Weekend change window for planned activities Max. no. of hours available in a given change window Is Application time zone sensitive? (Applicable if target data center is in a different Time Zone) Planned retirement / sunset date for the application (if any) Dependent Shared hosting environment (if any) Dependent Shared databases (if any) 3.3 Infrastructure Profile The objective of capturing infrastructure profile of each application is to Understand the size and complexity of application s physical environment Geographical foot print Type of hardware and software that has been deployed Any unique security & appliance requirements Dependency of Enterprise Shared Infrastructure External Vendor communication dependencies Infosys ebook 9

10 Below table illustrates some of the key infrastructure parameters an application that would be helpful in further due-diligence for Data Center Migration. Particular App Databases Appliances Individual Servers Network Shared Databases Shared Servers Software Storage Description Database instance Database name Database Role (Production / DR / Test / Dev) Database Server Hostname Database Vendor (Oracle / SQL / Sybase etc.) Appliance Category (Shared / Dedicated) Appliance Name (e.g. Data Power, Security devices etc.) Appliance Type (Facilities / Network / Security etc.) Appliance Vendor, Model Hardware Model Hardware Vendor Hostname Local Disk size Location (City, Rack location etc.) No. of CPUs OS Type (Linux, Unix, Windows etc.) OS Version RAM Server DR Partner Hostname (if any) Server HA cluster Partner (if any) Server Role (Test / Dev / Production / DR) Server Type (Web / App / DB) Virtualization status (Virtualized / Not virtualized) Any other specific network hardware solely deployed for the application Associated Security Zone (if any) IP address Network Traffic volume (Low / Medium / High) Third Party Circuit Details Brief description about the dependent Shared Database Location (City, Rack location etc.) Shared Server / Hosting environment name Number of licenses Software Name Software Role (Backup / Monitoring / Remote connection etc.) Software Vendor & Version Any other specific storage hardware solely deployed for the application Backup Type (Tape / Disk-to-Disk / DAS) External SAN storage size (if any) Local Disk Size Replication Type (synchronous / asynchronous) Storage Tier (if Hierarchical storage exists) 10 Infosys ebook

11 3.4 Application Interdependencies Today s complex application architectures interface with large number of other Enterprise & business applications. Migrating complete / partial application infrastructure to another data center does not only need a due-diligence from all the facets of application in question, but also need a thorough assessment of its impact to other interfacing applications. This analysis would assist in first understanding the existing interdependencies and then in evolving appropriate Move Bundles. Some Applications may be able to tolerate the unavailability of some non-critical interdependencies during migration window. However many other critical interfaces such as Real time business critical data processing may require that such applications be bundled together for the purpose of migration. Following table illustrates some of the critical parameters to assess Application Interdependencies: Particular Interface Name Related Application Initiator Description Direction Layer Making Connection Latency Sensitivity Protocol Bind Environment Frequency of Access Tolerance for unavailability Integration Type Description Name of the interface Unique Application Identifier of the interfacing Application Application / Bound Application A brief description of the interface Direction of dependency (Inbound / Outbound / Both) Web / Application / Database Layer Yes (If tolerance is < 50 ms, No if tolerance is > 50 ms) HTTP / SOAP / NDM / FTP etc. Specify if dependency exist with Mainframe / distributed / both component /s. (Applicable if Applications have both Mainframe and distributed components.) Daily Batch, Real-time, Adhoc etc. Can process without impact / Can process with impact / cannot process at all Provides Information & Support to / Receives information & depends on / Is a component of 3.5 Current Facilities Profile In order to plan the capacity & nature of facilities environment needed in the target data center viz. Floor Space, Number & Type of Racks, Power, Power Distribution system, Network & Storage Cabling, Air-conditioning systems etc. it is important to conduct an assessment of source data center facilities infrastructure. The utilization and pain points (if any) in existing facilities will provide meaningful data to plan capacity, distribution & design of target data center facilities. A mapping between the IT Infrastructure profile (hardware devices deployed), allocated facilities capacity, utilization patterns, Assessment of past outages, shortcomings provides information about: Total Allocated UPS power, % utilization (peak & average) Battery backup time BTUs of Heat dissipated by different hardware Distribution pattern of dissipated heat based on Server rack layout and hardware mounted in each rack. Any hot spots needing extra cooling, suction of heat / redistribution of hardware dissipating heat to racks where enough cooling is available etc. Any issues with cooling distribution such as Air flow blockages / Low Air pressure Energy consumption patterns Handling capacity of PDUs, % utilization Any Single points of failure Any capacity bottlenecks Infosys ebook 11

12 4 Business Service Reviews (BSR) It is very important to understand the service level expectations defined by business to ensure that all Data Center Migration Planning, Build & Test work is base lined in view of the same. 4.1 Why do we need to conduct BSR? Business Service Reviews are intended to seek answers to following illustrative questions so that most appropriate / cost effective Service level objectives are defined / agreed at. What level of availability does your business require? How much data is the business willing to lose in a catastrophic event? How will you mitigate data loss? How much revenue will be lost or additional expenses incurred by an unscheduled system outage for different durations (i.e. 10 minutes, half hour, one hour, etc.)? Is this financial impact more likely to be felt during certain peak processing times? If so, what are the peak periods? What hard processing commitments do we have to external agencies or trading partners that are critical? What is your customer s tolerance for this service not being available? What reputation risk or regulatory consequences are at stake for certain processing commitments? Business Partners should be educated to appropriately gauge the target state Service Level objectives for their Business Services. Following concepts about availability and recoverability should be made clear before seeking these Service level objectives. Availability is different from Disaster Recovery. Availability provides for recovery from localized routine or non-routine events, with potential end-user impact. Disaster Recovery involves recovery between data centers following catastrophic/extraordinary events, with certain end-user impact from a disruption in service. The business lens used for what would be reasonable to accept in a true disaster (Recoverability) has no relevance in normal processing (Availability). Recoverability has both a technology and business operations component The technology will recover the application to the RPO and then the individual business unit will need to recover lost transactions. Application interdependencies will need to be clearly understood to accurately assign both the AO and RPO. 12 Infosys ebook

13 Exhibit A below demonstrates differences between Availability & Recoverability. Based on this understanding, the ultimate goal of this exercise is to capture RPO, AO & RTO values for the target state so that Application & Infrastructure design activities can be based on these business requirements. In the next section we will understand the definitions of these Service level objectives and how typically these objectives are classified in an organization. Infosys ebook 13

14 4.2 Application - Recovery Point Objective Recovery Point Objective (RPO) is defined as the maximum amount of active transaction data, expressed in units of time, which may be irretrievably lost before a disaster event in order to meet business requirements. Some applications can handle up to 24 hours or more of data loss in the event of a true disaster, while others require near zero data loss. Below table illustrates how typically Recoverability Objectives are defined for each application. These will be utilized while defining the target state and further in Bundling of Applications for creating move groups. RPO Typical Use Notes A - Up to 15 minutes of data loss Transaction Processing Applications RPO standard for critical (Target: 15 minutes) applications B - greater than 15 min and less than 24 hours (Targets: 1 hour, 4 hours, 8 hours, or 16 hours) C - Equal to or greater than 24 hours of data loss (Targets: 24 hours or 48 hours) Data Warehouses Departmental Applications Minimal data loss via hardware based data replication solutions Intra-day snapshots or platformspecific data replication solutions Target data loss of less than 24 hours RPO Standard for non-critical Applications Impact - up to 2 business days of data loss X - Not Applicable Pass-Through applications Applications do not store any business data, database, or file structures Z - Near Zero data loss Third- Party custom solution, e.g. Wire Transfer System Custom IT solution Requires completing Exception Process for approval 4.3 Application - Availability Objective Availability Objective (AO) is defined as the ability of a component or service to perform its required function at a stated instant or over a stated period of time. In determining the most appropriate/cost effective Availability Objective, the following business considerations must be addressed: How much revenue will be lost or additional expenses incurred by an unscheduled system outage for different durations (i.e. 10 minutes, half hour, one hour, etc.)? Is this financial impact more likely to be felt during certain peak processing times? If so, what are the peak periods? What hard processing commitments do we have to external agencies or rading partners that are critical (i.e. Fed deadline or Balance Reporting)? What is your customer s tolerance for this service not being available? What reputation risk or regulatory consequences are at stake for certain processing commitments 14 Infosys ebook

15 Below table illustrates how typically Availability Objectives are defined for each application. These will be utilized while defining the target state and further in Bundling of Applications for creating move groups. App Category Platinum Overall Service Availability Greater then 99.95% Monthly Availability (22 minutes / month unavailable) Gold Between 99.9% % Monthly Availability (44 minutes / month unavailable) Silver Bronze Between 99.5% % Monthly Availability (3.65 hours / month unavailable) Between 99.0% % Monthly Availability (7.3 hours / month unavailable) Peak Service Availability 100% Monthly Availability (zero minutes / month unavailable) 99.95% Monthly Availability (22 minutes / month unavailable) 99.9% Monthly Availability (44 minutes / month unavailable) 99.5% Monthly Availability (3.65 hours / month unavailable) Scheduled Service Outage No scheduled outages (changes can be made w/o customer impact) Infrequently scheduled outages (ex quarterly) Regularly scheduled outages (ex monthly) Regularly scheduled outages (ex monthly) Service Restoration 2 minutes to restore application / service 1 hour to restore application / service 2 hours to restore application / service 6 hours to restore application / service Targeted Solution 2 completely independent Production environments Fully redundant Production environment with no single points of failure Partially redundant Production environment with some single points of failure Single Production environment with no redundancy Business Need Objective Used for Extremely Time Critical Products or Services. Used for Highly Time Critical Products or Services Used for Important Products or Services that need Intraday Support Used for Products or Services that are not Intraday Time Critical 4.4 Application - Recovery Time Objective Recovery Time Objectives (RTO) represents the expectations of how much time can elapse after a business interruption until the process or application needs to be restored. Typically, the Business Continuity Planning Group works with partners in the lines of business and technology to ensure each system/application has an RTO assigned reflective of the criticality of the business services delivered. Depending on the level of RTOs, appropriate technologies, processes, roles and responsibilities are laid to ensure that applications / business services can recover from a disaster in a given time frame. E.g. in table below, an RTO 1 (i.e. lowest in criticality from RTO standpoint) may require only a warm / cold DR and thereby save energy, rack space maintenance costs. In such cases, sufficient time is available to make technology & configuration changes to turn warm / cold DR infrastructure into production without compromising on RTO objectives. Similarly, an RTO 5 application is deemed as a critical application with a very little time to recover from a disaster. Applications with RTO 5 may need a hot DR with automated failover technologies in place since no human intervention is expected to recover such mission critical applications from a disaster. Infosys ebook 15

16 RTO RTO 5 RTO 4 RTO 3 RTO 2 RTO 1 Duration (Tolerable Time to Recover) 0-4:59 hours 5-24:59 hours 25-72:59 hours (1-3 days) hours (4-7 days) Greater than 168 hours (more than 1 week) So, the Availability and Recoverability objectives for an application drive the mechanisms to be put in place to ensure that business services supported on that application are being provisioned as per expectations and to prevent outages. Selection of appropriate technologies to meet these service level objectives has been discussed further in the target state design process where deployment patterns are explained in detail. 4.5 High Level Cost estimation The cost discussion in Business Service Reviews (BSR) is needed to set expectations on what sort of changes in cost the business can expect to see based on the target data center configuration. This is also necessary to support decision making around the appropriate Availability and Recovery objectives. The Availability & Recoverability objectives defined by business translate to the level of High Availability & Data Protection technologies to be implemented on Servers, Network & Storage environment. Therefore, Enterprises generally attach standard costs on the basis of type of hardware, selected Availability & Recoverability objectives for planning purposes. At this point in the program we are not aiming for actual Bill of Material / target state costs as those will be assessed towards the end of Target State Application & Infrastructure design. The objective to undergo this high level estimation is to ensure that business understands: Selecting a higher AO, RPO, and RTO values for the target state would translate to a certain standard cost levels If business wants to revisit selected service level objectives, they are prompted to do so before proceeding with detailed Application & Infrastructure Design activities for target state. Seek sign-off prior to detailed target state design. In general, key components of Cost Data are described as below: Recurring Expenses Illustrative Expenses that business would see as recurring, as a result of Data Center Migration include: Data retention and recovery Server support Network chargeback s Server system administration chargeback s One-Time Expenses Illustrative Expenses that business would see as one-time, as a result of Data Center Migration include: Approximate cost of new servers, and other hardware associated with new data center configuration Approximate cost of the Data Center Migration Move project and associated application testing. 16 Infosys ebook

17 5 Application & Infrastructure Design Target Data Center Application & Infrastructure design for the target state is based on multiple parameters such as business defined service level objectives, Enterprise IT Hardware & Software standards, opportunities for Infrastructure optimization, Data Center efficiencies and reduction in IT costs. In general, Target Application & Infrastructure Architecture is designed keeping in mind: Current & Target Availability, Recovery Time & Recovery Point Objectives Status of Applications (Development, Production, Sunset, Obsolete etc.) Retiring Hardware & Software requiring technology refresh Dependencies on Shared Hosting environments / Shared Databases. Storage requirements Virtualization & Consolidation opportunities Existing single points of failure Capacity, Performance & Scalability requirements Network & Security requirements External Vendor communication requirements Supported Vendor products & technologies Latency Sensitivity Analysis (in view of revised network routes connecting to Target Data Center) Target State Application & Infrastructure design would consist of following components that are discussed further in detail as we follow: Design Layer Core Infrastructure Layer Shared Services Layer Application Layer Definition of Deployment Patterns Description Target Data Center Facilities requirements (Space, Power, Cooling, Cabling etc.) Target Data Center Rack Layout Core Network, Security & Storage Infrastructure design Enterprise Shared Services (Authentication, Shared Databases, Messaging, Internet, Monitoring & Management systems etc.) Application Architecture at target state (in view of capacity, scalability, BSR expectations) Individual Application specific Hardware, Software requirements Selection of appropriate technologies to ensure Availability, Data protection at Target Data Center in-line with BSR expectations) 5.1 Core Infrastructure Design Assessment of the Source Data Center environment carried out earlier provides all the necessary high level indications to the scale, size, and type of hardware that will be built / moved to the target data center. Although, a detailed application level design is not available at this point in the program, the design and build out of Core Infrastructure layer needs to occur in parallel / prior to the actual application Infrastructure build, for obvious reasons. For capacity planning purposes, current state analysis along with all known considerations would help in estimation of: Number of racks of each category based on power ratings / cooling requirements / physical size of hardware to be deployed Power & Cooling requirement based on expected number of Servers, Network & Storage devices to be hosted in the target data center. Type & capacity of network & security hardware to be deployed Overlaying technologies to be deployed SAN / NAS / DAS / Backup Hardware & technologies to be deployed Infosys ebook 17

18 Enterprise Technology standards are followed in creating a skeleton of Infrastructure layer such as standard hardware, Core Distribution Access framework for aggregation & Distribution of Network & Storage traffic, deployment of security zones to host different applications / services in a systematic fashion, setup of Monitoring & Management framework to enable proactive monitoring, troubleshooting and administration of Core infrastructure. Core Infrastructure is not only designed to accommodate the present IT requirements, but also to accommodate business growth projections of the enterprise in the near future. So, Core Infrastructure should be flexible, modular, scalable & capable of meeting varying service level objectives defined by business for different applications. Below is an illustrative exhibit showing Core Infrastructure components. 18 Infosys ebook

19 5.2 Enterprise Shared Services Design Enterprise shared services serve as common service infrastructure for all the other business applications of the organization. As, a large number of applications utilize enterprise shared services for their full functionality, it is logical to design and build them prior to actual application migration e.g. Authentication, Authorization, DNS, Messaging, Monitoring, Antivirus, Security Services etc. Following are some of the parameters that should considered while planning the capacity of shared services infrastructure at target data center. Enterprise vision on selection of Shared Services technologies to be deployed at the target data center Number of Intranet / Internet / VPN users accessing different shared services in the source data center Expected number of Intranet / Internet / VPN users accessing these shared services in the target data center (based on growth trends) Expected Differences in IT workload on various systems & associated hardware & software sizing. Number of network hosts / mailboxes / backup clients / security zones / DNS zones etc. needed in the target data center based on Applications & Business Services being migrated to the target data center. Geographical locations from where shared services at target data center will be accessed, performance requirements thereof. Any additional shared services that can enhance the value to services offered by business should be considered in the target state architecture. Criticality of Shared Services planned to be offered to serve business needs. These services should be evaluated for appropriate Service Level Objectives (AO, RPO, RTOs). So that, their resiliency & data protection is planned accordingly. Explore opportunities to conduct a technology refresh in the target state if any of the Shared Services at Source Data Center are running on near End of Life Hardware / Software. Network, Server, Storage & Database Monitoring requirements in the target data center. Shared Database requirements (e.g. Oracle Grid, SQL cluster etc.) Shared hosting requirements (e.g. Shared Web / Application Server farms) 5.3 Application Re-Architecture As needed Re-architecture of certain applications is needed on a case to case basis. Based on the current state analysis of certain Applications, it may be need to make revisions to their logical architecture. Some of the illustrative reasons are: End of life of associated Hardware / Software / both. Consolidation of applications for cost optimization Rationalization & Consolidation of databases / Business application logic e.g. reduced individual application related database instances and moving towards utilization of Shared Databases / Application hosting farms. Feature Upgrades to cater new business scenarios OS / DB Platform Migration requirements e.g. Mainframe to Distributed or DB2 to Oracle etc. Changes to application interdependencies in target state that pose an impact on application architecture New security requirements in the target state data center.e.g. Enterprise strategy might enforce maintaining Application & DB Servers in different Tiers based on certain parameters in Application profile. Any latency intolerance with other dependent applications triggering an architectural change to mitigate the same. Requirements to adhere to any new Enterprise Standards in the target state. Infosys ebook 19

20 5.4 Selection of Deployment Model / Patterns Infrastructure Perspective Generally, large enterprises follow certain guiding principles to categorize level of redundancy, reliability & data protection to its physical deployment. These guiding principles enable a standard way of deploying applications in a data center configuration. Moreover, these patterns help for a better co-ordination between IT and Business in terms of identifying what infrastructure IT needs to provision in order to provide a certain grade of service to the business users. From a data center migration standpoint, selection of deployment patterns may be needed to either enhance or optimize the infrastructure implementation in the target state. e.g. in the source data center if a lower criticality RTO / RPO application has been deployed with unnecessary redundancies, there may be a potential to optimize the infrastructure deployment in the target state. Similarly, if the current business conditions require an upgrade to RTO / RPO of an application, it may mean deployment of additional availability infrastructure or implementation of other technologies to facilitate quicker data retrieval / better performance / zero human intervention / elimination of any other points of failure etc. Service Level Objectives defined by the business & Application-level design principles need to be applied to databases, messaging servers, application servers, web servers, and nearly any other type of workload. The deployment architecture should consider the High Availability requirements (based on Availability objectives) and Data protection requirements (based on the Recovery Point and Recovery Time Objectives). As a result, three popular deployment patterns can be derived: Active-Passive failover Active-Active failover Load Balanced Active-passive failover: This model works for nearly all application types, including databases, application servers, web servers, and messaging servers. Cluster management software (such as Microsoft Cluster Service or VERITAS Cluster Server) detects either a software or hardware failure on one node in the cluster and starts that workload on the idle node, allocating the failed node s IP address to the takeover node Active-active failover: This model also works for nearly all application types, since it is essentially just a variation on the active-passive failover model above. All nodes in the cluster are running applications, with enough reserve capacity across all of them to take over workloads from a failed node. Cluster management software monitors all nodes and services in the cluster and enables for migration of services from failed nodes to active nodes. As with active-passive failover, applications that maintain state with a client application or end user will lose any data not committed to disk at the time of failure. 20 Infosys ebook

21 Refer to below illustrative high availability patterns. h. Active Server at Production & Active / Passive at DR site i. Active Server Cluster at Production & Active / Passive Server Cluster at DR site Load balancing This model works for both stateless and stateful applications and can be used for web servers, application servers, messaging servers, database servers, and software developed in-house. Although load balancing may not always be feasible, where it can be implemented it provides a very high level of resiliency, performance, and can also provide a point-of-presence advantage for some applications. Stateless applications Multiple nodes in a cluster run the same application. Load balancing can be easily implemented at the network layer. Stateful applications without session state replication Affinity must be maintained between a particular client and a particular host in the cluster for the duration of the session. This can be done at the network layer with specially configured load balancers, or at the application layer. a. Load Balancing between Production & DR servers in two data centers Infosys ebook 21

22 b. Load Balancing between Production & DR Server Clusters in two data centers 5.5 Application specific Infrastructure Design At this point, we are ready to design application specific infrastructure requirements. Following list describes the various components that need to be looked at to evolve an application s infrastructure architecture: Logical Application Architecture Physical deployment architecture in the source data center Appropriate Physical Deployment Model for the target state Individual Servers & Databases Associated with an application Application specific software requirements Application specific appliances Application specific LAN/ WAN & Third Party network connectivity requirements Network Performance / Latency Sensitivity assessment (This will help in feasibility assessment / impact analysis & mitigation planning for moving an application from source to target data center) Application specific External Storage & Backup requirements Any client software needed on application specific servers to access Enterprise shared services 22 Infosys ebook

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

HP StorageWorks Data Protection Strategy brief

HP StorageWorks Data Protection Strategy brief HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,

More information

Informatica MDM High Availability Solution

Informatica MDM High Availability Solution Informatica MDM High Availability Solution 1 Executive Summary Informatica MDM Hub supports a number of different approaches to providing a highly available solution. Our use of the term highly available

More information

Contents. SnapComms Data Protection Recommendations

Contents. SnapComms Data Protection Recommendations Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery

More information

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

June 2009. Blade.org 2009 ALL RIGHTS RESERVED

June 2009. Blade.org 2009 ALL RIGHTS RESERVED Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Integrated Application and Data Protection. NEC ExpressCluster White Paper

Integrated Application and Data Protection. NEC ExpressCluster White Paper Integrated Application and Data Protection NEC ExpressCluster White Paper Introduction Critical business processes and operations depend on real-time access to IT systems that consist of applications and

More information

The Benefits of Virtualizing

The Benefits of Virtualizing T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi

More information

Eliminate SQL Server Downtime Even for maintenance

Eliminate SQL Server Downtime Even for maintenance Eliminate SQL Server Downtime Even for maintenance Eliminate Outages Enable Continuous Availability of Data (zero downtime) Enable Geographic Disaster Recovery - NO crash recovery 2009 xkoto, Inc. All

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

Cloud Computing Disaster Recovery (DR)

Cloud Computing Disaster Recovery (DR) Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you

More information

Introduction to Database as a Service

Introduction to Database as a Service Introduction to Database as a Service Exadata Platform Revised 8/1/13 Database as a Service (DBaaS) Starts With The Business Needs Establish an IT delivery model that reduces costs, meets demand, and fulfills

More information

Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER

Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Table of contents INTRODUCTION...1 BMC REMEDY AR SYSTEM ARCHITECTURE...2 BMC REMEDY AR SYSTEM TIER DEFINITIONS...2 > Client Tier...

More information

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

Eliminating End User and Application Downtime:

Eliminating End User and Application Downtime: Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous

More information

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE

More information

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

Capacity Plan. Template. Version X.x October 11, 2012

Capacity Plan. Template. Version X.x October 11, 2012 Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Disaster Prevention and Recovery Architecture

Disaster Prevention and Recovery Architecture RMI Risk Masters, Inc. Disaster Prevention and Recovery Architecture A Presentation for Disaster Recovery Planning Professionals Steven J. Ross Executive Principal Risk Masters, Inc. New York, NY 1 Abstract

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Non-Stop Hadoop Paul Scott-Murphy VP Field Techincal Service, APJ. Cloudera World Japan November 2014

Non-Stop Hadoop Paul Scott-Murphy VP Field Techincal Service, APJ. Cloudera World Japan November 2014 Non-Stop Hadoop Paul Scott-Murphy VP Field Techincal Service, APJ Cloudera World Japan November 2014 WANdisco Background WANdisco: Wide Area Network Distributed Computing Enterprise ready, high availability

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

IT Labor (Hourly Billable) Data Base Hosting

IT Labor (Hourly Billable) Data Base Hosting Cost Pool Definitions for Information Technology (IT) Services FY16/17 (Effective July 1, 2015) IT Labor (Hourly Billable) B/A 1365 - Programmer/Developer: EITS provides a variety of software development

More information

Documentation for data centre migrations

Documentation for data centre migrations Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed

More information

Downtime, whether planned or unplanned,

Downtime, whether planned or unplanned, Deploying Simple, Cost-Effective Disaster Recovery with Dell and VMware Because of their complexity and lack of standardization, traditional disaster recovery infrastructures often fail to meet enterprise

More information

SERVICE SCHEDULE DEDICATED SERVER SERVICES

SERVICE SCHEDULE DEDICATED SERVER SERVICES SERVICE SCHEDULE DEDICATED SERVER SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a

More information

High Availability for Citrix XenApp

High Availability for Citrix XenApp WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...

More information

Mark Bennett. Search and the Virtual Machine

Mark Bennett. Search and the Virtual Machine Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business

More information

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers

More information

Fax Server Cluster Configuration

Fax Server Cluster Configuration Fax Server Cluster Configuration Low Complexity, Out of the Box Server Clustering for Reliable and Scalable Enterprise Fax Deployment www.softlinx.com Table of Contents INTRODUCTION... 3 REPLIXFAX SYSTEM

More information

Modern Data Centers: Creating a New Value Proposition

Modern Data Centers: Creating a New Value Proposition Modern Data Centers: Creating a New Value Proposition América Latina 2008 Inter-secretarial Commission for the Development of Electronic Government Mexico City 24 May 2013 Data Center Consolidation Consolidating

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

Technology Insight Series

Technology Insight Series Evaluating Storage Technologies for Virtual Server Environments Russ Fellows June, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved Executive Summary

More information

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010 Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper October 2010 Disclaimer The following is intended to outline our general product direction.

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

OPTIMIZING SERVER VIRTUALIZATION

OPTIMIZING SERVER VIRTUALIZATION OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)

More information

Product Overview. UNIFIED COMPUTING Managed Hosting - Storage Data Sheet

Product Overview. UNIFIED COMPUTING Managed Hosting - Storage Data Sheet Product Overview Interoute offers a range of managed storage solutions to provide the best fit for our customers budget, capacity, performance and compliance needs. By taking advantage of our unrivalled

More information

Cloud Hosting. Quick Guide 7/30/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved.

Cloud Hosting. Quick Guide 7/30/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. Cloud Hosting Quick Guide 7/30/15 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Cloud Hosting Service Positioning INCREASE AGIILTY, REDUCE COMPLEXITY & COST

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

Building a better branch office. www.citrix.com

Building a better branch office. www.citrix.com Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch

More information

Client Study Portfolio

Client Study Portfolio Client Study Portfolio Client Study 1: UK District Council A re-architecture of the client s RAC Environment and full 24/7 support of the client s database systems thereafter has eliminated the risk of

More information

Reduce your data storage footprint and tame the information explosion

Reduce your data storage footprint and tame the information explosion IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive

More information

Vodacom Managed Hosted Backups

Vodacom Managed Hosted Backups Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

Server and Storage Virtualization with IP Storage. David Dale, NetApp

Server and Storage Virtualization with IP Storage. David Dale, NetApp Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this

More information

Module: Business Continuity

Module: Business Continuity Upon completion of this module, you should be able to: Describe business continuity and cloud service availability Describe fault tolerance mechanisms for cloud infrastructure Discuss data protection solutions

More information

be architected pool of servers reliability and

be architected pool of servers reliability and TECHNICAL WHITE PAPER GRIDSCALE DATABASE VIRTUALIZATION SOFTWARE FOR MICROSOFT SQL SERVER Typical enterprise applications are heavily reliant on the availability of data. Standard architectures of enterprise

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

How AWS Pricing Works

How AWS Pricing Works How AWS Pricing Works (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction... 3 Fundamental

More information

Top 5 reasons to virtualize Exchange

Top 5 reasons to virtualize Exchange Top 5 reasons to virtualize Exchange Siegfried Jagott Modern Data Protection Built for Virtualization Introduction This white paper presents the top five reasons to virtualize Microsoft Exchange Server

More information

Fujitsu Private Cloud Customer Service Description

Fujitsu Private Cloud Customer Service Description Fujitsu Private Cloud Customer Service Description Fujitsu Private Cloud forms part of Fujitsu Hybrid IT portfolio to address the full range of Customers requirements and business needs by providing agility

More information

Improving availability with virtualization technology

Improving availability with virtualization technology Improving availability with virtualization technology Renata Budko Solutions Marketing Manager VMware, Inc Why focus on business continuity In the previous years backup & recovery was best effort Today

More information

How AWS Pricing Works May 2015

How AWS Pricing Works May 2015 How AWS Pricing Works May 2015 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction...

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

Virtualizing Exchange

Virtualizing Exchange Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange

More information

NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions

NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions 1 NEC Corporation Technology solutions leader for 100+ years Established 1899, headquartered in Tokyo First Japanese joint

More information

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office

More information

Best Practice of Server Virtualization Using Qsan SAN Storage System. F300Q / F400Q / F600Q Series P300Q / P400Q / P500Q / P600Q Series

Best Practice of Server Virtualization Using Qsan SAN Storage System. F300Q / F400Q / F600Q Series P300Q / P400Q / P500Q / P600Q Series Best Practice of Server Virtualization Using Qsan SAN Storage System F300Q / F400Q / F600Q Series P300Q / P400Q / P500Q / P600Q Series Version 1.0 July 2011 Copyright Copyright@2011, Qsan Technology, Inc.

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

ILM: Tiered Services & The Need For Classification

ILM: Tiered Services & The Need For Classification ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

Disaster Recover Challenges Today

Disaster Recover Challenges Today S O L U T I O N S O V E R V I E W Disaster Recovery Solutions from VMware Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery Disaster Recover

More information

Migrating from Unix to Oracle on Linux. Sponsored by Red Hat. An Oracle and Red Hat White Paper September 2003

Migrating from Unix to Oracle on Linux. Sponsored by Red Hat. An Oracle and Red Hat White Paper September 2003 Migrating from Unix to Oracle on Linux Sponsored by Red Hat An Oracle and Red Hat White Paper September 2003 Migrating from Unix to Oracle on Linux Executive Overview... 3 Unbreakable Linux and Low-Cost

More information

Top 10 Disaster Recovery Pitfalls

Top 10 Disaster Recovery Pitfalls Top 10 Disaster Recovery Pitfalls The key to successful disaster recovery is good planning. But with so much at stake for your business, how do you plan with confidence and ensure all stakeholders know

More information

SYMMETRY WHITE PAPER. Business Continuity & High Availability Options. Adam Shane

SYMMETRY WHITE PAPER. Business Continuity & High Availability Options. Adam Shane SYMMETRY WHITE PAPER Business Continuity & High Availability Options Adam Shane Introduction Today, more than ever, security is a mission critical business component. This is not only true for our customers

More information

Hybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments

Hybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments Hybrid Cloud Backup and Recovery Software Virtualization Support Asigra Inc. 1120 Finch Avenue West, Suite 400 Toronto, ON Canada M3J 3H7 tel: 416-736-8111 fax: 416-736-7120 email: info@asigra.com www.recoveryourcool.com

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Applied Technology Abstract Microsoft SQL Server includes a powerful capability to protect active databases by using either

More information

End-to-End Availability for Microsoft SQL Server

End-to-End Availability for Microsoft SQL Server WHITE PAPER VERITAS Storage Foundation HA for Windows End-to-End Availability for Microsoft SQL Server January 2005 1 Table of Contents Executive Summary... 1 Overview... 1 The VERITAS Solution for SQL

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software

More information

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c An Oracle White Paper January 2013 A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c TABLE OF CONTENTS Introduction 2 ASM Overview 2 Total Storage Management

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

High Availability Database Solutions. for PostgreSQL & Postgres Plus

High Availability Database Solutions. for PostgreSQL & Postgres Plus High Availability Database Solutions for PostgreSQL & Postgres Plus An EnterpriseDB White Paper for DBAs, Application Developers and Enterprise Architects November, 2008 High Availability Database Solutions

More information

WANT TO SLASH DOWNTIME? FOCUS ON YOUR SERVER OPERATING SYSTEM

WANT TO SLASH DOWNTIME? FOCUS ON YOUR SERVER OPERATING SYSTEM WANT TO SLASH DOWNTIME? FOCUS ON YOUR SERVER OPERATING SYSTEM Ask any IT executive their biggest day-to-day fear, and they ll likely tell you something about reducing or even eliminating downtime. Not

More information

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ 9318; 5 Days, Instructor-led CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

Softverski definirani data centri - 2. dio

Softverski definirani data centri - 2. dio Softverski definirani data centri - 2. dio Vmware NSX To Deliver a Software Defined Data Center Implementation Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information