Capacity Plan. Template. Version X.x October 11, 2012
|
|
|
- Denis Matthews
- 10 years ago
- Views:
Transcription
1 Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business demands.
2 Company Name Street Address 1 Street Address 2 City Zip/Postal Code Country Tel: +xxx-x-xxx-xxxx Fax: + xxx-x-xxx-xxxx Last edited: 11 October 2012 Copyright 11 October 2012 [Company]. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission from [Company]. All copyright, confidential information, patents, design rights and all other intellectual property rights of whatsoever nature contained herein are and shall remain the sole and exclusive property of [Company]. The information furnished herein is believed to be accurate and reliable. However, no responsibility is assumed by [Company] for its use, or for any infringements of patents or other rights of third parties resulting from its use. The [Company] name and [Company] logo are trademarks or registered trademarks of [Company]. All other trademarks are the property of their respective owners Document Name: Company All rights reserved. Page 2 of 40
3 Version: Revision Date [Date] Sign-Off / Approved By [Name] [ ] [Telephone] Signature Date Sign-Off / Approved By [Name] [ ] [Telephone] Signature Date Sign-Off / Approved By [Name] [ ] [Telephone] Signature Date Revision History Rev # Revision Update Revised By Date Document Name: Company All rights reserved. Page 3 of 40
4 Table of Contents 1 Introduction PURPOSE BACKGROUND SCOPE SYSTEM IDENTIFICATION METHODS USED ASSUMPTIONS CONSTRAINTS RISKS ISSUES BUSINESS SCENARIOS OBJECTIVES & RATIONALE POINTS OF CONTACT Approach to Capacity Management Analysis of Capacity SERVICE CAPACITY SUMMARY RESOURCE CAPACITY SUMMARY Business Volume Requirements Production Environment Servers SERVER CAPACITY REQUIREMENTS PROCESSING CAPACITY REQUIREMENTS MEMORY REQUIREMENTS DISK CAPACITY REQUIREMENTS Desktop Client Machines SPECIFICATIONS PROCESSING REQUIREMENTS Network Capacity BANDWIDTH REQUIREMENTS Document Name: Company All rights reserved. Page 4 of 40
5 8 Findings Summary User Profile Usage Scenarios SCENARIO SCENARIO Load Matrix Estimated Growth NETWORK TRAFFIC IMPACT System Reserves Component Capacity Monitoring and Metrics SYSTEM MONITORING COMPONENT #1 MONITORING COMPONENT #2 MONITORING Intervention Thresholds Intervention Plan Compliance Planning Cost Management Recommendations Appendix A: References Appendix B: Acronyms, Abbreviations & Definitions Page 5 of 40 Document Name: Company All rights reserved
6 1 Introduction In this document, please note that gold text in the Instructions style (such as this) is designed to assist the person writing the document and should be removed from the final version of the document. This text should be modified to reflect any customization of the template. In addition, we have designed this template so that, if you need to capture a very complicated set of instructions, then you can use this template to cover most all aspects of the plan. Likewise, if your projects are on a smaller scale, then you can edit the document to suit your project. The Normal style (text in black) should be used by the author when adding text and describing the business environment. Introduce the document by providing a high-level summary of this plan, highlighting the main issues, options, recommendations, and costs. You can also provide a brief background of the following items: Your company s current levels of capacity Current problems or anticipated issues due to lack of capacity Degree to which the service levels (SLAs) are being achieved 1.1 Purpose Outline the purpose of this, for example: This is an integral part of infrastructure and deployment planning. It supports the goal of optimum, and cost effective provisioning of resources and services by aligning them to business demands. This document provides an estimate of the IT resources required to support the functionality and performance requirements of the <system> at full operating capacity. This estimate is derived using observations from the current production system and running load and/or stress tests in a similar environment. This capacity plan also addresses the database server, application server, web services server, reporting server and storage requirements. If 3 rd Party software tools are used as part of the solution, it is suggested that their technical documentation and optimal suggestions be included in this document. This document is used to: Help components perform as efficiently as possible and accommodate reasonable growth Describe the system capacity requirements for new systems and applications in <company name> s architecture at production cutover Ensure that infrastructure components are capable of performing all required functions Identify and reduce inefficiencies associated with under-utilized resources Provide a technical reference for team members working on <Project Name> Provide satisfactory service levels in a cost-efficient manner <<Begin Text>> Document Name: Company All rights reserved. Page 6 of 40
7 1.2 Background Briefly summarize the conditions that created the need for this capacity plan, for example, the budgeting systems for the entire organization have been standardized or other decisions that triggered this plan into action. <<Start text here>> 1.3 Scope Identify the IT services and equipment your company intends to add or replace within the scope of this capacity plan to maintain or improve the IT services. For example: This addresses the following IT services: Bandwidth Requirements Desktop Client Machines Disk Capacity Requirements Memory Requirements Network Capacity Processing Capacity Requirements Production Environment Servers Server Capacity Requirements This document is applicable to the following data centers: <Data Center Name> <Data Center Name> 1.4 System Identification Provide a full identification of the system to which this document applies, including, as applicable, identification number(s), title(s), abbreviation(s), version number(s), and release number(s). Identification Details Name: <Enter the project s formal name or N/A> Project #: <###> Project Sponsor: <Identify the project sponsor> Priority: H/M/L Requestor: Start Date: <Identify who requested this document to be developed> <Enter the preferred start date (mm/dd/yyyy)> Page 7 of 40 Document Name: Company All rights reserved
8 Cost Estimates [Optional] 1.5 Methods Used Identify where, when, and how you obtained the information provided in this document, such as technical documentation, Service Level Agreements (SLAs), utilization reports, capacity modeling, and workload forecasts. The following methods were used to obtain the information provided in this capacity plan: Method Description Method 1 Method 2 Describe how you obtained the information provided in this document, for example, existing technical documents and SLAs. [Optional] Describe how you obtained other information provided in this document, for example, interviews, sessions, workshops etc 1.6 Assumptions Identify any assumptions regarding the information provided in this document, especially conditions relating to business drivers for capacity and how your calculations were derived. You can also considering assumptions which are beyond the control of the project but may influence its success. Describe assumed factors (as opposed to known facts) that could affect the requirements, for example, third-party or commercial software, operating environment, company policy, or legislation. The project could be negatively affected if these assumptions are incorrect or change during the project lifecycle. The information in this capacity plan is based on the following assumptions: <Sample assumptions & text> Description Server utilization Concurrent Users Performance Optimization Hardware Business Process Assumption The system is performing within the SLA criteria users use the system as of <date>. Performance improvements beyond those implemented in production by <date> have not been considered. Potential improvements in hardware speed have not been considered. Business processes will not be changed. Document Name: Company All rights reserved. Page 8 of 40
9 1.7 Constraints Identify all known constraints. These are conditions on how the system must be designed, built, monitored, and maintained, such as legal requirements, technical standards, or strategic decisions. The most common constraints include external interface requirements and limits on schedules and budgets. For example, a delivery date becomes a constraint only if consequences arise as a result of not meeting the date. The information in this document is based on the following constraints: Constraint Impact 1.8 Risks Identify the business, operational, and technical risks of undertaking this project. Describe any potential risks and issues associated with the development of the proposed system. Highlight other consideration, such as project schedule or resource requirements and other known risks. The carries the following risks: Description Severity Impact Mitigation Actions H / M / L H / M / L H / M / L Cost / Time / Quality Cost / Time / Quality Cost / Time / Quality Page 9 of 40 Document Name: Company All rights reserved
10 1.9 Issues Identify any open issues that have been identified while writing this document. Move resolved issues to the Closed Issues table and keep the issue ID the same Open Issues ID Issue Resolution Responsibility Target Date Impact Date Closed Issues ID Issue Resolution Responsibility Target Date Impact Date 1.10 Business Scenarios Describe the current and expected future business environment. Discuss how your organization currently uses the equipment, hardware, system etc and how it plans to use any new equipment. For example, is the organization transitioning to an open plan office structure or other space redesign that may impact how the software and equipment is used. Also, if equipment is used (or is to be used) at different locations, explain how it is used Objectives & Rationale Describe the key objectives of the. You can retrieve this information from documents that describe the current operational environment as well as business requirements and functional specifications. By defining the objectives you are demonstrating to the reader that you have carefully considered the current operational setup, business requirements, IT solutions, and created a tailored capacity management plan that gives consideration to all these points. Document Name: Company All rights reserved. Page 10 of 40
11 Examples of typical objectives may include: Objective Decrease costs Customer service Rationale Describe how you will decrease costs in a specific business unit Describe how you will improve the responsiveness to internal customer requests Points of Contact Identify the points of contact (POCs) that may be needed by the reader for informational purposes. Role Name Telephone Page 11 of 40 Document Name: Company All rights reserved
12 2 Approach to Capacity Management This chapter helps project stakeholder grasp the key points of the plan, enabling them to understand the essence of the document before examining the details. Sample text: This is prepared using the past and current production performance characteristics. In some cases performance tests are performed in the Load and Stress Test environment for estimating future load on hardware. Testing was performed by simulating future system usage. We have used metrics gathered from these tests as input into the capacity planning model. System usage is measured in terms of the number of use cases (i.e. business process/scenarios) and the number of system users. Hardware utilization is measured in terms of processor capacity, memory and storage needs. Future hardware estimates is dependent on the number of use cases and the number of users. The application server estimates, database server estimates and storage estimates will be updated where required with each capacity plan deliverable. Note that there is a direct correlation between processor utilization and the number of users; as the number of business users increase, the amount of processor utilization increases. Therefore, the amount of processing capability, memory footprint, and storage size will increase as the system scales. Document Name: Company All rights reserved. Page 12 of 40
13 3 Analysis of Capacity This section describes the scenarios analyzed in terms of business process impact so you can accurately determine capacity requirements. Give consideration to scalability, throughput, availability requirements, storage, resource utilization, security, backups, etc and, where appropriate, outline the strategy for developing these scenarios. Describe plans for growth and how they will be addressed and managed. Consider not only the requirements for additional hardware, software, building materials, and space but also where financial funding for these things will come from; additional resource allocation requirements; staffing, training, other expenditures, etc. Expand upon this section by adding/removing additional scenarios if necessary. Capacity Type Current Capacity Expected Growth Recommendations Describe the capacity scenario analyzed. Describe currently available capacity. Describe future and planned growth expectations Discuss recommendations for managing & addressing growth. 3.1 Service Capacity Summary Current and Recent Service Provision Include a service profile that identifies throughput rates and resulting service utilization, e.g., memory, storage space, transfer rates, processor usage, and network usage Capacity Forecasts Describe anticipated short-term, medium-term, and long-term trends in service utilization. The trends should directly relate to the business requirements for new or expanded IT services, and the growth or contraction in the use of existing services. For example, if it is anticipated that additional functional areas will adopt this technology solution, those areas should be listed here with as much information as possible. Page 13 of 40 Document Name: Company All rights reserved
14 3.2 Resource Capacity Summary Current and Recent Resource Usage Provide information on the current throughput and utilization, broken down by hardware platform Resource Forecasts Outline the resources that will be needed to support short-, medium-, and long-term capabilities as identified in the previous section, broken down by hardware platform. Document Name: Company All rights reserved. Page 14 of 40
15 4 Business Volume Requirements Summarize the business metrics that are used in capacity planning the system. The information in this section may have been captured in detail in the Requirements Definition process deliverable. If this is the case, refer to that deliverable here, and summarize the main metrics you will need for the capacity planning analysis. Page 15 of 40 Document Name: Company All rights reserved
16 5 Production Environment Servers Describe the capacity planning for the servers that support the production environment. This is critical part of helping to manage the performance quality of the technical architecture. It helps reduce the risk of capacity shortfall, and any necessary re-architecture or migration to another server before production cutover or during the capacity plan horizon. Capacity Type Current Capacity Expected Growth Recommendations Describe the capacity scenario analyzed. Describe currently available capacity. Describe future and planned growth expectations Discuss recommendations for managing & addressing growth. 5.1 Server Capacity Requirements Describe the database server sizing for the project team s usage of CPUs and RAM. Complete the summary worksheet provided based on what you know about the environment. Future adjustments will be made when more information is available. If you are combining servers on a single platform, do not double count for the same space requirements. Use the DNS name to indicate what platform the server will be running on. Component Server (MB) Server (MB) Server (MB) Server (MB) Server (MB) Server (MB) DNS Name <Name> <Name> <Name> <Name> <Name> <Name> Operating System Swap Space User Directories Document Name: Company All rights reserved. Page 16 of 40
17 Component Server (MB) Server (MB) Server (MB) Server (MB) Server (MB) Server (MB) Documentation Repository Executables Archiving files Temp Space Total Applications Data Output files Total Disk Space 5.2 Processing Capacity Requirements <Outline the processing capacity requirements>. 5.3 Memory Requirements <Outline the memory requirements>. 5.4 Disk Capacity Requirements Describe the disk space requirements for the applications and other software tools required to support your production environment. Update this table with the applications being used on this project. Note that the list of applications provided here is not complete. Delete any products from the list that are not included in the sizing analysis. Software and data included in the sizing analysis are: Application Application #1 Application #2 Application #3 Disk Requirements Identify the disk requirements for this application. Identify the disk requirements for this application. Identify the disk requirements for this application. Page 17 of 40 Document Name: Company All rights reserved
18 5.4.1 Data Converted to System from Legacy Systems If the amount of conversion data is significant, then consider separating the analysis of the conversion data, and reuse it for the disk capacity requirements for the development server that is supporting the conversion work. Document Name: Company All rights reserved. Page 18 of 40
19 6 Desktop Client Machines 6.1 Specifications Use the following table to capture the specifications for the minimum recommended client processing capacity to run your applications. You may want to also provide different types of client machines to different users, in which case you need to document the different user roles and the machines they use. Component Desktop User Laptop User Developer CPU Clock Speed RAM Disk Monitor/Display 6.2 Processing Requirements As different users will have different machine processing requirements (for example, the HR Dept may have different requirements than the System Administrators) describe their individual requirements for desktop and laptop PC. User requirements will vary depending on their role in the company, the type of processing they perform, and the applications they need to run on their PCs. Client Machine <User Role 1> <User Role 2> Machine Class Vendor CPU Clock Speed RAM Page 19 of 40 Document Name: Company All rights reserved
20 Client Machine <User Role 1> <User Role 2> Disk Monitor Operating System Network Interface Card Document Name: Company All rights reserved. Page 20 of 40
21 7 Network Capacity The performance of an application that runs across a network is dependent on the performance of the network that the application runs over. If the network between the client and the application or database server performs poorly, the applications performance will be negatively affected, even if the client and database server are high performance machines. The two basic factors affecting network performance are a) network latency and b) network capacity. In this section, discuss the requirements for ensuring there is adequate network capacity. 7.1 Bandwidth Requirements Summarize the bandwidth requirements for users in each site, across each network segment that connects the sites of the client to the database server site. Site 1 - Client Business Function No. of Users Site 2 - Server Network Type Network Segment Bandwidth Kbps/user Use the following table to identify the total bandwidth requirements for each network segment, including applications, , and so on, and it shows the total expected bandwidth. Page 21 of 40 Document Name: Company All rights reserved
22 Network Connection Total Bandwidth Requirements For Site/Business Function (Kbps) Network Segment Network Type Rated Bandwidth Site Business Function No. of Users Applications File Transfers Web Document Name: Company All rights reserved. Page 22 of 40
23 8 Findings Summary If applicable, describe historical capacity growth patterns. Explain how future expected capacity requirements have been identified and analyzed. Outline recommendations for managing and addressing expected growth. It is recommended that you insert a table/illustration that shows the different recommendations to address each of the capacity scenarios illustrated above. Describe how expected growth will be monitored and managed. The following table may be used to illustrate one approach for monitoring and managing future capacity. The approach used to illustrate these requirements may differ from project to project. Page 23 of 40 Document Name: Company All rights reserved
24 Area/Item Monitored Capacity Requirement(s) % Increase Needed Capacity Threshold(s) Threshold Response Strategy Hard Drive Storage Capacity requirements & measures Projected increases over intervals Acceptable capacity threshold(s) Response strategies to threshold limits. Threshold is the level at which an event or change occurs Document Name: Company All rights reserved. Page 24 of 40
25 9 User Profile Provide profiles of system users and how they use the system. These profiles describe important user characteristics such as frequency of use, competence and expectations. You can group users in groups (or classes) such as help desk, development, database administration, etc. Business users include Accounting, HR, Finance, Security, etc. User Profile Function Area Key Characteristics Other Comments Page 25 of 40 Document Name: Company All rights reserved
26 10 Usage Scenarios [Optional] Provide usage scenarios (Use Cases) that illustrate how users perform system tasks. Define usage scenarios by each functional area. The benefit of exploring different usage scenarios is that it provides details of system process (from the user s perspective) and helps estimate capacity loads, demand, frequency and other factors Scenario 1 Describe the usage scenario and the characteristics that provide input to estimating loads, growth, and impacts. Use Case ID Goal Business event Primary Actor(s) Actor(s) Pre-conditions Post-conditons <UC_XXX_YYY>: Use an active verb phrase to describe this scenario Describe in one or two sentences the scope and content of the use case. These are triggers that simulate activity within the business. They prompt the business to act, for example, at the interface point between the business and an external entity that it interacts with. Events must be atomic (i.e. cannot be decomposed into two or more events) and observable. Identify the actor initiating the use case Identify the secondary actor Identify pre-conditions that must be met for the use case to be executed. For example, the use cases can start only when the system is in a certain state. Describe how the use case is successfully completed. Discuss alternative ways that the use case may terminate successfully. Failure Outcomes Failure Outcome Condition leading to outcome <Failure 1> Describe why the use case Describe the condition conditions under which the Document Name: Company All rights reserved. Page 26 of 40
27 may terminate. termination outcome occurs. <Failure 2> Flow of Events Describe what the actor does and how the system responds. The use case flow of events starts when the actor performs an action. An actor always initiates use cases. The use case describes what the actor does and what the system does in response. Alternative Scenarios Business Rules Traceability Inputs Summary Output Summary Describe the series of events that should occur for the failure outcomes. Identify business rules captured or referred to in this use case. Identify work products, models or documents that this use case is traceable to, for example, business rules, functional requirements, prototypes etc. Identify data input by the actor Identify data output by the system Scenario 2 Describe the usage scenario and the characteristics that provide input to estimating loads, growth, and impacts. Use Case ID Goal Business event Primary Actor(s) Actor(s) <UC_XXX_YYY>: Use an active verb phrase to describe this scenario Describe in one or two sentences the scope and content of the use case. These are triggers that simulate activity within the business. They prompt the business to act, for example, at the interface point between the business and an external entity that it interacts with. Events must be atomic (i.e. cannot be decomposed into two or more events) and observable. Identify the actor initiating the use case Identify the secondary actor Page 27 of 40 Document Name: Company All rights reserved
28 Pre-conditions Post-conditons Identify pre-conditions that must be met for the use case to be executed. For example, the use cases can start only when the system is in a certain state. Describe how the use case is successfully completed. Discuss alternative ways that the use case may terminate successfully. Failure Outcomes Failure Outcome Condition leading to outcome <Failure 1> Describe why the use case may terminate. Describe the condition conditions under which the termination outcome occurs. <Failure 2> Flow of Events Describe what the actor does and how the system responds. The use case flow of events starts when the actor performs an action. An actor always initiates use cases. The use case describes what the actor does and what the system does in response. Alternative Scenarios Business Rules Traceability Inputs Summary Output Summary Describe the series of events that should occur for the failure outcomes. Identify business rules captured or referred to in this use case. Identify work products, models or documents that this use case is traceable to, for example, business rules, functional requirements, prototypes etc. Identify data input by the actor Identify data output by the system. Document Name: Company All rights reserved. Page 28 of 40
29 11 Load Matrix Illustrate the different kinds of loads that each usage scenario places on the system. You can measure both server and client configurations as appropriate to the capacity-planning scenario. Load Scenario #1 Scenario #2 Scenario #3 Scenario #4 Bandwidth CPU Hard Drive Interfacing systems Printers RAM Scanners Software Transactions Page 29 of 40 Document Name: Company All rights reserved
30 12 Estimated Growth Describe the growth pattern for the usage scenarios discussed previously over time. You can also describe how the system is expected to add additional capacity such as: Incremental vs. replacement Horizontal vs. vertical Parallel vs. hub spoke New technology 12.1 Network Traffic Impact Estimate the impact of the system on network traffic including volume, type, and pattern (including time of day, seasonal, etc.) Document Name: Company All rights reserved. Page 30 of 40
31 13 System Reserves Define the reserve capacity of all system components required by the system, such as networking, servers, clients, and applications. For example, UNIX consumes 10% of the formatted disk's capacity with metadata about files and file system. The file system reserves bwtween 7-10 % of the remaining space to allow free space to be found quickly when extending files. The disk's capacity is reduced by 20% when the database uses the file system rather than raw partitions. Component System Reserve Comment Page 31 of 40 Document Name: Company All rights reserved
32 14 Component Capacity Identify system components, such as human, equipment, software, facilities, etc., and then define the components current capacities. You may tabulate this information to illustrate the system s functional components and to record measurement parameters for the system s known capacity limits. Function Areas Components Configuration Measurement Capacity Application software Data transmission links Domain/Site models Hardware Local Area Network Operating systems Protocols & Transport Wide Area Network Document Name: Company All rights reserved. Page 32 of 40
33 15 Monitoring and Metrics Describe the methods, techniques and specialist tools you will use to evaluate the system s performance and develop metrics for planning intervention. Describe each major component at the system level System Monitoring 15.2 Component #1 Monitoring 15.3 Component #2 Monitoring Page 33 of 40 Document Name: Company All rights reserved
34 16 Intervention Thresholds Identify thresholds that will trigger intervention by changing component configuration. Document Name: Company All rights reserved. Page 34 of 40
35 17 Intervention Plan Describe plans to preserve performance, including details of: Network traffic impact Volume Type Pattern (time of day, seasonal, etc) Impact on users System reserves Networking Servers Clients Applications Monitoring Thresholds Improvement strategy Prioritization Page 35 of 40 Document Name: Company All rights reserved
36 18 Compliance Planning [As appropriate] Identify compliance related processes that the system implementation must adhere to. Document Name: Company All rights reserved. Page 36 of 40
37 19 Cost Management Discuss the cost management plan or provide a cross-reference to its location. Outline the following information: Current (and forecast) costs of the current environment Identification of proposed funding sources Recurring costs associated with each option Nonrecurring costs associated with each option Resource requirements for each option and the current situation Ref # Area Item Amount 1.1 $ 1.2 $ 1.3 $ 1.4 $ 1.5 $ Total $ Page 37 of 40 Document Name: Company All rights reserved
38 20 Recommendations Outline any viable options for service improvement, such as server consolidation, network upgrades to take advantage of technological advances, fine-tuning the use of current resources, and purchasing new hardware/software. Outline recommendations for managing and addressing expected growth. Describe historical capacity growth patterns and explain how future expected capacity requirements have been identified and analyzed. Insert a table/illustration that shows the different recommendations to address each of the capacity scenarios. # Area Recommendation 1 Identify function or technology Discuss proposed recommendation 2 Identify function or technology Discuss proposed recommendation 3 Identify function or technology Discuss proposed recommendation 4 Identify function or technology Discuss proposed recommendation 5 Identify function or technology Discuss proposed recommendation Document Name: Company All rights reserved. Page 38 of 40
39 21 Appendix A: References [Identify all documentation referenced in this document by title, report number, date, and publishing organization. You can also cross-reference to another document if applicable This section lists all documents referenced in the preparation of this document, such as a) specific directives affecting this project, b) previously developed documents relating to the project and c) documentation concerning related projects # Document Title Version # Location Author 1 Identify document X.x URL or Network path Document Owner 2 Identify document X.x URL or Network path Document Owner 3 Identify document X.x URL or Network path Document Owner 4 Identify document X.x URL or Network path Document Owner 5 Identify document X.x URL or Network path Document Owner Page 39 of 40 Document Name: Company All rights reserved
40 22 Appendix B: Acronyms, Abbreviations & Definitions [Provide details of terms, acronyms, and abbreviations required to properly interpret this document. This information may be provided by reference to the project s Glossary.] Term Meaning [Insert Term] [Provide definition of the term used in this document.] [Insert Term] [Provide definition of the term used in this document.] [Insert Term] [Provide definition of the term used in this document.] Document Name: Company All rights reserved. Page 40 of 40
Stratusphere Solutions
Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices
System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director
System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical
Windows Server 2012 2,500-user pooled VDI deployment guide
Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution
By the Citrix Publications Department. Citrix Systems, Inc.
Licensing: Planning Your Deployment By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED
CDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
Request for Proposal for Application Development and Maintenance Services for XML Store platforms
Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...
How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
Server Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
Design Document Version 0.0
Software Development Templates Design Document Version 0.0 Description of Project DOCUMENT NO: VERSION: CONTACT: EMAIL: Ivan Walsh DATE: 4/13/2004 Distribution is subject to copyright. Design Document
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60
Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl
Automating IT Capacity Management
Automating IT Capacity Management Ingo Schulz Product Manager IT Intelligence SAS International Agenda Introduction The IT Capacity Planning Methodology IT Capacity Planning leveraging SAS IT Intelligence
Managing Capacity Using VMware vcenter CapacityIQ TECHNICAL WHITE PAPER
Managing Capacity Using VMware vcenter CapacityIQ TECHNICAL WHITE PAPER Table of Contents Capacity Management Overview.... 3 CapacityIQ Information Collection.... 3 CapacityIQ Performance Metrics.... 4
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company
Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company June 2010 TECHNICAL CASE STUDY Table of Contents Executive Summary...1 Customer Overview...1 Business Challenges...1
http://support.oracle.com/
Oracle Primavera Contract Management 14.0 Sizing Guide October 2012 Legal Notices Oracle Primavera Oracle Primavera Contract Management 14.0 Sizing Guide Copyright 1997, 2012, Oracle and/or its affiliates.
Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for
Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0
Cloud Panel Service Evaluation Scenarios
Cloud Panel Service Evaluation Scenarios August 2014 Service Evaluation Scenarios The scenarios below are provided as a sample of how Finance may approach the evaluation of a particular service offered
Whitepaper Performance Testing and Monitoring of Mobile Applications
M eux Test Whitepaper Performance Testing and Monitoring of Mobile Applications Abstract The testing of a mobile application does not stop when the application passes all functional tests. Testing the
Service Catalogue. Creation Date
Catalogue Creation Date Notes: The following template is provided for writing a Catalog document. [Inside each section, text in green font between brackets is included to provide guidance to the author
<name of project> Software Project Management Plan
The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor
HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment
Technical Paper Moving SAS Applications from a Physical to a Virtual VMware Environment Release Information Content Version: April 2015. Trademarks and Patents SAS Institute Inc., SAS Campus Drive, Cary,
Dell Desktop Virtualization Solutions Enterprise Offering Overview
Dell Desktop Virtualization Solutions Enterprise Offering Overview Dell Desktop Virtualization Solutions Enterprise are designed to help you get up and running faster, with less risk, and optimal end user
Data Classification Technical Assessment
Data Classification Update: February 13th, 2015 Statement of Confidentiality This Confidential Information is being provided to Customer ABC as a deliverable of this consulting engagement. The sole purpose
SAP Business One Hardware Requirements Guide
Hardware Requirements Guide Document Version: 1.04 2014-08-25 Release 8.8 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field
Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide
Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the
An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
VMware Performance and Capacity Management Accelerator Service
AT A GLANCE The VMware Performance and Capacity Management Accelerator Service rapidly deploys a performance management, capacity optimization, and log management solution focused on a limited predefined
Usage Analysis Tools in SharePoint Products and Technologies
Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information
Appendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
Application Performance Testing Basics
Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free
Online Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
Windows Server Virtualization An Overview
Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.
Infrastructure solution Options for
RFP 16-01 EXHIBIT L Infrastructure solution Options for Corporations and Charities System Contributors: Sanjeev Batta Contents Introduction... 1 Conceptual Infrastructure Design... 2 Corporations and Charities
Kronos Workforce Central on VMware Virtual Infrastructure
Kronos Workforce Central on VMware Virtual Infrastructure June 2010 VALIDATION TEST REPORT Legal Notice 2010 VMware, Inc., Kronos Incorporated. All rights reserved. VMware is a registered trademark or
IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
Accelerating High-Speed Networking with Intel I/O Acceleration Technology
White Paper Intel I/O Acceleration Technology Accelerating High-Speed Networking with Intel I/O Acceleration Technology The emergence of multi-gigabit Ethernet allows data centers to adapt to the increasing
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
How To Implement An Enterprise Resource Planning Program
ERP Implementation Program Key phases of ERP implementation: Analysis of the company existing or designing new business process descriptions Inventory of the company s existing formal workflows or designing
Process Guide. Release Management. Service Improvement Program (SIP)
Process Guide Release Service Improvement Program (SIP) i Table of Contents Process Guide Release Document Information... 3 Approval... 4 Section 1: Process Vision... 6 Overview... 6 Process Mission and
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
Computer System Validation for Clinical Trials:
Computer System Validation for Clinical Trials: Framework Standard Operating Procedure (F-SOP) Author: Tim Cross Version History: 0.1di DRAFT 24-April-2013 0.2 DRAFT 12-June-2013 Current Version: 1.0 17-June-2013
W H I T E P A P E R. Reducing Server Total Cost of Ownership with VMware Virtualization Software
W H I T E P A P E R Reducing Server Total Cost of Ownership with VMware Virtualization Software Table of Contents Executive Summary............................................................ 3 Why is
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
How To Test For Elulla
EQUELLA Whitepaper Performance Testing Carl Hoffmann Senior Technical Consultant Contents 1 EQUELLA Performance Testing 3 1.1 Introduction 3 1.2 Overview of performance testing 3 2 Why do performance testing?
California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
Contents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11
Oracle Primavera Contract Management 14.1 Sizing Guide July 2014 Contents Introduction... 5 Contract Management Database Server... 5 Requirements of the Contract Management Web and Application Servers...
Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions
The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions Published: December 2008 Information in this document, including URL and other Internet Web site
Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
<PROJECT NAME> PROJECT MANAGEMENT PLAN
PROJECT MANAGEMENT PLAN Version VERSION HISTORY [Provide information on how the development and distribution of the Project Management Plan was controlled and tracked.
An Esri White Paper June 2010 Tracking Server 10
An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Copyright 2010 Esri All rights
IT Onsite Service Contract Proposal. For. <<Customer>> Ltd
IT Onsite Service Contract Proposal For Ltd 1 of 14 I N T R O D U C T I O N This Service Contract for Onsite Deskside PC Support (this Service Contract ) is made effective as of February 5th,
System Center Configuration Manager 2007
System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
Quest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access
SQL Server Business Intelligence on HP ProLiant DL785 Server
SQL Server Business Intelligence on HP ProLiant DL785 Server By Ajay Goyal www.scalabilityexperts.com Mike Fitzner Hewlett Packard www.hp.com Recommendations presented in this document should be thoroughly
Enterprise Application Performance Management: An End-to-End Perspective
SETLabs Briefings VOL 4 NO 2 Oct - Dec 2006 Enterprise Application Performance Management: An End-to-End Perspective By Vishy Narayan With rapidly evolving technology, continued improvements in performance
DITA Adoption Process: Roles, Responsibilities, and Skills
DITA Adoption Process: Roles, Responsibilities, and Skills Contents 2 Contents DITA Adoption Process: Roles, Responsibilities, and Skills... 3 Investigation Phase... 3 Selling Phase...4 Pilot Phase...5
Virtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
http://support.oracle.com/
Contract Management System Architecture Data Sheet October 2012 Legal Notices Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
ProSystem fx Engagement. Deployment Planning Guide
ProSystem fx Engagement Deployment Planning Guide September 2011 Copyright: 2011, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted
Sage Intergy 6.10 Architecture Guide
Reference Confidential This document and the information it contains are the confidential information of Sage. Neither this document nor the information it contains may be disclosed to any third party
VDI Solutions - Advantages of Virtual Desktop Infrastructure
VDI s Fatal Flaw V3 Solves the Latency Bottleneck A V3 Systems White Paper Table of Contents Executive Summary... 2 Section 1: Traditional VDI vs. V3 Systems VDI... 3 1a) Components of a Traditional VDI
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009
Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized
How to Test Out Backup & Replication 6.5 for Hyper-V
How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? CA Capacity Management and Reporting Suite for Vblock Platforms
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
VMware Cloud Automation Design and Deploy IaaS Service
DATASHEET VMware Cloud Automation AT A GLANCE The VMware Cloud Automation Design and Deploy IaaS Service expands the power of virtualization and moves IT services away from existing infrastructure delivery
can you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone
Datasheet FUJITSU Cloud Monitoring Service
Datasheet FUJITSU Cloud Monitoring Service FUJITSU Cloud Monitoring Service powered by CA Technologies offers a single, unified interface for tracking all the vital, dynamic resources your business relies
Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise
Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise Providing Enterprise-Class Performance and Scalability and Driving Lower Customer Total Cost of Ownership
The Methodology Behind the Dell SQL Server Advisor Tool
The Methodology Behind the Dell SQL Server Advisor Tool Database Solutions Engineering By Phani MV Dell Product Group October 2009 Executive Summary The Dell SQL Server Advisor is intended to perform capacity
Cloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper October 2010 Disclaimer The following is intended to outline our general product direction.
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
Directions for VMware Ready Testing for Application Software
Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites
OE PROJECT CHARTER TEMPLATE
PROJECT : PREPARED BY: DATE (MM/DD/YYYY): Project Name Typically the Project Manager Project Charter Last Modified Date PROJECT CHARTER VERSION HISTORY VERSION DATE (MM/DD/YYYY) COMMENTS (DRAFT, SIGNED,
About Contract Management
Contract Management System Architecture Data Sheet June 2015 About Contract Management Oracle Primavera Contract Management is a multi-user, multi-project Web-based application that manages all aspects
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
FlexPod Datacenter with Microsoft Private Cloud Excels in Price-to-Performance Comparison
FlexPod Datacenter with Microsoft Private Cloud Excels in Price-to-Performance Comparison Published by: Value Prism Consulting Sponsored by: Microsoft Corporation Publish date: April 2015 Abstract: The
Measuring Cache and Memory Latency and CPU to Memory Bandwidth
White Paper Joshua Ruggiero Computer Systems Engineer Intel Corporation Measuring Cache and Memory Latency and CPU to Memory Bandwidth For use with Intel Architecture December 2008 1 321074 Executive Summary
Annex 9: Technical proposal template. Table of contents
UNFCCC/CCNUCC Page 1 Annex 9: Technical proposal template Table of contents Annex 9... 3 9.1 Technical proposal... 3 9.1.1 Vendor s name... 3 9.2 Engagement model... 3 9.2.1 Type of engagement... 3 9.2.2
Dell One Identity Manager Scalability and Performance
Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities
