SlideShare une entreprise Scribd logo
1  sur  38
Migrating Applications

                                 to a Target Data Center

                     and the use of Cloud Computing


  Created by:

  Tom Bronack, president
  Data Center Assistance Group, Inc.
  15180 20th Avenue
  Whitestone, NY 11357
  Phone: (718) 591-5553
  Email: bronackt@dcag.com
Release Date: 4/22/2012                © Thomas Bronack - Application Migration Guideline Document   Page: 1
Mission Statement
  1. Migrate Applications from one, or many, data centers to Primary, Secondary,
     and/or Recovery Data Centers.

  2. Reduce Costs while sustaining current, or increasing, work loads and providing
     continuous operations and supplementing future growth.

  3. Reduce foot print, infrastructure, and locations that will no longer be needed.
     Sell, or donate, surplus equipment via Asset Management process.

  4. Utilize latest technologies to support improved performance, reliability, and
     continuation of business should a disaster event occur.

  5. Integrate new operations through automated forms management and control
     system (ITIL or similar) that will accept “Work Orders” and associated “Purchase
     Orders” for development, implementation, support, maintenance, and recovery
     services.

  6. Integrate Management Reporting and Awareness to better manage the new
     environment.
Release Date: 4/22/2012    © Thomas Bronack - Application Migration Guideline Document   Page: 2
Objectives
1. Define Target environment(s) and their infrastructure, equipment, systems, and
   locations.

2. Establish migration process and the teams that will be needed to support the
   effort, then define their functional responsibilities.

3. Define Migration Life Cycle and sequence of functions to be performed.

4. Define tools needed to support migration effort and have personnel trained on new
   tools. Integrate tool usage within personnel functional responsibilities.

5. Identify applications to be migrated and the phase during which they will be moved
   to the target data center. Create a detailed Project Plan to support the migration.

6. Create Bench Mark and Performance guidelines to establish baseline and
   performance improvements associated with migration.

7. Implement Support, Problem, and Change Management procedures along with
   other system management functions needed to support applications.

Release Date: 4/22/2012   © Thomas Bronack - Application Migration Guideline Document   Page: 3
Migration Pathway
  SCOPE OF SERVICES

  The Conversion Specialist will be responsible for providing insight, planning and execution of conversion activities for
  management systems.

  The conversion specialist will be responsible for:

         • Establishing management group and reporting schedule.
         • Creating Risk Assessment to identify compliance and security guidelines.
         • Develop Target Environment profile.
         • Identify applications and data to be migrated.
         • Review Service Level Agreements for applications being migrated and insure Service Level Reporting is adequate.
         • Define IT Security, Encryption, Real-Time / Incremental backups, and failover requirements.
         • Create application migration project plan with identified resources, timeframe, and costs.
         • Determine use of Cloud Computing (internal / external) and define backup and recovery requirements.
         • Identify automated tools needed to support identification, migration, and tuning process – like ADDM, Sharkwire /
           Opnet, CiRBA, Double-Talk, AIX, Tivoli and any other identified automated tools.
         • Define migration path from selection through verification, package creation, and migration.
         • Implement Migration Factory and other functional areas needed to perform migration duties.
         • Perform Bench Marking of original system and migrated system and report on results.

  MANDATORY SKILLS/EXPERIENCE:

         •   Demonstrated depth of knowledge migrating applications.
         •   Demonstrated experience migrating / converting multiple and multi-platform legacy systems into a single system.
         •   Experience in the development of conversion cleanup reporting for use by subordinate staff during data purification.
         •   Demonstrated success managing large-scale conversion projects.
         •   Direct management of analysts and programmers coding conversion routines.
         •   Experience in required applications and technical requirements.
         •   Project Management experience.

Release Date: 4/22/2012                © Thomas Bronack - Application Migration Guideline Document                           Page: 4
Migration Work Cycle / Flow
           Start



      Define Target                                                                          Systems and
                            Location(s)         Infrastructure          Equipment
      Environment                                                                            Applications


                           Perform Risk         Identify Staff         Suppliers and
                                                                                               Clients
                           Assessment            & Functions             Vendors


        Establish             Define                                         Define
        Migration          Management           Define Functional                                  Assign
                                                                          Migration Life
         Process            and Teams            Responsibilities                                 Functions
                                                                              Cycle

                                                                                                   Create
                             Establish              Obtain Tools            Define Tool
                                                                                                  Migration
                          Reporting Cycle          and Train Staff         Requirements
                                                                                                 Project Plan

             A




Release Date: 4/22/2012        © Thomas Bronack - Application Migration Guideline Document               Page: 5
Migration Work Cycle / Flow                                                                  continued

         A



Create Migration          Define Migration              Define                 Define Migration
   Groups &                 Application             Components in               Move Phases &
   Functions                   Groups              Migration Groups              Timeframes


                                       Log Migration              Submit Groups                  Benchmark
                                        Groups and                 to Migration               Application Groups
                                         Schedule                     Factory                   prior to move


     Initiate             Copy Migration                                          Benchmark
                                                    Verify Successful
    Migration               Groups via                                             Migration
                                                       Migration
     Process               Double-Take                                         Application Groups


                                                                                                   Compare
                          Report Results of                    Improvement
                                                                                                  Benchmark
                          Migration Phase                           ?
                                                                                                    Results
         B


Release Date: 4/22/2012         © Thomas Bronack - Application Migration Guideline Document               Page: 6
Migration Work Cycle / Flow                                                                   continued
         B



     Review                       Perform
                                                            Identify Areas                 Implement
   Migration for                 Migration
                                                          for Improvement                Improvements
  Improvements                  Postmortem
                                                  N
                                Y             Improvement                              Retest and Report
                                                   ?                                      on Results


    Implement              Service Level                   Systems
                                                                                Development &
     Systems               Agreements &                 Development
                                                                                 Maintenance
   Management                Reporting                Life Cycle (SDLC)

                                                                           Support,
                                               Capacity &                                           Security and
                                                                          Problem &
                                              Performance                                            Recovery
                                                                            Change


 Repeat Process by                                  Dispose / Donate           Profit from space,        See Asset
                           Identify Surplus
Group Until Complete                                in accordance to           equipment sales,          Management
                             Equipment                                                                   Disciplines page
                                                      EPA and DoD                and personnel


 Release Date: 4/22/2012        © Thomas Bronack - Application Migration Guideline Document                  Page: 7
Can be sorted by: Equipment Type,
   Asset Management Disciplines                                                  Disposition, Date, or Location

                          “Dispose of Surplus equipment after Migration to         Pick-Up List
                          Target Data Center(s) to reap profit from sales,         Equip. Type:   Disp:   Location:
                          return of equipment storage space, and personnel.”       PC              A       Bldg 3, Rm 203
       Start                                                                       PC              R       Bldg 1, Rm 405
                                                                                   PC              T       Bldg 2, Rm 501
               Disposition = ‘A’

     Acquire               Purchase            Install                 Add to                  Master
    Equipment               Order            Equipment             Master Inventory           Inventory
                   Equipment is being Actively used

           Disposition = ‘R’                                                                N, Exceptions List Generated

    Re-deploy               Work                                         Compare to
                                               Pick-Up                                                      Warehouse
    Equipment
                                                                       Master Inventory           Y
                            Order             Inventory                                                     Inventory

                Equipment is moved to new location
                                                                Perform               Service
                                                                Services               Order
           Disposition = ‘T’

    Terminate               Work          Service             Ready-to-Sell       Purchase            Release           Finance
    Equipment               Order          Order               Inventory           Order               Form              Form
                Equipment is Sold or Disposed of
                                                                                   Marketing & Sales


        End                                    Archive

Release Date: 4/22/2012             © Thomas Bronack - Application Migration Guideline Document                       Page: 8
Updating the Standards and Procedures
                         Manual
                                                                             Status = ‘T’
                                                                                               Equipment
      Standards                           Status = ‘D’
         And                                                  Equipment                        Termination
      Procedures       Status
        Manual         = ‘R’     Equipment                     Donation                        Procedures

                                Redeployment                  Procedures
                                                                                               • Log & schedule,
Update manual to                 Procedures                                                    • Pick-up,
                                                               • Log & schedule,               • Data Wipe,
Include new procedures
                                                               • Pick-up,                      • Reconfigure,
for equipment                     • Log & schedule,
Redeployment,                                                  • Data Wipe,                    • Certify,
                                  • Pick-up,                   • Reconfigure,
Donation, and                                                                                  • Package,
                                  • Data Wipe,                 • Certify,
Termination in                                                                                 • Store,
                                  • Reconfigure,               • Package,
accordance with Legal,                                                                         • Sell,
                                  • Package,                   • Store,
Environmental, Business,                                                                       • Client Pick-up,
                                  • Store,                     • Donate,
and Regulatory                                                                                 • Financials,
                                  • Deliver,                   • Document,
Requirements.                                                                                  • Document,
                                  • Document,                  • Notify,                       • Notify,
                                  • Notify,                    • Track,
Train Staff on new                                                                             • Track,
procedures and provide            • Track,                     • History.                      • History.
Maintenance and Support           • History.
Services going forward.

  Release Date: 4/22/2012        © Thomas Bronack - Application Migration Guideline Document                   Page: 9
Systems Management Organization
                                         Systems Management                           Data Processing
                                          and Controls (SMC)                            Environment

     Service Level
     Management

                           Application             Production             Contingency           Change
      Inventory
                          Development              Acceptance             Management          Management
       & Asset
                             (PLC)
     Management

                          Application                                    EDP Security          Problem
                                                   Production
     Configuration                                                       Management           Management
                          Maintenance              Operations
     Management



      Capacity             Application                                  Vital Records
                            Testing                                     Management
     Management



     Performance            Quality                 Business                  Risk             Disaster
     Management            Assurance                Recovery               Management         Management



Release Date: 4/22/2012      © Thomas Bronack - Application Migration Guideline Document                Page: 10
Logical Example of Enterprise Target Environment
                  Overview of the Enterprise Information Technology Environment
       Physically Transported
            Using Tape
                                  Remote
         Only Encryption
                                 Tape / Data
             Customers;
                                   Vault                                                                                                                  Remote
             Credit Bureaus;
             Feed-Files; and,                     Electronic Vaulting;                                                                                   Locations
             Other Locations.                     Incremental Vaulting; and,                               Encrypting Data-In-
                                                  Electronic transmission to        Disaster             Movement will protect
                                                  Disaster Recovery Site                                data being transmitted to
                                                                                  Recovery Site               remote sites


                                                                   Electronic
                                                                  Transmission

        Local                                                                                   Electronic                                                     Local
                                                                                               Transmission
      Tape / Data                                                                                                                                            Tape / Data
        Vault                                                     Open Network                                                                                 Vault
                                                                       With
                                                              Multiple Access Points
                                                                                                                                                                  Local
              Local                                                                                     Encryption of “Data at Rest”                              Sites
              Sites                                                                                      to Provide Total Protection


                                                                                                                                         Production
                         Production                                                                                                        Site #2
                           Site #1                    Cloud
                                                                                                                   Company
                                                    Computing                                                        Data




                                 Systems Development Life Cycle (SDLC)                  Send Approved
                                                                                         Applications
                                                                                        To Production
                                   New                                                   Acceptance                                 Problem Resolution
               End User         Applications
                                                                                                                                           And
            “Work Order”                                                                                                              Enhancements
           to create a new
             Product or                                                        Testing and
               Service                     Development                                                                Maintenance
                                                                                 Quality
                                                                               Assurance

                                                       Development And Maintenance Environments

Release Date: 4/22/2012                        © Thomas Bronack - Application Migration Guideline Document                                                      Page: 11
Target Environment
Intel Builds Dell x86             Dell x86 Servers                                              IBM AIX P7 (“Watson”)
Chips for their Servers                                                                           Systems using AIX
                                                                                                VMware vSphere 5 and
                                                                                                      AIX Tivoli


                                                                                                     1 million I/O per Sec.



                                                           Remote
                                                           Storage
                          Double-Talk
                                                                           Local
                                                                          Storage




                                 Cisco Network Equipment
                                 for remote locations

                                                                                         VMware vSphere 5 Software
                                                                                         Supports :
  NetApp NAS to support                                                                  • vShield for Cloud Computing -
  Remote and Cloud Storage                           EMC SAN, supporting 2                 security, control, and compliance.
                                                     channels, AIX Storage Array,        • vCenter Site Recovery Manager 5.
                                                     up to 2 TeraBytes of Local          • vCloud Director 5 – model and
                                                     storage                               activate recovery and failover.

Release Date: 4/22/2012    © Thomas Bronack - Application Migration Guideline Document                          Page: 12
SDLC Documentation Requirements and Forms Automation

         New Product / Service Development Request Form Life Cycle
                                                                       Documents are Linked to from Date Field

           Development Request Form                                                        Development:
                                                                                              Development Request Form Number
           Phase:                              Date                                           Business Need
                                                                       Documentation
                                                                                              Application Overview
                                                                                              Audience (Functions and Job Descriptions)
        User Information                     _____________                                    Business / Technical Review Data
                                                                                              Cost Justification
        Business Justification               _____________
                                                                                              Build or Buy Decision
                                                                              Link to         Interfaces (Predecessor / Successor)
        Technical Justification              _____________
                                                                            Documents         Request Approval
        Build or Buy                         _____________
                                                                                           Testing:
        Development (Build / Modify)         _____________                                    Data Sensitivity & Access Controls
                                                                                              IT Security Management System
        Test:                                _____________              Documentation         Encryption
                                                                                              Vital Records Management
                Unit Testing           _____________                                          Data Synchronization
                                                                                              Backup and Recovery
                System Testing         _____________                                          Vaulting (Local / Remote)
                                                                                              Disaster Recovery
                Regression Testing     _____________                                          Business Recovery

        Quality Assurance                    _____________                                 Quality Assurance:
                                                                                              Application Owner
        Production Acceptance                _____________              Documentation
                                                                                              Documentation & Training
                                                                                              Application Support Personnel
        Production                           _____________                                    End User Coordinators
                                                                                              Vendors and Suppliers
        Support (Problem / Change)           _____________
                                                                                              Recovery Coordinators
                                                                                              Testing Results
        Maintenance (Fix, Enhancement)       _____________

        Documentation                        _____________
                                                                                           Production Acceptance
                                                                                              Application Setup
                                                                        Documentation         Input / Process / Output
        Recovery                             _____________
                                                                                              Messages and Codes
        Awareness and Training               _____________                                    Circumventions and Recovery
                                                                                              Recovery Site Information
                                                                                              Travel Instructions



Release Date: 4/22/2012                    © Thomas Bronack - Application Migration Guideline Document                         Page: 13
Systems Development Life Cycle (SDLC), Components and flow
        Development                        Testing                 Quality                Production Acceptance
                                                                  Assurance
            End-User                                              Naming,                  Security,           On-Line
           Request for
                                           Unit and
                                                                 Documents,                Vital Records,     Data Files
           New Product                     System
                                                                    and                    Back-up,
            Or Service                     Testing                                         Recovery,
                                                                 Placement
                                                                                           Audit.                 BKUP


       On-Line         BKUP
      Data Files
                                           Enhance                 Version
                                             And                    And                    Security,        Production
End-User Defines:                           Repair                 Release                 Vital Records,
• Business Purpose,                                                Control                 Back-up,
• Business Data,                                                                           Recovery,              BKUP
• Ownership,                                                                               Audit.
• Sensitivity,              New                                   Change
• Criticality,
                                        Maintenance
                                                                Management
• Usage,
• Restrictions,                                                                               On-Line
                                  Update                                                     Data Files
• RTO and RPO,
• Back-Up, and
• Recovery.
                                                     Business       Disaster
                   End-User        Recovery                                           Real-Time
                                                     Recovery       Recovery                                Off-Site
                    Location                         Facility       Facility                                 Vault
                                                                                        Periodic /
                   Company or                                                           Incremental          Vendor or
                    Client Site                       Vendor or Company Site                                company Site
 Release Date: 4/22/2012               © Thomas Bronack - Application Migration Guideline Document                Page: 14
Systems Management Controls and Workflow
               Service Level Reporting, Capacity Management, Performance Management, Problem Management,
                                     Inventory Management, Configuration Management.




                                                                              Production              Production
     Development                   Testing              Quality                                       Batch and On-Line
                                                       Assurance              Acceptance                 Management


Product or Service,              Walk Thru’s,                                Batch / On-Line,
Service Level Management,                              Test Validation,
                                 Unit Testing,                               Security / Encryption,
Project Life Cycle,                                    Components,
                                 System Testing,                             Operations,
Work Order,                                            Naming,
                                 Regression,                                 Recovery,
                                                       Placement,
Purchase Order(s),               Scenarios,            Functionality,
                                                                             EDP Audit.                       Vital
Documentation.                   Scripts,              Process.                                              Records
                                 Recovery Tests,
                                 Benchmarks,
                                 Post Mortem.


       Maintenance                     Change Management
                                                                                        Disaster             Off-Site
                                                                                        Recovery              Vault
     Service Level Management,
     Project Life Cycle.            Systems Development Life Cycle,
                                    Component & Release Management,
                                    Standards & Procedures,
                                    User Guides & Vendor Manuals,
                                    Training (CBT & Classroom), etc...
                                                                               Disaster Recovery Facility
     A Forms Management & Control System, used to originate
                                                                              Mainframe and Office Recovery
     work requests and track work until completed, will facilitate
     optimum staff productivity and efficiency.

   Release Date: 4/22/2012              © Thomas Bronack - Application Migration Guideline Document               Page: 15
Quality Assurance and PLC Checkpoints
        Interfaces Between Applications, QA, and Production Groups.
                                                                                                                   TESTING and QA
                                                                                                        Turnover Package Components:_________
                                                                                                    •   Service Form and results Assessments,
                                                                                                    •   Change & Release Notes,
   Create          Perform             Perform             Perform                Application       •   Application Group Testing Results,
   Service        Technical            Business           Requested                 Group           •   Test Scenarios & Scripts,
   Request        Assessment          Assessment            Work                   Testing          •   Messages & Codes, and Recoveries,
                                                                                                    •   Data for Regression and Normal Testing,
                                                                                                    •   Documentation.
         Error Loop                                CP #
                                                    1                 No                                Yes          Create QA
   Return
                                                                                                                      Turnover
     to                                                                           Successful                          Package
  Submitter      APPLICATIONS GROUP




             QA GROUP

                  Perform               Perform             QA                      Schedule                         QA Review
                   Post-               Requested           Review                   Request                            And
                  Mortem                 Work              Meeting                                                    Accept

      Error                                                                CP #
      Loop                                                                  2                                   PRODUCTION CONTROL
                               CP #                                                                           Turnover Package Components:
                                3                                 Create                                      • Explanation and Narrative,
                                             Perform                                                          • Files to be released,
        No                            Yes                       Production             Submit to
                                               User                                                           • Predecessor Scheduling,
                 Successful                                       Control              Production
                                            Acceptance                                                        • Special Instructions,
                                                                 Turnover               Control
                                             Testing                                                          • Risk Analysis,
                                                                 Package
                                                                                                              • Authorizations.

Release Date: 4/22/2012          © Thomas Bronack - Application Migration Guideline Document                                          Page: 16
“Problem Identification and Response process”
                    Problem Recovery Techniques
                                                                                                          Diagnostic Tools
                                                                                                       Omegamon        AF / Operator
  Users
  NCC                                                                                                  Netview         OPC / ESA
                           Problem                   Problem Indicators                                                                      Resolvers
  OCC
  HD                                                  Console     Completion      Unexpected
                                                                                                         Reference Materials
                                                                                                                                             Contacts
                                                        Log         Code           Results
                                                                                                       Messages            Job
                                                                                                                                             Escalation
                          Symptoms                                                                     and Codes         Run Book
Immediate




                                                     Problem Descriptions
  actions




                           Analyze                                 Possible      Actions to
                                                      Meaning      Causes        be Taken
                                                                                                                   Problem Resolvers
                          Circumvent                   Problem Bypass Procedures
                                                                                                                   1    System Software
                                                          Recovery         Restart
                          Document
                                                          Procedures      Procedures                               2    Comm. Systems

                         Log Problem                                                                               3    Corp. Security

                          Route /                                                     Problem                      4    Data Base Systems
                                              Problem History     Problem
Follow-on Actions




                             Escalate                             Record             Repository                    5    Storage Systems

                            Track                                                                                  6    Cap. & Performance

                           Resolve                                                                                 7    Decision Support

                                                  Review Problem Reporting                                         8    Optical Storage
                            Post                  and Resolution Procedures
                           Mortem                                                                                  9    CICS and On-lines

                           Upgrade                 Job           S&P        User       Inventory &               10     Systems Mgmt.
                          Supportive             Run Books      Manual      Guides     Configuration                    and Controls
                         Documentation
                                                  Problem Feed-Back, Rerouting and Escalation


                    Release Date: 4/22/2012       © Thomas Bronack - Application Migration Guideline Document                                Page: 17
Business Continuity Management Disciplines and Integration

                                                                   Charter:

                                            Contingency                Eliminate Business Interruptions;
                                                                       Ensure Continuity of Business;
          Contingency Recovery               Planning                  Minimize Financial Impact; and
               Disciplines                                             Adhere to Legal / Regulatory                  “These four Contingency Planning
                                                                       Requirements                                  Disciplines allow for logical work
                                                                                                                     separation and better controls”

                         Disaster                                      Business
                         Recovery                                      Recovery
                                                                       Corporate Asset                          “Establishing interfaces with key
       Information Technology
                                                                       Protection                               departments will allow for the inclusion
       Protection
                                                                                                                of corporate-wide recovery procedures
          Critical Jobs;
                                               Risk                       Inventory Control                     (Security, Salvage, and Restoration, etc.)
                                            Management                    Asset Management
          Data Sensitivity and Access                                                                           in department specific Recovery Plans”
          Controls;                                                       Configuration
          Vital Records Management;        Risk Management                Management
          Vaulting and Data Recovery;                                     Business Continuity; and
          Recovery Time Objectives;          Exposures (Gaps and          Office Recovery.
          Recovery Point Objectives; and     Exceptions);
          Mainframe, Mid-Range, and          Insurance;
          Servers.                           Legal / Regulatory
                                             Requirements;
                                             Cost Justification; and
                                                                                                                     Executive       Information
                                             Vendor Agreements.
                                                                                                                    Management       Technology


                                                                                                     Facilities
                                                                                                                                           Company
                    “Contingency Planning affects every part of the                                                                        Operations
                    organization and is separated into logical work                                                   Contingency
                    areas along lines of responsibility”.                                      Personnel               Recovery
                                                                                                                       Planning             Auditing

                                                                                                     General
                                                                                                     Services
                                                                                                                      Public
                                                                                                                                      Finance
                                                                                                                     Relations




 Release Date: 4/22/2012                       © Thomas Bronack - Application Migration Guideline Document                                                   Page: 18
Fully Integrated Recovery Operations and Disciplines (End Goal)


       Private Sector                                      ISO22313 and             National Fire        ISO27000
                                   CERT Resiliency                                                                                   Contingency
      Preparedness Act                                        ISO22318               Prevention            ISMS
                                     Engineering                                                                                      Command
         (Domestic                                         (International           Association           Security
                                     Framework                                                                                       Center (CCC)
         Standard)                                           Standard)             1600 Standard         Standard
                                      And COSO

                                                                                                                                       Incident
                                                          Information Security                                                        Command
                    Corporate                           Management System (ISMS)                                                      Center (IC)
                   Certification                           based on ISO27000

                                                                                                       Command                        Help Desk
                                                                                                        Centers                         (HD)
      Workplace
       Violence
      Prevention                             Emergency Operations                                                                      Operations
                                                 Center (EOC)                                                                          Command
                                                                                                                                      Center (OCC)


                                                                                                                                       Network
      Lines of                      Emergency                           Business                      Business                        Command
      Business                       Response                          Continuity                   Integration                      Center (NCC)
                                   Management                         Management


  •   Locations,          •   State and Local                    •   Risk Management,           •   Service Level Agreements &
  •   Employees,              Government.,                       •   Disaster Recovery,             Reporting,
  •   Infrastructure,     •   First Responders (Fire,            •   Business Continuity,       •   Systems Development Life Cycle
  •   Equipment,              Police, & EMT),                    •   Crisis Management,             (SDLC),
  •   Systems,            •   Department of                      •   Emergency                  •   COSO, CobIT, ITIL, and FFEIC,
  •   Applications,           Homeland Security                      Management,                •   ISO Guidelines,
  •   Supplies,               (DHS),                             •   Workplace Violence         •   Six Sigma or Equivalent for
  •   Customers.          •   Office of Emergency                    Prevention,                    Performance and Workflow
                              Management (OEM),                  •   Audit and HR.                  Management
                          •   Local Community.

Release Date: 4/22/2012                        © Thomas Bronack - Application Migration Guideline Document                                      Page: 19
Information Accounting and Charge-Back System Concept
By utilizing Work Order (WO) and Purchase Order (PO) concepts, it is possible to track and bill clients for
their use of Information Technology services associated with development and maintenance services. This
concept is presented below:

User Name: ____________________                User Division: ___________         User Identifier _______
Work Order #: __________________               Date: ___________       For: _________________________
           PO for: Development                                                    Cost: $ _____________
           PO for: Testing                                                        Cost: $ _____________
           PO for: Quality Assurance                                              Cost: $ _____________
           PO for: Production Acceptance                                          Costs $ _____________
           PO for: Production (on-going)                                          Cost: $ _____________
           PO for: Vital Records Management                                       Cost: $ _____________
           PO for: Asset Management (Acquisition, Redeployment, Termination)      Cost: $ _____________
           PO for: Inventory and Configuration Management                         Cost: $ _____________
           PO for: Information and Security Management                            Cost: $ _____________
           PO for: Workplace Violence Prevention                                  Cost: $ _____________
           PO for: Recovery Management                                            Cost: $ _____________
           PO for: Documentation and Training                                     Cost: $ _____________
           PO for: Support and Problem Management                                 Cost: $ _____________
           PO for: Change Management                                              Cost: $ _____________
           PO for: Version and Release Management                                 Cost: $ _____________

                                                                                     Total Cost: $ _____________

Bill can be generated via Forms Management, Time Accounting, or Flat Cost for Services. This system can
be used to predict costs for future projects and help control expenses and personnel time management.
 4/22/2012                    © Thomas Bronack - Application Migration Guideline Document                     20
VMware vSphere 5 platform and supporting components.
  VMware vSphere 5 Functions:                                                VMware vSphere 5 Features:
                                                                             • Utilizes x86 technology to provide an infrastructure-
  VMware vSphere 5                                                             as-a-service architecture.
  VMware vCenter Site Recovery Manager 5                                     • Can support 32 Virtual CPU’s with up to 1 Terabyte of
  VMware vCloud Director 5                                                     memory.
                                                                             • Support 1 million I/o per second.
  Together these tools help business:                                        • Provides Intelligent Policy Management by allowing a
  • Deploy business critical applications with                                 “set-it and forget-it” approach to managing data
    confidence,                                                                center resources, including server deployment and
  • Respond to the needs of the business with Cloud                            storage management through user defined profile.
    agility, and                                                             • Profile-Driven Storage Management saves personnel
  • Move to Cloud Computing with confidence.                                   administrative time.



Comprehensive Cloud Infrastructure Suite, includes:

• vShield 5 – addresses the top enterprise concerns about Cloud Computing – security, control, and compliance – the vShield product family
  overcomes the limits of traditional security solutions by delivering an adaptive, software-based security model designed for virtual and
  cloud environments. vShield 5 will include new Data Security capabilities that will enable IT to quickly identify risk exposures resulting
  from unprotected sensitive data, isolated applications with different levels of trust and migrate security policies as data and applications
  move between different virtual systems and apply the same policies in public clouds.

• vCenter Site Recovery Manager 5 – Extending this proven disaster recovery solution, vCenter Site Recovery Manager 5 will introduce
  built-in VMware vSphere replication capabilities that will allow customers to double the number of protected applications for the same
  cost while supporting heterogeneous storage configurations in the primary and backup sites. New automated failback and planning
  migration capabilities will allow customers to orchestrate migrations for disaster avoidance and to support planned maintenance
  activities and data center consolidations.

• vCloud Director 5 – Enabling a self-service model for provisioning infrastructure services across internal and external sources, VMware
  vCloud Director 5 will enable IT to dramatically reduce the time required to provision new servers. New Linked Clone capabilities will
  reduce provisioning time to as few as 5 seconds, while also reducing storage costs by as much as 60 percent, all while managing resources
  from a single pane of glass.

Release Date: 4/22/2012                  © Thomas Bronack - Application Migration Guideline Document                                Page: 21
BMC Atrium Discovery and Dependency Mapping (ADDM)
                    “Discover through Integrate” phases
•    Discover:
      –    Build a complete topology of your applications, software, host infrastructure and network devices and updates the
           profile as often as you need.
      –    Keep pace with changes in dynamic virtual environments from VMware, Sun, Microsoft, HP, and Citrix.
      –    Operate agent-free across Windows, Linux, Unix and Netware environments, using standard management protocols,
           such as SSH, WMI, and SNMP.
      –    Deep discovery of J2E applications and data bases (Tables, License options, etc.).
•    Analyze:
      –    Automatically group servers that work closely together, based on an analysis of the communications between them.
      –    Highlight high-risk servers that touch a large portion of the estate.
      –    Exclude hosts from automatic grouping – as needed.
•    Manual Grouping:
      –    Identify groups of hosts to help manage them through a project.
      –    Refine automatic groups based on non-discoverable head-knowledge.
      –    Exclude sets of servers from visualization – such as super-connected servers with hundreds of dependencies.
•    Application Dependency Mapping:
      –    Automatically identify IT components and configurations, and interpret raw, discovered data – from individual
           software processes to large-scale, distributed business applications.
      –    Use pre-populated patterns to recognize more than 400 infrastructure software products (with more added monthly).
      –    Automatically build visualizations that show configuration dependencies between switches, routers, virtual and
           physical hosts, software, business applications, and other business entities.



Release Date: 4/22/2012             © Thomas Bronack - Application Migration Guideline Document                          Page: 22
BMC Atrium Discovery and Dependency Mapping
                     “Visualize and Integrate”
• Dashboard & Reports:
      •    In seconds, create tabular reports and charts that provide answers to critical questions.
      •    Leverage pre-populated reports or create your own using the Search Engine Query Language.
      •    Organize your favorite charts into at-a-glance dashboards that display the metrics that matter most
           to you.
• Search:
      •    Perform fast, free text search of the entire data store and get the most relevant results in seconds.
      •    Narrow your searches to specific object types and use Search Query Language.
      •    Export search results in XML and CSV formats to facilitate information sharing.
• Host Profiles:
      •    View essential details for each host, including and analysis of the host’s network traffic in an
           accessible, easy-to-use format.
      •    Create reports as pdf documents.
      •    Email, print, discuss, and annotate, as needed.
• Integrate Dynamic CMDB:
      •    Provides seamless flow of the vital accurate, up to date data needed to underpin BSM initiatives and
           processes.
      •    Continuous CMDB synchronization allows real time up date of the CMDB as Cis are discovered.
      •    Filtering allows you to control the Cis types that are synchronized with the CMDB.

Release Date: 4/22/2012           © Thomas Bronack - Application Migration Guideline Document                 Page: 23
CiRBA Overview
CiRBA Data Center Intelligence

      CiRBA Data Center Intelligence (DCI) is predictive analytics software that
      powers a revolutionary console for policy-based control of virtual and
      cloud infrastructure.

The CiRBA Control Console

      CiRBA's Control Console gives you unprecedented control over the efficiency and risk of virtual and cloud
      infrastructure by optimizing resource allocations and workload placements. This revolutionary console
      shows you in a single glance which resources need attention and also provides the explicit actions
      required for optimization. Imagine knowing that you have the perfect amount of infrastructure to satisfy
      SLA and policy requirements, without having too much. And that your workloads are optimally placed and
      configured. This is the power of CiRBA Data Center Intelligence (DCI).

CiRBA's Control Console enables you to:

      1. Visualize - In a single glance, see which resources are appropriately placed, provisioned, and configured
      and which are at risk.

      2. Control - Precise actions are derived from policies and operational data to provide IT with
      unprecedented control over virtual and cloud infrastructure.

      3. Automate - Integrate DCI-Control with existing management systems to safely automate actions that
      improve efficiency and reduce risk.

Release Date: 4/22/2012          © Thomas Bronack - Application Migration Guideline Document             Page: 24
Wireshark – Network Analyzer
Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a
computer network. It is the de facto (and often de jure) standard across many industries and educational institutions.

Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a
project that started in 1998. (see www.wireshark.org for in-depth information and free download). Wireshark features include:

•    Deep inspection of hundreds of protocols, with more being added all the time
•    Live capture and offline analysis
•    Standard three-pane packet browser
•    Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
•    Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
•    The most powerful display filters in the industry
•    Rich VoIP analysis
•    Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog,
     Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network
     Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix
     K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
•    Capture files compressed with gzip can be decompressed on the fly
•    Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others
     (depending on your platform)
•    Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
•    Coloring rules can be applied to the packet list for quick, intuitive analysis
•    Output can be exported to XML, PostScript®, CSV, or plain text
•    Wireshark enables capturing and playback of transactions and network activity to benchmark / test migrated applications.
•    Wireshark can be used to test Business Recovery Applications at the remote site to insure they work properly and within
     Service Level Agreement guidelines.
•    Wireshark is a free product that can be downloaded and activated within minutes. It is an Open-Source product that can be
     tailored to the specific needs of your organization.

    Release Date: 4/22/2012             © Thomas Bronack - Application Migration Guideline Document                         Page: 25
Automated Tools
•    (ITIL v3) Information Technology Information Library version 3 for Forms Management and Control to support work flow
     and improve productivity.
•    AIX – Unix based operating system with GUI front ends and many tools to support present and future computing needs.
•    System “Z” – x86, Hx5 Blades, MF / Server, Scalable, Load Balancing, manage Virtual / Real computing
•    System “P” – Server Manager
•    IBM System “P7” (Power 7) – Watson computer used for Jeopardy and is extremely Scalable, Efficient and Powerful
•    zOS – MF, Server, Problem Management (Detect, Solve, Forward to Resolver, Analysis / Reporting) with extreme security
•    Tivoli – Omegamon XE, Storage Management, Tape System Optimization
•    DS8000 – Solid State to Disk Level to support priority processing, High I/O rate, Power Regulation controller
•    DS4000 – Fabric Storage Management, RAID Configuration, Configure Storage Arrays, Enclosure Drive Protection
•    TS3500 – Automated Tape / Cartridge Management System from picker to machine delivery and back
•    Double-Take – from Vision Systems and includes: “Recover Now”, Share, and Move modules that support:
      –    Recovery Point Objective (RPO) and Data Synchronization in virtual and real environments.
      –    Ensures aggressive Business Continuity Management over the environment and its data.
      –    Rewind Data for Continuous Data Protection, Roll-Back to Recovery Point, and Roll-Forward to pick-up point.
      –    Availability for Load Balancing, Transparent Recovery via Shut-Down, Move, Reconnect, and Restart operations.

•    The Use of these tools and the others mentioned in this presentation can support automated and incremental recovery
     operations for organizations of all sizes and we recommend you research their use for your company.



Release Date: 4/22/2012                  © Thomas Bronack - Application Migration Guideline Document                       Page: 26
ITIL V3 Overview
                                                           ITIL Five Phase approach to IT Service Support

                                                                  1.   Service Strategy,
                                                                  2.   Service Design,
                                                                  3.   Service Transition,
                                                                  4.   Service Operation, and
                                                                  5.   Continual Service Improvement.


                                       ITIL Available Modules
1. Service Strategy                                   3. Service Transition
      • Service Portfolio Management                        • Change Management
      • Financial Management                                • Project Management (Transition Planning and Support)
                                                            • Release and Deployment Management
2. Service Design                                           • Service Validation and Testing
      • Service Catalogue Management                        • Application Development and Customization
      • Service Level Management                            • Service Asset and Configuration Management
      • Risk Management                                     • Knowledge Management
      • Capacity Management
                                                      4. Service Operation
      • Availability Management
                                                            • Event Management
      • IT Service Continuity Management (BCM)
                                                            • Incident Management
      • Information Security Management (ISMS)
                                                            • Request Fulfillment
      • Compliance Management (Regulatory)
                                                            • Access Management
      • Architecture Management
                                                            • Problem Management
      • Supplier Management (Supply Chain)
                                                            • IT Operations Management
                                                            • Facilities Management

Release Date: 4/22/2012          © Thomas Bronack - Application Migration Guideline Document               Page: 27
IBM System “Z” overview
Built on a scalable, secure, reliable, simplified and cost-efficient infrastructure
       IBM System z is the ideal platform for meeting your Business Analytics needs for today while minimizing the costs of Business Analytics
       tomorrow. The server platform allows you to implement a single Business Analytics standard while providing Business Analytics as a
       service to your organization, for better corporate compliance and greater optimization.

Provide all decision-makers with complete, consistent, timely and relevant information
       • Easily scale to meet the needs of every decision-maker, from executives and line-of-business managers, financial and business analysts,
         to front line managers, partners and customers.
       • Offer a complete portfolio of business analytics on a single platform to meet business needs.
       • Provide a more complete view of the business with greater access to real-time data.

Increase user satisfaction and ROI
       • Obtain guaranteed system performance and availability (an enterprise SLA).
       • Provide faster time to value for the business.
       • Enable business units to shift their focus from administrative tasks to decision-making.

Reduce the cost and complexity of providing Business Analytics to your organization
       • Centralize resources and reduce the hardware, software and facilities (power, floor space, etc.) required to manage and maintain the
         Business Analytics infrastructure.
       • Significantly reduce the costs associated with Business Analytics system administration and facilities by upwards of 50% over 5 years.
       • Realize greater economies of scale, enabling IT to deliver Business Information (BI) to a broader audience at a reduced cost.
       • Make the high availability of your Business Analytics infrastructure a viable option for IT.

Make Business Analytics deployment easier
       •   Deploy in days/weeks on System Z instead of months.
       •   Reduce the time, resources and cost of delivering BI to new divisions, departments and users.
       •   Automate and facilitate self-service provisioning.
       •   Eliminate the cost-related barriers to introducing BI to new divisions/departments.

Simplify enforcement of corporate regulations and standards
       • Ensure corporate security policies are followed.
       • Ensure disaster recovery plans are in place.
       • Maintain control over business processes.
  Release Date: 4/22/2012                   © Thomas Bronack - Application Migration Guideline Document                               Page: 28
IBM System “P” overview
History

          • It was originally a line of workstations and servers called RS/6000, but the server line was then renamed to the eServer pSeries in
            2000 as part of its e-Server branding initiative.
          • With the advent of the POWER5 processor in 2004 the family was rebranded the eServer p5. With the global move of the server
            and storage brands to the System brand with the Systems Agenda, the family was renamed yet again to System p5 in 2005. The
            System p5 now encompasses the IBM OpenPower product line.
          • With the introduction of POWER6 processor models the new models are now being released under the System p brand, dropping
            the p5 designation.

Processors

          • Where RS/6000 used a mix of early POWER and PowerPC processors, when pSeries came along this had evolved into RS64-III and
            POWER3 across the board. POWER3 for its excellent floating point performance and RS64 for its scalability, throughput and integer
            performance.
          • IBM developed the POWER4 processor to replace both POWER3 and the RS64 line in 2001. After that the differences between
            throughput and number crunching optimized systems no longer existed. Since then System p machines evolved to use the
            POWER5 but also PowerPC 970 for the low end and blade systems.
          • The last System p systems used the POWER6 processor, such as the POWER6 based System p 570 and the JS22 blade. In addition
            IBM introduced during the SuperComputing 2007 (SC07) conference in Reno a new
            POWER6 based System p 575 with 32 POWER6 cores at 4.7 GHz and up to 256GB of
            RAM with water cooling.

Features

• All IBM System p5 and IBM eServer p5 machines support DLPAR (Dynamic Logical Partitioning)
  with Virtual I/O and Micro-partitioning.
• System p generally uses the AIX operating system and, more recently, 64-bit versions of the
  Linux operating system. Sun Microsystems is also developing an OpenSolaris port, currently
  experimental.[1]



Release Date: 4/22/2012                    © Thomas Bronack - Application Migration Guideline Document                                Page: 29
What is the Power7 processor?               IBM System Power 7 (P7) “Watson”
       The Power7 is the latest generation of IBM processors (chips) that are used as the CPUs in IBM mid range and high end open systems
       (pSeries) for Unix (AIX) and Linux as well as for the iSeries (aka AS400 successor). Building on previous Power series processors, the Power7
       increases the performance per core (CPU) along with the number of cores per socket (chip) footprint. For example, each Power7 chip that
       plugs into a socket on a processor card in a server can have up to 8 cores or CPUs. Note that sometimes cores are also known as micro CPUs
       as well as virtual CPUs not to be confused with their presented via Hypervisor abstraction.

       Sometimes you may also hear the term or phrase 2 way, 4 way (not to be confused with a Cincinnati style 4 way chili) or 8 way among
       others that refers to the number of cores on a chip. Hence, a dual 2 way would be a pair of processor chips each with 2 cores while a quad 8
       way would be 4 processors chips each with 8 cores and so on.

IBM Power7 with up to eight cores per processor (chip)

       In addition to faster and more cores in a denser footprint, there are also energy efficiency enhancements including Energy Star for
       enterprise servers qualification along with intelligent power management (IPM also see here) implementation. IPM is implanted in what
       IBM refers to as Intelligent Energy technology for turning on or off various parts of the system along
       with varying processor clock speeds. The benefit is when there is work to be done, get it down
       quickly or if there is less work, turn some cores off or slow clock speed down. This is similar to
       what other industry leaders including Intel have deployed with their Nehalem series of processors
       that also support IPM.

Additional features of the Power7 include (varies by system solutions):

• Energy Star for server qualified providing enhanced performance and efficiency.
• IBM Systems Director Express, Standard and Enterprise Editions for simplified management
  including virtualization capabilities across pools of Power servers as a single entity.
• PowerVM (Hypervisor) virtualization for AIX, iSeries and Linux operating systems.
• ActiveMemory enables effective memory capacity to be larger than physical memory, similar
  to how virtual memory works within many operating systems. The benefit is to enable a partition
  to have access to more memory which is important for virtual machines along with the ability to
   support more partitions in a given physical memory footprint.
• TurboCore and Intelligent Threads enable workload optimization by selecting the applicable mode for the work to be done. For example, single
  thread per core along with simultaneous threads (2 or 4) modes per core. The trade off is to have more threads per core for concurrent
  processing, or, fewer threads to boost single stream performance.
 Release Date: 4/22/2012                  © Thomas Bronack - Application Migration Guideline Document                                 Page: 30
IBM “zOS” System Overview
Major characteristics

z/OS supports stable mainframe systems and standards such as CICS, IMS, DB2, RACF, SNA, WebSphere MQ, record-oriented data access
methods, REXX, CLIST, SMP/E, JCL, TSO/E, and ISPF, among others. However, z/OS also supports 64-bit Java, C/C++, and UNIX (Single UNIX
Specification) APIs and applications through UNIX System Services.

The Open Group certifies z/OS as a compliant UNIX operating system — with UNIX/Linux-style hierarchical HFS and zFS file systems As a result,
z/OS hosts a broad range of commercial and open source software of any vintage. z/OS can communicate directly via TCP/IP, including IPv6,
and includes standard HTTP servers (one from Lotus, the other Apache - derived) along with other common services such as FTP, NFS,
and CIFS/SMB. Another central design philosophy is support for extremely high quality of service (QoS), even within a single operating system
instance, although z/OS has built-in support for Parallel Sysplex clustering.

z/OS has a unique Workload Manager (WLM) and dispatcher which automatically manages numerous concurrently hosted units of work running
in separate key-protected address spaces according to dynamically adjustable business goals. This capability inherently supports multi-tenancy
within a single operating system image. However, modern IBM mainframes also offer two additional levels of virtualization: LPARs and
(optionally) z/VM. These new functions within the hardware, z/OS, and z/VM — and Linux and OpenSolaris support — have encouraged
development of new applications for mainframes. Many of them utilize the WebSphere Application Server for z/OS middleware.
Because there is only one z/OS version (at least at present), releases are normally called "Release n," though more formally they are "Version 1
Release n" or "V1.n". The IBM Program Number for all z/OS Version 1 releases is 5694-A01.

From its inception z/OS has supported tri-modal addressing (24-bit, 31-bit, and 64-bit). Up through Version 1.5, z/OS itself could start in either
31-bit ESA/390 or 64-bit z/Architecture mode, so it could function on older hardware albeit without 64-bit application support on those
machines. (Only the newer z/Architecture hardware manufactured starting in the year 2000 can run 64-bit code.) IBM support for z/OS 1.5
ended on March 31, 2007. Now z/OS is only supported on z/Architecture mainframes and only runs in 64-bit mode. z/Architecture hardware
always starts running in 31-bit mode, but current z/OS releases quickly switch to 64-bit mode and will not run on hardware that does not
support 64-bit mode. Application programmers can still use any addressing mode: all applications, regardless of their addressing mode(s), can
coexist without modification, and IBM maintains an unwavering commitment to tri-modal backward compatibility. However, increasing numbers
of middleware products and applications, such as DB2 Version 8 and above, now require and exploit 64-bit addressing.

IBM markets z/OS as a flagship operating system, suited for continuous, high-volume operation with high security and stability. It is the most
popular mainframe operating system.

  Release Date: 4/22/2012                   © Thomas Bronack - Application Migration Guideline Document                                 Page: 31
IBM “zOS” System Overview                                                                                          (continued)

z/OS is available under standard license pricing as well as via System z New Application License Charges (zNALC) and "System z Solution
Edition," two lower priced offerings aimed at supporting newer applications ("new workloads"), U.S. standard commercial z/OS pricing starts
at about $125 per month, including support, for the smallest zNALC installation running the base z/OS product plus a typical set of optional
z/OS features.[
z/OS introduced Variable Workload License Charges (VWLC) and Entry Workload License Charges (EWLC) which are sub-capacity billing
options. VWLC and EWLC customers only pay for peak monthly z/OS usage, not for full machine capacity as with the previous OS/390
operating system. VWLC and EWLC are also available for most IBM software products running on z/OS, and their peaks are separately
calculated but can never exceed the z/OS peak. To be eligible for sub-capacity licensing, a z/OS customer must be running in 64-bit mode
(which requires z/Architecture hardware), must have completely eliminated OS/390 from the system, and must e-mail IBM monthly sub-
capacity reports. Sub-capacity billing substantially reduces software charges for most IBM mainframe customers. Advanced Workload License
Charges (AWLC) is the successor to VWLC on mainframe models starting with the zEnterprise 196 and EAWLC is an option on zEnterprise 114
models. AWLC and EAWLC offer further sub-capacity discounts.

The primary development center for z/OS is located at IBM's facilities in Poughkeepsie, New York, but numerous development centers in
several other countries contribute substantially to z/OS. As one example, IBM's center in Perth, Australia is mainly responsible for
z/OS's HLASM and DFSMS components.

64-bit memory support

Within each address space, z/OS typically only permits the placement of data above the 2GB "bar," not code. z/OS enforces this distinction
primarily for performance reasons. There are no architectural impediments to allowing more than 2GB of application code per address space.
IBM has started to allow Java code running on z/OS to execute above the 2GB bar, again for performance reasons.
Memory is obtained as "Large Memory Objects" in multiples of 1MB (with the expectation that applications and middleware will manage
memory allocation within these large pieces). There are three types of large memory objects:
        • Unshared - where only the creating address space can access the memory.
        • Shared - where the creating address space can give access to specific other address spaces.
        • Common - where all address spaces can access the memory. (This type was introduced in z/OS Release 10.)

Extreme security - In 1973, IBM published a unique "Statement of Integrity" for MVS which has been updated for z/OS and is still in force.


 Release Date: 4/22/2012                   © Thomas Bronack - Application Migration Guideline Document                               Page: 32
IBM Tivoli System Overview
Why Tivoli software
       A holistic approach to delivering and managing infrastructure services
       aligned to evolving business priorities.


What Tivoli offers

Visibility Control Automation ™
       An Integrated Service Delivery & Management platform optimized for:

       Asset and Facilities Management
              Improve efficiency and reduce the cost and risk of your assets, from medical devices to buildings.

       Business Service Management
              Improve customer satisfaction with increased availability of critical business services.

       Cloud and IT Transformation
              Lower the cost of your IT infrastructure and speed the delivery of innovative products and services.

       Data Protection and Storage Management
              Create a more responsive and resilient storage infrastructure.

       Enterprise Mobility Management
              Manage physical and virtual endpoints in real time and ensure compliance.

       Security
              Improve security, risk & compliance posture with automated threat protection & security controls.
Release Date: 4/22/2012            © Thomas Bronack - Application Migration Guideline Document                    Page: 33
IBM DS8000 I/O Priority Manager Overview
Abstract

The DS8000 I/O Priority Manager enables more effective storage consolidation and performance management
combined with the ability to align Quality of Service (QoS) levels to separate workloads in the system.

With DS8000 I/O Priority Manager, the system can prioritize access to system resources to achieve the volume's
desired QoS based on defined performance goals (high, medium, or low) of any volume. I/O Priority Manager
constantly monitors and balances system resources to help applications meet their performance targets
automatically, without operator intervention. Starting with DS8000 Licensed Machine Code (LMC) level R6.2, the
DS8000 I/O Priority Manager feature supports open systems and IBM System z®.

DS8000 I/O Priority Manager, together with IBM z/OS® Workload Manager (WLM), provides more effective
storage consolidation and performance management for System z systems. Now tightly integrated with Workload
Manager for z/OS, DS8000 I/O Priority Manager improves disk I/O performance for important workloads. It also
drives I/O prioritization to the disk system by allowing WLM to give priority to
the system's resources automatically when higher priority workloads are not
meeting their performance goals. Integration with zWLM is exclusive to
DS8000 and System z systems.

This slide is aimed at those who want to get an understanding of the DS8000
I/O Priority Manager concept and its underlying design. It provides guidance
and practical illustrations for users who want to exploit the capabilities of the
DS8000 I/O Priority Manager.



 Release Date: 4/22/2012           © Thomas Bronack - Application Migration Guideline Document        Page: 34
IBM DS4000 I/O Priority Manager Overview
  The DS4000 EXP810 is the latest disk drive enclosure in the DS4000 Series of
  products. This 3U enclosure has 4 Gbps Fibre Channel (FC) interfaces, and
  supports up to 16 disk drives.

  The 4 Gbps ready IBM System Storage EXP810 Storage Expansion Unit machine
  type (1812-81A) offers a new 16-bay disk enclosure for attachment to selected
  DS4000 Midrange Disk Systems, with up to 4.8 terabytes (TB) physical capacity
  per expansion unit using sixteen 300 GB disk drives.

  The EXP810 Storage Expansion Unit is designed to accommodate the new
  optional 2 Gbps Fibre Channel Enhanced Disk Drive Modules (E-DDM), as well as
  intermix of future optional 4 Gbps Fibre Channel Enhanced Disk Drive Modules
  (E-DDM), all within the same enclosure. Contains redundant (AC) power and
  cooling modules, and ESM interfaces. The DS4000 EXP810 is available in a 19-
  inch rack mount package.




Release Date: 4/22/2012   © Thomas Bronack - Application Migration Guideline Document   Page: 35
IBM TS3500 Automated Tape Manager Overview
Highlights

Supports highly scalable, automated data retention on tape utilizing
LTO Ultrium and IBM 3592 and TS1100 families of tape drives.

Delivers extreme scalability and capacity, growing from 1 to 16 frames
per library and from one to 15 libraries per library complex using the
TS3500 shuttle connector.

Provides up to 900 PB of automated, low-cost storage under a single library image,
dramatically improving floor space utilization and reducing storage cost per terabyte.

Offers optional second robotic accessor to enhance data availability and reliability.

Enables data security and regulatory compliance via support for tape drive encryption and WORM cartridges.

The IBM® System Storage® TS3500 Tape Library is designed to provide a highly scalable, automated tape library for mainframe
and open systems backup and archive that can scale from midrange to enterprise environments.

The TS3500 Tape Library continues to lead the industry in tape drive integration with features such as persistent World Wide
Name, multipath architecture, drive/media exception reporting, remote drive/media management, and host-based path
failover.

The TS3500 Tape Library supports IBM System z® when used with the IBM 3953 Tape System, the IBM Virtualization Engine
TS7740, or the IBM System Storage® Tape Controller for System z with its embedded library manager. These systems enable
System z hosts to access the TS3500 Tape Library cartridge inventory and allow connection to TS1140, TS1130, TS1120 and
IBM TotalStorage 3592 Model J1A Tape Drives. The TS3500 Tape Library can support up to four 3953 tape systems, up to eight
IBM Virtualization Engine TS7740 subsystems per physical library, and up to sixteen IBM System Storage Tape Controllers for
System z per logical library.

Release Date: 4/22/2012                © Thomas Bronack - Application Migration Guideline Document                      Page: 36
Double-Take Software Overview    Produced by Vision Systems

 Double-Take Availability for AIX                              Double-Take RecoverNow for AIX

 Double-Take for AIX has simplified failover management        Double-Take RecoverNow’s replication technology provides
 to meet the most aggressive Recovery Time Objectives,         superior performance that allows for a high level of system
 providing high availability for the masses.                   scalability and satisfies aggressive Recovery Time Objectives.

 Monitoring and automated failover ensures business                   • Reliable, affordable offsite data protection.
 continuity for customers, partners, and employees.                   • Supports physical and virtual environments.
                                                                      • Real time capture of data changes and replication to
        •   Failover to local or remote nodes for reliable,             a recovery system
            affordable offsite data protection.                       • Maintains write order consistency to ensure data
                                                                        integrity for disaster recovery
        •   Protects both physical and virtual AIX                    • Intelligent and efficient re-sync of production and
            environments.                                               recovery systems in the event of lost connectivity
                                                                      • In the event of a disaster, applications can be
        •   Eliminates the IT costs and business                        immediately restarted on the recovery system
            consequences of downtime and data loss.                   • Eliminates the IT costs and business consequences
                                                                        of downtime and data loss
        •   Removes the exposure to major data loss of                • Ensures business continuity for your customers,
            conventional backup and restore                             partners and employees
            technologies.                                             • Removes the exposure to major data loss of
                                                                        conventional backup and restore technologies
                                                                      • Storage independence avoids vendor lock-in and
                                                                        maximizes existing storage investments




Release Date: 4/22/2012              © Thomas Bronack - Application Migration Guideline Document                     Page: 37
Double-Take Software Overview                                                                                   continued


Double-Take Share for AIX:                                    Double-Take Move for AIX:

•      Real time data replication.                            With solutions for Windows®, Linux®, AIX® and IBM® I, Vision leads the
                                                              way in keeping systems and applications resilient and available. Whether
•      Reliable change data capture ensures data              you need an easier, more reliable disaster recovery solution, want
       integrity.                                             to manage and share data seamlessly between platforms and databases,
                                                              need a better way to maintain system efficiency, or you need a
•      Built-in conflict resolution and collision             comprehensive high availability solution for assured 24/7 operations,
       monitoring.                                            Vision Solutions has what you’re looking for - including your physical
                                                              environments, your virtual environments, as well as the cloud.
•      Accurate tracking and data auditing.                   SAN Array-Based Replication and Double-Take Availability.

•      Ensures delivery of replicated data even if the        High Availability
       target system is unavailable.                          Deliver nonstop business continuity and boost productivity. Innovative,
                                                              easy to use switching and replication solutions eliminate costly IT
•      LAN/WAN friendly.                                      downtime.

•      Real time, integrated data from divergent              Disaster Recovery
       sources allows for better informed decision            Protect critical information and recover lost data in a fraction of the time
       making.                                                and effort of traditional tape backup solutions. Affordable, automated
                                                              solutions deliver the power of continuous data protection and the
                                                              flexibility of in-house or hosted recovery options.

                                                              Data Sharing and Migration
                                                              Data center consolidation and virtualization initiatives save
                                                              organizations a great deal of money. Now you can move and share data
                                                              with unprecedented ease and efficiency. Powerful yet flexible solutions
                                                              let you unlock the maximum business value of your data.

    Release Date: 4/22/2012                 © Thomas Bronack - Application Migration Guideline Document                         Page: 38

Contenu connexe

Tendances

DBaaS - The Next generation of database infrastructure
DBaaS - The Next generation of database infrastructureDBaaS - The Next generation of database infrastructure
DBaaS - The Next generation of database infrastructureEmiliano Fusaglia
 
Innovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center ArchitecturesInnovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center ArchitecturesCisco Canada
 
System Integration PowerPoint Presentation Slides
System Integration PowerPoint Presentation Slides System Integration PowerPoint Presentation Slides
System Integration PowerPoint Presentation Slides SlideTeam
 
Microservice architecture case study
Microservice architecture case studyMicroservice architecture case study
Microservice architecture case studyRudra Tripathy
 
Ifra 솔루션 제품소개서
Ifra 솔루션 제품소개서Ifra 솔루션 제품소개서
Ifra 솔루션 제품소개서oyoma
 
Client Onboarding PowerPoint Presentation Slides
Client Onboarding PowerPoint Presentation SlidesClient Onboarding PowerPoint Presentation Slides
Client Onboarding PowerPoint Presentation SlidesSlideTeam
 
Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...
Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...
Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...Databricks
 
Managed Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help DeskManaged Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help DeskAmit Panchal
 
Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017ioshean
 
Orion Context Broker 20220526
Orion Context Broker 20220526Orion Context Broker 20220526
Orion Context Broker 20220526Fermin Galan
 
On Prem vs Cloud SlideShare
On Prem vs Cloud SlideShareOn Prem vs Cloud SlideShare
On Prem vs Cloud SlideShareTim Conti
 
Dynamics 365 and Azure Functions scenarios
Dynamics 365 and Azure Functions scenariosDynamics 365 and Azure Functions scenarios
Dynamics 365 and Azure Functions scenariossalimmtl
 
Presentation of helpdesk
Presentation of helpdeskPresentation of helpdesk
Presentation of helpdeskArchana Negi
 

Tendances (14)

DBaaS - The Next generation of database infrastructure
DBaaS - The Next generation of database infrastructureDBaaS - The Next generation of database infrastructure
DBaaS - The Next generation of database infrastructure
 
Innovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center ArchitecturesInnovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center Architectures
 
System Integration PowerPoint Presentation Slides
System Integration PowerPoint Presentation Slides System Integration PowerPoint Presentation Slides
System Integration PowerPoint Presentation Slides
 
Microservice architecture case study
Microservice architecture case studyMicroservice architecture case study
Microservice architecture case study
 
Ifra 솔루션 제품소개서
Ifra 솔루션 제품소개서Ifra 솔루션 제품소개서
Ifra 솔루션 제품소개서
 
Client Onboarding PowerPoint Presentation Slides
Client Onboarding PowerPoint Presentation SlidesClient Onboarding PowerPoint Presentation Slides
Client Onboarding PowerPoint Presentation Slides
 
Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...
Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...
Building an Enterprise Data Platform with Azure Databricks to Enable Machine ...
 
Managed Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help DeskManaged Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help Desk
 
Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017
 
Orion Context Broker 20220526
Orion Context Broker 20220526Orion Context Broker 20220526
Orion Context Broker 20220526
 
On Prem vs Cloud SlideShare
On Prem vs Cloud SlideShareOn Prem vs Cloud SlideShare
On Prem vs Cloud SlideShare
 
Dynamics 365 and Azure Functions scenarios
Dynamics 365 and Azure Functions scenariosDynamics 365 and Azure Functions scenarios
Dynamics 365 and Azure Functions scenarios
 
CQRS and Event Sourcing with Axon Framework
CQRS and Event Sourcing with Axon FrameworkCQRS and Event Sourcing with Axon Framework
CQRS and Event Sourcing with Axon Framework
 
Presentation of helpdesk
Presentation of helpdeskPresentation of helpdesk
Presentation of helpdesk
 

En vedette

PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB
 
Toronto VMUG - November 13, 2013 - CiRBA
Toronto VMUG - November 13, 2013 - CiRBAToronto VMUG - November 13, 2013 - CiRBA
Toronto VMUG - November 13, 2013 - CiRBAtovmug
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTContinuity and Resilience
 
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...BCM Institute
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBCContinuity and Resilience
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recoveryAdeel Javaid
 
10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...
10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...
10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...Brandon Fix
 
3mf infinity-and-beyond
3mf infinity-and-beyond3mf infinity-and-beyond
3mf infinity-and-beyondmikaelbarbero
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.inSatya Yadav
 
5M lines of code migration
5M lines of code migration5M lines of code migration
5M lines of code migrationmikaelbarbero
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Fadi Semaan
 
VMTurbo Overview July 2015 v7
VMTurbo Overview July 2015 v7VMTurbo Overview July 2015 v7
VMTurbo Overview July 2015 v7Michael Nagar
 
Business Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeBusiness Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeDipankar Ghosh
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
Unix to Red Hat Enterprise Linux
Unix to Red Hat Enterprise Linux Unix to Red Hat Enterprise Linux
Unix to Red Hat Enterprise Linux Syed Shaaf
 

En vedette (20)

VmTurbo
VmTurboVmTurbo
VmTurbo
 
Business resiliency workshop
Business resiliency workshopBusiness resiliency workshop
Business resiliency workshop
 
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
 
Toronto VMUG - November 13, 2013 - CiRBA
Toronto VMUG - November 13, 2013 - CiRBAToronto VMUG - November 13, 2013 - CiRBA
Toronto VMUG - November 13, 2013 - CiRBA
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
 
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBC
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
 
10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...
10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...
10 tough decisions donor data migration decisions (Webinar hosted by Bloomera...
 
3mf infinity-and-beyond
3mf infinity-and-beyond3mf infinity-and-beyond
3mf infinity-and-beyond
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
 
5M lines of code migration
5M lines of code migration5M lines of code migration
5M lines of code migration
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud
 
VMTurbo Overview July 2015 v7
VMTurbo Overview July 2015 v7VMTurbo Overview July 2015 v7
VMTurbo Overview July 2015 v7
 
Business Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeBusiness Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In Practice
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Unix to Red Hat Enterprise Linux
Unix to Red Hat Enterprise Linux Unix to Red Hat Enterprise Linux
Unix to Red Hat Enterprise Linux
 
Application Migrations at Scale
Application Migrations at ScaleApplication Migrations at Scale
Application Migrations at Scale
 

Similaire à Application migration guideline document

Application Compatibility Planning Service
Application Compatibility Planning ServiceApplication Compatibility Planning Service
Application Compatibility Planning ServiceChristopherSilver
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012DDLS
 
An Execution Approach to Large-Scale SOA Technology Migration
An Execution Approach to Large-Scale SOA Technology MigrationAn Execution Approach to Large-Scale SOA Technology Migration
An Execution Approach to Large-Scale SOA Technology MigrationCognizant
 
Step by-step cloud migration checklist
Step by-step cloud migration checklist Step by-step cloud migration checklist
Step by-step cloud migration checklist Forte Group
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureBob Rhubart
 
Migração - EBC on the road Brazil Edition [Portuguese]
Migração - EBC on the road Brazil Edition [Portuguese]Migração - EBC on the road Brazil Edition [Portuguese]
Migração - EBC on the road Brazil Edition [Portuguese]Amazon Web Services
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloudRaj Raj
 
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...David O'Dowd
 
Dec 2012 Evening Talk - Managing Complex Project
Dec 2012 Evening Talk - Managing Complex ProjectDec 2012 Evening Talk - Managing Complex Project
Dec 2012 Evening Talk - Managing Complex ProjectZulkefle Idris
 
Skyward Erp Presentation
Skyward Erp PresentationSkyward Erp Presentation
Skyward Erp Presentationvishalnvora1
 
The 2014 AWS Enterprise Summit - Where to Begin
The 2014 AWS Enterprise Summit - Where to BeginThe 2014 AWS Enterprise Summit - Where to Begin
The 2014 AWS Enterprise Summit - Where to BeginAmazon Web Services
 
SharePoint Migration-What you need to know
SharePoint Migration-What you need to knowSharePoint Migration-What you need to know
SharePoint Migration-What you need to knowOliver Wirkus
 
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs
 
Nicholas king oracle epm migration and upgrade
Nicholas king   oracle epm migration and upgradeNicholas king   oracle epm migration and upgrade
Nicholas king oracle epm migration and upgradenking821
 
Docker for the Enterprise with Containers as a Service by Banjot Chanana
Docker for the Enterprise with Containers as a Service by Banjot ChananaDocker for the Enterprise with Containers as a Service by Banjot Chanana
Docker for the Enterprise with Containers as a Service by Banjot ChananaDocker, Inc.
 
PLM Implementation services
PLM Implementation servicesPLM Implementation services
PLM Implementation servicesGeometric Ltd.
 
Cloud migration presentation
Cloud migration presentationCloud migration presentation
Cloud migration presentationtyronechinnia
 

Similaire à Application migration guideline document (20)

Application Compatibility Planning Service
Application Compatibility Planning ServiceApplication Compatibility Planning Service
Application Compatibility Planning Service
 
Camo
CamoCamo
Camo
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
 
An Execution Approach to Large-Scale SOA Technology Migration
An Execution Approach to Large-Scale SOA Technology MigrationAn Execution Approach to Large-Scale SOA Technology Migration
An Execution Approach to Large-Scale SOA Technology Migration
 
Step by-step cloud migration checklist
Step by-step cloud migration checklist Step by-step cloud migration checklist
Step by-step cloud migration checklist
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
 
Migração - EBC on the road Brazil Edition [Portuguese]
Migração - EBC on the road Brazil Edition [Portuguese]Migração - EBC on the road Brazil Edition [Portuguese]
Migração - EBC on the road Brazil Edition [Portuguese]
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
 
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
 
Dec 2012 Evening Talk - Managing Complex Project
Dec 2012 Evening Talk - Managing Complex ProjectDec 2012 Evening Talk - Managing Complex Project
Dec 2012 Evening Talk - Managing Complex Project
 
Skyward Erp Presentation
Skyward Erp PresentationSkyward Erp Presentation
Skyward Erp Presentation
 
The 2014 AWS Enterprise Summit - Where to Begin
The 2014 AWS Enterprise Summit - Where to BeginThe 2014 AWS Enterprise Summit - Where to Begin
The 2014 AWS Enterprise Summit - Where to Begin
 
SharePoint Migration-What you need to know
SharePoint Migration-What you need to knowSharePoint Migration-What you need to know
SharePoint Migration-What you need to know
 
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
XebiaLabs, CloudBees, Puppet Labs Webinar Slides - IT Automation for the Mode...
 
Nicholas king oracle epm migration and upgrade
Nicholas king   oracle epm migration and upgradeNicholas king   oracle epm migration and upgrade
Nicholas king oracle epm migration and upgrade
 
Docker for the Enterprise with Containers as a Service by Banjot Chanana
Docker for the Enterprise with Containers as a Service by Banjot ChananaDocker for the Enterprise with Containers as a Service by Banjot Chanana
Docker for the Enterprise with Containers as a Service by Banjot Chanana
 
Newt global meetup microservices
Newt global meetup microservicesNewt global meetup microservices
Newt global meetup microservices
 
PLM Implementation services
PLM Implementation servicesPLM Implementation services
PLM Implementation services
 
Cloud migration presentation
Cloud migration presentationCloud migration presentation
Cloud migration presentation
 
marco-tedone-cv
marco-tedone-cvmarco-tedone-cv
marco-tedone-cv
 

Plus de Thomas Bronack

Personnel Productivity System - Exec Pres
Personnel Productivity System - Exec PresPersonnel Productivity System - Exec Pres
Personnel Productivity System - Exec PresThomas Bronack
 
Utilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiencyUtilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiencyThomas Bronack
 
Optimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboardsOptimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboardsThomas Bronack
 
Dcag training on VMware DR Process
Dcag training on VMware DR ProcessDcag training on VMware DR Process
Dcag training on VMware DR ProcessThomas Bronack
 
Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...Thomas Bronack
 
Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.Thomas Bronack
 
Optimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentOptimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentThomas Bronack
 
Dcag service optimization offering01
Dcag service optimization offering01Dcag service optimization offering01
Dcag service optimization offering01Thomas Bronack
 
Recovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackRecovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackThomas Bronack
 
Auditing contingency Plans
Auditing contingency PlansAuditing contingency Plans
Auditing contingency PlansThomas Bronack
 
Equipment Redeployment and Termination Procedures
Equipment Redeployment and Termination ProceduresEquipment Redeployment and Termination Procedures
Equipment Redeployment and Termination ProceduresThomas Bronack
 
Article on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationArticle on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationThomas Bronack
 
Updated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance PresentationUpdated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance PresentationThomas Bronack
 
Smaller Presentation on Enterprise Resiliency and Corporate Certification
Smaller Presentation on Enterprise Resiliency and Corporate CertificationSmaller Presentation on Enterprise Resiliency and Corporate Certification
Smaller Presentation on Enterprise Resiliency and Corporate CertificationThomas Bronack
 
Exec Presentation on Achieving Enterprise Resiliency and Corporate Certification
Exec Presentation on Achieving Enterprise Resiliency and Corporate CertificationExec Presentation on Achieving Enterprise Resiliency and Corporate Certification
Exec Presentation on Achieving Enterprise Resiliency and Corporate CertificationThomas Bronack
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceThomas Bronack
 
Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013Thomas Bronack
 
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationThomas Bronack
 
Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(Thomas Bronack
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 

Plus de Thomas Bronack (20)

Personnel Productivity System - Exec Pres
Personnel Productivity System - Exec PresPersonnel Productivity System - Exec Pres
Personnel Productivity System - Exec Pres
 
Utilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiencyUtilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiency
 
Optimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboardsOptimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboards
 
Dcag training on VMware DR Process
Dcag training on VMware DR ProcessDcag training on VMware DR Process
Dcag training on VMware DR Process
 
Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...
 
Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.
 
Optimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentOptimizing the IT and Business Environment
Optimizing the IT and Business Environment
 
Dcag service optimization offering01
Dcag service optimization offering01Dcag service optimization offering01
Dcag service optimization offering01
 
Recovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackRecovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom Bronack
 
Auditing contingency Plans
Auditing contingency PlansAuditing contingency Plans
Auditing contingency Plans
 
Equipment Redeployment and Termination Procedures
Equipment Redeployment and Termination ProceduresEquipment Redeployment and Termination Procedures
Equipment Redeployment and Termination Procedures
 
Article on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationArticle on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate Certification
 
Updated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance PresentationUpdated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance Presentation
 
Smaller Presentation on Enterprise Resiliency and Corporate Certification
Smaller Presentation on Enterprise Resiliency and Corporate CertificationSmaller Presentation on Enterprise Resiliency and Corporate Certification
Smaller Presentation on Enterprise Resiliency and Corporate Certification
 
Exec Presentation on Achieving Enterprise Resiliency and Corporate Certification
Exec Presentation on Achieving Enterprise Resiliency and Corporate CertificationExec Presentation on Achieving Enterprise Resiliency and Corporate Certification
Exec Presentation on Achieving Enterprise Resiliency and Corporate Certification
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry compliance
 
Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013
 
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate Certification
 
Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 

Application migration guideline document

  • 1. Migrating Applications to a Target Data Center and the use of Cloud Computing Created by: Tom Bronack, president Data Center Assistance Group, Inc. 15180 20th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Email: bronackt@dcag.com Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 1
  • 2. Mission Statement 1. Migrate Applications from one, or many, data centers to Primary, Secondary, and/or Recovery Data Centers. 2. Reduce Costs while sustaining current, or increasing, work loads and providing continuous operations and supplementing future growth. 3. Reduce foot print, infrastructure, and locations that will no longer be needed. Sell, or donate, surplus equipment via Asset Management process. 4. Utilize latest technologies to support improved performance, reliability, and continuation of business should a disaster event occur. 5. Integrate new operations through automated forms management and control system (ITIL or similar) that will accept “Work Orders” and associated “Purchase Orders” for development, implementation, support, maintenance, and recovery services. 6. Integrate Management Reporting and Awareness to better manage the new environment. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 2
  • 3. Objectives 1. Define Target environment(s) and their infrastructure, equipment, systems, and locations. 2. Establish migration process and the teams that will be needed to support the effort, then define their functional responsibilities. 3. Define Migration Life Cycle and sequence of functions to be performed. 4. Define tools needed to support migration effort and have personnel trained on new tools. Integrate tool usage within personnel functional responsibilities. 5. Identify applications to be migrated and the phase during which they will be moved to the target data center. Create a detailed Project Plan to support the migration. 6. Create Bench Mark and Performance guidelines to establish baseline and performance improvements associated with migration. 7. Implement Support, Problem, and Change Management procedures along with other system management functions needed to support applications. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 3
  • 4. Migration Pathway SCOPE OF SERVICES The Conversion Specialist will be responsible for providing insight, planning and execution of conversion activities for management systems. The conversion specialist will be responsible for: • Establishing management group and reporting schedule. • Creating Risk Assessment to identify compliance and security guidelines. • Develop Target Environment profile. • Identify applications and data to be migrated. • Review Service Level Agreements for applications being migrated and insure Service Level Reporting is adequate. • Define IT Security, Encryption, Real-Time / Incremental backups, and failover requirements. • Create application migration project plan with identified resources, timeframe, and costs. • Determine use of Cloud Computing (internal / external) and define backup and recovery requirements. • Identify automated tools needed to support identification, migration, and tuning process – like ADDM, Sharkwire / Opnet, CiRBA, Double-Talk, AIX, Tivoli and any other identified automated tools. • Define migration path from selection through verification, package creation, and migration. • Implement Migration Factory and other functional areas needed to perform migration duties. • Perform Bench Marking of original system and migrated system and report on results. MANDATORY SKILLS/EXPERIENCE: • Demonstrated depth of knowledge migrating applications. • Demonstrated experience migrating / converting multiple and multi-platform legacy systems into a single system. • Experience in the development of conversion cleanup reporting for use by subordinate staff during data purification. • Demonstrated success managing large-scale conversion projects. • Direct management of analysts and programmers coding conversion routines. • Experience in required applications and technical requirements. • Project Management experience. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 4
  • 5. Migration Work Cycle / Flow Start Define Target Systems and Location(s) Infrastructure Equipment Environment Applications Perform Risk Identify Staff Suppliers and Clients Assessment & Functions Vendors Establish Define Define Migration Management Define Functional Assign Migration Life Process and Teams Responsibilities Functions Cycle Create Establish Obtain Tools Define Tool Migration Reporting Cycle and Train Staff Requirements Project Plan A Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 5
  • 6. Migration Work Cycle / Flow continued A Create Migration Define Migration Define Define Migration Groups & Application Components in Move Phases & Functions Groups Migration Groups Timeframes Log Migration Submit Groups Benchmark Groups and to Migration Application Groups Schedule Factory prior to move Initiate Copy Migration Benchmark Verify Successful Migration Groups via Migration Migration Process Double-Take Application Groups Compare Report Results of Improvement Benchmark Migration Phase ? Results B Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 6
  • 7. Migration Work Cycle / Flow continued B Review Perform Identify Areas Implement Migration for Migration for Improvement Improvements Improvements Postmortem N Y Improvement Retest and Report ? on Results Implement Service Level Systems Development & Systems Agreements & Development Maintenance Management Reporting Life Cycle (SDLC) Support, Capacity & Security and Problem & Performance Recovery Change Repeat Process by Dispose / Donate Profit from space, See Asset Identify Surplus Group Until Complete in accordance to equipment sales, Management Equipment Disciplines page EPA and DoD and personnel Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 7
  • 8. Can be sorted by: Equipment Type, Asset Management Disciplines Disposition, Date, or Location “Dispose of Surplus equipment after Migration to Pick-Up List Target Data Center(s) to reap profit from sales, Equip. Type: Disp: Location: return of equipment storage space, and personnel.” PC A Bldg 3, Rm 203 Start PC R Bldg 1, Rm 405 PC T Bldg 2, Rm 501 Disposition = ‘A’ Acquire Purchase Install Add to Master Equipment Order Equipment Master Inventory Inventory Equipment is being Actively used Disposition = ‘R’ N, Exceptions List Generated Re-deploy Work Compare to Pick-Up Warehouse Equipment Master Inventory Y Order Inventory Inventory Equipment is moved to new location Perform Service Services Order Disposition = ‘T’ Terminate Work Service Ready-to-Sell Purchase Release Finance Equipment Order Order Inventory Order Form Form Equipment is Sold or Disposed of Marketing & Sales End Archive Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 8
  • 9. Updating the Standards and Procedures Manual Status = ‘T’ Equipment Standards Status = ‘D’ And Equipment Termination Procedures Status Manual = ‘R’ Equipment Donation Procedures Redeployment Procedures • Log & schedule, Update manual to Procedures • Pick-up, • Log & schedule, • Data Wipe, Include new procedures • Pick-up, • Reconfigure, for equipment • Log & schedule, Redeployment, • Data Wipe, • Certify, • Pick-up, • Reconfigure, Donation, and • Package, • Data Wipe, • Certify, Termination in • Store, • Reconfigure, • Package, accordance with Legal, • Sell, • Package, • Store, Environmental, Business, • Client Pick-up, • Store, • Donate, and Regulatory • Financials, • Deliver, • Document, Requirements. • Document, • Document, • Notify, • Notify, • Notify, • Track, Train Staff on new • Track, procedures and provide • Track, • History. • History. Maintenance and Support • History. Services going forward. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 9
  • 10. Systems Management Organization Systems Management Data Processing and Controls (SMC) Environment Service Level Management Application Production Contingency Change Inventory Development Acceptance Management Management & Asset (PLC) Management Application EDP Security Problem Production Configuration Management Management Maintenance Operations Management Capacity Application Vital Records Testing Management Management Performance Quality Business Risk Disaster Management Assurance Recovery Management Management Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 10
  • 11. Logical Example of Enterprise Target Environment Overview of the Enterprise Information Technology Environment Physically Transported Using Tape Remote Only Encryption Tape / Data Customers; Vault Remote Credit Bureaus; Feed-Files; and, Electronic Vaulting; Locations Other Locations. Incremental Vaulting; and, Encrypting Data-In- Electronic transmission to Disaster Movement will protect Disaster Recovery Site data being transmitted to Recovery Site remote sites Electronic Transmission Local Electronic Local Transmission Tape / Data Tape / Data Vault Open Network Vault With Multiple Access Points Local Local Encryption of “Data at Rest” Sites Sites to Provide Total Protection Production Production Site #2 Site #1 Cloud Company Computing Data Systems Development Life Cycle (SDLC) Send Approved Applications To Production New Acceptance Problem Resolution End User Applications And “Work Order” Enhancements to create a new Product or Testing and Service Development Maintenance Quality Assurance Development And Maintenance Environments Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 11
  • 12. Target Environment Intel Builds Dell x86 Dell x86 Servers IBM AIX P7 (“Watson”) Chips for their Servers Systems using AIX VMware vSphere 5 and AIX Tivoli 1 million I/O per Sec. Remote Storage Double-Talk Local Storage Cisco Network Equipment for remote locations VMware vSphere 5 Software Supports : NetApp NAS to support • vShield for Cloud Computing - Remote and Cloud Storage EMC SAN, supporting 2 security, control, and compliance. channels, AIX Storage Array, • vCenter Site Recovery Manager 5. up to 2 TeraBytes of Local • vCloud Director 5 – model and storage activate recovery and failover. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 12
  • 13. SDLC Documentation Requirements and Forms Automation New Product / Service Development Request Form Life Cycle Documents are Linked to from Date Field Development Request Form Development: Development Request Form Number Phase: Date Business Need Documentation Application Overview Audience (Functions and Job Descriptions) User Information _____________ Business / Technical Review Data Cost Justification Business Justification _____________ Build or Buy Decision Link to Interfaces (Predecessor / Successor) Technical Justification _____________ Documents Request Approval Build or Buy _____________ Testing: Development (Build / Modify) _____________ Data Sensitivity & Access Controls IT Security Management System Test: _____________ Documentation Encryption Vital Records Management Unit Testing _____________ Data Synchronization Backup and Recovery System Testing _____________ Vaulting (Local / Remote) Disaster Recovery Regression Testing _____________ Business Recovery Quality Assurance _____________ Quality Assurance: Application Owner Production Acceptance _____________ Documentation Documentation & Training Application Support Personnel Production _____________ End User Coordinators Vendors and Suppliers Support (Problem / Change) _____________ Recovery Coordinators Testing Results Maintenance (Fix, Enhancement) _____________ Documentation _____________ Production Acceptance Application Setup Documentation Input / Process / Output Recovery _____________ Messages and Codes Awareness and Training _____________ Circumventions and Recovery Recovery Site Information Travel Instructions Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 13
  • 14. Systems Development Life Cycle (SDLC), Components and flow Development Testing Quality Production Acceptance Assurance End-User Naming, Security, On-Line Request for Unit and Documents, Vital Records, Data Files New Product System and Back-up, Or Service Testing Recovery, Placement Audit. BKUP On-Line BKUP Data Files Enhance Version And And Security, Production End-User Defines: Repair Release Vital Records, • Business Purpose, Control Back-up, • Business Data, Recovery, BKUP • Ownership, Audit. • Sensitivity, New Change • Criticality, Maintenance Management • Usage, • Restrictions, On-Line Update Data Files • RTO and RPO, • Back-Up, and • Recovery. Business Disaster End-User Recovery Real-Time Recovery Recovery Off-Site Location Facility Facility Vault Periodic / Company or Incremental Vendor or Client Site Vendor or Company Site company Site Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 14
  • 15. Systems Management Controls and Workflow Service Level Reporting, Capacity Management, Performance Management, Problem Management, Inventory Management, Configuration Management. Production Production Development Testing Quality Batch and On-Line Assurance Acceptance Management Product or Service, Walk Thru’s, Batch / On-Line, Service Level Management, Test Validation, Unit Testing, Security / Encryption, Project Life Cycle, Components, System Testing, Operations, Work Order, Naming, Regression, Recovery, Placement, Purchase Order(s), Scenarios, Functionality, EDP Audit. Vital Documentation. Scripts, Process. Records Recovery Tests, Benchmarks, Post Mortem. Maintenance Change Management Disaster Off-Site Recovery Vault Service Level Management, Project Life Cycle. Systems Development Life Cycle, Component & Release Management, Standards & Procedures, User Guides & Vendor Manuals, Training (CBT & Classroom), etc... Disaster Recovery Facility A Forms Management & Control System, used to originate Mainframe and Office Recovery work requests and track work until completed, will facilitate optimum staff productivity and efficiency. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 15
  • 16. Quality Assurance and PLC Checkpoints Interfaces Between Applications, QA, and Production Groups. TESTING and QA Turnover Package Components:_________ • Service Form and results Assessments, • Change & Release Notes, Create Perform Perform Perform Application • Application Group Testing Results, Service Technical Business Requested Group • Test Scenarios & Scripts, Request Assessment Assessment Work Testing • Messages & Codes, and Recoveries, • Data for Regression and Normal Testing, • Documentation. Error Loop CP # 1 No Yes Create QA Return Turnover to Successful Package Submitter APPLICATIONS GROUP QA GROUP Perform Perform QA Schedule QA Review Post- Requested Review Request And Mortem Work Meeting Accept Error CP # Loop 2 PRODUCTION CONTROL CP # Turnover Package Components: 3 Create • Explanation and Narrative, Perform • Files to be released, No Yes Production Submit to User • Predecessor Scheduling, Successful Control Production Acceptance • Special Instructions, Turnover Control Testing • Risk Analysis, Package • Authorizations. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 16
  • 17. “Problem Identification and Response process” Problem Recovery Techniques Diagnostic Tools Omegamon AF / Operator Users NCC Netview OPC / ESA Problem Problem Indicators Resolvers OCC HD Console Completion Unexpected Reference Materials Contacts Log Code Results Messages Job Escalation Symptoms and Codes Run Book Immediate Problem Descriptions actions Analyze Possible Actions to Meaning Causes be Taken Problem Resolvers Circumvent Problem Bypass Procedures 1 System Software Recovery Restart Document Procedures Procedures 2 Comm. Systems Log Problem 3 Corp. Security Route / Problem 4 Data Base Systems Problem History Problem Follow-on Actions Escalate Record Repository 5 Storage Systems Track 6 Cap. & Performance Resolve 7 Decision Support Review Problem Reporting 8 Optical Storage Post and Resolution Procedures Mortem 9 CICS and On-lines Upgrade Job S&P User Inventory & 10 Systems Mgmt. Supportive Run Books Manual Guides Configuration and Controls Documentation Problem Feed-Back, Rerouting and Escalation Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 17
  • 18. Business Continuity Management Disciplines and Integration Charter: Contingency Eliminate Business Interruptions; Ensure Continuity of Business; Contingency Recovery Planning Minimize Financial Impact; and Disciplines Adhere to Legal / Regulatory “These four Contingency Planning Requirements Disciplines allow for logical work separation and better controls” Disaster Business Recovery Recovery Corporate Asset “Establishing interfaces with key Information Technology Protection departments will allow for the inclusion Protection of corporate-wide recovery procedures Critical Jobs; Risk Inventory Control (Security, Salvage, and Restoration, etc.) Management Asset Management Data Sensitivity and Access in department specific Recovery Plans” Controls; Configuration Vital Records Management; Risk Management Management Vaulting and Data Recovery; Business Continuity; and Recovery Time Objectives; Exposures (Gaps and Office Recovery. Recovery Point Objectives; and Exceptions); Mainframe, Mid-Range, and Insurance; Servers. Legal / Regulatory Requirements; Cost Justification; and Executive Information Vendor Agreements. Management Technology Facilities Company “Contingency Planning affects every part of the Operations organization and is separated into logical work Contingency areas along lines of responsibility”. Personnel Recovery Planning Auditing General Services Public Finance Relations Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 18
  • 19. Fully Integrated Recovery Operations and Disciplines (End Goal) Private Sector ISO22313 and National Fire ISO27000 CERT Resiliency Contingency Preparedness Act ISO22318 Prevention ISMS Engineering Command (Domestic (International Association Security Framework Center (CCC) Standard) Standard) 1600 Standard Standard And COSO Incident Information Security Command Corporate Management System (ISMS) Center (IC) Certification based on ISO27000 Command Help Desk Centers (HD) Workplace Violence Prevention Emergency Operations Operations Center (EOC) Command Center (OCC) Network Lines of Emergency Business Business Command Business Response Continuity Integration Center (NCC) Management Management • Locations, • State and Local • Risk Management, • Service Level Agreements & • Employees, Government., • Disaster Recovery, Reporting, • Infrastructure, • First Responders (Fire, • Business Continuity, • Systems Development Life Cycle • Equipment, Police, & EMT), • Crisis Management, (SDLC), • Systems, • Department of • Emergency • COSO, CobIT, ITIL, and FFEIC, • Applications, Homeland Security Management, • ISO Guidelines, • Supplies, (DHS), • Workplace Violence • Six Sigma or Equivalent for • Customers. • Office of Emergency Prevention, Performance and Workflow Management (OEM), • Audit and HR. Management • Local Community. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 19
  • 20. Information Accounting and Charge-Back System Concept By utilizing Work Order (WO) and Purchase Order (PO) concepts, it is possible to track and bill clients for their use of Information Technology services associated with development and maintenance services. This concept is presented below: User Name: ____________________ User Division: ___________ User Identifier _______ Work Order #: __________________ Date: ___________ For: _________________________ PO for: Development Cost: $ _____________ PO for: Testing Cost: $ _____________ PO for: Quality Assurance Cost: $ _____________ PO for: Production Acceptance Costs $ _____________ PO for: Production (on-going) Cost: $ _____________ PO for: Vital Records Management Cost: $ _____________ PO for: Asset Management (Acquisition, Redeployment, Termination) Cost: $ _____________ PO for: Inventory and Configuration Management Cost: $ _____________ PO for: Information and Security Management Cost: $ _____________ PO for: Workplace Violence Prevention Cost: $ _____________ PO for: Recovery Management Cost: $ _____________ PO for: Documentation and Training Cost: $ _____________ PO for: Support and Problem Management Cost: $ _____________ PO for: Change Management Cost: $ _____________ PO for: Version and Release Management Cost: $ _____________ Total Cost: $ _____________ Bill can be generated via Forms Management, Time Accounting, or Flat Cost for Services. This system can be used to predict costs for future projects and help control expenses and personnel time management. 4/22/2012 © Thomas Bronack - Application Migration Guideline Document 20
  • 21. VMware vSphere 5 platform and supporting components. VMware vSphere 5 Functions: VMware vSphere 5 Features: • Utilizes x86 technology to provide an infrastructure- VMware vSphere 5 as-a-service architecture. VMware vCenter Site Recovery Manager 5 • Can support 32 Virtual CPU’s with up to 1 Terabyte of VMware vCloud Director 5 memory. • Support 1 million I/o per second. Together these tools help business: • Provides Intelligent Policy Management by allowing a • Deploy business critical applications with “set-it and forget-it” approach to managing data confidence, center resources, including server deployment and • Respond to the needs of the business with Cloud storage management through user defined profile. agility, and • Profile-Driven Storage Management saves personnel • Move to Cloud Computing with confidence. administrative time. Comprehensive Cloud Infrastructure Suite, includes: • vShield 5 – addresses the top enterprise concerns about Cloud Computing – security, control, and compliance – the vShield product family overcomes the limits of traditional security solutions by delivering an adaptive, software-based security model designed for virtual and cloud environments. vShield 5 will include new Data Security capabilities that will enable IT to quickly identify risk exposures resulting from unprotected sensitive data, isolated applications with different levels of trust and migrate security policies as data and applications move between different virtual systems and apply the same policies in public clouds. • vCenter Site Recovery Manager 5 – Extending this proven disaster recovery solution, vCenter Site Recovery Manager 5 will introduce built-in VMware vSphere replication capabilities that will allow customers to double the number of protected applications for the same cost while supporting heterogeneous storage configurations in the primary and backup sites. New automated failback and planning migration capabilities will allow customers to orchestrate migrations for disaster avoidance and to support planned maintenance activities and data center consolidations. • vCloud Director 5 – Enabling a self-service model for provisioning infrastructure services across internal and external sources, VMware vCloud Director 5 will enable IT to dramatically reduce the time required to provision new servers. New Linked Clone capabilities will reduce provisioning time to as few as 5 seconds, while also reducing storage costs by as much as 60 percent, all while managing resources from a single pane of glass. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 21
  • 22. BMC Atrium Discovery and Dependency Mapping (ADDM) “Discover through Integrate” phases • Discover: – Build a complete topology of your applications, software, host infrastructure and network devices and updates the profile as often as you need. – Keep pace with changes in dynamic virtual environments from VMware, Sun, Microsoft, HP, and Citrix. – Operate agent-free across Windows, Linux, Unix and Netware environments, using standard management protocols, such as SSH, WMI, and SNMP. – Deep discovery of J2E applications and data bases (Tables, License options, etc.). • Analyze: – Automatically group servers that work closely together, based on an analysis of the communications between them. – Highlight high-risk servers that touch a large portion of the estate. – Exclude hosts from automatic grouping – as needed. • Manual Grouping: – Identify groups of hosts to help manage them through a project. – Refine automatic groups based on non-discoverable head-knowledge. – Exclude sets of servers from visualization – such as super-connected servers with hundreds of dependencies. • Application Dependency Mapping: – Automatically identify IT components and configurations, and interpret raw, discovered data – from individual software processes to large-scale, distributed business applications. – Use pre-populated patterns to recognize more than 400 infrastructure software products (with more added monthly). – Automatically build visualizations that show configuration dependencies between switches, routers, virtual and physical hosts, software, business applications, and other business entities. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 22
  • 23. BMC Atrium Discovery and Dependency Mapping “Visualize and Integrate” • Dashboard & Reports: • In seconds, create tabular reports and charts that provide answers to critical questions. • Leverage pre-populated reports or create your own using the Search Engine Query Language. • Organize your favorite charts into at-a-glance dashboards that display the metrics that matter most to you. • Search: • Perform fast, free text search of the entire data store and get the most relevant results in seconds. • Narrow your searches to specific object types and use Search Query Language. • Export search results in XML and CSV formats to facilitate information sharing. • Host Profiles: • View essential details for each host, including and analysis of the host’s network traffic in an accessible, easy-to-use format. • Create reports as pdf documents. • Email, print, discuss, and annotate, as needed. • Integrate Dynamic CMDB: • Provides seamless flow of the vital accurate, up to date data needed to underpin BSM initiatives and processes. • Continuous CMDB synchronization allows real time up date of the CMDB as Cis are discovered. • Filtering allows you to control the Cis types that are synchronized with the CMDB. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 23
  • 24. CiRBA Overview CiRBA Data Center Intelligence CiRBA Data Center Intelligence (DCI) is predictive analytics software that powers a revolutionary console for policy-based control of virtual and cloud infrastructure. The CiRBA Control Console CiRBA's Control Console gives you unprecedented control over the efficiency and risk of virtual and cloud infrastructure by optimizing resource allocations and workload placements. This revolutionary console shows you in a single glance which resources need attention and also provides the explicit actions required for optimization. Imagine knowing that you have the perfect amount of infrastructure to satisfy SLA and policy requirements, without having too much. And that your workloads are optimally placed and configured. This is the power of CiRBA Data Center Intelligence (DCI). CiRBA's Control Console enables you to: 1. Visualize - In a single glance, see which resources are appropriately placed, provisioned, and configured and which are at risk. 2. Control - Precise actions are derived from policies and operational data to provide IT with unprecedented control over virtual and cloud infrastructure. 3. Automate - Integrate DCI-Control with existing management systems to safely automate actions that improve efficiency and reduce risk. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 24
  • 25. Wireshark – Network Analyzer Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998. (see www.wireshark.org for in-depth information and free download). Wireshark features include: • Deep inspection of hundreds of protocols, with more being added all the time • Live capture and offline analysis • Standard three-pane packet browser • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others • Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility • The most powerful display filters in the industry • Rich VoIP analysis • Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others • Capture files compressed with gzip can be decompressed on the fly • Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform) • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2 • Coloring rules can be applied to the packet list for quick, intuitive analysis • Output can be exported to XML, PostScript®, CSV, or plain text • Wireshark enables capturing and playback of transactions and network activity to benchmark / test migrated applications. • Wireshark can be used to test Business Recovery Applications at the remote site to insure they work properly and within Service Level Agreement guidelines. • Wireshark is a free product that can be downloaded and activated within minutes. It is an Open-Source product that can be tailored to the specific needs of your organization. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 25
  • 26. Automated Tools • (ITIL v3) Information Technology Information Library version 3 for Forms Management and Control to support work flow and improve productivity. • AIX – Unix based operating system with GUI front ends and many tools to support present and future computing needs. • System “Z” – x86, Hx5 Blades, MF / Server, Scalable, Load Balancing, manage Virtual / Real computing • System “P” – Server Manager • IBM System “P7” (Power 7) – Watson computer used for Jeopardy and is extremely Scalable, Efficient and Powerful • zOS – MF, Server, Problem Management (Detect, Solve, Forward to Resolver, Analysis / Reporting) with extreme security • Tivoli – Omegamon XE, Storage Management, Tape System Optimization • DS8000 – Solid State to Disk Level to support priority processing, High I/O rate, Power Regulation controller • DS4000 – Fabric Storage Management, RAID Configuration, Configure Storage Arrays, Enclosure Drive Protection • TS3500 – Automated Tape / Cartridge Management System from picker to machine delivery and back • Double-Take – from Vision Systems and includes: “Recover Now”, Share, and Move modules that support: – Recovery Point Objective (RPO) and Data Synchronization in virtual and real environments. – Ensures aggressive Business Continuity Management over the environment and its data. – Rewind Data for Continuous Data Protection, Roll-Back to Recovery Point, and Roll-Forward to pick-up point. – Availability for Load Balancing, Transparent Recovery via Shut-Down, Move, Reconnect, and Restart operations. • The Use of these tools and the others mentioned in this presentation can support automated and incremental recovery operations for organizations of all sizes and we recommend you research their use for your company. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 26
  • 27. ITIL V3 Overview ITIL Five Phase approach to IT Service Support 1. Service Strategy, 2. Service Design, 3. Service Transition, 4. Service Operation, and 5. Continual Service Improvement. ITIL Available Modules 1. Service Strategy 3. Service Transition • Service Portfolio Management • Change Management • Financial Management • Project Management (Transition Planning and Support) • Release and Deployment Management 2. Service Design • Service Validation and Testing • Service Catalogue Management • Application Development and Customization • Service Level Management • Service Asset and Configuration Management • Risk Management • Knowledge Management • Capacity Management 4. Service Operation • Availability Management • Event Management • IT Service Continuity Management (BCM) • Incident Management • Information Security Management (ISMS) • Request Fulfillment • Compliance Management (Regulatory) • Access Management • Architecture Management • Problem Management • Supplier Management (Supply Chain) • IT Operations Management • Facilities Management Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 27
  • 28. IBM System “Z” overview Built on a scalable, secure, reliable, simplified and cost-efficient infrastructure IBM System z is the ideal platform for meeting your Business Analytics needs for today while minimizing the costs of Business Analytics tomorrow. The server platform allows you to implement a single Business Analytics standard while providing Business Analytics as a service to your organization, for better corporate compliance and greater optimization. Provide all decision-makers with complete, consistent, timely and relevant information • Easily scale to meet the needs of every decision-maker, from executives and line-of-business managers, financial and business analysts, to front line managers, partners and customers. • Offer a complete portfolio of business analytics on a single platform to meet business needs. • Provide a more complete view of the business with greater access to real-time data. Increase user satisfaction and ROI • Obtain guaranteed system performance and availability (an enterprise SLA). • Provide faster time to value for the business. • Enable business units to shift their focus from administrative tasks to decision-making. Reduce the cost and complexity of providing Business Analytics to your organization • Centralize resources and reduce the hardware, software and facilities (power, floor space, etc.) required to manage and maintain the Business Analytics infrastructure. • Significantly reduce the costs associated with Business Analytics system administration and facilities by upwards of 50% over 5 years. • Realize greater economies of scale, enabling IT to deliver Business Information (BI) to a broader audience at a reduced cost. • Make the high availability of your Business Analytics infrastructure a viable option for IT. Make Business Analytics deployment easier • Deploy in days/weeks on System Z instead of months. • Reduce the time, resources and cost of delivering BI to new divisions, departments and users. • Automate and facilitate self-service provisioning. • Eliminate the cost-related barriers to introducing BI to new divisions/departments. Simplify enforcement of corporate regulations and standards • Ensure corporate security policies are followed. • Ensure disaster recovery plans are in place. • Maintain control over business processes. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 28
  • 29. IBM System “P” overview History • It was originally a line of workstations and servers called RS/6000, but the server line was then renamed to the eServer pSeries in 2000 as part of its e-Server branding initiative. • With the advent of the POWER5 processor in 2004 the family was rebranded the eServer p5. With the global move of the server and storage brands to the System brand with the Systems Agenda, the family was renamed yet again to System p5 in 2005. The System p5 now encompasses the IBM OpenPower product line. • With the introduction of POWER6 processor models the new models are now being released under the System p brand, dropping the p5 designation. Processors • Where RS/6000 used a mix of early POWER and PowerPC processors, when pSeries came along this had evolved into RS64-III and POWER3 across the board. POWER3 for its excellent floating point performance and RS64 for its scalability, throughput and integer performance. • IBM developed the POWER4 processor to replace both POWER3 and the RS64 line in 2001. After that the differences between throughput and number crunching optimized systems no longer existed. Since then System p machines evolved to use the POWER5 but also PowerPC 970 for the low end and blade systems. • The last System p systems used the POWER6 processor, such as the POWER6 based System p 570 and the JS22 blade. In addition IBM introduced during the SuperComputing 2007 (SC07) conference in Reno a new POWER6 based System p 575 with 32 POWER6 cores at 4.7 GHz and up to 256GB of RAM with water cooling. Features • All IBM System p5 and IBM eServer p5 machines support DLPAR (Dynamic Logical Partitioning) with Virtual I/O and Micro-partitioning. • System p generally uses the AIX operating system and, more recently, 64-bit versions of the Linux operating system. Sun Microsystems is also developing an OpenSolaris port, currently experimental.[1] Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 29
  • 30. What is the Power7 processor? IBM System Power 7 (P7) “Watson” The Power7 is the latest generation of IBM processors (chips) that are used as the CPUs in IBM mid range and high end open systems (pSeries) for Unix (AIX) and Linux as well as for the iSeries (aka AS400 successor). Building on previous Power series processors, the Power7 increases the performance per core (CPU) along with the number of cores per socket (chip) footprint. For example, each Power7 chip that plugs into a socket on a processor card in a server can have up to 8 cores or CPUs. Note that sometimes cores are also known as micro CPUs as well as virtual CPUs not to be confused with their presented via Hypervisor abstraction. Sometimes you may also hear the term or phrase 2 way, 4 way (not to be confused with a Cincinnati style 4 way chili) or 8 way among others that refers to the number of cores on a chip. Hence, a dual 2 way would be a pair of processor chips each with 2 cores while a quad 8 way would be 4 processors chips each with 8 cores and so on. IBM Power7 with up to eight cores per processor (chip) In addition to faster and more cores in a denser footprint, there are also energy efficiency enhancements including Energy Star for enterprise servers qualification along with intelligent power management (IPM also see here) implementation. IPM is implanted in what IBM refers to as Intelligent Energy technology for turning on or off various parts of the system along with varying processor clock speeds. The benefit is when there is work to be done, get it down quickly or if there is less work, turn some cores off or slow clock speed down. This is similar to what other industry leaders including Intel have deployed with their Nehalem series of processors that also support IPM. Additional features of the Power7 include (varies by system solutions): • Energy Star for server qualified providing enhanced performance and efficiency. • IBM Systems Director Express, Standard and Enterprise Editions for simplified management including virtualization capabilities across pools of Power servers as a single entity. • PowerVM (Hypervisor) virtualization for AIX, iSeries and Linux operating systems. • ActiveMemory enables effective memory capacity to be larger than physical memory, similar to how virtual memory works within many operating systems. The benefit is to enable a partition to have access to more memory which is important for virtual machines along with the ability to support more partitions in a given physical memory footprint. • TurboCore and Intelligent Threads enable workload optimization by selecting the applicable mode for the work to be done. For example, single thread per core along with simultaneous threads (2 or 4) modes per core. The trade off is to have more threads per core for concurrent processing, or, fewer threads to boost single stream performance. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 30
  • 31. IBM “zOS” System Overview Major characteristics z/OS supports stable mainframe systems and standards such as CICS, IMS, DB2, RACF, SNA, WebSphere MQ, record-oriented data access methods, REXX, CLIST, SMP/E, JCL, TSO/E, and ISPF, among others. However, z/OS also supports 64-bit Java, C/C++, and UNIX (Single UNIX Specification) APIs and applications through UNIX System Services. The Open Group certifies z/OS as a compliant UNIX operating system — with UNIX/Linux-style hierarchical HFS and zFS file systems As a result, z/OS hosts a broad range of commercial and open source software of any vintage. z/OS can communicate directly via TCP/IP, including IPv6, and includes standard HTTP servers (one from Lotus, the other Apache - derived) along with other common services such as FTP, NFS, and CIFS/SMB. Another central design philosophy is support for extremely high quality of service (QoS), even within a single operating system instance, although z/OS has built-in support for Parallel Sysplex clustering. z/OS has a unique Workload Manager (WLM) and dispatcher which automatically manages numerous concurrently hosted units of work running in separate key-protected address spaces according to dynamically adjustable business goals. This capability inherently supports multi-tenancy within a single operating system image. However, modern IBM mainframes also offer two additional levels of virtualization: LPARs and (optionally) z/VM. These new functions within the hardware, z/OS, and z/VM — and Linux and OpenSolaris support — have encouraged development of new applications for mainframes. Many of them utilize the WebSphere Application Server for z/OS middleware. Because there is only one z/OS version (at least at present), releases are normally called "Release n," though more formally they are "Version 1 Release n" or "V1.n". The IBM Program Number for all z/OS Version 1 releases is 5694-A01. From its inception z/OS has supported tri-modal addressing (24-bit, 31-bit, and 64-bit). Up through Version 1.5, z/OS itself could start in either 31-bit ESA/390 or 64-bit z/Architecture mode, so it could function on older hardware albeit without 64-bit application support on those machines. (Only the newer z/Architecture hardware manufactured starting in the year 2000 can run 64-bit code.) IBM support for z/OS 1.5 ended on March 31, 2007. Now z/OS is only supported on z/Architecture mainframes and only runs in 64-bit mode. z/Architecture hardware always starts running in 31-bit mode, but current z/OS releases quickly switch to 64-bit mode and will not run on hardware that does not support 64-bit mode. Application programmers can still use any addressing mode: all applications, regardless of their addressing mode(s), can coexist without modification, and IBM maintains an unwavering commitment to tri-modal backward compatibility. However, increasing numbers of middleware products and applications, such as DB2 Version 8 and above, now require and exploit 64-bit addressing. IBM markets z/OS as a flagship operating system, suited for continuous, high-volume operation with high security and stability. It is the most popular mainframe operating system. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 31
  • 32. IBM “zOS” System Overview (continued) z/OS is available under standard license pricing as well as via System z New Application License Charges (zNALC) and "System z Solution Edition," two lower priced offerings aimed at supporting newer applications ("new workloads"), U.S. standard commercial z/OS pricing starts at about $125 per month, including support, for the smallest zNALC installation running the base z/OS product plus a typical set of optional z/OS features.[ z/OS introduced Variable Workload License Charges (VWLC) and Entry Workload License Charges (EWLC) which are sub-capacity billing options. VWLC and EWLC customers only pay for peak monthly z/OS usage, not for full machine capacity as with the previous OS/390 operating system. VWLC and EWLC are also available for most IBM software products running on z/OS, and their peaks are separately calculated but can never exceed the z/OS peak. To be eligible for sub-capacity licensing, a z/OS customer must be running in 64-bit mode (which requires z/Architecture hardware), must have completely eliminated OS/390 from the system, and must e-mail IBM monthly sub- capacity reports. Sub-capacity billing substantially reduces software charges for most IBM mainframe customers. Advanced Workload License Charges (AWLC) is the successor to VWLC on mainframe models starting with the zEnterprise 196 and EAWLC is an option on zEnterprise 114 models. AWLC and EAWLC offer further sub-capacity discounts. The primary development center for z/OS is located at IBM's facilities in Poughkeepsie, New York, but numerous development centers in several other countries contribute substantially to z/OS. As one example, IBM's center in Perth, Australia is mainly responsible for z/OS's HLASM and DFSMS components. 64-bit memory support Within each address space, z/OS typically only permits the placement of data above the 2GB "bar," not code. z/OS enforces this distinction primarily for performance reasons. There are no architectural impediments to allowing more than 2GB of application code per address space. IBM has started to allow Java code running on z/OS to execute above the 2GB bar, again for performance reasons. Memory is obtained as "Large Memory Objects" in multiples of 1MB (with the expectation that applications and middleware will manage memory allocation within these large pieces). There are three types of large memory objects: • Unshared - where only the creating address space can access the memory. • Shared - where the creating address space can give access to specific other address spaces. • Common - where all address spaces can access the memory. (This type was introduced in z/OS Release 10.) Extreme security - In 1973, IBM published a unique "Statement of Integrity" for MVS which has been updated for z/OS and is still in force. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 32
  • 33. IBM Tivoli System Overview Why Tivoli software A holistic approach to delivering and managing infrastructure services aligned to evolving business priorities. What Tivoli offers Visibility Control Automation ™ An Integrated Service Delivery & Management platform optimized for: Asset and Facilities Management Improve efficiency and reduce the cost and risk of your assets, from medical devices to buildings. Business Service Management Improve customer satisfaction with increased availability of critical business services. Cloud and IT Transformation Lower the cost of your IT infrastructure and speed the delivery of innovative products and services. Data Protection and Storage Management Create a more responsive and resilient storage infrastructure. Enterprise Mobility Management Manage physical and virtual endpoints in real time and ensure compliance. Security Improve security, risk & compliance posture with automated threat protection & security controls. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 33
  • 34. IBM DS8000 I/O Priority Manager Overview Abstract The DS8000 I/O Priority Manager enables more effective storage consolidation and performance management combined with the ability to align Quality of Service (QoS) levels to separate workloads in the system. With DS8000 I/O Priority Manager, the system can prioritize access to system resources to achieve the volume's desired QoS based on defined performance goals (high, medium, or low) of any volume. I/O Priority Manager constantly monitors and balances system resources to help applications meet their performance targets automatically, without operator intervention. Starting with DS8000 Licensed Machine Code (LMC) level R6.2, the DS8000 I/O Priority Manager feature supports open systems and IBM System z®. DS8000 I/O Priority Manager, together with IBM z/OS® Workload Manager (WLM), provides more effective storage consolidation and performance management for System z systems. Now tightly integrated with Workload Manager for z/OS, DS8000 I/O Priority Manager improves disk I/O performance for important workloads. It also drives I/O prioritization to the disk system by allowing WLM to give priority to the system's resources automatically when higher priority workloads are not meeting their performance goals. Integration with zWLM is exclusive to DS8000 and System z systems. This slide is aimed at those who want to get an understanding of the DS8000 I/O Priority Manager concept and its underlying design. It provides guidance and practical illustrations for users who want to exploit the capabilities of the DS8000 I/O Priority Manager. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 34
  • 35. IBM DS4000 I/O Priority Manager Overview The DS4000 EXP810 is the latest disk drive enclosure in the DS4000 Series of products. This 3U enclosure has 4 Gbps Fibre Channel (FC) interfaces, and supports up to 16 disk drives. The 4 Gbps ready IBM System Storage EXP810 Storage Expansion Unit machine type (1812-81A) offers a new 16-bay disk enclosure for attachment to selected DS4000 Midrange Disk Systems, with up to 4.8 terabytes (TB) physical capacity per expansion unit using sixteen 300 GB disk drives. The EXP810 Storage Expansion Unit is designed to accommodate the new optional 2 Gbps Fibre Channel Enhanced Disk Drive Modules (E-DDM), as well as intermix of future optional 4 Gbps Fibre Channel Enhanced Disk Drive Modules (E-DDM), all within the same enclosure. Contains redundant (AC) power and cooling modules, and ESM interfaces. The DS4000 EXP810 is available in a 19- inch rack mount package. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 35
  • 36. IBM TS3500 Automated Tape Manager Overview Highlights Supports highly scalable, automated data retention on tape utilizing LTO Ultrium and IBM 3592 and TS1100 families of tape drives. Delivers extreme scalability and capacity, growing from 1 to 16 frames per library and from one to 15 libraries per library complex using the TS3500 shuttle connector. Provides up to 900 PB of automated, low-cost storage under a single library image, dramatically improving floor space utilization and reducing storage cost per terabyte. Offers optional second robotic accessor to enhance data availability and reliability. Enables data security and regulatory compliance via support for tape drive encryption and WORM cartridges. The IBM® System Storage® TS3500 Tape Library is designed to provide a highly scalable, automated tape library for mainframe and open systems backup and archive that can scale from midrange to enterprise environments. The TS3500 Tape Library continues to lead the industry in tape drive integration with features such as persistent World Wide Name, multipath architecture, drive/media exception reporting, remote drive/media management, and host-based path failover. The TS3500 Tape Library supports IBM System z® when used with the IBM 3953 Tape System, the IBM Virtualization Engine TS7740, or the IBM System Storage® Tape Controller for System z with its embedded library manager. These systems enable System z hosts to access the TS3500 Tape Library cartridge inventory and allow connection to TS1140, TS1130, TS1120 and IBM TotalStorage 3592 Model J1A Tape Drives. The TS3500 Tape Library can support up to four 3953 tape systems, up to eight IBM Virtualization Engine TS7740 subsystems per physical library, and up to sixteen IBM System Storage Tape Controllers for System z per logical library. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 36
  • 37. Double-Take Software Overview Produced by Vision Systems Double-Take Availability for AIX Double-Take RecoverNow for AIX Double-Take for AIX has simplified failover management Double-Take RecoverNow’s replication technology provides to meet the most aggressive Recovery Time Objectives, superior performance that allows for a high level of system providing high availability for the masses. scalability and satisfies aggressive Recovery Time Objectives. Monitoring and automated failover ensures business • Reliable, affordable offsite data protection. continuity for customers, partners, and employees. • Supports physical and virtual environments. • Real time capture of data changes and replication to • Failover to local or remote nodes for reliable, a recovery system affordable offsite data protection. • Maintains write order consistency to ensure data integrity for disaster recovery • Protects both physical and virtual AIX • Intelligent and efficient re-sync of production and environments. recovery systems in the event of lost connectivity • In the event of a disaster, applications can be • Eliminates the IT costs and business immediately restarted on the recovery system consequences of downtime and data loss. • Eliminates the IT costs and business consequences of downtime and data loss • Removes the exposure to major data loss of • Ensures business continuity for your customers, conventional backup and restore partners and employees technologies. • Removes the exposure to major data loss of conventional backup and restore technologies • Storage independence avoids vendor lock-in and maximizes existing storage investments Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 37
  • 38. Double-Take Software Overview continued Double-Take Share for AIX: Double-Take Move for AIX: • Real time data replication. With solutions for Windows®, Linux®, AIX® and IBM® I, Vision leads the way in keeping systems and applications resilient and available. Whether • Reliable change data capture ensures data you need an easier, more reliable disaster recovery solution, want integrity. to manage and share data seamlessly between platforms and databases, need a better way to maintain system efficiency, or you need a • Built-in conflict resolution and collision comprehensive high availability solution for assured 24/7 operations, monitoring. Vision Solutions has what you’re looking for - including your physical environments, your virtual environments, as well as the cloud. • Accurate tracking and data auditing. SAN Array-Based Replication and Double-Take Availability. • Ensures delivery of replicated data even if the High Availability target system is unavailable. Deliver nonstop business continuity and boost productivity. Innovative, easy to use switching and replication solutions eliminate costly IT • LAN/WAN friendly. downtime. • Real time, integrated data from divergent Disaster Recovery sources allows for better informed decision Protect critical information and recover lost data in a fraction of the time making. and effort of traditional tape backup solutions. Affordable, automated solutions deliver the power of continuous data protection and the flexibility of in-house or hosted recovery options. Data Sharing and Migration Data center consolidation and virtualization initiatives save organizations a great deal of money. Now you can move and share data with unprecedented ease and efficiency. Powerful yet flexible solutions let you unlock the maximum business value of your data. Release Date: 4/22/2012 © Thomas Bronack - Application Migration Guideline Document Page: 38