You are on page 1of 31

Application:

Discovery and Migrations-


Data Centers, Clouds and beyond

January 10th, 2012


John Bouchard
Agenda

• Restate/Confirm Challenge
• Review the Process of Application
Migration OBJECTIVE
To review Unisys’
• Review the Method that Unisys Leverage Application Inventory
to ensure success Migrations Capabilities and the
• Review various tooling and techniques process by which Unisys
can (a) application
leveraged to collect information required
assignments to the cloud,
to collect information, analyze and internal DC, co-lo DC, etc
recommend a suitable destination. and (b) enable capacity
• Review on-going steady state option to planning. 
maintain and manage application growth
and workload balancing

© 2011 Unisys Corporation. All rights reserved. 2


What We Hear in the Market –
Summarizing Issues

• Uncontrolled Growth in Data Center Services (and costs)


– Mergers & acquisitions
– Businesses making decisions outside of IT control

• vs. Corporate Objective to Control IT Costs


– Need to reduce data center services footprint
– Rationalize applications and eliminate redundant/extraneous apps

• Hampered by Lack of Accurate and Detailed Information on


Application / DC Capabilities Mix
– Ability to define end state requires in-depth knowledge of workload
characteristics, business requirements and current DC capabilities

© 2011 Unisys Corporation. All rights reserved. 3


Getting to the Right Data Center
Services Portfolio Model

“If you don’t know where


you are going, any road
will get you there.”

Getting control over data center/cloud sprawl is achievable if you start


with a clearly defined set of activities that drive towards a rational and
maintainable plan. The first step is to know where you are today.

© 2011 Unisys Corporation. All rights reserved. 4


Multiple New Delivery Models Have Emerged
Alongside Traditional Delivery Models

IT Delivery Models Increase With Cloud


Internal Outsourced
Internal Hosted
Data Public Data
Private Private
Centers Clouds Centers
Clouds Clouds

Traditional Cloud Traditional

How do CIOs optimize all of these delivery models?

IT delivery models increase with cloud, driven by:


• The business bypassing IT for speed and lower cost…
• …And IT exploring the latest tools and technology
While gaining the benefits of cloud…
• Increased IT agility, potential for better IT economics, flexible business models
…CIOs now need to grapple with:
• Less control over infrastructure and service levels
• Greater risk of exposure to security, governance and compliance pitfalls
• Organizational change & process issues
• Potentially higher cost due to complexity, skills and resources issues

© 2011 Unisys Corporation. All rights reserved. 5


Unisys Viewpoint - The Hybrid Enterprise:
More Than a Hybrid Cloud

Borderless, Virtual, Automated, Visible and Secure


Processes Policies Architecture

Internal Internal Hosted Outsourced


Data Public
Private Private Data
Centers Clouds
Clouds Clouds Centers

Security Governance Integration Applications

Hybrid Enterprise
A Hybrid Enterprise is a composition of cloud, non-cloud, internal and external IT service delivery
models that remain unique entities but are bound together by an integrated management
environment, and common technology, processes and policies to optimize agility, enable data
and application portability, and reduce risk.

© 2011 Unisys Corporation. All rights reserved. 6


Core Areas Customers Need to Consider
When Moving to the Hybrid Enterprise

Architecture, regulatory compliance, data locality


Applications and more determine appropriate delivery models.

Diverse architectures, operating models and


Data Centers technologies drive varying operating risk and costs.

Management complexity increases, impacting


Management governance, compliance, and financial models

To leverage the capabilities that cloud computing provides, while keeping chaos
from overwhelming IT, a strategic, comprehensive methodology is needed that
spans all IT service delivery models.

© 2011 Unisys Corporation. All rights reserved. 7


Application Portfolio Management Facilitates Business-IT Alignment,
underpinning each activity that Unisys focuses on during an engagement.
Clear metrics and measures for success establish the bases for aligning a
customers application portfolio and creating actionable steps to create
short term and long term value.

SHORT TERM
MEDIUM TO LONG TERM
IMPACT
IMPACT
IT Alignment
Business –

Minimize Portfolio of Applications Reduce Time to Market

Reduction in Number of Standards


Improve Customer Satisfaction
and Platforms

Complete Business Process Support Adequate Risk Management

Optimum Spending On Application


Strategic Cost Management
Maintenance

© 2011 Unisys Corporation. All rights reserved. 8


Optimizing Your Future Application
Deployment Scenario

Workloads & Applications moved to the best fit resource

Internal Internal Internal Hosted Outsourced


Community Public
Data VM Data Private Private Data
Clouds Clouds
Centers Centers Clouds Clouds Centers

Dedicated Virtualized Cloud Business Models (SaaS, IaaS, PaaS) Managed

What is the right balance of data center services in your portfolio?

• Cloud and VMs have created a necessary cost adjustment in your users mind…
• But users will still demand IT services at a faster rate and a lower cost…
• IT leaders will need to explore the most effective use of new tools and technology
• Vendor impact: continued rapid innovation and acquisition strategy

© 2011 Unisys Corporation. All rights reserved. 9


The Unisys Hybrid Enterprise
Approach to Applications
Application Deployment
Application Portfolio Business Goals & Objectives
Models
Hosted Outsourced
Internal
Private Data
Data Internal
Clouds Public Centers
Centers Private Clouds
Clouds

Application Workload Characteristics Deployment Profiles


Business Goals, Objectives, Needs
Collected Through Automated &Manual Best Practices
Collected Through Interviews
Methods Reference Architectures

Workload Placement Decision Model


DC/Cloud Migration
Strategy & Roadmap

Internal Internal Hosted Outsourced


Data Public Data
Private Private
Centers Clouds Centers
Clouds Clouds

Traditional Cloud Traditional


Our Workload Placement Decision Model provides a framework on which we can project business objectives,
technology constraints and economic factors to facilitate a transparent and quantitative decision making process

© 2011 Unisys Corporation. All rights reserved. 10


What Is The Result of This Approach?

…an optimized, efficient


workload environment
IT Service-based
Delivery

We use a
* Point Solution Delivery
Value
structured tools IT Waste &
Business Effectiveness Overspending
and methodology-
o ne
based, repeatable, eZ
future-state a nc
rm
approach to fo Missed Business

P er Expectations
achieve… Silo Delivery

*
Chaos IT Efficiency

© 2011 Unisys Corporation. All rights reserved. 11


Our Approach: A simple approach keeps Unisys focused on delivering
success. Business Driven & Fit for Purpose Design enables maximum
business value.

Plan Un
Business Alignment de
rs
ct

What does the business need?


ta
ite

Do I have the right applications? nd


ch
Ar

Discover Analyze Strategize

Transform
Design Document
Which technologies should I use? What do I have in my datacenters?
How should I move my What is the implication of moving
applications?
applications?

© 2011 Unisys Corporation. All rights reserved. 12


Workload Placement Decision Model
Engagement Approach
Understanding the business demand against the capabilities of each model, and
building a plan to optimize the distribution of your application portfolio.

1 2 3 4
Inventory & Assess Map Workloads to Model Utilize Repeatable Placement
Inventory applications; And...which of those Process
We then utilize a repeatable …To place applications in
determine which are not applications can leverage workload/application the best deployment model
optimally deployed alternative deployment migration process… possible
models (e.g. cloud), at how
much effort/cost?
Business-As-Usual Internal
Data
Centers

Traditional

Internal Hosted
Mission Critical Private Private
Public
Clouds
Clouds Clouds

Cloud
Innovation

Outsourced
Data
Centers

Traditional

© 2011 Unisys Corporation. All rights reserved. 13


Inventory & Assess

© 2011 Unisys Corporation. All rights reserved. 14


Inventory and Assess Process

Application Application Data Analysis Visualization Operationalize &


Discovery Enrichment Maintain
• Application • Extend Data • Deployment • Site View • Set Schedule
Discovery w/Architecture • Gaps • Host View for Data
&Dependency Docs • Policy • Application Collection &
Mapping • Customer Data Violations View Analysis
• CMDB Import • Guidance & • Estate Views Update
• Workload • Reconcile and Recs
Analytics and Prioritize
Attributes Conflicting
Data

Making this part of your


Gaining understanding and insight into the operational process
deployment of applications / workloads across ensures that you always
hosts and data centers is the first critical step have a current, up-to-
date view as your
towards rationalization and consolidation. environment changes.

© 2011 Unisys Corporation. All rights reserved. 15


Inventory & Assess
Data Input, Analysis and Visualization

Secure Data Build


Discovery Data Analytics Visualization
Transfer Repository

• Conduct automated • Snapshot discovery • Import discovery • Complex event • Import data
discovery database database into processing • Generate standard
• Collect additional • Secure transfer Repository • Event association visualization baseline
architectural details (SFTP) data • Enhance data via and correlation • Prepare baseline
and data points • Receive and unpack Integration Utilities • Application Pattern visualizations for
• Solicit data format data • Export into the Staging Forensics customization based on
requirements and Factory databases • Explicit client customer requirements
• Run proprietary Datamart created for • Prepare visualizations
analytics to populate analysis and for client
metamodel reporting review/vetting
• Generate output for
visualization step

© 2011 Unisys Corporation. All rights reserved. 16


Inventory and Assess
Gathering Current State Data

Prepare Current-State Discover and Compile Aggregate and Ship Data

• Define host list and • Deploy discovery and • Assemble additional


application boundaries forensics tools and validate customer input (CMDB data,
• Define discovery and • Execute pilot scans and spreadsheets, artifact
forensics requirements remediate credentialing documents, other)
• Determine scan frequency • Execute scan schedules • Compile discovery data
and schedules • Build discovery and snapshot and customer
• Educate IT Ops, forensics data snapshot and input
Engineering and Security validate • Transfer data for analysis

© 2011 Unisys Corporation. All rights reserved. 17


Application Attributes and the management of the discovered data play a large role in
creating a streamline, repeatable process for application inventory and management

Mined Data Discovered Data Identifying data point, both


manually mined and
automatically discovered
20-30% 70-80% enables one to identify how
often the data needs to be
Manually Mined, less Automatically collected and how long data
points are good for. Unisys
frequently. Discovered breaks down application
characteristics, identifies
durations and recommends a
cycle for discovery and
Business Metrics System/Application Metrics updates.

© 2011 Unisys Corporation. All rights reserved. 18


Each phase in the our approach has custom tooling that enables data
collection, comparison and analysis. A metric based approach allows
Unisys to design solutions that are fit for purpose. Meta tagging allows
continuous automated discover of data points an application changes to
meet business demands

Planning Studio IT Design Workbench Transformation Studio


Business Fit for Purpose Workload
Value Chain Hosts Environments
Drivers (KPIs) Design Profiles
Consumption Pattern Application
Application Demand Locations
Sizing Mapping Dependencies
Alignment Characteristics
Intelligent Design Current-state Visualization
Business Context and
Requirements

Unisys 3D Blueprinting Metadata Repository

Software Analysis & Unisys Application Portfolio


TCO / ROI Toolkit
Measurement Tool Assessment Toolkit

Legacy Software Business Value Engineering Business Models


Dependency Assessment Toolkit

Infrastructure Software Cost Unisys Services Delivery


Dependency Estimation Tool Framework (SDF)
Assessment

Our tool-enabled and structured methods enable automated discovery, analysis and delivery processes to
achieve more comprehensive assessments, faster delivery and high quality results

© 2011 Unisys Corporation. All rights reserved. 19


Inventory & Assess
Discovered Data Typically Isn’t Good Enough

Integrated Application Characteristics and meta data help determine the


architectural fit of an application for a given infrastructure.

© 2011 Unisys Corporation. All rights reserved. 20


Inventory & Assess Output
Visualizing the Current State

On Which Hosts Does the


Application Run?

What Dependencies Does


the Application Have?

Where Does the


Application Live?

© 2011 Unisys Corporation. All rights reserved. 21


Inventory & Assess – Business
Top-Down Applications And Business Value Chain

Application Deployment
Application Portfolio Business Goals & Objectives
Models
Hosted Outsourced
Internal
Private Data
Data Internal
Clouds Public Centers
Centers Private Clouds
Clouds

 How: Top-down, business-driven approach to IT design.


– Align business requirements to functional organizations, activities, business demand characteristics and KPIs with their
supporting applications.
– Define demand characteristics profile for IT capability analysis
– Capture business-relevant demographics to assess needs, risks and impacts

 Who: This tool is for business and IT professionals with initiatives to drive our cost, improve agility, and delivery better
service performance and quality to their customers
– Business and IT Leadership
– Program Managers
– Application Owners
– Enterprise Architects

 What: A decision support tool that provides a solid foundation to drive the technical design process by creating a common
language between the business and IT.
– Business Value Chain decomposition
– Business demand characterization
– Application portfolio supply and demand mapping

© 2011 Unisys Corporation. All rights reserved. 22


Inventory & Assess – Business
Establish the Business Context

Due Diligence Workshop Decompose the Business Align the Portfolio

• Define objectives and scope • Decompose the business • Identify the application
• Identify stakeholders and functions and associated associations to the business
project team business activities activities and align
• Identify target environment • Define the associated • Evaluate the application
• Define scan groups and revenue-generating activities portfolio alignment
schedules • Align the business “pain • Assess the potential impact
• Finalize timeline and project points” to the BVC to the business
plan
© 2011 Unisys Corporation. All rights reserved. 23
Next Step: Develop Workload Placement
Rules Specific To Your Business Needs
Application Deployment
Application Portfolio Business Goals & Objectives
Models
Hosted Outsourced
Internal
Private Data
Data Internal
Clouds Public Centers
Centers Private Clouds
Clouds

© 2011 Unisys Corporation. All rights reserved. 24


Workload Placement Decision Model
Key Criteria for Evaluating Applications for Cloud Readiness

© 2011 Unisys Corporation. All rights reserved. 25


Workload Placement Decision Model
Identifying The Right Deployment Profile

Internal Internal Outsourced Hosted Public


Data Private Data Private Clouds
Centers Clouds Centers Clouds
Typical Deployment
Profile Characteristics
Less than Traditional
Capital Cost Significant
Data Centers

n al Moderate

s
Moderate Negligible

io
Less than Traditional

s t i c
t
Operating Cost Significant Moderate Moderate Based on Usage

i
Data Centers

n t a
Less than Traditional
te r
e c
Provisioning Time Significant Moderate Moderate Negligible

s a
Data Centers
Elasticity Limited

p r e
Moderate

h a r Moderate Moderate Flexible

Re al C
Staffing Requirements High Moderate Moderate Moderate Negligible

tu
Reliability High High High High Moderate
Control High
c High Medium Medium Low

tA
No
Security / Privacy High High Medium Medium Low
Asset Ownership Customer Customer Customer or Vendor Customer Vendor
Infrastructure Location Customer Customer Customer or Vendor Customer Vendor
Infrastructure
Customer Customer Vendor Customer Vendor
Management
Infrastructure Usage Dedicated Dedicated Dedicated Dedicated Multi-Tenant
Unisys Application Workload Decision Model facilitates the application deployment process by matching the
workload characteristics and the business objectives with the right deployment profile

© 2011 Unisys Corporation. All rights reserved. 26


Map Workload Placement to Decision Model
Application Level Report – Where Should This Application Run?

© 2011 Unisys Corporation. All rights reserved. 27


Next Steps

© 2011 Unisys Corporation. All rights reserved. 28


The Application Migration Journey:
New delivery models are forcing more automated mechanisms of
managing application portfolios as they move to highly agile and
flexible environments.

Cloud Computing Solutions


For Enterprise Applications
Software-as-a-Service (SaaS)
Provider licenses an application for
use as a service on demand over
the internet.
Platform-as-a-Service (PaaS)
Provider licenses a runtime and
development platform for new
application development over the
internet.

Infrastructure-as-a-Service
Provider supplies compute and
storage resources as a service for
application deployment,
development and testing.

The challenge for application portfolio managers is to ensure that each business application is deployed and
delivered through the best model that yields the optimum economic, business and operational results

© 2011 Unisys Corporation. All rights reserved. 29 29


Page
Tagging applications in alignment with business rules and a business
value chain help to create a view into the business that justifies an
application footprint and rationalizes an applications capabilities. Unisys
tooling enables meta tagging and application associations to business
value chain.

 How: Top-down, business-driven approach to IT design.


– Align business requirements to functional organizations, activities, business
demand characteristics and KPIs with their supporting applications.
– Define demand characteristics profile for IT capability analysis
– Capture business-relevant demographics to assess needs, risks and impacts

 Who: This tool is for business and IT professionals with initiatives to drive our
cost, improve agility, and delivery better service performance and quality to their
customers
– Business and IT Leadership
– Program Managers
– Application Owners
– Enterprise Architects

 What: A decision support tool that provides a solid foundation to drive the
technical design process by creating a common language between the business
and IT.
– Business Value Chain decomposition
– Business demand characterization
– Application portfolio supply and demand mapping

© 2011 Unisys Corporation. All rights reserved. 30


Unisys has established various metrics, and workload qualities required to
gather a clear picture of an application its respective workload
characteristics. The proper collection and continued maintenance of these
metrics establish a basis for automating application portfolio management.

Communication Complexity UI
Data Source Integration (Fan-In) Degree of Exception Based Processing Percent Desktop Integration (increases)
Requirement for Guaranteed Delivery of Messages Reusability (Component, Process, Data) Graphic Visualization (increases)
Asynchronous Message Delivery Volatility of Business Rules Screen Complexity (increases)
Number of Protocols Modifiability of Workflow (degree of anticipated) Usability (Learn, Error Avoidance, Efficient)
External Connections (Confidentiality) National Jurisdiction & Legal req. (increases) Modifiability of UI (degree of control by user)
Data Output Dissemination (Fan-Out) Workload - Constrained by Workflow Rules
Workload Volume
QoS Sensitive Messaging Throughput Volume
Data Usage
User Data Storage / Retention- Time Peak Duration
Session Oriented (degree of user intervention) Data Storage / Retention-Size Peak Frequency
Delegation by Role / Fn Calculation Size: number of records processed per Peak Size
User Geo. (dispersion increases) Calculation Data: amount of data in a unit of work Latency (increasing)
User Role Diversity (increases) Data Stewardship Number of Concurrent Users
Data Storage Access Type Compute Intensive
Availability
Availability Target % Uptime Workload Type
Availability Requirement - Days of Operation Batch Processing Time
Availability Requirement - Hours of Operation Event Driven
Availability Requirement - SLA for MTTR Workload Concurrency (Distribution)
Availability Requirement - Fast Recovery Time Workload Units (Fine, Coarse)
Workload QoS: Time, Vol - specifics in performance
Security Scalability (Statelessness)
Integrity (level of validation) Preemption of Workload
Confidentiality (Sensitivity) Workload Units Processing (Transactional)
Sharing of Workload Data

© 2011 Unisys Corporation. All rights reserved. 31

You might also like