Professional Documents
Culture Documents
• Restate/Confirm Challenge
• Review the Process of Application
Migration OBJECTIVE
To review Unisys’
• Review the Method that Unisys Leverage Application Inventory
to ensure success Migrations Capabilities and the
• Review various tooling and techniques process by which Unisys
can (a) application
leveraged to collect information required
assignments to the cloud,
to collect information, analyze and internal DC, co-lo DC, etc
recommend a suitable destination. and (b) enable capacity
• Review on-going steady state option to planning.
maintain and manage application growth
and workload balancing
Hybrid Enterprise
A Hybrid Enterprise is a composition of cloud, non-cloud, internal and external IT service delivery
models that remain unique entities but are bound together by an integrated management
environment, and common technology, processes and policies to optimize agility, enable data
and application portability, and reduce risk.
To leverage the capabilities that cloud computing provides, while keeping chaos
from overwhelming IT, a strategic, comprehensive methodology is needed that
spans all IT service delivery models.
SHORT TERM
MEDIUM TO LONG TERM
IMPACT
IMPACT
IT Alignment
Business –
• Cloud and VMs have created a necessary cost adjustment in your users mind…
• But users will still demand IT services at a faster rate and a lower cost…
• IT leaders will need to explore the most effective use of new tools and technology
• Vendor impact: continued rapid innovation and acquisition strategy
We use a
* Point Solution Delivery
Value
structured tools IT Waste &
Business Effectiveness Overspending
and methodology-
o ne
based, repeatable, eZ
future-state a nc
rm
approach to fo Missed Business
P er Expectations
achieve… Silo Delivery
*
Chaos IT Efficiency
Plan Un
Business Alignment de
rs
ct
Transform
Design Document
Which technologies should I use? What do I have in my datacenters?
How should I move my What is the implication of moving
applications?
applications?
1 2 3 4
Inventory & Assess Map Workloads to Model Utilize Repeatable Placement
Inventory applications; And...which of those Process
We then utilize a repeatable …To place applications in
determine which are not applications can leverage workload/application the best deployment model
optimally deployed alternative deployment migration process… possible
models (e.g. cloud), at how
much effort/cost?
Business-As-Usual Internal
Data
Centers
Traditional
Internal Hosted
Mission Critical Private Private
Public
Clouds
Clouds Clouds
Cloud
Innovation
Outsourced
Data
Centers
Traditional
• Conduct automated • Snapshot discovery • Import discovery • Complex event • Import data
discovery database database into processing • Generate standard
• Collect additional • Secure transfer Repository • Event association visualization baseline
architectural details (SFTP) data • Enhance data via and correlation • Prepare baseline
and data points • Receive and unpack Integration Utilities • Application Pattern visualizations for
• Solicit data format data • Export into the Staging Forensics customization based on
requirements and Factory databases • Explicit client customer requirements
• Run proprietary Datamart created for • Prepare visualizations
analytics to populate analysis and for client
metamodel reporting review/vetting
• Generate output for
visualization step
Our tool-enabled and structured methods enable automated discovery, analysis and delivery processes to
achieve more comprehensive assessments, faster delivery and high quality results
Application Deployment
Application Portfolio Business Goals & Objectives
Models
Hosted Outsourced
Internal
Private Data
Data Internal
Clouds Public Centers
Centers Private Clouds
Clouds
Who: This tool is for business and IT professionals with initiatives to drive our cost, improve agility, and delivery better
service performance and quality to their customers
– Business and IT Leadership
– Program Managers
– Application Owners
– Enterprise Architects
What: A decision support tool that provides a solid foundation to drive the technical design process by creating a common
language between the business and IT.
– Business Value Chain decomposition
– Business demand characterization
– Application portfolio supply and demand mapping
• Define objectives and scope • Decompose the business • Identify the application
• Identify stakeholders and functions and associated associations to the business
project team business activities activities and align
• Identify target environment • Define the associated • Evaluate the application
• Define scan groups and revenue-generating activities portfolio alignment
schedules • Align the business “pain • Assess the potential impact
• Finalize timeline and project points” to the BVC to the business
plan
© 2011 Unisys Corporation. All rights reserved. 23
Next Step: Develop Workload Placement
Rules Specific To Your Business Needs
Application Deployment
Application Portfolio Business Goals & Objectives
Models
Hosted Outsourced
Internal
Private Data
Data Internal
Clouds Public Centers
Centers Private Clouds
Clouds
n al Moderate
s
Moderate Negligible
io
Less than Traditional
s t i c
t
Operating Cost Significant Moderate Moderate Based on Usage
i
Data Centers
n t a
Less than Traditional
te r
e c
Provisioning Time Significant Moderate Moderate Negligible
s a
Data Centers
Elasticity Limited
p r e
Moderate
Re al C
Staffing Requirements High Moderate Moderate Moderate Negligible
tu
Reliability High High High High Moderate
Control High
c High Medium Medium Low
tA
No
Security / Privacy High High Medium Medium Low
Asset Ownership Customer Customer Customer or Vendor Customer Vendor
Infrastructure Location Customer Customer Customer or Vendor Customer Vendor
Infrastructure
Customer Customer Vendor Customer Vendor
Management
Infrastructure Usage Dedicated Dedicated Dedicated Dedicated Multi-Tenant
Unisys Application Workload Decision Model facilitates the application deployment process by matching the
workload characteristics and the business objectives with the right deployment profile
Infrastructure-as-a-Service
Provider supplies compute and
storage resources as a service for
application deployment,
development and testing.
The challenge for application portfolio managers is to ensure that each business application is deployed and
delivered through the best model that yields the optimum economic, business and operational results
Who: This tool is for business and IT professionals with initiatives to drive our
cost, improve agility, and delivery better service performance and quality to their
customers
– Business and IT Leadership
– Program Managers
– Application Owners
– Enterprise Architects
What: A decision support tool that provides a solid foundation to drive the
technical design process by creating a common language between the business
and IT.
– Business Value Chain decomposition
– Business demand characterization
– Application portfolio supply and demand mapping
Communication Complexity UI
Data Source Integration (Fan-In) Degree of Exception Based Processing Percent Desktop Integration (increases)
Requirement for Guaranteed Delivery of Messages Reusability (Component, Process, Data) Graphic Visualization (increases)
Asynchronous Message Delivery Volatility of Business Rules Screen Complexity (increases)
Number of Protocols Modifiability of Workflow (degree of anticipated) Usability (Learn, Error Avoidance, Efficient)
External Connections (Confidentiality) National Jurisdiction & Legal req. (increases) Modifiability of UI (degree of control by user)
Data Output Dissemination (Fan-Out) Workload - Constrained by Workflow Rules
Workload Volume
QoS Sensitive Messaging Throughput Volume
Data Usage
User Data Storage / Retention- Time Peak Duration
Session Oriented (degree of user intervention) Data Storage / Retention-Size Peak Frequency
Delegation by Role / Fn Calculation Size: number of records processed per Peak Size
User Geo. (dispersion increases) Calculation Data: amount of data in a unit of work Latency (increasing)
User Role Diversity (increases) Data Stewardship Number of Concurrent Users
Data Storage Access Type Compute Intensive
Availability
Availability Target % Uptime Workload Type
Availability Requirement - Days of Operation Batch Processing Time
Availability Requirement - Hours of Operation Event Driven
Availability Requirement - SLA for MTTR Workload Concurrency (Distribution)
Availability Requirement - Fast Recovery Time Workload Units (Fine, Coarse)
Workload QoS: Time, Vol - specifics in performance
Security Scalability (Statelessness)
Integrity (level of validation) Preemption of Workload
Confidentiality (Sensitivity) Workload Units Processing (Transactional)
Sharing of Workload Data