Domain

IT Operations Knowledge – Page 58

Virtualization Challenges

This whitepaper discusses the things to consider before taking the plunge into virtualization – because "Collapsing multiple physical devices into software affects the<br /> people and processes supporting the data center. Therefore, enterprises should thoroughly evaluate how business processes, administrative rights, capacity planning, performance monitoring tools and security strategies will need to change."

Virtualization 2.0

This whitepaper makes the case for manageability as a cornerstone of Virtualization. The authors contend that Virtualization 1.0 – that is how the story started! – was about maximizing functionality of shared infrastructure. Virtualization 2.0 is about performance i.e. squeezing the last drop out of virtual infrastructure so the focus should be on monitoring and management solutions.

A Practical Guide to Virtualization

This whitepaper discusses the drivers compelling organizations to pursue virtualization as a solution, describes the benefits of virtualization, and demonstrates network virtualization in action.

Application Modernization Strategy

This white paper discusses four strategic options available for legacy application, modernization and using service oriented architecture (SOA), and the five steps in re-engineering to modernize legacy applications.

Strategy for Application Modernization

This paper discusses the key factors driving the application modernization decision and proposes an approach to legacy application modernization – "establishing and executing a realistic strategic roadmap that starts from the current state environment, captures existing and new business and IT goals, budgets and skills, establishes the future strategic architecture and charts a path through a custom strategic transition roadmap."

Mainframe Modernization

This paper aims to provide "a clear illustration of the process of Mainframe modernization, and why this has an immediate and long term positive effect on both shareholder value and competitive position."

Legacy Modernization Beyond SOA

This paper discusses a practical approach to realizing application modernization beyond SOA – beyond simple Web enablement and service-oriented architectures and embracing more recent innovations and technical enablers, such as cloud computing, software-as-a-service, next-generation mobile computing, and even social computing.

Performing an Information Security Assessment

This presentation describes the steps in performing an information security assessment – what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to support a security assessment? how to perform a gap analysis? how to create a security road map? – and discusses the lessons learnt.

CIO Portal