Application Transformation Acceleration Dell EMC Consulting Ingo Strutz
IT CHALLENGE: BUILD NEW AND SUPPORT EXISTING NEW PLATFORMS EXISTING PLATFORMS Flexibility & Agility To Drive New Digital Business Outcomes Stable & Reliable Performance To Drive Daily Business Functions 3
Advanced Services Objectives REDUCE COST AND INCREASE AGILITY The Customer Journey to Business Value Cost Current State Inflexible High-cost Redundant Platform 2 / 2.5 Proprietary Agility Target Future State Agile Cost-efficient Rationalized Platform 3 / Hybrid Cloud Open AGILITY BENEFITS 50-70% Faster in Planning COST BENEFITS Validation Analytics 50% less internal resources Real or Neartime Data Analytics driven Monoliths / Legacy App Servers Modular Apps + industry standard stacks PaaS / microservices 30-50% reduction in Application Migrations and Transformation Costs 4 Source: IDC, Dell Puppet - Internal Labs, EMC Use analysis - Confidential
Application Transformation is leading Align Workloads With Most Suitable Cloud Model And Empower Them for Mobile And Big Data Solutions Build A Cost-efficient, Agile Infrastructure To Enable Private and Hybrid Cloud APPLICATION TRANSFORMATION End User Experience EXISTING PLATFORMS Existing Applications NEW PLATFORMS INFRASTRUCTURE TRANSFORMATION OPERATING MODEL TRANSFORMATION Service Portal Management, Orchestration New Roles Agile Processes Package And Orchestrate Services For Agile IT Operations And Convenient Consumption 5
EMC APPLICATION TRANSFORMATION FRAMEWORK Application Strategy and Transformation Program Management NEW APPS Increase Agility Application Alignment Assessment BUILD NEW REWRITE MODERN APP FACTORY Architecture, Standards DEV DEV OPS Dev, Execution MIGRATION FACTORY EXISTING APPS Reduce Costs REPLATFORM RETIRE Architecture, Standards Migration Execution RETIREMENT FACTORY REPLATFORM RETAIN Architecture, Standards Retirement Execution Organization and Operating Model Transformation Integrated Service Management Infrastructure Transformation 6
SaaS Decision Support Factory Existing Data Decision Factory Target Current Platforms Programmatic consumption of all application data-sources and discovery tools Multiple IT and Line of Business inputs Intelligent blueprinting and workload analytics Application-centric, software accelerated, scalable migration model Automated Blueprints feed IT Mgmt Tooling Platform evolves to support emerging IT capabilities Application Portfolio Operational Demand KPI Assignment Key Demographics Business Categorise Applications Align Business Demand to IT Supply Target architecture specifications Application Dependency Data Infrastructure Inventory Performance & Monitoring Data (CiBRA, BMC, HP etc.) Technology Visualise Application Relationships Identify demand v supply gaps Design for your target architecture Factory Deliverables Business to IT Alignment Suitability, Selection, Sizing Migration and Validation Feedback to Bus. Case Application Fit Algorithmic scoring Application Prioritisation (RPO, Application Deployment RTO) Modeling Target Platform Capabilities Sizing, capacity, consumption Application dependency (affinity) and platform requirements 7 mapping Application Move Groups Migration Execution Validation Support Sunset and Decommissioning BoM for Target platform Wave schedule and real time execution plan
5 step Decision Support Factory - Approach EMC Migration Services * Supports 8 all other Dell - steps Internal with Use fact - Confidential based forensic discovery data, but is NOT mandated. Can run in parallel.
Classify Application Classification Assessment Inputs Process Outputs List of Application Names Up to 9 Scoring Criteria Up to 5 Classifications Customer Staff Resources Classification Report (pdf) Consensus and agreed classification for selected applications Confidence to select correct applications for next step Select agreed number of applications Define and agree scoring criteria Define and agree classifications Run joint EMC customer workshop Review and validate results 9
Classification Dashboard EACH APPLICATION ALIGNED WITH BUSINESS DRIVERS NOT TECHNOLOGY Identifies priorities for potential action Automated classification of your portfolio aligned to your business drivers Customer defined business drivers Portfolio level view empowers executives to make informed decisions 10
Blueprint* Application Blueprinting Assessment * Supports all other steps with fact based forensic discovery data, but is NOT mandated. Can run in parallel. Inputs Process Outputs Network Topology Compute Hosts Network Access Existing data-sets Customer Network Resources Practitioners forensic workbook (xls) Multiple deployment and interactions blueprints (pdf) Confidence to perform migration and transformation work Install network discovery tools Conduct automated discovery and data enrichment Populate and build blueprint data repository Run analytics and build blueprints Review and validate results 11
Blueprintig Deliverables: INVENTORY AND DEPENDENCIES Inventory Servers Network Devices Data Bases Application Storage Array Level (Optional) Dependencies Infrastructure Services Business Services Application Services Storage Associated with Hosts (Optional) 12
Application Environment Host Relationships Mapping of Internal and External Interactions Shows all discovered collaborating applications and their business unit ownership for an application Agentless Discover dependent business and infrastructure services for an application 13 Shows all discovered servers for an application across all discovered environments
Align Application Alignment Assessment Inputs Process Outputs Business Value Chain Business Function KPIs Business Activity Demand Characteristics Application Characteristics Customer Resources Disposition Report (pdf) Agreed disposition for each application (Retire, Retain, Re- Write, Re-Platform) Confidence to select correct applications for next step Define and agree overarching BVC Complete KPI and Demand Characteristics Complete Application Characteristics Jointly analyse results of disposition Perform executive review 14
Mapping Applications to Business PROCESS Applications mapped to business activities in value chain Applications mapped to business value chain 15
Suitability Cloud Advisory Service - Planning Inputs Process Outputs Business Value Chain Business Function KPIs Business Activity Demand Characteristics Application Characteristics Customer Resources Cloud Suitability Report (pdf) Agreed cloud suitability for each application (Public, Private, Managed) Confidence to select correct applications for next step Define and agree overarching BVC Complete KPI and Demand Characteristics Complete Application Characteristics Jointly Analyse results of suitability Perform executive review 16
Cloud Fit Index Explained Cloud fit for each application Impact of business considerations, demographics and feasibility on cloud fit 17
Design Cloud Advisory Service - Design Inputs Process Outputs Extended Application Characteristics As-Is Deployment Topology Existing Utilisation Functional Pattern Matching Customer Technical Resources Cloud Placement Report (pdf) Agreed cloud placement recommendation (specific cloud service provider) Confidence to progress to migration Extended application workload quality profile Existing deployment topology and utilisation Functional pattern matching To-Be deployment topology and sizing Perform executive review 18
Application Cloud Placement Specific private and public cloud options scored for each criterion Cloud options ranked by overall fit score User preference indicated, though not optimal solution 19
Detailed Application Configuration Recommended application deployment topology Web server host deployment topology and configuration Application server host deployment topology and configuration Database server host deployment topology and configuration 20
Delivering Value Multiple Lenses Classify Align Suitability Design Blueprint Quickly categorise applications into - Mission Critical, Business Critical, Business Essential or Operational with cross BU consensus Quickly categorise applications into - Retirement Re-Platform Re-Writing Retain candidates with confidence Assess applications suitability for - Public Private or Managed Cloud with automated analytics Placement & design recommendations - F/EHC Virtustream AWS Azure and more leading providers Forensic insight into existing - Servers Network Interactions Software to enable informed decisions Consult Architect Engineer Single Data Repository 21
Minimum Viable Proof of le E2E Service Example 1 Initial Proof of Value exercise taking a limited number of applications through each of Classify, Align, Suitability and Design services. Number of applications will reduce from a maximum of 30 through down to 15 through with a small sub-set of 5 going all the way through to the Design service. 3 0 Blueprint 1 5 1 5 5 Identify a small network segment install minimal blueprint infrastructure and collect forensic data for a maximum of 6-weeks. Results will be of limited use but will prove value of Blueprinting once wider deployment agreed. 22
MINIMUM VIABLE E2E SERVICE EXAMPLE TIMELINE Advanced E2E Services PoV Example Timeline Events Project Mobilisation Application Blueprinting Week 1 Week 2 Week 3 Install, Configure, Collect, Normalise Week 4 Week 5 Week 6 Application Classification Data Collection Application Alignment 1 Day Workshop Workshops, Interviews Analyse Data Cloud Suitability (CAS-PS) Cloud Design (CAS-DS) Analyse Data Analyse Data 23 Project Closure & Exec Review Note: This Proof of Value is dependent on customer resources being available throughout the 6-week period but most of the workshops/interviews will take place in weeks 1-2 : Executive Review and final outputs will be presented and shared in sixth week Presentation Dev and Results Validation