Module 2 App Assessment & Migration Planning Flashcards
(331 cards)
First layer of the cloud stack
Applications
Drive the decisions made throughout the rest of the stack in the VDC
Applications
Has the most to gain from a well designed VDC
Application layer
How can application deployment and management be simplified?
By using techniques and technologies available in other layers.
How application uptime can be enhanced
By using features available in the hypervisor
First step in application assessment
To understand the applications in the environment, their value to the organization, and their requirements.
Examples of application requirements
Data security, accessibility, latency, etc.
Four modern application delivery challenges
- Little attention to performance during development
- Security vulnerabilities
- Distributed employees
- Distributed applications & associated complexity
Five new application delivery challenges
- Movement away from monolithic architectures
- Web 2.0 & rich content application requirements
- SLAs
- Legacy apps and application silos
- Consumerization of IT
Three virtualization technology opportunities
- Increase flexibility
- Reduce cost
- Tighten security
True or False:
Generally, the role of application performance & robustness has been pushed down the stack to the compute, network, and storage layers.
True
How can employees be distributed?
Across organization facilities, small field offices, home offices, or at customer sites using mobile devices.
How can applications be distributed?
With multiple presentation layers, residing on separate machines and locations from the business logic layers and data access layers.
Two examples of Web 2.0 systems
How can IT eliminate traditional costs and become leaner?
Through consolidation and standardization
Makes a customer dependent on a vendor for hardware or software, creating a situation where they are unable to use another system without incurring substantial costs or data loss.
Vendor Lock-in
Five items to evaluate to determine if vendor lock-in exists
- Proprietary hardware, software, APIs, file formats
- Software limited to certain hardware platforms or configurations
- Abandonware
- Availability of source code, documentation, skillsets
- Licensing
Three legal issues pertaining to vendor lock-in
- Government laws
- Commercial licenses
- Open Source licenses
True or False: Vendor lock-in is limited to large hardware / software / systems companies.
False.
Three vendor lock-in scenarios for software
- Where software only runs on specific hardware.
- Where software uses unpublished APIs.
- Where software uses undocumented file formats.
True or False: Systems developed in-house can lead to vendor lock-in scenarios.
True
Category of software in which the product is not being maintained due to the vendor stopping work, going out of business, the in-house developer leaving the company, etc.
Abandonware
True or False:
Hardware can also fall into the category of abandonware.
True
Makes it much easier and less costly to work with vendor lock-in situations
Availability of source code