Title: Corporate Template
1(No Transcript)
2Deploy With Confidence
Minimize risks Improve business output Optimize
resources
3The Application Lifecycle
O B J E C T I V E S
BUSINESS AVAILABILITY
SYSTEM PERFORMANCE
APPLICATION READINESS
DEVELOPMENT
IT GOVERNANCE
DEVELOP
OPERATE
DEPLOY
TEST
PLAN
4Deployment Complexity
Legacy
APPLICATION
ERP
CRM
Sessions
Firewall
DNS
Indexes
Customize Code
Latency
Connection
SQL Call
Encryption
Throughput
DATABASE
APP SERVER
WEB SERVER
NETWORK
SECURITY
LOAD BALANCER
No system-wide perspectiveSignificant time
pressure
5Deployment Risks
6When to Optimize/Tune
Initial Rollout Projects
User Expansions
New Geographies
System Integrations
Shared Infrastructures
OS, App, System Updates
7Optimization Methodology
8Our Optimization Methodology
- Phase-driven approach to Performance Optimization
Fully Plan the project Organize the Team
Quantify the System Performance
Iteratively Isolate and Eliminate
Performance Bottlenecks
Assess the Performance Improvements and Report
9Determine Business Objectives (Phase 1)
10Organize the Team (Phase 1)
- Most problems result from interactions between
components - Team structure streamlines analysis and diagnosis
ProTune Specialist
DBA
Project Manager
Sys Admin
Dev QA
App Architect
NW Admin
Silo-centric
Cross Discipline Team
Plan
11Baseline the System (Phase 2)
12Compare Results to Targets (Phase 2)
13Optimize the System tier by tier (Phase 3)
- Diagnose by logical tiers
- Employ component library tests for infrastructure
tiers - Create specific tests for application and
database tiers
14Iteratively Analyze each Tier (Phase 3)
Fire wall
Load Balancer
Fire wall
Web Servers
Application Tier
Database Tier
Infrastructure Tier
Validate Fix
Optimize
15EJB - Latency Breakdown
16EJB - Throughput Distribution
17Re-run Baseline and Assess (Phase 4)
- Quantify improvements
- Deliver Executive and Detailed Reports
18Introducing
ProTune
- Validate performance
- Optimize configuration
- Verify alignment with business objectives
19Safe Deployment System(SDS)
Including
Systematic Identification
Problem Isolation
Expert Recommendations
DB SERVERS
WEB SERVERS
APP SERVERS
LOADBALANCER
NETWORK
SECURITY
Automated Improvements and Validation
Overload Protection
20How It Works
- Mapped topology
- Auto-Assigned monitoring
- Business process emulation
- System component validation
- Problem detection
- Recommended configuration
- Automated checklist
- Repeated validation
- Audit trail
CONSOLE
21Our Experience and Track Record
- Over 3000 Optimization Engagements
- Average Results (performance improvements)
- ERP Systems 100
- CRM Systems 150
- Web andJ2EE 400
- Complex C/S 200
22Electronic Ticketing System Improves Throughput
by 10x
- The Case
- E-ticket system required throughput of 400
tickets/hr - Web-based application, Oracle database, SABRE
system integration - The Findings
- Infrastructure Configurations
- Routers improperly configured, insufficient
bandwidth, and insufficient file descriptors for
Web Servers - Application Code Defects
- Isolated JAVA code null pointer exception
- The Results
- Increased system throughput by 10x from 270 to
over 3000 transactions/hour
and booked over 1M per day with no down-time.