Overview. Consolidating SCM Infrastructures - Migrating between Tools -

Similar documents
Comparison: Perforce and Microsoft Visual SourceSafe. Perforce VSS

XP: Backup Your Important Files for Safety

18-642: Software Development Processes

Availability and the Always-on Enterprise: Why Backup is Dead

Tips for creating a VDI backup plan

BCN Virtualisation. Exceeding Expectations

Categorizing Migrations

MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

Desktop & Laptop Edition

TSM Paper Replicating TSM

The SD-WAN security guide

Disaster Recovery Is A Business Strategy

IBM Best Practices Working With Multiple CCM Applications Draft

Bridge Course On Software Testing

CATCH ERRORS BEFORE THEY HAPPEN. Lessons for a mature data governance practice

Common Preventive Maintenance Techniques for Operating Systems

Server Edition USER MANUAL. For Mac OS X

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

Certified Information Systems Auditor (CISA)

PLAYBOOK. How Do You Plan to Grow? Evaluating Your Critical Infrastructure Can Help Uncover the Right Strategy

Total Cost of Ownership: Benefits of the OpenText Cloud

Server Edition USER MANUAL. For Microsoft Windows

Five Key Considerations for Selecting Cloud Recovery Services

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Although many business owners think that Virtualization and Disaster Recovery (DR) are two separate services, the

Bullet Proof. Dimension Technology Solutions, Inc. Methodologies and Practice Concerning. Monitoring, Backups and Recovery

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Cisco Collaboration Optimization Services: Tune-Up for Peak Performance

Accelerate Your Enterprise Private Cloud Initiative

Vendor: IBM. Exam Code: C Exam Name: Fundamentals of Applying Tivoli Storage Solutions V3. Version: Demo

High Availability and Disaster Recovery Solutions for Perforce

High Availability- Disaster Recovery 101

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

The Fruits of Their Labor

Making the Case for Cloud-to-Cloud Backup

High Availability- Disaster Recovery 101

Understanding Managed Services

Controlling Costs and Driving Agility in the Datacenter

Migration. 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1

Dell PowerVault DL2100 Powered by CommVault

Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions

Alongside this is AVB, an IEEE standards based technology that could stand on its own or underpin many of the existing networked audio protocols.

white paper Rocket Rocket U2 High Availability / Disaster Recovery Best Practices

The Six Principles of BW Data Validation

The Danger of Invalid Database Objects

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors

AKF Partners Case Study Engagement Type: Long Term Interim CTO Role Industry: Online Marketing Analytics

DEDUPLICATION BASICS

THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY

Veritas System Recovery 18 Management Solution Administrator's Guide

Tips for Effective Patch Management. A Wanstor Guide

Expert Reference Series of White Papers. 12 Virtualization Myths Debunked

Guide for migrating to Exchange 2010

Hitachi Adaptable Modular Storage and Workgroup Modular Storage

Requirements for virtualizing Exchange Server 2010

Chapter 10 Protecting Virtual Environments

Implementing ITIL v3 Service Lifecycle

PROTECT YOUR DATA FROM MALWARE AND ENSURE BUSINESS CONTINUITY ON THE CLOUD WITH NAVLINK MANAGED AMAZON WEB SERVICES MANAGED AWS

TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy

How to Rescue a Deleted File Using the Free Undelete 360 Program

Launch successful marketing campaigns that build your customer list and bring in new sales with little to no effort on your part

HP Application Lifecycle Management. Upgrade Best Practices

How to be a Great Production DBA

Understanding Virtual System Data Protection

Backups and archives: What s the scoop?

SALESFORCE CERTIFIED DEVELOPMENT LIFECYCLE AND DEPLOYMENT DESIGNER

A Digium Solutions Guide. Switchvox On-Premise Options: Is it Time to Virtualize?

Firmware Updates for Internet of Things Devices

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Realizing the Value of Standardized and Automated Database Management SOLUTION WHITE PAPER

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

New Zealand Government IBM Infrastructure as a Service

Clearvision allows Teranet to slash code development costs. Executive summary CLIENT INDUSTRY LOCATION SOLUTION CHALLENGE SOLUTION RESULTS

UNITRENDS CLOUD BACKUP FOR OFFICE 365

Veritas System Recovery 16 Management Solution Administrator's Guide

Virtual protection gets real

Designing Data Protection Strategies for Oracle Databases

THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY

CLOUDALLY EBOOK. Best Practices for Business Continuity

Still All on One Server: Perforce at Scale

Designing Data Protection Strategies for Oracle Databases

Chapter 3 `How a Storage Policy Works

Micro Focus Desktop Containers

StoreVault and NetApp Snapshot Technology

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

How CloudEndure Works

REPORT 2015/149 INTERNAL AUDIT DIVISION

Novell GroupWise vs. Microsoft * Exchange:

Incremental development A.Y. 2018/2019

Case study on PhoneGap / Apache Cordova

Cisco Director Class SAN Planning and Design Service

SAP HANA Disaster Recovery with Asynchronous Storage Replication

SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Professional Services for Cloud Management Solutions

Transcription:

- Migrating between Tools - Neal R. Firth, SageRight, Inc. An affiliate of Vizim Worldwide, Inc. 1 Overview Introduction Organizational Factors Business and People Product Factors Features and Usage The migration process 2 3 1

Organizational Factor Overview Change Drivers Reality Checks Justification Process Costs Key Practices 4 Organizational Factors Driving Factors Financial Pressures Saving money Alternative to upgrade Difficult ROI Mergers and Acquisitions One organizational standard Change of Methodology New tool features or integrations required 5 Organizational Factors Reality Checks SCM information is your company! Change is hard! Can you change just to save money? What if the change doesn t go well? 6 2

Organizational Factors Justification Pitfalls Recovering from mistakes of the past. Addressing symptoms not causes. Focusing on easily quantifiable factors. Ignoring the hard to quantify intangibles. The decision matrix. Must have product features. 7 Organizational Factors Justification Reasons Usually Good Productivity Integration with Other Systems Content and Activity audits Stability Usually Questionable Features Usability Stability 8 Organizational Factors Process Implications Does Process define the tools? Do the tools define the Process? Does a vendor define the Process? Is the process backed by standards? 9 3

Organizational Factors Costs Product licensing standard + add-on Infrastructure Retraining administrator, user Retooling builds, delivery, backup Consultants Legacy licenses and support Transition down time Post-transition productivity 10 Organizational Factors Key Practices Change because you have to. People resources dedicated and empowered. Formal training for advocates and early adopters. Use Product experts they know how the new product really operates. 11 12 4

Product Factor Overview Infrastructure Stability Scalability Key Considerations 13 Product Factors Application Infrastructure Defect/ Issue management Build automation Integrated Development Environments and other plug-in uses Product Distribution full release, patch Non-developer uses documentation, web content 14 Product Factors Hardware Infrastructure Performance and Availability Servers Production Migration Ongoing Test Backup Clients Local Remote Distributed 15 5

Product Factors Communication Infrastructure Server backbone NAS, Backup, Redundancy Clients How many, how often, how much Clients Intranet, internet Build systems Data Volume Integrated applications What if they re not available? 16 Product Factors Product Stability Communication dependencies Time dependencies Data corruption Environmental User accident Malicious User Disaster Recovery Standby Servers none, warm, hot Server Exposure Client Exposure 17 Product Factors Scalability What do you need to scale an environment? Can additional resources scale faster? Vendor involvement Users and access security Administrative overhead Storage overhead 18 6

Product Factors Key Considerations Dedicated infrastructure Quality infrastructure Don t retrofit Stability. Use specific product features as an evaluation exclusion factor not an inclusion criteria. Usability is frequently emotional and often subject to change. 19 20 Conversion Factor Overview Techniques The approach Artifacts Perils Key Considerations 21 7

Technique Automation Support Vendor User community Custom providers Ability to extract history Command line/ API conversions look like user activity Recovery Emulation convert to backup and restore 22 Possible Approaches Tip/ Head Milestone Snapshot Retained History Incremental changes since a baseline conversion Selective subsets of existing artifacts Golden Copy Import reliable sources aren t available 23 Approach Considerations Post transition environment single or multiple SCM systems Legacy licenses Legacy infrastructure History browsing Legacy releases and support Conversion time risk of delay/ cost of failure 24 8

Refactoring Why refactor during a conversion? Timing Before a conversion During a conversion After a conversion Considerations Audit trail Equivalence validation Partial refactoring 25 Validation Considerations Isn t this apples and oranges? Trial runs Selected conversions how do you select? Test Cases do they cover all situations? Full conversion time intensive A potentially infinite time sink Current tip equivalence Equivalence is less likely as artifacts age 26 Validation Techniques Validation sources Extracted artifacts Golden copies Shipped product Validation of subjective artifacts History Comments File characteristics Workspace population as a factor 27 9

Validation - Missing Data Intentional product provides the interface Malicious a variation on disaster recovery Corruption disaster recovery is overkill How do you differentiate? 28 Artifacts Time and Date formats, time zones User licensing, security Naming name spaces, allowable characters, character case Comments check-in, check-out, implicit Dynamic shares, symbolic links 29 Artifact References Version numbers Evil Siblings Changesets/ Changelists Deleted artifacts Workspace implications 30 10

File Content Data Types Text all text is not created equal ANSII-text which character map Unicode-text BOM is binary to some Binary Custom Line endings Server storage compressed, full, latest 31 Branches What is a branch? Specification requirements Activity histories Merge differences Conflict resolution differences Representation Sparse Fully populated Workspace content 32 Labels The dead wood typically >95% Artifact reference differences acute for deleted and renamed artifacts Utilization differences Workspace baselines Points in time Artificial branches Performance implications Extraction Conversion 33 11

Common Perils The file with 1000 versions Time to validate Time to migrate Refactoring Mid-conversion failure Production environment impact Development impact 34 Conversion Key Practices Any two systems are similar but not identical. There are going to be trade-offs. Consistency! A straightforward approach. Be sure the tips are accurate! Avoid time sinks validation, artifact conversion It s not what if XXX goes wrong but rather can we recover when XXX goes wrong. 35 Conclusions Migrate for sound business reasons! It s about Process and Productivity Money should be a secondary factor Quality Infrastructure Invest! Don t just make do. It is just like rocket science Migrate to your experience level 36 12

Mini Cases Organizational Factors One standard to rule them all A year after the fact, process improvements are an organizationwide activity, automation improvements apply to all projects, and SCM skills are no longer a factor in people assignments. And the numbers is Ignoring the disaster intangible showed a large savings by staying with the old system. But did they save enough to cover the costs of a missed release and a week of engineering down time? They ll know how to use it They only hire top people so they saved a lot of money by skipping formal training. But the people only learned enough to make the new system operate like the old system. Many of the expected gains in productivity were never realized. 37 Mini Cases Product Factors Response times continued their descent The new tool evaluated with significantly better performance than the existing tool. After the conversion, response time was once again acceptable. But it soon began to suffer. The problem was infrastructure not tool. But productivity didn t increase The pre-conversion evaluation clearly indicated that certain missing features were impacting productivity. But postconversion productivity was still low even though the new tool had the required features. Tools can hide or mitigate fundamentally unproductive processes but they can t fix them. 38 Mini Cases The impossible validation After weeks of adjustments and re-tries the converted sources still didn t match the sources extracted from the legacy system. Nor did they match the golden copy. Of course the extracted legacy system sources didn t match the golden copy either. But no one had thought to try that comparison. But the test cases validated just fine The conversion validated against test cases and selected smaller projects. But it failed during the go-live conversion run creating chaos in the schedule. Test cases rarely find the more creative artifacts of tool use. And smaller projects convert faster but their small size rarely creates interesting usage scenarios. 39 13

Mini Cases The algorithmic tour-de-force Significant effort was spent emulating branch and merge actions as part of the conversion process. As time passed and users became accustomed to the characteristics and protocols of branch and merge using the new tool these emulations became a source of error and confusion. Similar is not equal. Even if emulations can be achieved, straightforward is often the best approach. It shouldn t be taking this long Later conversions were taking 50 to 100% longer than anticipated based on earlier trials. This may be a normal side effect of the tool attempting to manage more information. Early conversions won t experience this because they are operating against relatively pristine servers. On live systems this may be a consequence of servers attempting to manage the atypical usage of conversions. 40 14