What is involved in WAN Optimization
Find out what the related areas are that WAN Optimization connects with, associates with, correlates with or affects, and which require thought, deliberation, analysis, review and discussion. This unique checklist stands out in a sense that it is not per-se designed to give answers, but to engage the reader and lay out a WAN Optimization thinking-frame.
How far is your company on its WAN Optimization journey?
Take this short survey to gauge your organization’s progress toward WAN Optimization leadership. Learn your strongest and weakest areas, and what you can do now to create a strategy that delivers results.
To address the criteria in this checklist for your organization, extensive selected resources are provided for sources of further research and information.
Start the Checklist
Below you will find a quick checklist designed to help you think about which WAN Optimization related domains to cover and 114 essential critical questions to check off in that domain.
The following domains are covered:
WAN Optimization, Bandwidth management, Business Continuity, Data Center, Data migration, Data transfer, Disaster Recovery, Forward error correction, Gartner, HTTPS Proxy, Multicast, Proprietary software, Protocol spoofing, Server Message Block, Traffic shaping, Web cache, Web caching, Wide-area network, Wide area file services:
WAN Optimization Critical Criteria:
Guard WAN Optimization engagements and improve WAN Optimization service perception.
– What are our best practices for minimizing WAN Optimization project risk, while demonstrating incremental value and quick wins throughout the WAN Optimization project lifecycle?
– How do your measurements capture actionable WAN Optimization information for use in exceeding your customers expectations and securing your customers engagement?
– What about WAN Optimization Analysis of results?
Bandwidth management Critical Criteria:
Grasp Bandwidth management issues and suggest using storytelling to create more compelling Bandwidth management projects.
– Is there any existing WAN Optimization governance structure?
– What are the business goals WAN Optimization is aiming to achieve?
– How can skill-level changes improve WAN Optimization?
Business Continuity Critical Criteria:
Discourse Business Continuity projects and separate what are the business goals Business Continuity is aiming to achieve.
– Who will be responsible for leading the various bcp teams (e.g., crisis/emergency, recovery, technology, communications, facilities, Human Resources, business units and processes, Customer Service)?
– Has the organization established an enterprise-wide business continuity/disaster recovery program that is consistent with requirements, policy, and applicable guidelines?
– Do you have a written business continuity/disaster recovery plan that includes procedures to be followed in the event of a disruptive computer incident?
– Does our business continuity and/or disaster recovery plan (bcp/drp) address the timely recovery of its it functions in the event of a disaster?
– Do our business continuity andor disaster recovery plan (bcp/drp) address the timely recovery of our it functions in the event of a disaster?
– What programs/projects/departments/groups have some or all responsibility for business continuity/Risk Management/organizational resilience?
– Which data center management activity involves eliminating single points of failure to ensure business continuity?
– How will management prepare employees for a disaster, reduce the overall risks, and shorten the recovery window?
– What prevents me from making the changes I know will make me a more effective WAN Optimization leader?
– What is the role of digital document management in business continuity planning management?
– Does increasing our companys footprint add to the challenge of business continuity?
– How does our business continuity plan differ from a disaster recovery plan?
– Does WAN Optimization analysis isolate the fundamental causes of problems?
– Has business continuity thinking and planning become too formulaic?
– What is business continuity planning and why is it important?
– Do you have any DR/business continuity plans in place?
– Do you have a tested IT disaster recovery plan?
– What do we really want from Service Management?
Data Center Critical Criteria:
Do a round table on Data Center results and integrate design thinking in Data Center innovation.
– Are we a listed company, if so ask ourselves this: Disaster recovery planning, or its lack, will affect a companys equity position. why buy stock in a company that will disappear should the data center go down?
– An administrator of a virtualized data center is particularly concerned about nic failure. what should the administrator configure to address this concern?
– Determine if the data center has Service Level Agreements with the clients it serves. if so, do they measure themselves for compliance with the agreement?
– What are the specific security and integrity threats to cloud computing storage systems that do not exist in private data centers?
– Does the cloud solution offer equal or greater data security capabilities than those provided by your organizations data center?
– Do operating procedures require systems to undergo a security/vulnerability scan before being placed into production?
– Which report should an administrator use to know both historic and current utilization of storage in a data center?
– Which applications are best suited for the internal data center, and which ones make sense for the public cloud?
– Should the dataset be deposited in a national, international or discipline-based data center?
– Do any countries force cloud based companies to house data within that countrys data centers?
– Is stuff in the cloud on the same legal footing as stuff in your data center?
– Is the priority of system restores documented in the disaster recovery plan?
– What is the best strategy going forward for data center disaster recovery?
– Can we do WAN Optimization without complex (expensive) analysis?
– How many and where are located the providers data centers?
– How do you prepare your data center for Cloud?
– Why should data center elements be monitored?
– How do we go about Securing WAN Optimization?
– What is Effective WAN Optimization?
Data migration Critical Criteria:
Trace Data migration visions and test out new things.
– The process of conducting a data migration involves access to both the legacy source and the target source. The target source must be configured according to requirements. If youre using a contractor and provided that the contractor is under strict confidentiality, do you permit the contractor to house copies of your source data during the implementation?
– Think about the people you identified for your WAN Optimization project and the project responsibilities you would assign to them. what kind of training do you think they would need to perform these responsibilities effectively?
– Data migration does our organization have a resource (dba, etc) who understands your current database structure and who can extract data into a pre-defined file and format?
– With the traditional approach to data migration, delays due to specification changes are an expected (and accepted) part of most projects. does this sound familiar?
– Data migration are there any external users accounts existing and will these user accounts need to be migrated to the new lms?
– Risk factors: what are the characteristics of WAN Optimization that make it risky?
– Are there data migration issues?
Data transfer Critical Criteria:
Boost Data transfer engagements and reduce Data transfer costs.
– The slower data transfer rate between a compute cluster and a storage array has been adversely impacting multiple cloud services. which Service Management process helps to mitigate this impact?
– How do we measure improved WAN Optimization service perception, and satisfaction?
– How will you know that the WAN Optimization project has been successful?
– Can Management personnel recognize the monetary benefit of WAN Optimization?
Disaster Recovery Critical Criteria:
Exchange ideas about Disaster Recovery risks and research ways can we become the Disaster Recovery company that would put us out of business.
– Have policies and procedures been established to ensure the continuity of data services in an event of a data breach, loss, or other disaster (this includes a disaster recovery plan)?
– If we move in a different direction, what are the private-property concerns?
– What, if any, policies are in place to address post-disaster redevelopment?
– Where does recovery fit within the other phases of emergency management?
– What are we doing related to disaster recovery planning & programs?
– How well do we document, keep up-to-date, and test our bc plans?
– Does the building need to be secured against theft/ vandalism?
– Key customers and/or suppliers been affected by the disaster?
– Does the building need to be secured against theft vandalism?
– Can your business change easily to react to outside forces?
– Are damage assessment and disaster recovery plans in place?
– Can you wait to reopen and still be viable when you do?
– Expertise readily available to install the equipment?
– How do we define the disaster recovery process?
– Is your business vital to the community?
– Is disaster recovery server in scope?
– Should I go back into business?
– Can the item be replaced?
– What was selling?
Forward error correction Critical Criteria:
Consolidate Forward error correction planning and separate what are the business goals Forward error correction is aiming to achieve.
– Does WAN Optimization systematically track and analyze outcomes for accountability and quality improvement?
– What are our needs in relation to WAN Optimization skills, labor, equipment, and markets?
– Is WAN Optimization Required?
Gartner Critical Criteria:
Align Gartner leadership and look for lots of ideas.
– Will WAN Optimization deliverables need to be tested and, if so, by whom?
– Does the WAN Optimization task fit the clients priorities?
– What are specific WAN Optimization Rules to follow?
HTTPS Proxy Critical Criteria:
Concentrate on HTTPS Proxy outcomes and frame using storytelling to create more compelling HTTPS Proxy projects.
– Do several people in different organizational units assist with the WAN Optimization process?
– Are accountability and ownership for WAN Optimization clearly defined?
Multicast Critical Criteria:
Have a session on Multicast visions and oversee implementation of Multicast.
– If a network is involved, what is its operational paradigm, that is, unicast (point-to-point network, such as Ethernet), multicast, or broadcast?
– What other organizational variables, such as reward systems or communication systems, affect the performance of this WAN Optimization process?
– How do we ensure that implementations of WAN Optimization products are done in a way that ensures safety?
– Are there WAN Optimization Models?
Proprietary software Critical Criteria:
Interpolate Proprietary software failures and intervene in Proprietary software processes and leadership.
– Will WAN Optimization have an impact on current business continuity, disaster recovery processes and/or infrastructure?
– Which WAN Optimization goals are the most important?
– Why is WAN Optimization important for you now?
Protocol spoofing Critical Criteria:
Frame Protocol spoofing leadership and proactively manage Protocol spoofing risks.
– At what point will vulnerability assessments be performed once WAN Optimization is put into production (e.g., ongoing Risk Management after implementation)?
– Who is the main stakeholder, with ultimate responsibility for driving WAN Optimization forward?
– Do we all define WAN Optimization in the same way?
Server Message Block Critical Criteria:
Coach on Server Message Block governance and budget the knowledge transfer for any interested in Server Message Block.
– What role does communication play in the success or failure of a WAN Optimization project?
– What threat is WAN Optimization addressing?
Traffic shaping Critical Criteria:
Detail Traffic shaping tactics and correct Traffic shaping management by competencies.
– Where do ideas that reach policy makers and planners as proposals for WAN Optimization strengthening and reform actually originate?
– How does the organization define, manage, and improve its WAN Optimization processes?
Web cache Critical Criteria:
Consult on Web cache risks and transcribe Web cache as tomorrows backbone for success.
– What are your results for key measures or indicators of the accomplishment of your WAN Optimization strategy and action plans, including building and strengthening core competencies?
– Have you identified your WAN Optimization key performance indicators?
Web caching Critical Criteria:
Transcribe Web caching failures and grade techniques for implementing Web caching controls.
– What will be the consequences to the business (financial, reputation etc) if WAN Optimization does not go ahead or fails to deliver the objectives?
– Who will be responsible for deciding whether WAN Optimization goes ahead or not after the initial investigations?
– What business benefits will WAN Optimization goals deliver if achieved?
Wide-area network Critical Criteria:
Test Wide-area network management and overcome Wide-area network skills and management ineffectiveness.
– Think about the kind of project structure that would be appropriate for your WAN Optimization project. should it be formal and complex, or can it be less formal and relatively simple?
– How important is WAN Optimization to the user organizations mission?
– How is the value delivered by WAN Optimization being measured?
Wide area file services Critical Criteria:
Analyze Wide area file services results and give examples utilizing a core of simple Wide area file services skills.
– What are the Key enablers to make this WAN Optimization move?
– What are internal and external WAN Optimization relations?
This quick readiness checklist is a selected resource to help you move forward. Learn more about how to achieve comprehensive insights with the WAN Optimization Self Assessment:
Author: Gerard Blokdijk
CEO at The Art of Service | theartofservice.com
Gerard is the CEO at The Art of Service. He has been providing information technology insights, talks, tools and products to organizations in a wide range of industries for over 25 years. Gerard is a widely recognized and respected information expert. Gerard founded The Art of Service consulting business in 2000. Gerard has authored numerous published books to date.
To address the criteria in this checklist, these selected resources are provided for sources of further research and information:
WAN Optimization External links:
WAN Optimization – MACH5 | Symantec
News and Updates – WAN Optimization Companies | Viptela
Bandwidth management External links:
Bandwidth Management and Access Gateway AG 2500 | …
Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. Bandwidth management is measured in bits per second (bit/s) or bytes per second (B/s).
Business Continuity External links:
Business Continuity Plan | Northwest Title & Escrow
ISO 22301 Business Continuity Standard in Plain English
Data Center External links:
Data Dashboards – Education Research and Data Center
Park Place Technologies : Data Center Maintenance
Home – State of South Dakota K-12 Data Center
Data migration External links:
Data Migration Jobs – Apply Now | CareerBuilder
Download Intel® Data Migration Software
Data Migration Specialist Jobs, Employment | Indeed.com
Data transfer External links:
Easy & Safe Data Transfer Between Any Mobile Phones
[DOC]Data Transfer Agreement – Atlanta VA Medical Center
Data Transfer via Human Body – scribd.com
Disaster Recovery External links:
EnsureDR for Disaster Recovery
SCDRO – South Carolina Disaster Recovery Office
Cloud Migration and Disaster Recovery
Forward error correction External links:
AHA Products Group – Forward Error Correction
[PPT]Forward Error CORRECTION – Christopher Newport …
Forward Error Correction
Gartner External links:
IT Gartner Login
Mobile Apps | Gartner Inc.
Gartner Customer Service
HTTPS Proxy External links:
Proxee – SOCKS5 & HTTPS proxy servers
Multicast External links:
Basic Multicast Troubleshooting Tools – Cisco
Multicast UDP Streaming Using VLC – YouTube
Proprietary software External links:
Proprietary Software and the Institutional Researcher. – …
Proprietary Software for Free | USC Spatial Sciences Institute
Proprietary Software Definition – LINFO
Server Message Block External links:
Server Message Block communication between a client …
Overview of Server Message Block signing
Server Message Block
Server Message Block. In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS, /?s?fs/), operates as an application-layer network protocol mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network.
Traffic shaping External links:
Traffic Shaping | Silver Peak
Traffic Shaping | A10 Networks
Traffic shaping | Cradlepoint
Web cache External links:
Web Cache Illuminator – Download
Starting and Stopping OracleAS Web Cache – docs.oracle.com
Web caching External links:
Impact of Web Caching – Catchpoint Systems
Microcache – Web caching solution – Home | Facebook
Web Caching | Akamai
Wide area file services External links:
What is wide area file services? Webopedia Definition
Wide Area File Services (WAFS) | WAN Optimization …