SlideShare a Scribd company logo
1 of 9
vBrownbag VCAP6-DCV
Design
Objective 1.1- Gather and analyze
business requirements
Who is this guy?
Gregg Robertson
VCDX5-DCV #205
EMEA #vBrownbag Host
VMware Communities Moderator
vExpert 2011-2016 (hopefully ’17 soon)
Blog: TheSaffaGeek.Co.Uk
Twitter: @GreggRobertson5
Dell - Internal Use - Confidential3 of Y
Associate a stakeholder with the information that
needs to be collected.
This is down to the questions you need to ask and also who you need to ask these questions. These
questions are ones you are going to ask during the design workshop for the design/project. For the
workshop you need to make sure you have the applicable project participants/stakeholders who can
join the workshops (depends if you want one big one where people come and go at certain points or
multiple ones where you speak to each business unit/ team). For the stakeholder meetings/design
workshops I personally like to try bring in the following people, this does vary depending on the
project and what has been chosen but 9/10 times these are the people you want to speak to:
› Virtualisation administrators (if applicable. If not already present then future
administrators of the solution)
› Server Hardware Administrators
› Backup Administrators
› Storage Administrators
› Desktop/OS Administrators
› Network Administrators
› Application Administrators (these are very important as their applications may have very
specific requirements)
› Security Officer
› Project Sponsors
› End users/ Developers/ Help desk personnel (this I find is helpful to find out what are the
current support desk tickets/problems the company are facing and if these will impact the
project in any way. Also these discussions are easy to have in the hallway/over a coffee
but have alerted me to unknown risks that would have severely impacted the design and
delivery)
Dell - Internal Use - Confidential4 of Y
Utilize customer inventory and assessment data
from the current environment to define a baseline
state.
• Identify virtualisation candidates and applications
– Identify non-virtualisation candidates
• Capture baseline performance metrics including average and peak loads
– Feeds into capacity requirements
– Feeds into consolidation ratios
– Can be used later for comparison purposes
• Identify unique dependencies
• Identify reusable hardware for the design
• Some or all of these items will produce design decisions
Dell - Internal Use - Confidential5 of Y
Determine customer priorities for defined
objectives.
• I think this is fairly straight forward as from the design workshops and interviews you have
collected what their objectives are and also ensured from all the workshops there are no obvious
conflicts of people’s plans for the solution they want you to design.
• A “normal” customer objectives piece would be:
• Virtual infrastructure capable of supporting consolidated country workloads.
• Highly available, disaster recoverable solution.
• Common standardised infrastructure.
• Simplified and improved support model.
• DR with VMware SRM and EMC RecoverPoint.
• Provide virtual infrastructure that can provide 99.9% availability or higher.
• Automatic virtual machine failover in the event of a host failure.
• DR of critical systems with 99.9% availability.
• DR of non-critical systems with 99% availability.
• Simplicity where possible to allow existing operations teams to manage the new
environments.
• Resilient and provide the highest levels of availability where possible whilst keeping
costs to a minimum.
• 30% growth of virtual machines and storage over the next four years.
Dell - Internal Use - Confidential6 of Y
Ensure that Availability, Manageability, Performance,
Recoverability and Security (AMPRS) considerations are
applied during the requirements gathering process.
ID Requirement Design Characteristic
R101 The solution must deliver a virtual infrastructure capable of supporting all the
consolidated countries applications, data and services.
Availability, Manageability, Performance,
Recoverability, Security
R102 The solution must provide a highly available, disaster recoverable solution. Availability
Recoverability
R103 The solution must deliver a common standardised infrastructure. Manageability
R104 The solution must deliver a centralised infrastructure process and
management.
Manageability
R105 The solution must deliver a simplified and improved support model. Manageability
R106 Design must account for a 30% growth of virtual machines and storage over
the next four years
Performance
R107 The solution must provide an infrastructure that can provide 99.9%
availability or higher.
Availability, Manageability, Performance,
Recoverability, Security
Dell - Internal Use - Confidential7 of Y
Given results of a requirements gathering survey,
develop requirements for a conceptual design.
• This should be relatively straight forward for anyone as you’ve now spoken to all the applicable
people and have taken down all their requirements and ensured there are no requirements
conflicts.
• Requirements have to be very precise so that there is no misinterpretation that could cause scope
creep and it forces you to ensure you know exactly what the customer requires and that they
validate this as correct before you start the logical design.
• For example a requirement of “Customer wants high availability” is far too vague as everyone
might have a different understanding of what high availability means. Your requirement should be
“Customer wants 99.99% availability for the front end portal and 99.9% availability for consumer
workloads outside of scheduled maintenance windows”.
• You would also include RPO and RTO values for these in my opinion in subsequent requirements so
that SLA mapping is clear.
Dell - Internal Use - Confidential8 of Y
Categorize business requirements by infrastructure
quality to prepare for a logical design.
I’m glad this is mentioned here as for the VCDX they are very big advocates for mapping your
requirements to the infrastructure qualities. If you don’t know what the infrastructure qualities are
they are:
– Availability
– Manageability
– Performance
– Recoverability
– Security
So for example my previous concise requirement would fall under Availability, application of
PCI/SOX/Hardening guidelines would fall under security, and ability to run the 1000 developer
workloads would be performance.
This is also very helpful if you are doing requirements mapping from the conceptual requirements to
the logical design decisions to the physical design decisions.
Dell - Internal Use - Confidential9 of Y
Questions?

More Related Content

What's hot

A Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationA Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate Presentation
Robert Atkins
 
Agile architecture
Agile architectureAgile architecture
Agile architecture
Paul Preiss
 

What's hot (20)

Arunprakash Alagesan
Arunprakash AlagesanArunprakash Alagesan
Arunprakash Alagesan
 
A Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationA Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate Presentation
 
Agile architecture
Agile architectureAgile architecture
Agile architecture
 
What are IBM Rational's CLM products
What are IBM Rational's CLM productsWhat are IBM Rational's CLM products
What are IBM Rational's CLM products
 
Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...
Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...
Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...
 
Best practices in IBM Operational Decision Manager Standard 8.7.0 topologies
Best practices in IBM Operational Decision Manager Standard 8.7.0 topologiesBest practices in IBM Operational Decision Manager Standard 8.7.0 topologies
Best practices in IBM Operational Decision Manager Standard 8.7.0 topologies
 
Jitendra_Jadhav
Jitendra_JadhavJitendra_Jadhav
Jitendra_Jadhav
 
Building Operational Intelligence in Telecom with IBM ODM @Claro
Building Operational Intelligence in Telecom with IBM ODM @ClaroBuilding Operational Intelligence in Telecom with IBM ODM @Claro
Building Operational Intelligence in Telecom with IBM ODM @Claro
 
Rational CLM at a glance
Rational CLM at a glanceRational CLM at a glance
Rational CLM at a glance
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017
 
Ba 5-16 tech resume kevin.harger2
Ba   5-16 tech  resume kevin.harger2Ba   5-16 tech  resume kevin.harger2
Ba 5-16 tech resume kevin.harger2
 
Requirement Elicitation Techniques
Requirement Elicitation Techniques Requirement Elicitation Techniques
Requirement Elicitation Techniques
 
Ganesh_Resume_2016
Ganesh_Resume_2016Ganesh_Resume_2016
Ganesh_Resume_2016
 
IBM Collaborative Lifecycle Management Solution for DevOps v6
IBM Collaborative Lifecycle Management Solution for DevOps v6IBM Collaborative Lifecycle Management Solution for DevOps v6
IBM Collaborative Lifecycle Management Solution for DevOps v6
 
Arness Technologies white paper on Re engineering
Arness Technologies white paper on Re engineeringArness Technologies white paper on Re engineering
Arness Technologies white paper on Re engineering
 
Job Postings
Job PostingsJob Postings
Job Postings
 
Requirements engineering in agile
Requirements engineering in agileRequirements engineering in agile
Requirements engineering in agile
 
CRM Desktop Typical Implementation Project by InvisibleCRM
CRM Desktop Typical Implementation Project by InvisibleCRMCRM Desktop Typical Implementation Project by InvisibleCRM
CRM Desktop Typical Implementation Project by InvisibleCRM
 
Sda 6
Sda   6Sda   6
Sda 6
 
PureApplication: Devops and Urbancode
PureApplication: Devops and UrbancodePureApplication: Devops and Urbancode
PureApplication: Devops and Urbancode
 

Similar to #vBrownbag VCAP6-DCV Design Objective 1.1

it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
Robert Nardella
 
Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)
LavaCon
 

Similar to #vBrownbag VCAP6-DCV Design Objective 1.1 (20)

Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
 
Operating a Highly Available Cloud Service
Operating a Highly Available Cloud ServiceOperating a Highly Available Cloud Service
Operating a Highly Available Cloud Service
 
How to test a Mainframe Application
How to test a Mainframe ApplicationHow to test a Mainframe Application
How to test a Mainframe Application
 
Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)
 
Techcello at a glance
Techcello at a glanceTechcello at a glance
Techcello at a glance
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud Computing
 
Avoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation FailureAvoiding Cloud Computing Planning & Implementation Failure
Avoiding Cloud Computing Planning & Implementation Failure
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science Platform
 
VMworld 2015: vRealize Operations Insight: Manage vSphere and Your Entire Dat...
VMworld 2015: vRealize Operations Insight: Manage vSphere and Your Entire Dat...VMworld 2015: vRealize Operations Insight: Manage vSphere and Your Entire Dat...
VMworld 2015: vRealize Operations Insight: Manage vSphere and Your Entire Dat...
 
1221 raise expectations_for_the_ always_on_enterprise
1221 raise expectations_for_the_ always_on_enterprise1221 raise expectations_for_the_ always_on_enterprise
1221 raise expectations_for_the_ always_on_enterprise
 
Building Maintainable PHP Applications.pptx
Building Maintainable PHP Applications.pptxBuilding Maintainable PHP Applications.pptx
Building Maintainable PHP Applications.pptx
 
DevOps in the Hybrid Cloud
DevOps in the Hybrid CloudDevOps in the Hybrid Cloud
DevOps in the Hybrid Cloud
 
Using Agile Approach with Fixed Budget Projects
Using Agile Approach with Fixed Budget ProjectsUsing Agile Approach with Fixed Budget Projects
Using Agile Approach with Fixed Budget Projects
 
Point ofview devops
Point ofview devopsPoint ofview devops
Point ofview devops
 
the-top-ten-things-that-have-been-proven-to-effect-software-reliability-1.pdf
the-top-ten-things-that-have-been-proven-to-effect-software-reliability-1.pdfthe-top-ten-things-that-have-been-proven-to-effect-software-reliability-1.pdf
the-top-ten-things-that-have-been-proven-to-effect-software-reliability-1.pdf
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change
 
The Enterprise Unlocked webinar
The Enterprise Unlocked webinarThe Enterprise Unlocked webinar
The Enterprise Unlocked webinar
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

#vBrownbag VCAP6-DCV Design Objective 1.1

  • 1. vBrownbag VCAP6-DCV Design Objective 1.1- Gather and analyze business requirements
  • 2. Who is this guy? Gregg Robertson VCDX5-DCV #205 EMEA #vBrownbag Host VMware Communities Moderator vExpert 2011-2016 (hopefully ’17 soon) Blog: TheSaffaGeek.Co.Uk Twitter: @GreggRobertson5
  • 3. Dell - Internal Use - Confidential3 of Y Associate a stakeholder with the information that needs to be collected. This is down to the questions you need to ask and also who you need to ask these questions. These questions are ones you are going to ask during the design workshop for the design/project. For the workshop you need to make sure you have the applicable project participants/stakeholders who can join the workshops (depends if you want one big one where people come and go at certain points or multiple ones where you speak to each business unit/ team). For the stakeholder meetings/design workshops I personally like to try bring in the following people, this does vary depending on the project and what has been chosen but 9/10 times these are the people you want to speak to: › Virtualisation administrators (if applicable. If not already present then future administrators of the solution) › Server Hardware Administrators › Backup Administrators › Storage Administrators › Desktop/OS Administrators › Network Administrators › Application Administrators (these are very important as their applications may have very specific requirements) › Security Officer › Project Sponsors › End users/ Developers/ Help desk personnel (this I find is helpful to find out what are the current support desk tickets/problems the company are facing and if these will impact the project in any way. Also these discussions are easy to have in the hallway/over a coffee but have alerted me to unknown risks that would have severely impacted the design and delivery)
  • 4. Dell - Internal Use - Confidential4 of Y Utilize customer inventory and assessment data from the current environment to define a baseline state. • Identify virtualisation candidates and applications – Identify non-virtualisation candidates • Capture baseline performance metrics including average and peak loads – Feeds into capacity requirements – Feeds into consolidation ratios – Can be used later for comparison purposes • Identify unique dependencies • Identify reusable hardware for the design • Some or all of these items will produce design decisions
  • 5. Dell - Internal Use - Confidential5 of Y Determine customer priorities for defined objectives. • I think this is fairly straight forward as from the design workshops and interviews you have collected what their objectives are and also ensured from all the workshops there are no obvious conflicts of people’s plans for the solution they want you to design. • A “normal” customer objectives piece would be: • Virtual infrastructure capable of supporting consolidated country workloads. • Highly available, disaster recoverable solution. • Common standardised infrastructure. • Simplified and improved support model. • DR with VMware SRM and EMC RecoverPoint. • Provide virtual infrastructure that can provide 99.9% availability or higher. • Automatic virtual machine failover in the event of a host failure. • DR of critical systems with 99.9% availability. • DR of non-critical systems with 99% availability. • Simplicity where possible to allow existing operations teams to manage the new environments. • Resilient and provide the highest levels of availability where possible whilst keeping costs to a minimum. • 30% growth of virtual machines and storage over the next four years.
  • 6. Dell - Internal Use - Confidential6 of Y Ensure that Availability, Manageability, Performance, Recoverability and Security (AMPRS) considerations are applied during the requirements gathering process. ID Requirement Design Characteristic R101 The solution must deliver a virtual infrastructure capable of supporting all the consolidated countries applications, data and services. Availability, Manageability, Performance, Recoverability, Security R102 The solution must provide a highly available, disaster recoverable solution. Availability Recoverability R103 The solution must deliver a common standardised infrastructure. Manageability R104 The solution must deliver a centralised infrastructure process and management. Manageability R105 The solution must deliver a simplified and improved support model. Manageability R106 Design must account for a 30% growth of virtual machines and storage over the next four years Performance R107 The solution must provide an infrastructure that can provide 99.9% availability or higher. Availability, Manageability, Performance, Recoverability, Security
  • 7. Dell - Internal Use - Confidential7 of Y Given results of a requirements gathering survey, develop requirements for a conceptual design. • This should be relatively straight forward for anyone as you’ve now spoken to all the applicable people and have taken down all their requirements and ensured there are no requirements conflicts. • Requirements have to be very precise so that there is no misinterpretation that could cause scope creep and it forces you to ensure you know exactly what the customer requires and that they validate this as correct before you start the logical design. • For example a requirement of “Customer wants high availability” is far too vague as everyone might have a different understanding of what high availability means. Your requirement should be “Customer wants 99.99% availability for the front end portal and 99.9% availability for consumer workloads outside of scheduled maintenance windows”. • You would also include RPO and RTO values for these in my opinion in subsequent requirements so that SLA mapping is clear.
  • 8. Dell - Internal Use - Confidential8 of Y Categorize business requirements by infrastructure quality to prepare for a logical design. I’m glad this is mentioned here as for the VCDX they are very big advocates for mapping your requirements to the infrastructure qualities. If you don’t know what the infrastructure qualities are they are: – Availability – Manageability – Performance – Recoverability – Security So for example my previous concise requirement would fall under Availability, application of PCI/SOX/Hardening guidelines would fall under security, and ability to run the 1000 developer workloads would be performance. This is also very helpful if you are doing requirements mapping from the conceptual requirements to the logical design decisions to the physical design decisions.
  • 9. Dell - Internal Use - Confidential9 of Y Questions?