Abstract
This appendix shows a practical Terms of Reference which may be used as a framework for tendering IT projects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
List of Functional Requirements
List of Functional Requirements
Item | Requirements | Comply (yes/no) | Remarks/Work Around Substitution |
---|---|---|---|
1 | Backup and replication solution in a single product | Â | Â |
2 | Leverage vSphere API (Application Programming Interface) for Data Protection | Â | Â |
3 | Integrate and leverage on Changed Block Tracking | Â | Â |
4 | Agentless deployment without the need to install individual agents inside each Guest VMs | Â | Â |
5 | Full support for VMWare ESX and ESXi editions | Â | Â |
6 | Ability to backup via vCenter or directly from individual ESX or ESXi servers | Â | Â |
7 | Support for LAN-free data backup | Â | Â |
8 | Support for thin and thick provisioned VMs | Â | Â |
9 | Provide a centralized web-based enterprise console to monitor and manage all the backup servers with dashboard statistics view | Â | Â |
10 | Ability to add datastore object as a dynamic container for backup which will include new VM when it is added into the datastore during backup job run | Â | Â |
11 | Ability to exclude specific virtual disk for backup as per VM selected in a backup job | Â | Â |
12 | User profiling to allow role segregation to perform full administration, backup operations, backup viewing only, or restore operations | Â | Â |
13 | Customizable block size for optimal deduplication across different networks (SAN, LAN, WAN) | Â | Â |
14 | Deduplication and compression bundled in software without additional option to purchase | Â | Â |
15 | Ability to utilize forward and reverse incremental backup methodology | Â | Â |
16 | Ability to utilize full backup methodology | Â | Â |
17 | Ability to provide application-consistent backups (utilizing Microsoft Visual Source Safe or VMware Tools) | Â | Â |
18 | Support for continuous job schedule to immediately start the backup job once upon completion to provide near-Continuous Date Protection (CDP) | Â | Â |
19 | Backup VM can be manually or automatically removed from the backup image file to reduce backup storage space | Â | Â |
20 | Single, consistent method of image-level backup but provides granular full or item-level recovery | Â | Â |
21 | Ability to perform full VM restoration and Guest OS file-level recovery | Â | Â |
22 | Ability to perform application-item level recovery (for MS SQL, MS Exchange, MS Active Directory, and other applications) | Â | Â |
23 | Ability to perform transaction log pruning after successful backup of VM running MS SQL | Â | Â |
24 | Automated verification of backup images by starting up required VMs, checks performed on VM, OS and Application to ensure integrity without the need of human intervention. Verification report to be emailed automatically to administrator can be configured | Â | Â |
25 | Provide near-CDP-level replication bundled in software without additional option to purchase | Â | Â |
26 | Ability to create isolated environment for on-demand Sandbox with required VMs running for testing/troubleshooting. In addition, this isolated environment will be able to interact with the production environment | Â | Â |
27 | Offsite storage of backups with built-in WAN acceleration | Â | Â |
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Castillo, F. (2016). Appendix A: Sample Terms of Reference (TOR). In: Managing Information Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-38891-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-38891-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38890-8
Online ISBN: 978-3-319-38891-5
eBook Packages: Computer ScienceComputer Science (R0)