EditAttachPrintable
r12 - 2014-06-15 - 07:42:02 - Main.sbeardYou are here: TWiki >  Deployment Web > DeploymentPlanningAndDesign > RFPQuestions

uc.png Request for proposal (RFP) questions

Authors: Dan Toczala
Build basis: 4.x and later

Customers often ask questions in a request for proposal (RFP) or in some other fact-finding document. This page has a list of common RFP questions and the answers to those questions. The page is divided into the major sections that RFPs often contain. If you are looking for answers to deployment related questions, you can also look at the Common deployment questions and answers page.

Architecture and performance

Question: How is your solution is architected?

Question: How is your solution is designed to meet the best level of performance through lowering response times?

  • The Jazz solution is based on the concept of "linked data." By having data accessible through REST-based mechanisms, the clients that access that data are able to use a standard HTTP protocol to address the various software development artifacts. This ability to directly address and manipulate these artifacts means that very little "control" information is passed along the network. The only data that is transmitted is the data that is essential to typical operations, thus optimizing network usage and solution performance. Calculations are done where they are needed and are able to be done most efficiently, either at the application server, or within the client or browser.

Question: Which mechanisms or approaches can help to reach adequate performance level on a WAN architecture?

  • Because this is a REST-based architecture, static content (such as files or versions stored in the SCM system) can be "cached" for performance improvements using standard network acceleration technologies. While performance on a WAN does depend on the latency and throughput available on the WAN, use of content caching proxy servers or other network caching technologies can help improve end user performance.

Question: Does your solution use open source?

  • The Jazz solutions will integrate with many different open source solutions, and our products do utilize some open source code. This is highlighted in our certificates of originality (COO).

Question: What is the software life cycle and revision history of this proposed solution?

  • The Jazz products are developed out on Jazz.net. We currently use a continuous delivery process for delivering our products, and you can learn more about this process by reading about how we do continuous delivery planning.

Question: How secure is this product? What is the authentication mechanism?

  • The Jazz solutions will typically be used in conjunction with the LDAP solution being used by the organization. User authentication is provided using OAuth. For more information, see the security page.

Question: Are there limits on the scalability of the Jazz solution?

  • Everything has limits. As Jazz deployments need to scale to have additional capacity, additional instances of RTC (CCM) and RQM (QM) can be deployed under the same Jazz Team Server (JTS). This is not yet possible with the RRC (RM) component. In order to get an idea of how many users and projects can be hosted by a single Jazz instance, we suggest reviewing the performance datasheets and sizing guidance for your particular version of the solution.
  • We also strongly suggest that you put some type of performance and service monitoring in place with your Jazz deployment.

Question: Are client-side components needed, such as Java applets, Java applications, Flash, plug-ins or ActiveX controls? Indicate versions (if applicable) and associated security controls.

Question: Are there documented procedures for performing stress or load testing on your service or application? If so, what were the results? How often are these tests performed and are the results retained?

Administration

Question: What operating systems does this work with?

  • Check out the Systems Requirements section of the Installing, upgrading and migrating page on the deployment wiki, for the systems requirements appropriate for your specific release.

Question: What databases are supported?

  • Check out the Systems Requirements section of the Installing, upgrading and migrating page on the deployment wiki, for the systems requirements appropriate for your specific release.

Question: What web browsers are supported?

  • Check out the Systems Requirements section of the Installing, upgrading and migrating page on the deployment wiki, for the systems requirements appropriate for your specific release.

Question: Is there any additional hardware that should be purchased for optimal performance?

  • For optimal performance in scenarios when Jazz SCM is being used, it is suggested that a caching proxy be utilized to improve end user response time, and to lighten the load on the Jazz infrastructure. For more information on this, read Using content caching proxies for Jazz Source Control.

Question: What are the minimum processor speed and memory requirements for the CLM applications?

Question: What network connectivity speeds are needed for the ideal operation of these products?

  • For ideal operation of the Jazz solutions, we would like to see the highest speeds, lowest latencies, and highest bandwidth possible. The faster you go, the better the end user experience will be. The network speed between the application servers and the database server should be at least 100 Mbit/s, with 1 Gbit/s preferred. In most cases a standard broadband connection to the client is sufficient.

Question: In terms of historical data archiving, how long does your solution keep historical data for trending and analysis?

  • Data is never destroyed. Data is held in a data warehouse, which is used to provide historical data for reporting purposes.

Integration

Question: Provide a list of all of the tools that your products integrate with.

  • Any list of ALL of the tools that the Jazz products integrate with would be outdated soon after it was published. The current list of supported integrations is maintained out on Jazz.net.
  • The Jazz based tools are all integrated with each other, providing a seamless user experience as the user navigates between the various capabilities provided by the tools. Jazz products utilize OSLC to provide integrations with a large number of tools from both IBM, as well a other vendors. You can learn about OSLC by going through things like the OSLC Workshop. There is also a TRS workshop provided out on the Eclipse website, which covers the creation of a TRS (Tracked Resource Set) provider.

Extensibility

Nothing here yet.

Customization

Question: Describe some of the typical customization that can be done.

  • Most Jazz implementations will have some level of customization. Many implement their own work item types and process flows. Adding work item types and customization of work items is relatively simple, and can be done using the guidance provided in the Jazz deployment guide. For more complex customizations of the process and automation, some will extend the solution using Eclipse based extensions using the techniques found in the extensions workshop.
  • There are also some good blogs and other information both on this wiki, and out on PlanetJazz.

Security

Question: Describe the location, encryption (as applicable) and contents of any configuration files. Who has access to these files and are access attempts logged? If encryption is used, describe the key storage mechanism and key management process.

  • Application configuration files are located in the /server/conf folder and its sub folders. Files are not encrypted. See CLM Backup article for more information. The files must be accessible (read/write) to the user running the application server and backup. Protection and logging should be done using the Operating system mechanisms. The files are usually modified by the administration UI of the application and during setup. Only users with JazzAdmin repository role can modify the properties through the Admin UI.

Question: Describe the controls that are in place to ensure that data is only accessible on a need-to-know basis and that a client/end-user can access only the data to which they are authorized.

  • The Jazz solution provides the following controls: (1) Login. Only users with a user ID and password are able to access data., (2) Configuration of the Read Access permissions. It is possible to limit read access to a project area to a list of users e.g. members of that project area., (3) Visibility constraints e.g. on SCM objects such as streams and components that can be limited to a small number of users that are more fine grained than on the project level.
  • In general, the Jazz solution provides for increased productivity and is designed to support collaboration. It provides read access to all data that is not restricted using read access restriction or visibility.

Question: What session management methodology is used (e.g. non-persistent cookies, session tokens stored in the database, by URL)?

  • The Jazz solution uses cookies to store the information of the logged-in user in the Web UI.

Question: How the session token is constructed (i.e. data elements)? What steps have been taken to ensure that it is effectively non-forgeable? If encryption is used, provide algorithm and key length.

  • A cookie is stored locally. The interfaces are REST based and therefore don't need session management, only the login needs to be tracked. No data is available for this as this is internal information. Different UI elements might store some data locally temporarily in the browser. This is information not exposed by the Jazz solution and it is really meant to be transparent to users.

Question: Describe controls on repeated attempts to log on including account lockout (including duration of lockout) and logging/alerting?

Question: What audit trails does the system generate? Describe what events and data is logged for application and system access and updates. Describe storage location, length of storage, and security controls for audit trail logs in online and offline storage. Does the application allow for verbose logging which may result in sensitive data in the log files? What mechanism is used for enabling logging? Describe any separation of audit functionality from debug/trace logging if it exists.

Question: Describe controls in place to protect production systems and data from unauthorized access within the corporate network.

Operation

Question: Are there any specific browser version or browser setting requirements? Does the system utilize JavaScript if a customer’s browser supports it? Does the system degrade gracefully to pure HTML if the customer’s browser doesn’t support it (or the customer has disabled it)?

Question: Is buffer overrun checking performed? Are other “sanity checks” performed on input data?

Question: How is the initial logon to the database or other backend system performed? If an application-level authentication is used, describe where and how the UserID and password is stored for the application or what other authentication method is used.

Question:

Related topics: Deployment web home, Common deployment questions and answers

External links:

Additional contributors: RosaNaranjo

Edit | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r15 < r14 < r13 < r12 < r11 | More topic actions...
 
This site is powered by the TWiki collaboration platformCopyright © by IBM and non-IBM contributing authors. All material on this collaboration platform is the property of the contributing authors.
Contributions are governed by our Terms of Use. Please read the following disclaimer.
Dashboards and work items are no longer publicly available, so some links may be invalid. We now provide similar information through other means. Learn more here.