A Symptom Extraction and Classification Method for Self-Management

Size: px
Start display at page:

Download "A Symptom Extraction and Classification Method for Self-Management"

Transcription

1 LANOMS th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation RTP, NC, USA 4th Latin American Network Operations and Management Symposium (LANOMS 2005) August 29-31, 2005 Porto Alegre, Brazil Keywords: Autonomic Computing, Self-Management, Self-Healing, Symptoms, Symptom Taxonomy Abstract: IT professionals often seek ways to effectively detect and prevent problems associated to the resources they manage. Their solution so far has been to rely on past experiences and established processes. Novel industry initiatives, like the Autonomic Computing paradigm provide concepts such as Events and Symptoms to facilitate automatic processing and consequently identification and treatment of problems and incidents. But the lack of an established method for identifying and classifying such symptoms still presents itself as a complex problem. Answers would be more readily available if processes and practices were to merge into information resources comprising a generic taxonomy of symptoms and their associated knowledge types (situations and recommendations). The purpose of this study is to determine whether the essence of IT problem determination and prediction can be captured by a limited number of generic symptom types. Symptoms with nearly identical structures, such as "application connection error" and "server unreachable error" are to be classified in generic types, e.g. "network condition X". The implication of having a generic taxonomy is directly related to how easily situations can be automated and how knowledge can be identified. In this study we analyze common solutions deployed by IT shops around the world when they integrate their infrastructure with existing event management and problem determination products. The end results of this analysis and a proposal for a generic taxonomy of symptoms for IT problem determination and prediction is presented.

2 202 LANOMS th Latin American Network Operations and Management Symposium Agenda Introduction Scenario Motivations Symptom Sources, Patterns & Properties Symptom Categories & Numbers Conclusion Introduction approach used by this method Scenario problem and concepts Motivations what can be expected when applying this methodology? Identification sources, identification patterns and properties Results categories identified and statistics Conclusion remarks and future work

3 LANOMS th Latin American Network Operations and Management Symposium 203 Introduction Motivations Leverages existing body of knowledge Provides directives on how to effectively identify symptoms Establish a roadmap for future efforts Pass 1 Analysis of existing assets in the form of rules, hard-coded algorithms, policies, log/trace files, etc. Pass 2 Extract symptoms that lead to common problems from assets Document and classify symptom identification process No taxonomy so far was focused entirely on symptoms. Taxonomies exist for raw events and for incidents, but not for in between (symptoms). This study leverages an enormous body of knowledge comprised by rules, source code, policies, and log files used in the deployment of real field solutions. The first step was to identify and categorize existing data. The second step was to adopt a common methodology and extract specific symptoms by using data mining tools and manual analysis. Identification of symptoms consists in enumerating which events are used to compose the symptom, what are their relationship (how they are identified), and also provide textual content used to describe and explain the symptom, as well as the recommended actions (if any) used for the treatment of the condition associated to the symptom. Finally, once the specific symptoms are enumerated, classify them in generic types using a consistent and reproducible approach.

4 204 LANOMS th Latin American Network Operations and Management Symposium The Autonomic Computing Scenario symptom Symptoms are identified from event data and processed in an autonomic manager S AME A P M K E S E symptom event symptom event event event correlated events raw events Events / Message Bus S E S E Rules Touchpoint / Filtering & Correlation Touchpoint / Data Collection Log/Trace In the common scenario associated with the Self-Healing discipline of the Autonomic Computing paradigm we often encounter two distinct types of monitored information: raw events and correlated events. A raw event is merely an observation of a certain condition in a monitored resource, and is associated with status and reporting conditions. In contrast, correlated events aim to include a certain level of intelligence to the data being reported. A correlated event is eventually something very similar to a symptom, but it s identified in lower layers that are near to the monitored resource itself. Frequently we can find a 1-to-1 mapping between correlated events and specific symptoms associated to a particular resource type. Continuing in the scenario, these events enter the autonomic manager process, where they are transformed into symptoms in the monitoring block. These symptoms can then be further correlated together or with other events to form root-cause symptoms, or incidents.

5 LANOMS th Latin American Network Operations and Management Symposium 205 Motivations Goal: define a generic taxonomy that can be applied to each problem category. Symptom categories can be easily identified. Symptoms serve as input to root cause analysis and prediction, which groups them together in incidents and links them with recommended actions. Simplifies Knowledge Acquisition for analysis, correlation, prediction. Knowledge processing symptom incident categorized questions Knowledge acquisition symptom event symptom event event event analysis, correlation, prediction actions Problem reporting and resolution The goal of this study is to present hard results derived from real data. The symptoms that were found as a result of this study where then analyzed by following a common classification method that consists in retrofitting the data into categorized questions that will then associate in a 1-to-1 mapping to first level symptoms (or specific symptoms, so called because they often refer to a specific technology and can be further extrapolated into general categories). The study continues on to find two kinds of relationships between these first level symptoms: inheritance and correlation. When an inheritance relationship exists, a symptom category is created to accommodate the symptoms that were used in its identification. These generic symptoms are also called second level symptoms or a first level symptom category. The other kind of relationship, called correlation, is also very desirable because it will ultimately lead to root-cases or incidents in the causality chain associated to symptoms and their respective monitored resources. The process is iterative until symptoms can be further classified into the identified main categories (four main categories were identified in this study, please refer to the symptom taxonomy section of this presentation).

6 206 LANOMS th Latin American Network Operations and Management Symposium Symptom Sources Insight Manager CICS CIM Hundreds of different resource types were considered for this study. Approximately fifty resource types were selected for symptom collection. The criteria for selection were mainly originality (which resources types would lead to different, non-common symptoms) and quality of derived rules, descriptions and recommendations. This study utilizes the main resource types from where rules, code, policies and log files were used to perform symptom identification.

7 LANOMS th Latin American Network Operations and Management Symposium 207 Symptom Identification Patterns SINGULARITY MULTIPLICITY SEQUENCE SET As part of the methodology to identify how a symptom is formed, this study considered four main patterns, which are also fundamental building blocks of composition, commonly found in diverse application, such as collection classes for code libraries, for example. The basic patterns used in the composition of symptoms are: Singularity specifies a 1-to-1 mapping relationship between an event and a symptom. Multiplicity specifies an n-to-1 mapping relationship between multiple instances of the same event and a symptom. Sequence specifies an n-to-1 and ordered relationship between multiple instances of different events and a symptom. Set specifies an n-to-1 and unordered relationship between multiple instances of different events and a symptom.

8 208 LANOMS th Latin American Network Operations and Management Symposium Symptom Identification Properties CLONING / KEYING THRESHOLDING Two main properties were considered in the symptom identification exercise: Cloning/Keying this property parameterizes a certain event by a certain attribute value example: we want to associate multiple instances of the same symptom type when events arrive for different host machines (event parameter = hostname). Thresholding this property parameterizes a collection of events by a threshold calculated from a certain attribute of these events example: we want to identify a symptom only when the sum of the attribute wrong password attempt (where 1 means wrong password and 0 means the password was correct) reaches the value 3.

9 LANOMS th Latin American Network Operations and Management Symposium 209 Symptom Identification Results Four main symptom categories: Security Availability Operation QoS Four main symptom identification patterns: Singularity Multiplicity Sequence Set Several commonly used action patterns: filtering, logging, notification (trouble ticket, , paging, display, etc), escalation, monitoring, clearing, proactive resolution (restart, resize, clean, etc) Result numbers and statistics. From the whole body of data utilized in this study, only four general symptom categories were found. Likewise, there was the need of only four main patterns (that can be combined if necessary) for their identification. A plethora of different recommended actions could be extrapolated from the sample data in the deployed solutions. These actions were performed when a symptom was deemed to be a rootcause or an incident. In these cases the following actions were often performed: -Filtering of the events associated with the symptom -Logging of the events associated with the symptom -Notification of the incident to the end user (management operator), which assumed varied forms like opening a trouble ticket, sending an , sending a page, or just displaying it in the screen -Escalation control of the incident, usually if the incident is not resolved in a certain amount of time, it s severity is increased and other actions (such as notification) can also be executed -Monitoring of the symptom, i.e., it s only displayed and waits for manual confirmation and resolution -Proactive resolution performed automatically by the system this depends on each individual incident but often involved remediation in a failed resource (restart of a machine, resize of a file system, cleaning of a database, etc). It should be noted that this class of actions accounts for a very low percentage compared to others, which means there s a LOT to grow in terms of automatic resolution of problems in the context of autonomic computing for current products and solutions.

10 210 LANOMS th Latin American Network Operations and Management Symposium Symptom Categories & Numbers Problem Determination Prediction Security (15,2,0) Operation (14,1,0) Availability (49,39,3) QoS (10,1,0) Prevention Execution Storage Metrics Authentication Logic IO Performance Authorization Configuration Network Communication Hardware First level symptom categories: 4 Second-level symptom categories: 15 Software Data Total number of symptoms: This is the identified taxonomy of symptoms extrapolated from the sample data. These categories apply evenly to either Problem Determination or Problem Prediction. There are four main categories: Security, Operation, Availability and QoS. These categories are each composed by several lower level categories. For example, the Security category contains 15 second-level categories and 2 thirdlevel categories (not shown) and no fourth-level categories (for now!!!). In contrast, the Operation category numbers were 14, 1, 0; the Availability category numbers were 49, 39, 3; and the QoS category numbers were 10, 1, 0; The total number of symptoms identified was 134!!!

11 LANOMS th Latin American Network Operations and Management Symposium 211 Final Remarks Specific symptoms are often classified in a set of canonical categories, with a subset presented here as a basis. Categorization helps completeness in the identification of symptoms. Symptom categories can be loosely mapped to Incident Management service flows this facilitates automation of service flows!!! Specific symptoms of different categories can be correlated together, but eventually root cause belongs to only one root cause category. The taxonomy is still evolving!!! The goal is to reduce the number of generic symptoms (level 1) thus simplifying the acquisition process. Operation Application task failure Execution Communication problem Database problem Event processor problem Storage allocation problem root cause symptoms The existence of this taxonomy actually improved the task of identifying and classifying symptoms in a large data set. Often classifying a specific symptom under a generic category also gives an idea of how the symptom should be handled and to which other symptoms it could be correlated in order to produce incidents. Generic symptom categories can be loosely coupled to incident categories as defined by standard Incident Management processes, like the ones defined by the group. This taxonomy is still in evolution. It is not expected that it will work for all existing symptoms extracted from various sources of data. Also, further simplification of the taxonomy is a possible enhancement to be sought. The number of generic categories is large as it is now, and some low level categories can possibly be grouped together into higher level categories, this will help to further reduce the number of categories and simplify the classification method. Also pointed out here is the correlation relationship between symptoms. This is a different but useful relationship where symptoms are associated together to determine the root-cause of problems these root-cause symptoms are then promoted to be incidents, and this is what will drive higher layers of the autonomic control loop.

12 212 LANOMS th Latin American Network Operations and Management Symposium Future Work Process more symptom sources (i.e. more products, solutions, technologies, etc). Propose ways to align existing problem and incident taxonomies to the one described in this document. Produce tooling to enable mass consumption of a symptoms database and to facilitate incorporation and easy maintenance of symptoms and symptom categories. Apply discovered symptoms to service flows in order to foster automation in the implementation of these flows. Establish a sharing model that would make the symptoms body of knowledge available to all adopters of the autonomic computing technology. As a follow up to this study, the following activities are planned: -Augment the number of symptoms by processing more and original data collected from other solutions and products -Align existing taxonomies related to events, incidents and problems to reconcile them into a meta-taxonomy that can be applied and extended as needed for different knowledge types associated to the problem determination and prediction disciplines. -Produce tooling around the concepts of symptoms and the taxonomy of symptoms. Make the process of identification and classification easy for end users. -Further explore standard IT service flows and identify which symptoms can be applied and extracted from the various parts of the processes. -Share the identified content in the form of a symptoms database that could be reused by adopters of the Autonomic Computing architecture.

Autonomic computing: strengthening manageability for SOA implementations

Autonomic computing: strengthening manageability for SOA implementations Autonomic computing Executive brief Autonomic computing: strengthening manageability for SOA implementations December 2006 First Edition Worldwide, CEOs are not bracing for change; instead, they are embracing

More information

Best Practices Report

Best Practices Report Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

Agio Remote Monitoring and Management

Agio Remote Monitoring and Management Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays

More information

ITIL: Service Operation

ITIL: Service Operation ITIL: Service Operation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom s Taxonomy What do you Expect? Housekeeping

More information

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)

More information

BSM Transformation through CMDB Deployment. Streamlining the Integration of Change and Release Management

BSM Transformation through CMDB Deployment. Streamlining the Integration of Change and Release Management BSM Transformation through CMDB Deployment Streamlining the Integration of Change and Release Management Gordon Owens, Managing Consultant generatione Technologies Agenda Brief Introduction Building Blocks

More information

BIG DATA THE NEW OPPORTUNITY

BIG DATA THE NEW OPPORTUNITY Feature Biswajit Mohapatra is an IBM Certified Consultant and a global integrated delivery leader for IBM s AMS business application modernization (BAM) practice. He is IBM India s competency head for

More information

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND

More information

White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard

White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in

More information

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations A Vision for Operational Analytics as the Enabler for Focused Hybrid Cloud Operations As infrastructure and applications have evolved from legacy to modern technologies with the evolution of Hybrid Cloud

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

An architectural blueprint for autonomic computing.

An architectural blueprint for autonomic computing. Autonomic Computing White Paper An architectural blueprint for autonomic computing. June 2005 Third Edition Page 2 Contents 1. Introduction 3 Autonomic computing 4 Self-management attributes of system

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson

More information

DCIM Software and IT Service Management - Perfect Together DCIM: The Physical Heart of ITSM

DCIM Software and IT Service Management - Perfect Together DCIM: The Physical Heart of ITSM 1 Overview Information Technology is so fundamental to every business today that every organization needs to establish formal processes to ensure that IT services are continually aligned to the business,

More information

White Paper Take Control of Datacenter Infrastructure

White Paper Take Control of Datacenter Infrastructure Take Control of Datacenter Infrastructure Uniting the Governance of a Single System of Record with Powerful Automation Tools Take Control of Datacenter Infrastructure A new breed of infrastructure automation

More information

Published April 2010. Executive Summary

Published April 2010. Executive Summary Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must

More information

Service Asset & Configuration Management PinkVERIFY

Service Asset & Configuration Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

Juniper Networks Automated Support and Prevention Solution (ASAP)

Juniper Networks Automated Support and Prevention Solution (ASAP) Juniper Networks Automated Support and Prevention Solution (ASAP) An ecosystem of tools, applications, and systems to streamline operations, bring operational efficiency, reduce downtime, and increase

More information

Five best practices for deploying a successful service-oriented architecture

Five best practices for deploying a successful service-oriented architecture IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative

More information

IBM Tivoli Service Request Manager

IBM Tivoli Service Request Manager Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Understanding the Performance Management Process

Understanding the Performance Management Process Understanding the Performance Management Process Monitoring Market Monitoring tools account for more then 50% of market Most organizations have not matured their monitoring environment Missing Process

More information

BMC Service Assurance. Proactive Availability and Performance Management Capacity Optimization

BMC Service Assurance. Proactive Availability and Performance Management Capacity Optimization BMC Service Assurance Proactive Availability and Performance Management Capacity Optimization BSM enables cross-it workflow Proactive Operations Initiatives Incident Management Proactive Operations REQUEST

More information

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt> Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.

More information

Establishing a business performance management ecosystem.

Establishing a business performance management ecosystem. IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance

More information

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. IBM Service Management solutions and the service desk White paper Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. December

More information

DCIM Software and IT Service Management - Perfect Together

DCIM Software and IT Service Management - Perfect Together DCIM Software and IT Service Management - Perfect Together A White Paper from Raritan 2014 Raritan Inc Overview Information Technology is so fundamental to every business today that every organization

More information

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2

More information

Beyond Logging and Monitoring. New Techniques for Solving J2EE Application Problems in Production Environments. David Kadouch BMC Software

Beyond Logging and Monitoring. New Techniques for Solving J2EE Application Problems in Production Environments. David Kadouch BMC Software Beyond Logging and Monitoring New Techniques for Solving J2EE Application Problems in Production Environments David Kadouch BMC Software Abstract Application downtime costs in production systems can range

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

PATROL From a Database Administrator s Perspective

PATROL From a Database Administrator s Perspective PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks

More information

IT Service Management

IT Service Management IT Service Management Policy Based IT Service Management White Paper Prepared by: Rick Leopoldi March 23, 2004 Copyright 2001. All rights reserved. Duplication of this document or extraction of content

More information

Approach to Service Management

Approach to Service Management Approach to Service Management In SOA Space Gopala Krishna Behara & Srikanth Inaganti Abstract SOA Management covers the Management and Monitoring of applications, services, processes, middleware, infrastructure,

More information

Implementing ITIL with Kaseya Tools

Implementing ITIL with Kaseya Tools Kaseya White Paper Implementing ITIL with Kaseya Tools A white paper by Robert Perrine, ITIL-Service Manager www.kaseya.com Executive Overview Kaseya Service Desk provides the logic and tools necessary

More information

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into

More information

Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER

Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER Table of Contents Introduction...1 Business Challenge...1 A Solution: Predictive Intelligence...1

More information

Business Service Management the ITIL Way

Business Service Management the ITIL Way Business Service Management the ITIL Way CONTENTS ITIL s First Steps... 3 The Key to ITIL s Success... 3 Alignment of IT to Business Goals... 3 Further Evolution... 4 COPYRIGHT NOTICE Copyright Axios Systems

More information

Service Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group. Tuesday June 12 1:00-2:15

Service Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group. Tuesday June 12 1:00-2:15 Service Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group Tuesday June 12 1:00-2:15 Service Oriented Architecture and the DBA What is Service Oriented Architecture (SOA)

More information

Applying SOA to OSS. for Telecommunications. IBM Software Group

Applying SOA to OSS. for Telecommunications. IBM Software Group IBM Software Group Applying SOA to OSS for Telecommunications Kevin Twardus Manager of Industry Architecture and Standards IBM Software Group Communications Sector IBM Corporation The Details of SOA depends

More information

The CMDB: The Brain Behind IT Business Value

The CMDB: The Brain Behind IT Business Value Thought Leadership white paper The CMDB: The Brain Behind IT Business Value By Gerry Roy, Director of Solutions Management for BMC Atrium and BMC Service Support, BMC Software TABLE OF CONTENTS Executive

More information

Why you need an Automated Asset Management Solution

Why you need an Automated Asset Management Solution solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery

More information

Problem Management: A CA Service Management Process Map

Problem Management: A CA Service Management Process Map TECHNOLOGY BRIEF: PROBLEM MANAGEMENT Problem : A CA Service Process Map MARCH 2009 Randal Locke DIRECTOR, TECHNICAL SALES ITIL SERVICE MANAGER Table of Contents Executive Summary 1 SECTION 1: CHALLENGE

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

4net ESP differentiators. Data Sheet

4net ESP differentiators. Data Sheet 4net ESP differentiators Data Sheet Table of Contents 1.0 Key Objective Increase Customer Profitability 3 2.0 What s Important to Customers 3 3.0 Fundamental Advantages 4 3.1 Clear focus on Application

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

Deploying the CMDB for Change & Configuration Management

Deploying the CMDB for Change & Configuration Management WHITE PAPER: CMDB, CHANGE & CONFIGURATION MANAGEMENT Deploying the CMDB for Change & Configuration Management MAY 2007 CA and BearingPoint Table of Contents Executive Summary SECTION 1 2 Pressures on IT

More information

Business white paper. Top ten reasons to automate your IT processes

Business white paper. Top ten reasons to automate your IT processes Business white paper Top ten reasons to automate your IT processes Table of contents 4 Data center management trends and tools 4 Today s challenge 4 What is next? 5 Automating the remediation of incidents

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

Cisco Unified Communications Remote Management Services

Cisco Unified Communications Remote Management Services Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco

More information

Cisco Unified Computing Remote Management Services

Cisco Unified Computing Remote Management Services Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing

More information

IT Services Management Service Brief

IT Services Management Service Brief IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction

More information

BETTER BUSINESS FORESIGHT THROUGH SHARPER TECHNOLOGICAL INSIGHT.

BETTER BUSINESS FORESIGHT THROUGH SHARPER TECHNOLOGICAL INSIGHT. www.wipro.com BETTER BUSINESS FORESIGHT THROUGH SHARPER TECHNOLOGICAL INSIGHT. FixOmatic DO BUSINESS BETTER AUTOMATION: THE KEY TO SERVICE INNOVATION Automation has now become one of the top priorities

More information

ORACLE IT SERVICE MANAGEMENT SUITE

ORACLE IT SERVICE MANAGEMENT SUITE ORACLE IT SERVICE MANAGEMENT SUITE ITIL COMPATIBLE PINKVERIFY ORACLE IT SERVICE MANAGEMENT SUITE HAS BEEN CERTIFIED BY PINK ELEPHANT THROUGH THE PINKVERIFY PROCESS TO BE ITIL COMPATIBLE IN SIX PROCESS

More information

Extend the value of your core business systems.

Extend the value of your core business systems. Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense

Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for NetIQ November 2008 IT Management

More information

Top 10 Reasons to Automate your IT Run Books

Top 10 Reasons to Automate your IT Run Books Top 10 Reasons to Automate your IT Run Books DS12 Top 10 Reasons to Automate Your IT Run Books Run Book Automation is an emerging technology space that is being adopted by many of the largest, most sophisticated

More information

Predictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER

Predictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER Predictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER Table of Contents Introduction...1 Business Challenge...1 A Solution: Predictive Intelligence...1 > Dynamic Thresholding...2

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

Drive Down IT Operations Cost with Multi-Level Automation

Drive Down IT Operations Cost with Multi-Level Automation White White Paper Paper Drive Down IT Operations Cost with Multi-Level Automation Overview Reducing IT infrastructure and operations (I+O) budgets is as much on the mind of CIOs today as it s ever been.

More information

FireScope + ServiceNow: CMDB Integration Use Cases

FireScope + ServiceNow: CMDB Integration Use Cases FireScope + ServiceNow: CMDB Integration Use Cases While virtualization, cloud technologies and automation have slashed the time it takes to plan and implement new IT services, enterprises are still struggling

More information

How To Create A Help Desk For A System Center System Manager

How To Create A Help Desk For A System Center System Manager System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and

More information

Empowering intelligent utility networks with visibility and control

Empowering intelligent utility networks with visibility and control IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

White Paper. Incident Management: A CA IT Service Management Process Map

White Paper. Incident Management: A CA IT Service Management Process Map White Paper Incident Management: A CA IT Service Management Process Map Peter Doherty Senior Consultant, Technical Service, CA, Inc. Peter Waterhouse Director, Product Marketing, Business Service Optimization,

More information

SOA Myth or Reality??

SOA Myth or Reality?? IBM TRAINING S04 SOA Myth or Reality Jaqui Lynch IBM Corporation 2007 SOA Myth or Reality?? Jaqui Lynch Mainline Information Systems Email jaqui.lynch@mainline.com Session S04 http://www.circle4.com/papers/s04soa.pdf

More information

Leveraging ITIL to Manage Your Virtual Environment. Laurent Mandorla, Manager Fredrik Hallgårde, Consultant BearingPoint, Inc.

Leveraging ITIL to Manage Your Virtual Environment. Laurent Mandorla, Manager Fredrik Hallgårde, Consultant BearingPoint, Inc. Leveraging ITIL to Manage Your Virtual Environment Laurent Mandorla, Manager Fredrik Hallgårde, Consultant BearingPoint, Inc. Agenda Introduction VMware: Great promises, but some significant challenges

More information

VMware Virtualization and Cloud Management Overview. 2010 VMware Inc. All rights reserved

VMware Virtualization and Cloud Management Overview. 2010 VMware Inc. All rights reserved VMware Virtualization and Cloud Management Overview 2010 VMware Inc. All rights reserved Automating Operations Management Why? What? How? Why is Operations Management different in the virtual world? What

More information

An Oracle White Paper June, 2014. Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c

An Oracle White Paper June, 2014. Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c An Oracle White Paper June, 2014 Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c Product Overview... 1 Introduction... 1 Laying the Groundwork for Monitoring...

More information

Wilhelmenia Ravenell IT Manager Eli Lilly and Company

Wilhelmenia Ravenell IT Manager Eli Lilly and Company Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience

More information

CA Service Desk On-Demand

CA Service Desk On-Demand PRODUCT BRIEF: CA SERVICE DESK ON DEMAND -Demand Demand is a versatile, ready-to-use IT support solution delivered On Demand to help you build a superior Request, Incident, Change and Problem solving system.

More information

Advanced Remote Monitoring: Managing Today s Pace of Change

Advanced Remote Monitoring: Managing Today s Pace of Change Advanced Remote Monitoring: Managing Today s Pace of Change RMM solutions enable an organization to reduce the risk of system outages and guard against the impact of unauthorized or malicious uses of technology,

More information

The IBM Solution Architecture for Energy and Utilities Framework

The IBM Solution Architecture for Energy and Utilities Framework IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions

More information

Cisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service

Cisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service Cisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service Cisco TelePresence Select Operate allows customers to make full use of the benefits of the Cisco TelePresence solution,

More information

INTELLIGENT DEFECT ANALYSIS, FRAMEWORK FOR INTEGRATED DATA MANAGEMENT

INTELLIGENT DEFECT ANALYSIS, FRAMEWORK FOR INTEGRATED DATA MANAGEMENT INTELLIGENT DEFECT ANALYSIS, FRAMEWORK FOR INTEGRATED DATA MANAGEMENT Website: http://www.siglaz.com Abstract Spatial signature analysis (SSA) is one of the key technologies that semiconductor manufacturers

More information

BoxTone Mobile User Management with ITIL and ITSM

BoxTone Mobile User Management with ITIL and ITSM White Paper BoxTone Mobile User Management with ITIL and ITSM Summary Today, many organizations are shifting their IT focus from day-to-day technical operation of back-office infrastructure to delivering

More information

& USER T ECH.C W WW. SERVICE

& USER T ECH.C W WW. SERVICE BUSINESS SERVICE & END USER EXPERIENCE MONITORING A UGUST 2, 2 010 A NTONIO ROLL LE V P OF PROFESSIONAL SEE RVICES W WW. GENERA TIONE T ECH.C OM W WW. RESOLV E -SYSTT EMS.CO M BUSINESS SERVICE & END USER

More information

Veritas Configuration Manager Profile. A Profile Prepared by EMA October 2006

Veritas Configuration Manager Profile. A Profile Prepared by EMA October 2006 Veritas Configuration Manager Profile A Profile Prepared by EMA October 2006 Table of Contents Corporate Information...1 CMDB Type:...1 Areas Supported:...1 IT Domain:...2 Target customers:...2 Product

More information

ITIL V3 Foundation Certification - Sample Exam 1

ITIL V3 Foundation Certification - Sample Exam 1 ITIL V3 Foundation Certification - Sample Exam 1 The new version of ITIL (Information Technology Infrastructure Library) was launched in June 2007. ITIL V3 primarily describes the Service Lifecycle of

More information

How To Use Bco

How To Use Bco !!! Moviri Managed BCO Services The managed services offering for BMC Capacity Optimization (BCO) customers designed to maximize the return on their BCO investment.! Built for BCO customers Moviri Managed

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

ITIL Best Practices with Oracle Enterprise Manager 10g and Oracle PeopleSoft Help Desk. An Oracle White Paper September 2007

ITIL Best Practices with Oracle Enterprise Manager 10g and Oracle PeopleSoft Help Desk. An Oracle White Paper September 2007 ITIL Best Practices with Oracle Enterprise Manager 10g and Oracle PeopleSoft Help Desk An Oracle White Paper September 2007 ITIL Best Practices with Oracle Enterprise Manager 10g and Oracle PeopleSoft

More information

Three Fundamental Techniques To Maximize the Value of Your Enterprise Data

Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Prepared for Talend by: David Loshin Knowledge Integrity, Inc. October, 2010 2010 Knowledge Integrity, Inc. 1 Introduction Organizations

More information

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY

More information

IBM Tivoli Monitoring for Applications

IBM Tivoli Monitoring for Applications Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including

More information

Configuring and Deploying a Private Cloud

Configuring and Deploying a Private Cloud Course 20247C: Configuring and Deploying a Private Cloud Course Details Course Outline Module 1: Planning for the Cloud Planning a hybrid cloud involves understanding these tools and technologies so that

More information

The Future of Business Analytics is Now! 2013 IBM Corporation

The Future of Business Analytics is Now! 2013 IBM Corporation The Future of Business Analytics is Now! 1 The pressures on organizations are at a point where analytics has evolved from a business initiative to a BUSINESS IMPERATIVE More organization are using analytics

More information

ITIL Service Lifecycle Operation

ITIL Service Lifecycle Operation ITIL Service Lifecycle Operation Course Details Course Code: Duration: Notes: ITILSL-Oper 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

WHITE PAPER. SAS IT Intelligence. Balancing enterprise strategy, business objectives, IT enablement and costs

WHITE PAPER. SAS IT Intelligence. Balancing enterprise strategy, business objectives, IT enablement and costs WHITE PAPER SAS IT Intelligence Balancing enterprise strategy, business objectives, IT enablement and costs Table of Contents Executive summary... 1 SAS IT Intelligence leaping tactical pitfalls... 2 Resource

More information

02 General Information. 03 Features. 06 Benefits.

02 General Information. 03 Features. 06 Benefits. invgate 02 General Information. 03 Features. 06 Benefits. Index. 02 General Information. Improve your IT department Managing Service Support just got easier Despite growing connectivity, data accessibility

More information

WHITE PAPER. iet ITSM Enables Enhanced Service Management

WHITE PAPER. iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted

More information

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann

More information

SOA management challenges. After completing this topic, you should be able to: Explain the challenges of managing an SOA environment

SOA management challenges. After completing this topic, you should be able to: Explain the challenges of managing an SOA environment Managing SOA Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this unit, you should be able to: Explain

More information

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Andy Oppenheim Enterprise Management, Product Management Mervyn Lally

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies

More information

ITIL Event Management in the Cloud

ITIL Event Management in the Cloud ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum July 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information