A Symptom Extraction and Classification Method for Self-Management
|
|
- Joseph Sims
- 8 years ago
- Views:
Transcription
1 LANOMS th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation RTP, NC, USA 4th Latin American Network Operations and Management Symposium (LANOMS 2005) August 29-31, 2005 Porto Alegre, Brazil Keywords: Autonomic Computing, Self-Management, Self-Healing, Symptoms, Symptom Taxonomy Abstract: IT professionals often seek ways to effectively detect and prevent problems associated to the resources they manage. Their solution so far has been to rely on past experiences and established processes. Novel industry initiatives, like the Autonomic Computing paradigm provide concepts such as Events and Symptoms to facilitate automatic processing and consequently identification and treatment of problems and incidents. But the lack of an established method for identifying and classifying such symptoms still presents itself as a complex problem. Answers would be more readily available if processes and practices were to merge into information resources comprising a generic taxonomy of symptoms and their associated knowledge types (situations and recommendations). The purpose of this study is to determine whether the essence of IT problem determination and prediction can be captured by a limited number of generic symptom types. Symptoms with nearly identical structures, such as "application connection error" and "server unreachable error" are to be classified in generic types, e.g. "network condition X". The implication of having a generic taxonomy is directly related to how easily situations can be automated and how knowledge can be identified. In this study we analyze common solutions deployed by IT shops around the world when they integrate their infrastructure with existing event management and problem determination products. The end results of this analysis and a proposal for a generic taxonomy of symptoms for IT problem determination and prediction is presented.
2 202 LANOMS th Latin American Network Operations and Management Symposium Agenda Introduction Scenario Motivations Symptom Sources, Patterns & Properties Symptom Categories & Numbers Conclusion Introduction approach used by this method Scenario problem and concepts Motivations what can be expected when applying this methodology? Identification sources, identification patterns and properties Results categories identified and statistics Conclusion remarks and future work
3 LANOMS th Latin American Network Operations and Management Symposium 203 Introduction Motivations Leverages existing body of knowledge Provides directives on how to effectively identify symptoms Establish a roadmap for future efforts Pass 1 Analysis of existing assets in the form of rules, hard-coded algorithms, policies, log/trace files, etc. Pass 2 Extract symptoms that lead to common problems from assets Document and classify symptom identification process No taxonomy so far was focused entirely on symptoms. Taxonomies exist for raw events and for incidents, but not for in between (symptoms). This study leverages an enormous body of knowledge comprised by rules, source code, policies, and log files used in the deployment of real field solutions. The first step was to identify and categorize existing data. The second step was to adopt a common methodology and extract specific symptoms by using data mining tools and manual analysis. Identification of symptoms consists in enumerating which events are used to compose the symptom, what are their relationship (how they are identified), and also provide textual content used to describe and explain the symptom, as well as the recommended actions (if any) used for the treatment of the condition associated to the symptom. Finally, once the specific symptoms are enumerated, classify them in generic types using a consistent and reproducible approach.
4 204 LANOMS th Latin American Network Operations and Management Symposium The Autonomic Computing Scenario symptom Symptoms are identified from event data and processed in an autonomic manager S AME A P M K E S E symptom event symptom event event event correlated events raw events Events / Message Bus S E S E Rules Touchpoint / Filtering & Correlation Touchpoint / Data Collection Log/Trace In the common scenario associated with the Self-Healing discipline of the Autonomic Computing paradigm we often encounter two distinct types of monitored information: raw events and correlated events. A raw event is merely an observation of a certain condition in a monitored resource, and is associated with status and reporting conditions. In contrast, correlated events aim to include a certain level of intelligence to the data being reported. A correlated event is eventually something very similar to a symptom, but it s identified in lower layers that are near to the monitored resource itself. Frequently we can find a 1-to-1 mapping between correlated events and specific symptoms associated to a particular resource type. Continuing in the scenario, these events enter the autonomic manager process, where they are transformed into symptoms in the monitoring block. These symptoms can then be further correlated together or with other events to form root-cause symptoms, or incidents.
5 LANOMS th Latin American Network Operations and Management Symposium 205 Motivations Goal: define a generic taxonomy that can be applied to each problem category. Symptom categories can be easily identified. Symptoms serve as input to root cause analysis and prediction, which groups them together in incidents and links them with recommended actions. Simplifies Knowledge Acquisition for analysis, correlation, prediction. Knowledge processing symptom incident categorized questions Knowledge acquisition symptom event symptom event event event analysis, correlation, prediction actions Problem reporting and resolution The goal of this study is to present hard results derived from real data. The symptoms that were found as a result of this study where then analyzed by following a common classification method that consists in retrofitting the data into categorized questions that will then associate in a 1-to-1 mapping to first level symptoms (or specific symptoms, so called because they often refer to a specific technology and can be further extrapolated into general categories). The study continues on to find two kinds of relationships between these first level symptoms: inheritance and correlation. When an inheritance relationship exists, a symptom category is created to accommodate the symptoms that were used in its identification. These generic symptoms are also called second level symptoms or a first level symptom category. The other kind of relationship, called correlation, is also very desirable because it will ultimately lead to root-cases or incidents in the causality chain associated to symptoms and their respective monitored resources. The process is iterative until symptoms can be further classified into the identified main categories (four main categories were identified in this study, please refer to the symptom taxonomy section of this presentation).
6 206 LANOMS th Latin American Network Operations and Management Symposium Symptom Sources Insight Manager CICS CIM Hundreds of different resource types were considered for this study. Approximately fifty resource types were selected for symptom collection. The criteria for selection were mainly originality (which resources types would lead to different, non-common symptoms) and quality of derived rules, descriptions and recommendations. This study utilizes the main resource types from where rules, code, policies and log files were used to perform symptom identification.
7 LANOMS th Latin American Network Operations and Management Symposium 207 Symptom Identification Patterns SINGULARITY MULTIPLICITY SEQUENCE SET As part of the methodology to identify how a symptom is formed, this study considered four main patterns, which are also fundamental building blocks of composition, commonly found in diverse application, such as collection classes for code libraries, for example. The basic patterns used in the composition of symptoms are: Singularity specifies a 1-to-1 mapping relationship between an event and a symptom. Multiplicity specifies an n-to-1 mapping relationship between multiple instances of the same event and a symptom. Sequence specifies an n-to-1 and ordered relationship between multiple instances of different events and a symptom. Set specifies an n-to-1 and unordered relationship between multiple instances of different events and a symptom.
8 208 LANOMS th Latin American Network Operations and Management Symposium Symptom Identification Properties CLONING / KEYING THRESHOLDING Two main properties were considered in the symptom identification exercise: Cloning/Keying this property parameterizes a certain event by a certain attribute value example: we want to associate multiple instances of the same symptom type when events arrive for different host machines (event parameter = hostname). Thresholding this property parameterizes a collection of events by a threshold calculated from a certain attribute of these events example: we want to identify a symptom only when the sum of the attribute wrong password attempt (where 1 means wrong password and 0 means the password was correct) reaches the value 3.
9 LANOMS th Latin American Network Operations and Management Symposium 209 Symptom Identification Results Four main symptom categories: Security Availability Operation QoS Four main symptom identification patterns: Singularity Multiplicity Sequence Set Several commonly used action patterns: filtering, logging, notification (trouble ticket, , paging, display, etc), escalation, monitoring, clearing, proactive resolution (restart, resize, clean, etc) Result numbers and statistics. From the whole body of data utilized in this study, only four general symptom categories were found. Likewise, there was the need of only four main patterns (that can be combined if necessary) for their identification. A plethora of different recommended actions could be extrapolated from the sample data in the deployed solutions. These actions were performed when a symptom was deemed to be a rootcause or an incident. In these cases the following actions were often performed: -Filtering of the events associated with the symptom -Logging of the events associated with the symptom -Notification of the incident to the end user (management operator), which assumed varied forms like opening a trouble ticket, sending an , sending a page, or just displaying it in the screen -Escalation control of the incident, usually if the incident is not resolved in a certain amount of time, it s severity is increased and other actions (such as notification) can also be executed -Monitoring of the symptom, i.e., it s only displayed and waits for manual confirmation and resolution -Proactive resolution performed automatically by the system this depends on each individual incident but often involved remediation in a failed resource (restart of a machine, resize of a file system, cleaning of a database, etc). It should be noted that this class of actions accounts for a very low percentage compared to others, which means there s a LOT to grow in terms of automatic resolution of problems in the context of autonomic computing for current products and solutions.
10 210 LANOMS th Latin American Network Operations and Management Symposium Symptom Categories & Numbers Problem Determination Prediction Security (15,2,0) Operation (14,1,0) Availability (49,39,3) QoS (10,1,0) Prevention Execution Storage Metrics Authentication Logic IO Performance Authorization Configuration Network Communication Hardware First level symptom categories: 4 Second-level symptom categories: 15 Software Data Total number of symptoms: This is the identified taxonomy of symptoms extrapolated from the sample data. These categories apply evenly to either Problem Determination or Problem Prediction. There are four main categories: Security, Operation, Availability and QoS. These categories are each composed by several lower level categories. For example, the Security category contains 15 second-level categories and 2 thirdlevel categories (not shown) and no fourth-level categories (for now!!!). In contrast, the Operation category numbers were 14, 1, 0; the Availability category numbers were 49, 39, 3; and the QoS category numbers were 10, 1, 0; The total number of symptoms identified was 134!!!
11 LANOMS th Latin American Network Operations and Management Symposium 211 Final Remarks Specific symptoms are often classified in a set of canonical categories, with a subset presented here as a basis. Categorization helps completeness in the identification of symptoms. Symptom categories can be loosely mapped to Incident Management service flows this facilitates automation of service flows!!! Specific symptoms of different categories can be correlated together, but eventually root cause belongs to only one root cause category. The taxonomy is still evolving!!! The goal is to reduce the number of generic symptoms (level 1) thus simplifying the acquisition process. Operation Application task failure Execution Communication problem Database problem Event processor problem Storage allocation problem root cause symptoms The existence of this taxonomy actually improved the task of identifying and classifying symptoms in a large data set. Often classifying a specific symptom under a generic category also gives an idea of how the symptom should be handled and to which other symptoms it could be correlated in order to produce incidents. Generic symptom categories can be loosely coupled to incident categories as defined by standard Incident Management processes, like the ones defined by the group. This taxonomy is still in evolution. It is not expected that it will work for all existing symptoms extracted from various sources of data. Also, further simplification of the taxonomy is a possible enhancement to be sought. The number of generic categories is large as it is now, and some low level categories can possibly be grouped together into higher level categories, this will help to further reduce the number of categories and simplify the classification method. Also pointed out here is the correlation relationship between symptoms. This is a different but useful relationship where symptoms are associated together to determine the root-cause of problems these root-cause symptoms are then promoted to be incidents, and this is what will drive higher layers of the autonomic control loop.
12 212 LANOMS th Latin American Network Operations and Management Symposium Future Work Process more symptom sources (i.e. more products, solutions, technologies, etc). Propose ways to align existing problem and incident taxonomies to the one described in this document. Produce tooling to enable mass consumption of a symptoms database and to facilitate incorporation and easy maintenance of symptoms and symptom categories. Apply discovered symptoms to service flows in order to foster automation in the implementation of these flows. Establish a sharing model that would make the symptoms body of knowledge available to all adopters of the autonomic computing technology. As a follow up to this study, the following activities are planned: -Augment the number of symptoms by processing more and original data collected from other solutions and products -Align existing taxonomies related to events, incidents and problems to reconcile them into a meta-taxonomy that can be applied and extended as needed for different knowledge types associated to the problem determination and prediction disciplines. -Produce tooling around the concepts of symptoms and the taxonomy of symptoms. Make the process of identification and classification easy for end users. -Further explore standard IT service flows and identify which symptoms can be applied and extracted from the various parts of the processes. -Share the identified content in the form of a symptoms database that could be reused by adopters of the Autonomic Computing architecture.
Autonomic computing: strengthening manageability for SOA implementations
Autonomic computing Executive brief Autonomic computing: strengthening manageability for SOA implementations December 2006 First Edition Worldwide, CEOs are not bracing for change; instead, they are embracing
More informationBest Practices Report
Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general
More informationCA Service Desk Manager
PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES
More informationAgio Remote Monitoring and Management
Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays
More informationITIL: Service Operation
ITIL: Service Operation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom s Taxonomy What do you Expect? Housekeeping
More informationCisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows
Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)
More informationBSM Transformation through CMDB Deployment. Streamlining the Integration of Change and Release Management
BSM Transformation through CMDB Deployment Streamlining the Integration of Change and Release Management Gordon Owens, Managing Consultant generatione Technologies Agenda Brief Introduction Building Blocks
More informationBIG DATA THE NEW OPPORTUNITY
Feature Biswajit Mohapatra is an IBM Certified Consultant and a global integrated delivery leader for IBM s AMS business application modernization (BAM) practice. He is IBM India s competency head for
More informationConvergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager
Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND
More informationWhite Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in
More informationA Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations
A Vision for Operational Analytics as the Enabler for Focused Hybrid Cloud Operations As infrastructure and applications have evolved from legacy to modern technologies with the evolution of Hybrid Cloud
More informationImplement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
More informationAn architectural blueprint for autonomic computing.
Autonomic Computing White Paper An architectural blueprint for autonomic computing. June 2005 Third Edition Page 2 Contents 1. Introduction 3 Autonomic computing 4 Self-management attributes of system
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More informationMODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson
More informationDCIM Software and IT Service Management - Perfect Together DCIM: The Physical Heart of ITSM
1 Overview Information Technology is so fundamental to every business today that every organization needs to establish formal processes to ensure that IT services are continually aligned to the business,
More informationWhite Paper Take Control of Datacenter Infrastructure
Take Control of Datacenter Infrastructure Uniting the Governance of a Single System of Record with Powerful Automation Tools Take Control of Datacenter Infrastructure A new breed of infrastructure automation
More informationPublished April 2010. Executive Summary
Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must
More informationService Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
More informationJuniper Networks Automated Support and Prevention Solution (ASAP)
Juniper Networks Automated Support and Prevention Solution (ASAP) An ecosystem of tools, applications, and systems to streamline operations, bring operational efficiency, reduce downtime, and increase
More informationFive best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
More informationIBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
More informationVistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationUnderstanding the Performance Management Process
Understanding the Performance Management Process Monitoring Market Monitoring tools account for more then 50% of market Most organizations have not matured their monitoring environment Missing Process
More informationBMC Service Assurance. Proactive Availability and Performance Management Capacity Optimization
BMC Service Assurance Proactive Availability and Performance Management Capacity Optimization BSM enables cross-it workflow Proactive Operations Initiatives Incident Management Proactive Operations REQUEST
More informationIntelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
More informationEstablishing a business performance management ecosystem.
IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance
More informationExtend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.
IBM Service Management solutions and the service desk White paper Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. December
More informationDCIM Software and IT Service Management - Perfect Together
DCIM Software and IT Service Management - Perfect Together A White Paper from Raritan 2014 Raritan Inc Overview Information Technology is so fundamental to every business today that every organization
More informationUse product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).
ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2
More informationBeyond Logging and Monitoring. New Techniques for Solving J2EE Application Problems in Production Environments. David Kadouch BMC Software
Beyond Logging and Monitoring New Techniques for Solving J2EE Application Problems in Production Environments David Kadouch BMC Software Abstract Application downtime costs in production systems can range
More informationEnterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationPATROL From a Database Administrator s Perspective
PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks
More informationIT Service Management
IT Service Management Policy Based IT Service Management White Paper Prepared by: Rick Leopoldi March 23, 2004 Copyright 2001. All rights reserved. Duplication of this document or extraction of content
More informationApproach to Service Management
Approach to Service Management In SOA Space Gopala Krishna Behara & Srikanth Inaganti Abstract SOA Management covers the Management and Monitoring of applications, services, processes, middleware, infrastructure,
More informationImplementing ITIL with Kaseya Tools
Kaseya White Paper Implementing ITIL with Kaseya Tools A white paper by Robert Perrine, ITIL-Service Manager www.kaseya.com Executive Overview Kaseya Service Desk provides the logic and tools necessary
More informationKaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views
Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into
More informationPredictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER
Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER Table of Contents Introduction...1 Business Challenge...1 A Solution: Predictive Intelligence...1
More informationBusiness Service Management the ITIL Way
Business Service Management the ITIL Way CONTENTS ITIL s First Steps... 3 The Key to ITIL s Success... 3 Alignment of IT to Business Goals... 3 Further Evolution... 4 COPYRIGHT NOTICE Copyright Axios Systems
More informationService Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group. Tuesday June 12 1:00-2:15
Service Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group Tuesday June 12 1:00-2:15 Service Oriented Architecture and the DBA What is Service Oriented Architecture (SOA)
More informationApplying SOA to OSS. for Telecommunications. IBM Software Group
IBM Software Group Applying SOA to OSS for Telecommunications Kevin Twardus Manager of Industry Architecture and Standards IBM Software Group Communications Sector IBM Corporation The Details of SOA depends
More informationThe CMDB: The Brain Behind IT Business Value
Thought Leadership white paper The CMDB: The Brain Behind IT Business Value By Gerry Roy, Director of Solutions Management for BMC Atrium and BMC Service Support, BMC Software TABLE OF CONTENTS Executive
More informationWhy you need an Automated Asset Management Solution
solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery
More informationProblem Management: A CA Service Management Process Map
TECHNOLOGY BRIEF: PROBLEM MANAGEMENT Problem : A CA Service Process Map MARCH 2009 Randal Locke DIRECTOR, TECHNICAL SALES ITIL SERVICE MANAGER Table of Contents Executive Summary 1 SECTION 1: CHALLENGE
More informationServer & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
More information4net ESP differentiators. Data Sheet
4net ESP differentiators Data Sheet Table of Contents 1.0 Key Objective Increase Customer Profitability 3 2.0 What s Important to Customers 3 3.0 Fundamental Advantages 4 3.1 Clear focus on Application
More informationService Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
More informationDeploying the CMDB for Change & Configuration Management
WHITE PAPER: CMDB, CHANGE & CONFIGURATION MANAGEMENT Deploying the CMDB for Change & Configuration Management MAY 2007 CA and BearingPoint Table of Contents Executive Summary SECTION 1 2 Pressures on IT
More informationBusiness white paper. Top ten reasons to automate your IT processes
Business white paper Top ten reasons to automate your IT processes Table of contents 4 Data center management trends and tools 4 Today s challenge 4 What is next? 5 Automating the remediation of incidents
More informationCloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
More informationCisco Unified Communications Remote Management Services
Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco
More informationCisco Unified Computing Remote Management Services
Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing
More informationIT Services Management Service Brief
IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction
More informationBETTER BUSINESS FORESIGHT THROUGH SHARPER TECHNOLOGICAL INSIGHT.
www.wipro.com BETTER BUSINESS FORESIGHT THROUGH SHARPER TECHNOLOGICAL INSIGHT. FixOmatic DO BUSINESS BETTER AUTOMATION: THE KEY TO SERVICE INNOVATION Automation has now become one of the top priorities
More informationORACLE IT SERVICE MANAGEMENT SUITE
ORACLE IT SERVICE MANAGEMENT SUITE ITIL COMPATIBLE PINKVERIFY ORACLE IT SERVICE MANAGEMENT SUITE HAS BEEN CERTIFIED BY PINK ELEPHANT THROUGH THE PINKVERIFY PROCESS TO BE ITIL COMPATIBLE IN SIX PROCESS
More informationExtend the value of your core business systems.
Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems
More informationAugmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
More informationAutomating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense
Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for NetIQ November 2008 IT Management
More informationTop 10 Reasons to Automate your IT Run Books
Top 10 Reasons to Automate your IT Run Books DS12 Top 10 Reasons to Automate Your IT Run Books Run Book Automation is an emerging technology space that is being adopted by many of the largest, most sophisticated
More informationPredictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER
Predictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER Table of Contents Introduction...1 Business Challenge...1 A Solution: Predictive Intelligence...1 > Dynamic Thresholding...2
More informationDer Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
More informationDrive Down IT Operations Cost with Multi-Level Automation
White White Paper Paper Drive Down IT Operations Cost with Multi-Level Automation Overview Reducing IT infrastructure and operations (I+O) budgets is as much on the mind of CIOs today as it s ever been.
More informationFireScope + ServiceNow: CMDB Integration Use Cases
FireScope + ServiceNow: CMDB Integration Use Cases While virtualization, cloud technologies and automation have slashed the time it takes to plan and implement new IT services, enterprises are still struggling
More informationHow To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
More informationEmpowering intelligent utility networks with visibility and control
IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering
More informationThe Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence
How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................
More informationWhite Paper. Incident Management: A CA IT Service Management Process Map
White Paper Incident Management: A CA IT Service Management Process Map Peter Doherty Senior Consultant, Technical Service, CA, Inc. Peter Waterhouse Director, Product Marketing, Business Service Optimization,
More informationSOA Myth or Reality??
IBM TRAINING S04 SOA Myth or Reality Jaqui Lynch IBM Corporation 2007 SOA Myth or Reality?? Jaqui Lynch Mainline Information Systems Email jaqui.lynch@mainline.com Session S04 http://www.circle4.com/papers/s04soa.pdf
More informationLeveraging ITIL to Manage Your Virtual Environment. Laurent Mandorla, Manager Fredrik Hallgårde, Consultant BearingPoint, Inc.
Leveraging ITIL to Manage Your Virtual Environment Laurent Mandorla, Manager Fredrik Hallgårde, Consultant BearingPoint, Inc. Agenda Introduction VMware: Great promises, but some significant challenges
More informationVMware Virtualization and Cloud Management Overview. 2010 VMware Inc. All rights reserved
VMware Virtualization and Cloud Management Overview 2010 VMware Inc. All rights reserved Automating Operations Management Why? What? How? Why is Operations Management different in the virtual world? What
More informationAn Oracle White Paper June, 2014. Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c
An Oracle White Paper June, 2014 Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c Product Overview... 1 Introduction... 1 Laying the Groundwork for Monitoring...
More informationWilhelmenia Ravenell IT Manager Eli Lilly and Company
Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience
More informationCA Service Desk On-Demand
PRODUCT BRIEF: CA SERVICE DESK ON DEMAND -Demand Demand is a versatile, ready-to-use IT support solution delivered On Demand to help you build a superior Request, Incident, Change and Problem solving system.
More informationAdvanced Remote Monitoring: Managing Today s Pace of Change
Advanced Remote Monitoring: Managing Today s Pace of Change RMM solutions enable an organization to reduce the risk of system outages and guard against the impact of unauthorized or malicious uses of technology,
More informationThe IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
More informationCisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service
Cisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service Cisco TelePresence Select Operate allows customers to make full use of the benefits of the Cisco TelePresence solution,
More informationINTELLIGENT DEFECT ANALYSIS, FRAMEWORK FOR INTEGRATED DATA MANAGEMENT
INTELLIGENT DEFECT ANALYSIS, FRAMEWORK FOR INTEGRATED DATA MANAGEMENT Website: http://www.siglaz.com Abstract Spatial signature analysis (SSA) is one of the key technologies that semiconductor manufacturers
More informationBoxTone Mobile User Management with ITIL and ITSM
White Paper BoxTone Mobile User Management with ITIL and ITSM Summary Today, many organizations are shifting their IT focus from day-to-day technical operation of back-office infrastructure to delivering
More information& USER T ECH.C W WW. SERVICE
BUSINESS SERVICE & END USER EXPERIENCE MONITORING A UGUST 2, 2 010 A NTONIO ROLL LE V P OF PROFESSIONAL SEE RVICES W WW. GENERA TIONE T ECH.C OM W WW. RESOLV E -SYSTT EMS.CO M BUSINESS SERVICE & END USER
More informationVeritas Configuration Manager Profile. A Profile Prepared by EMA October 2006
Veritas Configuration Manager Profile A Profile Prepared by EMA October 2006 Table of Contents Corporate Information...1 CMDB Type:...1 Areas Supported:...1 IT Domain:...2 Target customers:...2 Product
More informationITIL V3 Foundation Certification - Sample Exam 1
ITIL V3 Foundation Certification - Sample Exam 1 The new version of ITIL (Information Technology Infrastructure Library) was launched in June 2007. ITIL V3 primarily describes the Service Lifecycle of
More informationHow To Use Bco
!!! Moviri Managed BCO Services The managed services offering for BMC Capacity Optimization (BCO) customers designed to maximize the return on their BCO investment.! Built for BCO customers Moviri Managed
More informationHELP DESK SYSTEMS. Using CaseBased Reasoning
HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind
More informationITIL Best Practices with Oracle Enterprise Manager 10g and Oracle PeopleSoft Help Desk. An Oracle White Paper September 2007
ITIL Best Practices with Oracle Enterprise Manager 10g and Oracle PeopleSoft Help Desk An Oracle White Paper September 2007 ITIL Best Practices with Oracle Enterprise Manager 10g and Oracle PeopleSoft
More informationThree Fundamental Techniques To Maximize the Value of Your Enterprise Data
Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Prepared for Talend by: David Loshin Knowledge Integrity, Inc. October, 2010 2010 Knowledge Integrity, Inc. 1 Introduction Organizations
More informationCA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview
PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY
More informationIBM Tivoli Monitoring for Applications
Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including
More informationConfiguring and Deploying a Private Cloud
Course 20247C: Configuring and Deploying a Private Cloud Course Details Course Outline Module 1: Planning for the Cloud Planning a hybrid cloud involves understanding these tools and technologies so that
More informationThe Future of Business Analytics is Now! 2013 IBM Corporation
The Future of Business Analytics is Now! 1 The pressures on organizations are at a point where analytics has evolved from a business initiative to a BUSINESS IMPERATIVE More organization are using analytics
More informationITIL Service Lifecycle Operation
ITIL Service Lifecycle Operation Course Details Course Code: Duration: Notes: ITILSL-Oper 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based
More informationCollaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
More informationWHITE PAPER. SAS IT Intelligence. Balancing enterprise strategy, business objectives, IT enablement and costs
WHITE PAPER SAS IT Intelligence Balancing enterprise strategy, business objectives, IT enablement and costs Table of Contents Executive summary... 1 SAS IT Intelligence leaping tactical pitfalls... 2 Resource
More information02 General Information. 03 Features. 06 Benefits.
invgate 02 General Information. 03 Features. 06 Benefits. Index. 02 General Information. Improve your IT department Managing Service Support just got easier Despite growing connectivity, data accessibility
More informationWHITE PAPER. iet ITSM Enables Enhanced Service Management
iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted
More informationIMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN
i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann
More informationSOA management challenges. After completing this topic, you should be able to: Explain the challenges of managing an SOA environment
Managing SOA Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this unit, you should be able to: Explain
More informationEnabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management
Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Andy Oppenheim Enterprise Management, Product Management Mervyn Lally
More informationIT Service Management with System Center Service Manager
Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies
More informationITIL Event Management in the Cloud
ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum July 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More information