HP Service Health Analyzer: Decoding the DNA of IT performance problems

Size: px
Start display at page:

Download "HP Service Health Analyzer: Decoding the DNA of IT performance problems"

Transcription

1 HP Service Health Analyzer: Decoding the DNA of IT performance problems Technical white paper Table of contents Introduction... 2 HP unique approach HP SHA driven by the HP Run-time Service Model... 2 HP SHA runtime predictive analytics... 5 Product capabilities... 7 Get started with zero configuration and zero maintenance... 7 Return on investment Conclusion... 12

2 Introduction Making sure you have complete visibility into the health of your business service, that you can adapt, and even survive, in today s cloud and virtualized IT environment isn t just a nice-to-have. It is mandatory. Managing a dynamic infrastructure and applications will take more than just reacting to business service problems when they occur, or manually updating static thresholds that are difficult to set accurately and problematic to maintain. In today s world, you need advanced notification of problems so you can solve those issues before the business is impacted. You need better visibility into how your applications and business services are correlated with your dynamic infrastructure, so you can track anomalies across the complete IT stack, including the network, servers, middleware, applications, and business processes. You need an easier way of determining acceptable thresholds as a basis for identifying events that might impact the business. You need automation to leverage the knowledge from past events that can be applied to address new events more efficiently and can also be used to suppress extraneous events allowing IT to focus on just the business-impacting events. While IT organizations have the methods to collect massive amount of data, what has been lacking is the analytic tool set and automated intelligence to correlate these disparate metrics from both an application and a topology perspective to help these organizations anticipate or forecast potential problems on the horizon. IT managers are looking into the world of predictive analytics, one of the notable business intelligence trends of 2011, to help them improve service uptime and performance, thereby increasing business-generated revenue and decreasing maintenance and support cost. HP Service Health Analyzer (SHA) is a predictive analytics tool built on top of a real-time, dynamic service model so you can understand the relationship of metric abnormalities with the application and its underlying infrastructure. HP unique approach HP SHA driven by the HP Run-time Service Model Monitoring systems provide measurements and events from all layers of the IT stack hardware, network OS, middleware, application, business services, and processes. Configuration management databases (CMDBs) provide the model that links all of the different components. But, given the ever changing nature of IT systems, CMDBs need to be constantly updated, such as in the case of HP Run-time Service Model (RtSM). The combination of the monitors and the real-time CMDB provide all the necessary data to meet the challenges above. However, all of the data needs to be transformed to provide actionable information. HP SHA uses advanced algorithms that combine multiple disciplines, topology, data analytics, graph theory, and statistics in the Run-time Anomaly Detection (RAD) Engine. HP solution to the outdated service model is our RtSM. The RtSM synchronizes with the HP UCMDB to leverage the service modeling in the external Universal Configuration Management Database (UCMDB). The RtSM then leverages the data collectors of HP Business Service Management (Business Service Management) portfolio that are monitoring for performance, availability, fault, and topology to share real-time topology so that the RtSM has the most current understanding of topology and relationships. The RtSM is a core foundation to SHA. For more information on how the RtSM works with the UCMDB, see the RtSM best practices guide 2

3 Figure 1. Solution template Figure 1 outlines the components of SHA that we determined are required for an accurate solution to decode IT performance problems. We now outline the components and their requirements. Baselining is the first component, which takes every metric collected by monitoring systems and learns its normal behavior. Deviations from normal behavior by the metric serves as the first step for detecting, predicting, and decoding performance problems. However, learning the normal behavior of metrics accurately is a challenging task. Factors such as seasonal behavior, trends, and changes due to an ever evolving IT system require the learning algorithm estimating the baseline to be adaptive and aware of these factors. Figure 2 shows the distribution of the season for over 17,000 performance metrics collected from a real IT system. These are a combination of system, application, and user-level monitors. As can be seen, over two thirds of the metrics display some seasonal behavior, and these represent a range of various seasons, not just the typically assumed daily or weekly seasonality. A baseline algorithm must first estimate the season to be accurate for example, if a metric has a seasonal behavior of five hours, and a baseline algorithm ignores the season or uses a predetermined season that is incorrect (for example, 24 hours), it will produce a poor baseline. The baseline will be too sensitive, producing many false deviations from normal, which are actually normal, or be too indiscriminate and will not detect deviations from normal behavior when those exist. 3

4 Figure 2. Distribution of seasonal behavior for over 17,000 metrics collected from an IT environment Similarly, estimating trend and being adaptive to changes are important for estimating a good baseline. While understanding the normal behavior of individual metrics is important, it is not sufficient to detect and predict real problems. By definition, some of the deviations from the baseline will not be related to any problem (a small fraction); in a large IT environment with millions of metrics, even this small fraction can lead to too many false alerts, if treated individually as a problem. In addition, problems typically do not manifest themselves on a single metric in the environment. Temporal analysis: It is one of the widespread approaches to combine metrics into a single anomaly. Temporal analysis methods include metric-to-metric correlations, where metrics are grouped together based on the similarity of their time-series measurements, or multivariate temporal analysis/prediction that combines multiple metrics together through a, typically linear, multivariate mathematical model, such as multivariate regression, neural, and Bayesian models. These methods are powerful but have their limitations. First, they scale poorly with the number of metrics. Second, given their statistical nature, they can find misleading correlations if they are provided a very large number of metrics that have no real relationship between them; the chance of finding such wrong correlations increases with the number of metrics. Topology analysis: What helps temporal methods overcome their limitations is domain-related context. In particular, in IT environments, the set of metrics being analyzed should be limited to a logical set of related metrics. If the CPUs of two completely unrelated servers become high at the same time, they should not be considered correlated even if statistically they appear to be. Such context is provided in the topology of IT systems, through CMDBs. A CMDB is essentially a graph, modeling the relationships between all components making up IT systems the physical, middleware, software, application, business services, and processes layers. Topology analysis, in the form of advanced graph algorithms, is therefore required for extraction of the contextual information within the CMDB, and to help detect real problems and correlations between metrics, while filtering noise. 4

5 Therefore, detecting a real problem requires detection of patterns of deviations from normalcy of multiple metrics that span time and filtered by topology. This leads to statistical learning methods that analyze temporal and topological data. Historical analysis: Beyond detection and prediction of a problem, the topology provides the ability to scope the problem and separate root cause from symptoms; both are important for quickly resolving the problems. With a problem detected and analyzed, its DNA pattern is finally decoded, and it can be stored in a knowledgebase. To leverage the knowledgebase, algorithms that perform historical analysis are required. These include algorithms for matching and comparing different problem DNA patterns, clustering them, and classifying techniques. With the knowledgebase and algorithms in place, past problems can be leveraged quickly and automatically to help find root cause and resolutions to new problems. RAD Engine: It is defined by this complete set of algorithms. The algorithms within the RAD Engine are the subject of 10 separate patent applications. The output of the RAD Engine is a critical key performance indicator (KPI) in the HP BSM dashboard, and it send an event into the BSM event subsystem, HP Operations Manager i (OMi). The event from SHA contains a wealth of contextual information gathered by the RAD Engine including the lead suspects, location information, business impact information, a list of the configuration items (CIs) involved in the anomaly, and any similar anomaly information. This information will help customers isolate and resolve the event quickly before the business is impacted. HP SHA runtime predictive analytics In SHA we developed statistical learning algorithms coupled with graph algorithms, for analyzing the full spectrum of data collected by BSM systems: Monitoring data (synthetic and real user) Events Changes Topology from the RtSM These algorithms accurately detect anomalies, decode their DNA structure, their business impact, and match them to previously decoded anomalies, collected in our Anomaly DNA Knowledgebase. SHA can be described in the following steps: Metric behavior learning Learning the normal behavior, also known as baselining, of the metrics collected from all levels of the service (system, middleware, application, and others) is a necessary first step. It removes the need to set static thresholds and enables early detection of deviations from normalcy. Key strengths of our algorithms are: Automatic learning of the metric seasonal behavior and its trend Adaptive to behavioral changes over time a must in virtualized environments Configuration free no administrative effort to set or maintain thresholds is required Anomaly DNA Technology detection As a holistic problem evolves in an IT service, numerous metrics and components related to that service begin to experience deviations from normal behavior. However, there are constant momentary deviations from normalcy by various components that do not represent any meaningful problem. Selecting the meaningful problems and discovering the DNA of true problems is the challenge of any anomaly detection system. Our anomaly DNA detection algorithm accomplishes this using a unique statistical algorithm, which combines three types of information, necessary for achieving accurate detection: Topological: logical links between monitors and the components they monitor Temporal information: the duration and temporal correlation of the monitors being in an abnormal state Statistical confidence information: the probability of the monitor to be truly in an abnormal state, as learned by the baseline over time 5

6 Key strengths of our anomaly detection algorithm are: Clutter reduction: Provides an automatic method to group metrics that breached their baseline, using both temporal and topological information. This in turn reduces the number of events of baseline breaches that an operator would have to look at, without having to set any rules. Event reduction: The algorithms of SHA combine multiple abnormal metrics into a single event reducing the total number of events presented to an operator. The entry point of this type of event is multiple metrics breaching their dynamic thresholds. Then, SHA correlates these metrics by time and topology to generate a single event allowing the operator to focus on the real issue. False alarm reduction: Reduces the number of false alerts by computing the significance of an anomaly in the system using a statistical algorithm. Also, known anomalies that have been marked as noise in the past will be used to match current anomalies and suppress the anomaly event. Anomaly DNA Technology decoding The next step following the detection of the anomaly and its structure is decoding of its DNA. Decoding the anomaly DNA is done by analyzing and classifying it based on the topology (CIs and their topological structure), the metrics and additional information. In particular, the decoding achieves: Separation of suspects, thus providing actionable information. Identification of business impact using business related information: user volume, service-level agreements (SLAs), and affected geographical areas, thus allowing prioritizing the anomaly according to the impact Identification of related changes that may have affected the system behavior Anomaly DNA Technology matching With the anomaly DNA structure decoded, matching of the current anomaly with past anomalies is performed. The matching is performed with a unique graph similarity algorithm, which compares abstract anomaly structures, thus allowing matching between anomalies that were detected on different services that have a similar architecture. The advantages of our matching are: Enables reuse of discovered solutions of past events. Matches to anomalies of known issues that are yet to be resolved, reducing the need to reinvestigate Reduces false alarms when the past similar anomaly was classified as noisy DNA structures, for example an anomaly that is caused by normal maintenance actions on the service Anomaly DNA Knowledgebase As the knowledge base of past anomalies and their resolutions is collected, using advanced data mining methods analyzes and generates the relationship between all anomalies, thus creating a map of the entire Anomaly DNA Knowledgebase. Our anomaly DNA matching algorithm defines the required metric space for data mining methods such as clustering and classification. These are applied to provide the following benefits: Proactive problem resolution identification of recurrent problems through anomaly DNA classification to problem and resolution types, reducing the time to diagnose and resolve these types in the future Leveraging knowledge collected from various services that display similar behavior 6

7 Product capabilities Built upon HP RtSM, HP SHA analyzes historical norms and trends of both applications and infrastructure, and compares that data against real-time performance metrics. Leveraging a run-time service model is crucial for your dynamic environment so you can: Correlate anomalies to topology changes and past issues Understand the business impact of each issue and prioritize resolution Identify the suspects of the issue and use that knowledge to prevent similar issues in the future SHA automatically learns the dynamic thresholds in your environment so you don t have to invest the labor to set and maintain static thresholds. SHA works on metrics from the following BSM data sources: HP Business Process Monitor HP Diagnostics HP Network Node Manager i HP Operations Manager, Performance Agent HP Real User Monitor HP SiteScope SHA identifies anomalies based on abnormal metric behavior related to the RtSM, sets a KPI, and generates an event with context to help identify business priority of this issue. Additionally, SHA uses Anomaly DNA Technology to analyze the structural makeup of an anomaly, and it compares that with the known DNA of other anomalies. Matches provide known remediation actions without further investigation, and matches marked as noise are suppressed. If you have abnormalities related to a specific service, you can see the SLAs, and know the impact that anomaly could cause. Finally SHA incorporates remediation capabilities from the HP Closed Loop Incident Process (CLIP) solution and provides direct integration with HP Operations Orchestration. For instance, you can fuse analytics and automation together to remediate issues quickly. When SHA sends an event into OMi, an operator can take action before service is impaired with the CLIP process. This quick remediation solution simplifies the complexities of virtualization, cloud computing environments. Get started with zero configuration and zero maintenance After you install the product, you select the applications that you want to monitor, and SHA starts collecting data and learns your system behavior. SHA gathers data from the application, infrastructure, database, network, and middleware, as well as topology information from the RtSM, and learns the baseline. The baseline defines the normal behavior of an individual metric over time, including the seasonal characteristics. For example, normal behavior for a metric may include a very busy Monday morning and a very quiet Friday afternoon. 7

8 Figure 3. Example of a dynamic baseline sleeve in gray band with actual metric data in purple. After you have the dynamic baselines established for all the application metrics, SHA RAD Engine starts looking for anomalies in application behavior. The entry point into the RAD Engine is a baseline breach indicating that a metric is exhibiting abnormal behavior. To define an anomaly, the RAD Engine takes the abnormal metric information gathered from all monitored metrics and couples that with topology information from the RtSM to determine if there are multiple breaches, from different metrics, affecting the same service. If an anomaly is detected, a event is generated and sent to the event subsystem. Additionally, when an anomaly is detected SHA automatically captures the current topology of the CIs involved with the event. The value of this is to understand the topology as it was at the time of the anomaly, which is especially valuable when reviewing anomalies that occurred overnight or when there are no on-call operators to address the issues. SHA also collects and presents discovered changes for the relevant CIs so this information can be used as part of the root cause analysis. This correlation means faster troubleshooting and reduced mean time to repair (MTTR). When SHA discovers an anomaly in the application behavior it changes the status of the Predictive Health KPI and triggers an event that is sent to BSM event browser. From this point you can start to drill down, isolate the problem, and understand its impact on the business. SHA provides a page with anomaly highlights that contains all you need to know about the problem and its impact on your business, as well as advanced isolation capabilities if you need to drill down and investigate it further. 8

9 Figure 4. An anomaly highlights page At the top of figure 4 An anomaly highlights page, you can find the suspects list. The suspects are CIs (applications, transactions, infrastructure elements) that were found by SHA as the possible cause of the anomaly. Suspects can be CIs whose metrics breached baseline, anomaly patterns that were previously identified by the user as abnormal, and CIs that failed verifications with user provided verification tool. The highlights page also provide the anomaly business impact by presenting which SLAs were breached because of the anomaly, the services and applications that were affected, and a breakdown of the locations that were impacted. 9

10 SHA also offers to run relevant reports to drill down and have a better view of the problem. The similar anomalies section is generated using Anomaly DNA Technology, and it provides more confidence on the occurrence of the problem by showing a list of similar patterns, and additional information about how they were handled. SHA provides a problem investigation and isolation tool to drill down into the anomaly, and isolate a possible root cause of the problem with the Subject Matter Expert User Interface (SME UI). The investigation tool allows you to travel in time in the anomaly and have a detailed view into the turn of events that lead to the problem as it is reflected in the application topology. The figure below shows an example of an anomaly and its turn of events over time. Figure 5. SME UI showing topology of anomaly The lower part of the screen shows the events in the system as they occurred and captured by SHA over the time before and during the anomaly. At 06:15 a.m. SHA recorded a discovered change in the system. At 06:30 a.m. SHA triggered an anomaly. It means that it detected some abnormal metrics that breached its baseline before SiteScope and OM that were monitoring the system discovered it. At this point of time SHA already triggered an event that was sent to the operations personnel. At 08:00 08:20 a.m. SiteScope and OM triggered events on high CPU usage. The reason why SiteScope and OM discovered the problem later than SHA, is that their thresholds were set higher than SHA s dynamic baseline to reduce noise and false positive alerts. At 8:30 a.m. the first real-user experienced the performance problem and opened an incident. As you can see, SHA discovered the problem and alerted on it two hours ahead of time and before any of the users complained about it while providing the operations personnel advance notice to handle and resolve it. SHA provides you with a powerful tool to correlate and find out which of the metrics can be the possible root cause of the problem in your system. 10

11 In the figure below you can see SHA metric view that is part of the SME UI. Figure 6. SME UI in metric view The metric view allows you to preview your application s metrics as they were captured during the anomaly time frame in the envelop of their baseline. It also allows you to find out which of the metrics was the root cause of the problem by correlating it to the other metrics related to the same service using sophisticated statistical algorithms. In this example, the user decided to correlate Real User Monitor (RUM) metric with all the others. The reason why this metric was picked is that it represents best the real response time that the actual users are experiencing while using the application. The rest of the metrics are of infrastructure and middleware components, and the metric view provides a point-and-click mechanism to present a correlation between them to poor response time. The metric that got the highest correlation value (81 percent) was Sitescope_paging File Usage, that indicates that the root cause is most likely insufficient memory allocation. Return on investment SHA calculates a return on investment (ROI) using information gathered from the deployment environment. The metric management section looks at the ROI from reducing the administrative labor of setting and maintaining thresholds with the self learned dynamic thresholds that SHA delivers. The events and anomaly section looks at ROI from an event reduction perspective comparing the current OMi event stream to the anomaly events generated from SHA. This information is rolled up into the overall efficiency. 11

12 Figure 7. SHA ROI view Conclusion SHA is HP next-generation run-time predictive analytics solution that can anticipate IT problems before they occur by analyzing abnormal service behavior and alerting IT managers of real service degradation before that issue impacts their business. SHA delivers tight integration with the HP BSM solutions for event remediation to reduce the MTTR. Additionally, SHA is simple to use, requires minimal configuration and settings, and has a small learning curve. With SHA you no longer have to maintain your monitoring thresholds, as it constantly learns the behavior of your applications and adjust them accordingly. It reduces your application MTTR as you get fewer events in your system, each of them represents a real problem, and it is focused on the root cause. And because it is powered by dynamic HP RtSM, SHA can help IT operations identify potential issues across both topology and the services and solve them before the problem is even experienced by end users. HP SHA is the new era of analytics in IT. For more information, visit Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. 4AA3-8672ENW, Created December 2011

BB2798 How Playtech uses predictive analytics to prevent business outages

BB2798 How Playtech uses predictive analytics to prevent business outages BB2798 How Playtech uses predictive analytics to prevent business outages Eli Eyal, Playtech Udi Shagal, HP June 13, 2013 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained

More information

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

can you improve service quality and availability while optimizing operations on VCE Vblock Systems? SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible

More information

The top 10 misconceptions about performance and availability monitoring

The top 10 misconceptions about performance and availability monitoring The top 10 misconceptions about performance and availability monitoring Table of contents Introduction................................................................ 3 The top 10 misconceptions about

More information

Enterprise Business Service Management

Enterprise Business Service Management Technical white paper Enterprise Business Service Management Key steps and components of a successful solution Table of contents Executive Summary... 2 Setting the goal establishing an IT initiative...

More information

Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER

Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER Table of Contents Introduction...1 Business Challenge...1 A Solution: Predictive Intelligence...1

More information

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Data Drives IT Intelligence We live in a world driven by software and applications. And, the

More information

Predictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER

Predictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER Predictive Intelligence: Moving Beyond the Crystal Ball BEST PRACTICES WHITE PAPER Table of Contents Introduction...1 Business Challenge...1 A Solution: Predictive Intelligence...1 > Dynamic Thresholding...2

More information

Business white paper. Top ten reasons to automate your IT processes

Business white paper. Top ten reasons to automate your IT processes Business white paper Top ten reasons to automate your IT processes Table of contents 4 Data center management trends and tools 4 Today s challenge 4 What is next? 5 Automating the remediation of incidents

More information

HP SiteScope software

HP SiteScope software HP SiteScope software When you can see availability and performance, you can improve it. Improve the availability and performance of your IT environment HP SiteScope software helps you to agentlessly monitor

More information

Closed Loop Incident Process

Closed Loop Incident Process Closed Loop Incident Process From fault detection to closure Andreas Gutzwiller Presales Consultant, Hewlett-Packard (Schweiz) HP Software and Solutions 2010 Hewlett-Packard Development Company, L.P. The

More information

HP Business Service Management

HP Business Service Management HP Business Service Management for the Windows and Linux operating systems Software Version: 9.12 Getting Started with BSM Document Release Date: November 2011 Software Release Date: November 2011 Legal

More information

HP Business Availability Center software. Improving IT operational efficiency and customer satisfaction

HP Business Availability Center software. Improving IT operational efficiency and customer satisfaction HP Business Availability Center software Improving IT operational efficiency and customer satisfaction Today, IT organizations are under growing pressure to reduce downtime and improve the quality of user

More information

BMC Service Assurance. Proactive Availability and Performance Management Capacity Optimization

BMC Service Assurance. Proactive Availability and Performance Management Capacity Optimization BMC Service Assurance Proactive Availability and Performance Management Capacity Optimization BSM enables cross-it workflow Proactive Operations Initiatives Incident Management Proactive Operations REQUEST

More information

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA SaaS Packaged applications Employees IT metrics/analytics Storage Public cloud Security Challenges for IT Environments are

More information

HP Business Service Management 9.2 and

HP Business Service Management 9.2 and HP Business Service Management 9.2 and Operations Analytics Mark Pinskey Product Marketing Network Management 2011Hewlett-Packard 2013 Development.The information Company, contained L.P. herein is subject

More information

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief HP End User Management software Enables real-time visibility into application performance and availability Solution brief Figure 1 HP End User Management lets you proactively identify application performance

More information

VMware Virtualization and Cloud Management Overview. 2010 VMware Inc. All rights reserved

VMware Virtualization and Cloud Management Overview. 2010 VMware Inc. All rights reserved VMware Virtualization and Cloud Management Overview 2010 VMware Inc. All rights reserved Automating Operations Management Why? What? How? Why is Operations Management different in the virtual world? What

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

A closer look at HP LoadRunner software

A closer look at HP LoadRunner software Technical white paper A closer look at HP LoadRunner software Table of contents Sizing up the system 2 The limits of manual testing 2 A new take on testing: the HP LoadRunner solution 3 The HP LoadRunner

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

How To Standardize Itil V3.3.5

How To Standardize Itil V3.3.5 Business white paper Standardize your ITSM An HP approach based on best practices Table of contents 3 Introduction 3 Benefits and challenges 5 The HP approach to standardizing ITSM 6 Establish an IT operations

More information

Copyright 11/1/2010 BMC Software, Inc 1

Copyright 11/1/2010 BMC Software, Inc 1 Copyright 11/1/2010 BMC Software, Inc 1 Copyright 11/1/2010 BMC Software, Inc 2 Copyright 11/1/2010 BMC Software, Inc 3 The current state of IT Service How we work today! INCIDENT SERVICE LEVEL DATA SERVICE

More information

& USER T ECH.C W WW. SERVICE

& USER T ECH.C W WW. SERVICE BUSINESS SERVICE & END USER EXPERIENCE MONITORING A UGUST 2, 2 010 A NTONIO ROLL LE V P OF PROFESSIONAL SEE RVICES W WW. GENERA TIONE T ECH.C OM W WW. RESOLV E -SYSTT EMS.CO M BUSINESS SERVICE & END USER

More information

Table of contents. Standardizing IT Service Management. Best practices based on HP experience in ITSM consolidation. White paper

Table of contents. Standardizing IT Service Management. Best practices based on HP experience in ITSM consolidation. White paper Standardizing IT Service Management Best practices based on HP experience in ITSM consolidation White paper Table of contents Go!... 2 Benefits and challenges... 2 The HP approach to standardizing ITSM...

More information

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into

More information

Master big data to optimize the oil and gas lifecycle

Master big data to optimize the oil and gas lifecycle Viewpoint paper Master big data to optimize the oil and gas lifecycle Information management and analytics (IM&A) helps move decisions from reactive to predictive Table of contents 4 Getting a handle on

More information

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance

More information

BMC ProactiveNet Performance Management: Delivering on the Promise of Predictive Control Across the Total IT Environment SOLUTION WHITE PAPER

BMC ProactiveNet Performance Management: Delivering on the Promise of Predictive Control Across the Total IT Environment SOLUTION WHITE PAPER BMC ProactiveNet Performance Management: Delivering on the Promise of Predictive Control Across the Total IT Environment SOLUTION WHITE PAPER TABLE OF CONTENTS EXECUTIVE OVERVIEW 1 MANAGING INCREASING

More information

Align IT Operations with Business Priorities SOLUTION WHITE PAPER

Align IT Operations with Business Priorities SOLUTION WHITE PAPER Align IT Operations with Business Priorities SOLUTION WHITE PAPER Table of Contents Executive summary............................................... 1 the Need for Aligning IT Operations with Business

More information

Monitoring and Operating a Private Cloud with System Center 2012 (10750) H7G37S

Monitoring and Operating a Private Cloud with System Center 2012 (10750) H7G37S HP Education Services course data sheet Monitoring and Operating a Private Cloud with System Center 2012 (10750) H7G37S Course Overview In this course, you will receive an overview of a private cloud infrastructure,

More information

When application performance is better, business works better.

When application performance is better, business works better. Solution brief When application performance is better, business works better. How APM improves IT operational efficiency and customer satisfaction. Table of contents 3 Monitor. Manage. Perform. 3 What

More information

When application performance is better, business works better.

When application performance is better, business works better. Business white paper When application performance is better, business works better. Six application performance management steps to optimize efficiency and satisfaction Table of contents Contents 3 Poor

More information

HP Application Performance Management

HP Application Performance Management HP Application Performance Management Improving IT operational efficiency and customer satisfaction Solution brief IT organizations are under pressure to reduce downtime and improve the quality of user

More information

HP Business Availability Center software. Manage and optimize the health of business services and applications

HP Business Availability Center software. Manage and optimize the health of business services and applications software Manage and optimize the health of business services and applications Today, IT organizations are under growing pressure to optimize the availability and performance of key business services. This

More information

Konsolidert driftsovervåking: Hvordan OMi 8.10 gir radikalt bedre oversikt over tilstanden til din IT infrastruktur Rolf Frydenberg Manag-E Nordic AS

Konsolidert driftsovervåking: Hvordan OMi 8.10 gir radikalt bedre oversikt over tilstanden til din IT infrastruktur Rolf Frydenberg Manag-E Nordic AS Konsolidert driftsovervåking: Hvordan OMi 8.10 gir radikalt bedre oversikt over tilstanden til din IT infrastruktur Rolf Frydenberg Manag-E Nordic AS Agenda The Operations Bridge Concept Moving to a Next

More information

Course Data Sheet OMi120 Operations Manager i Software 10.x Essentials

Course Data Sheet OMi120 Operations Manager i Software 10.x Essentials Course Data Sheet OMi120 Operations Manager i Software 10.x Essentials Course No.: OMI120 For software version(s): 10.0 Software version used in the labs: 10.01 Delivery formats: Instructor Led (ILT) and

More information

Delivering Cost Effective IT Services

Delivering Cost Effective IT Services M2 Technology Delivering Cost Effective IT Services Defense agencies have been directed to move towards cloud and shared service models by the Federal Data Center Consolidation Initiative (FDCCI), the

More information

Maximizing Service Assurance for Global Payment Systems

Maximizing Service Assurance for Global Payment Systems White Paper Maximizing Service Assurance for Global Payment Systems Predictive Analytics for IT in Action October 2011 Introduction Financial services executives responsible for the performance of payments

More information

HP APPLICATION PERFORMANCE MONITORING

HP APPLICATION PERFORMANCE MONITORING HP APPLICATION PERFORMANCE MONITORING mr. sci Tomislav Kanižaj Teritorry Sales Manager HP Software March 2011 2010 Hewlett-Packard Development Company, L.P. The information contained 1 herein is subject

More information

HP Service Manager software. The HP next-generation IT Service Management solution is the industry-leading consolidated IT service desk.

HP Service Manager software. The HP next-generation IT Service Management solution is the industry-leading consolidated IT service desk. software The HP next-generation IT Service solution is the industry-leading consolidated IT service desk. : setting the standard for IT service management solutions with a robust lifecycle approach to

More information

IBM Tivoli Netcool network management solutions for enterprise

IBM Tivoli Netcool network management solutions for enterprise IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals

More information

Monitoring and Log Management in Hybrid Cloud Environments

Monitoring and Log Management in Hybrid Cloud Environments Ingo Averdunk, Dipl.-Inform. November 11, 2015 IT Service Management Monitoring and Log Management in Hybrid Cloud Environments Agenda Overview Hybrid Service Management Monitoring Log Management Closing

More information

Table of contents. Data tells no tales improving incident management with IT Analytics. White paper

Table of contents. Data tells no tales improving incident management with IT Analytics. White paper Data tells no tales improving incident management with IT Analytics White paper Table of contents Introduction...2 Incident Management (IM)... 2 Introducing IT Analytics... 3 Improving Incident Management...

More information

White Paper. Business Service Management Solution

White Paper. Business Service Management Solution White Paper Business Service Management Solution Eric Stinson, September 2005 Executive Summary With services and Service Level Agreements (SLAs) being direct sources of revenue (or penalties) for service

More information

HP Systems Insight Manager and HP OpenView

HP Systems Insight Manager and HP OpenView HP Systems Insight Manager and HP OpenView Working Better Together to Deliver End-to-End Management, from Hardware Infrastructure to Business Service Availability Executive Summary... 2 Challenges of Managing

More information

X86 Virtualization Technology Evolution to HP Virtualization Performance Viewer (HP vpv)

X86 Virtualization Technology Evolution to HP Virtualization Performance Viewer (HP vpv) Technical white paper X86 Virtualization Technology Evolution to HP Virtualization Performance Viewer (HP vpv) HP vpv 2.20 Table of contents Summary 2 Evolution Story 2 Comparing HP vpv with VI-SPI 3 Comparing

More information

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities SOLUTION WHITE PAPER Align Change and Incident Management with Business Priorities Table of Contents Executive summary 1 the Need for Business aware Service support processes 2 The Challenge of Traditional

More information

HP Operations Smart Plug-in for Virtualization Infrastructure

HP Operations Smart Plug-in for Virtualization Infrastructure HP Operations Smart Plug-in for Virtualization Infrastructure for HP Operations Manager for Windows Software Version: 1.00 Deployment and Reference Guide Document Release Date: October 2008 Software Release

More information

HP TransactionVision 5.0 software

HP TransactionVision 5.0 software HP TransactionVision 5.0 software Data sheet HP TransactionVision is a business transaction management product that gives you visibility into enterprise transactions to measure health, performance and

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal

More information

Application performance management: a six-step approach to improving staff efficiency and customer satisfaction

Application performance management: a six-step approach to improving staff efficiency and customer satisfaction Application performance management: a six-step approach to improving staff efficiency and customer satisfaction Business white paper Poor application performance and the bottom line Poor application performance

More information

Proactive Performance Management for Enterprise Databases

Proactive Performance Management for Enterprise Databases Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive

More information

Table of contents. HP NNMi: the i is for integration. White paper

Table of contents. HP NNMi: the i is for integration. White paper HP NNMi: the i is for integration. White paper Table of contents Executive summary... 2 HP software integrations (supported out of the box)... 3 HP NNMi integrations for Business Service Management...

More information

WHITE PAPER. Five Steps to Better Application Monitoring and Troubleshooting

WHITE PAPER. Five Steps to Better Application Monitoring and Troubleshooting WHITE PAPER Five Steps to Better Application Monitoring and Troubleshooting There is no doubt that application monitoring and troubleshooting will evolve with the shift to modern applications. The only

More information

Software EMEA Performance Tour 2013. London, UK 2 July

Software EMEA Performance Tour 2013. London, UK 2 July Software EMEA Performance Tour 2013 London, UK 2 July Maximise your customer satisfaction with APM Jon Tyson, Technical Team Leader Unix and Monitoring, Allianz Tom Harvey, Pre-sales Consultant, HP Agenda

More information

Brochure. Data Protector 9: Nine reasons to upgrade

Brochure. Data Protector 9: Nine reasons to upgrade Brochure Data Protector 9: Nine reasons to upgrade Data Protector 9: Nine reasons to upgrade Shifting data center requirements are forcing IT organizations to reassess backup and recovery processes, strategies,

More information

Five Essential Components for Highly Reliable Data Centers

Five Essential Components for Highly Reliable Data Centers GE Intelligent Platforms Five Essential Components for Highly Reliable Data Centers Ensuring continuous operations with an integrated, holistic technology strategy that provides high availability, increased

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]

PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ] [ WhitePaper ] PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. Over the past decade, the value of log data for monitoring and diagnosing complex networks has become increasingly obvious.

More information

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle

More information

HP Business Service Management

HP Business Service Management HP Business Service Management For the Windows and Linux operating systems Software Version: 9.24 Operations Manager i Concepts Guide Document Release Date: April 2014 Software Release Date: April 2014

More information

HP Business Service Management

HP Business Service Management HP Business Service Management for the Windows/Linux operating system Software Version: 9.20 Effective Modeling for BSM Best Practices Document Release Date: August 2012 Software Release Date: August 2012

More information

HP Change Configuration and Release Management (CCRM) Solution

HP Change Configuration and Release Management (CCRM) Solution HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document

More information

HP Client Manager 6.1

HP Client Manager 6.1 HP Client Manager 6.1 Introduction... 2 New Features in HPCM 6.1... 4 Understanding how HPCM works... 6 Extensive reporting capability... 7 HPCM in operation... 7 Client inventory... 7 Health monitoring...

More information

TRAVERSE: VIRTUALIZATION AND PRIVATE CLOUD MONITORING

TRAVERSE: VIRTUALIZATION AND PRIVATE CLOUD MONITORING TRAVERSE: VIRTUALIZATION AND PRIVATE CLOUD MONITORING SUMMARY Given recent advances in distributed computing, virtualization and private cloud technologies, enterprise datacenters have effectively become

More information

Understanding the Performance Management Process

Understanding the Performance Management Process Understanding the Performance Management Process Monitoring Market Monitoring tools account for more then 50% of market Most organizations have not matured their monitoring environment Missing Process

More information

MRV EMPOWERS THE OPTICAL EDGE.

MRV EMPOWERS THE OPTICAL EDGE. Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com

More information

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Andy Oppenheim Enterprise Management, Product Management Mervyn Lally

More information

Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics

Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics A Sumo Logic White Paper Executive Summary The huge volume of log data generated by today s enterprises

More information

Customer Evaluation Report On Incident.MOOG

Customer Evaluation Report On Incident.MOOG WHITE PAPER Customer Evaluation Report On Incident.MOOG (Real Data Provided by a Fortune 100 Company) For information about Moogsoft and Incident.MOOG, visit www.moogsoft.com. http://moogsoft.com 2011-2015

More information

Taming Microsoft Environments with HP SiteScope Exchange and Active Directory Solution Templates

Taming Microsoft Environments with HP SiteScope Exchange and Active Directory Solution Templates Taming Microsoft Environments with HP SiteScope Exchange and Active Directory Solution Templates Quick and economical troubleshooting and performance management for Microsoft environments Business white

More information

Operations Management for Virtual and Cloud Infrastructures: A Best Practices Guide

Operations Management for Virtual and Cloud Infrastructures: A Best Practices Guide Operations Management for Virtual and Cloud Infrastructures: A Best Practices Guide Introduction Performance Management: Holistic Visibility and Awareness Over the last ten years, virtualization has become

More information

Real-time hybrid analysis:

Real-time hybrid analysis: Real-time hybrid : Find more, fix faster Technology white paper Brian Chess, Ph.D., Distinguished Technologist, HP Founder and Chief Scientist, HP Fortify Summary Real-time hybrid marks a substantial evolution

More information

Predictive Analytics for APM. Neil MacGowan Technical Director Netuitive Europe 18 April 2013

Predictive Analytics for APM. Neil MacGowan Technical Director Netuitive Europe 18 April 2013 Predictive Analytics for APM Neil MacGowan Technical Director Netuitive Europe 18 April 2013 World-Class Customer Base, including Financial Services Media Telecom E-Commerce Industrials Energy, Others

More information

10 Best Practices for Application Performance Testing

10 Best Practices for Application Performance Testing Business white paper 10 Best Practices for Application Performance Testing Leveraging Agile Performance Testing for Web and Mobile Applications 10 Best Practices for Application Performance Testing Table

More information

Users. Extending Visibility Across Your TIBCO Infrastructure and Beyond

Users. Extending Visibility Across Your TIBCO Infrastructure and Beyond White Paper Application Performance Management (APM) for TIBCO Users Extending Visibility Across Your TIBCO Infrastructure and Beyond Publication Date: October 2008 Abstract: TIBCO users may wish to expand

More information

Service Automation to implement and operate your Cloud initiatives

Service Automation to implement and operate your Cloud initiatives Service Automation to implement and operate your Cloud initiatives Pierre AESCHLIMANN Principal Solution Consultant (EMEA Global Accounts) BMC Software ! Request, change, and support business services!

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

The CMDB: The Brain Behind IT Business Value

The CMDB: The Brain Behind IT Business Value Thought Leadership white paper The CMDB: The Brain Behind IT Business Value By Gerry Roy, Director of Solutions Management for BMC Atrium and BMC Service Support, BMC Software TABLE OF CONTENTS Executive

More information

Intelligent Operations Management from Applications to Storage. VMware vrealize Operations

Intelligent Operations Management from Applications to Storage. VMware vrealize Operations Intelligent Operations Management from Applications to Storage VMware vrealize Operations KEY HIGHLIGHTS VMware vrealize Operations delivers intelligent operations management with application to storage

More information

BSM120 Application Performance Management 9.x Essentials

BSM120 Application Performance Management 9.x Essentials BSM120 Application Performance Management 9.x Essentials Overview This entry-level, instructor-led classroom training offers technical personnel, who are new to Business Service Management (BSM) 9.0, 9.1or

More information

For Infrastructure & Operations Professionals

For Infrastructure & Operations Professionals Case Study: AMERICAN SYSTEMS Demonstrates The Value Of Business Service Management From Reactive To Proactive: Using Service Management To Leverage Integrated Event Correlation Executive Summary by Evelyn

More information

Solution White Paper Boosting Digital Transformation BMC vs. HP

Solution White Paper Boosting Digital Transformation BMC vs. HP Solution White Paper Boosting Digital Transformation BMC vs. HP A head-to-head comparison between BMC and HP on capabilities designed to speed up digital business Table of Contents 1 EXECUTIVE SUMMARY

More information

HP OpenView Application Readiness Program Data sheet

HP OpenView Application Readiness Program Data sheet HP OpenView Application Readiness Program Data sheet The HP OpenView Application Readiness Program enables implementation partners (HP consulting, value-added resellers and system integrators) to leverage

More information

HP SOA Systinet software

HP SOA Systinet software HP SOA Systinet software Govern the Lifecycle of SOA-based Applications Complete Lifecycle Governance: Accelerate application modernization and gain IT agility through more rapid and consistent SOA adoption

More information

HP Intelligent Management Center Standard Software Platform

HP Intelligent Management Center Standard Software Platform Data sheet HP Intelligent Management Center Standard Software Platform Key features Highly flexible and scalable deployment Powerful administration control Rich resource management Detailed performance

More information

Introducing SAP s Landscape and Data Center Innovation Platform. Phil Jackson SAP Solution Engineer

Introducing SAP s Landscape and Data Center Innovation Platform. Phil Jackson SAP Solution Engineer Introducing SAP s Landscape and Data Center Innovation Platform Phil Jackson SAP Solution Engineer CIO challenges Business Agility & Innovation Business Continuity Cost Containment Hybrid On-premise, Virtual

More information

HP Client Manager 6.2

HP Client Manager 6.2 HP Client Manager 6.2 Introduction... 2 New Features in HPCM 6.2... 4 Understanding how HPCM works... 5 Extensive reporting capability... 5 HPCM in operation... 6 Client inventory... 6 Health monitoring...

More information

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper BRIDGE the gaps between IT, cloud service providers, and the business. IT service management for the cloud Business white paper Executive summary Today, with more and more cloud services materializing,

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

HP Business Service Management

HP Business Service Management HP Business Service Management Managing today's dynamic environments to meet the needs of your demanding business Technical white paper Table of contents Executive summary... 2 Customer successes... 2

More information

Quantifying the Value of Investments in HP Cloud Service Automation. An ROI White Paper

Quantifying the Value of Investments in HP Cloud Service Automation. An ROI White Paper Quantifying the Value of Investments in HP Cloud Service Automation An ROI White Paper Table of contents Executive overview... 3 Benefit categories... 3 Effective Cloud Service Automation: Managing the

More information

HP OpenView Service Level Manager 5.0 software

HP OpenView Service Level Manager 5.0 software HP OpenView Service Level Manager 5.0 software Data sheet Meet the challenge of running IT as a business with HP OpenView Service Level Manager 5.0. This module of the HP OpenView Service Desk 5.0 a second-generation

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

HP OpenView Smart Plug-in for Microsoft Exchange

HP OpenView Smart Plug-in for Microsoft Exchange HP OpenView Smart Plug-in for Microsoft Exchange Data sheet Email is no longer just a productivity application - it is a company s lifeline. When email slows down or stops altogether, the business loses

More information

A Guide Through the BPM Maze

A Guide Through the BPM Maze A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM

More information

HP PCM Plus v4 Network Management Software Series

HP PCM Plus v4 Network Management Software Series HP PCM Plus v4 Network Management Software Series Data sheet Product overview HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network

More information

AccelOps for Managed Service Providers

AccelOps for Managed Service Providers SOLUTION BRIEF AccelOps for Managed Service Providers Integrated Cloud Security, Performance and Availability Monitoring for MSPs The Challenge MSP Benefits: Integrated platform to monitor Performance,

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

Bridge Development and Operations for faster delivery of applications

Bridge Development and Operations for faster delivery of applications Technical white paper Bridge Development and Operations for faster delivery of applications HP Continuous Delivery Automation software Table of contents Application lifecycle in the current business scenario

More information