SlideShare a Scribd company logo
1 of 24
Download to read offline
IBM Global Technology Services
December 2009




                                 Gaining efficiency and business value
                                 through effective management of your
                                 IT infrastructure
                                 Eight challenges to overcome for optimal service
                                 delivery and cost savings
Gaining efficiency and business value through effective management of your IT infrastructure
Page 2




                                                                                       Table of Contents


                  Introduction
                  Understand key challenges of infrastructure management ....................................................                                                                    3
                  Plan for effective infrastructure management ..................................................................................                                                6
                        Detecting and handling incidents and problems .....................................................................................                                      7
                        Handling changes with minimal impact on availability..........................................................................                                           7
                        Preventing security problems .........................................................................................................................                   8
                        Using emerging or challenging technologies effectively ......................................................................                                            9
                        Maintaining server software and firmware .................................................................................................                                9
                        Having indicators of status and trends for specific infrastructure activities .................................                                                           10
                        Having the right tools for the job ..................................................................................................................                    10
                        Deploying infrastructure and tools rapidly with a proper level of ongoing management .........                                                                           16
                  Focus on service areas of growing importance ..............................................................................                                                    17
                  Consider outsourcing and managed services ..................................................................................                                                   18
                  Summary ....................................................................................................................................................................   18
                  Infrastructure management checklist ....................................................................................................                                       19
Gaining efficiency and business value through effective management of your IT infrastructure
Page 3




                 Introduction
                 Managing today’s complex server environments, networks and IT infrastructures is challenging. Most
                 organizations have tools and disciplines in place to provide basic availability management including
                 hardware and software monitoring capabilities. However, your staff may not have the skills or time to
                 support and implement notification handling, performance and capacity management, security
                 management, configuration management and automation. With the pressure to do more with less,
                 how can you balance the need to drive down costs and also improve delivery of system administration,
                 information access, remote access and problem and change management?

                 This paper surveys the challenges and solutions for effective management of your server infrastructures and
                 network devices. We discuss important disciplines such as availability management and the tools you need
                 to support a complex IT environment. Use of outsourcing and managed services is demonstrated as a
                 strategic way to drive efficiency and create business value. You may choose to use this paper as a tool or
                 checklist to evaluate and improve your in-house handling of infrastructure management or to evaluate
                 potential services providers.


                 Understand key challenges of infrastructure management
                 An infrastructure typically consists of a broadly heterogeneous collection of elements such as servers,
                 virtual machines, logical partitions, routers, switches, wireless appliances, disks, processors, operating
                 systems, middleware and database instances, and batch jobs. All of these elements can be mapped,
                 more or less, into a simple framework as shown in Figure 1.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 4




                                                   Applications, services



                                                              Middleware



                                                       Operating system
                                                                                                     Platform

                                            Computer and network hardware

                 Figure 1. Software and hardware service layers in distributed systems.



                 The management of your distributed and complex IT infrastructure is often a significant portion of your
                 total cost of ownership. Getting costs under control while also meeting your service-level commitments
                 requires a focus on the following eight areas of infrastructure management challenges:

                 Detecting and handling incidents and problems: Incidents and problems are a way of life for systems that
                 involve hardware, software and people. Detecting and handling problems effectively is simply not easy.
                 Handling problems requires discipline, imagination and experience.

                 Handling changes with minimal impact on availability: Change is frequently required in today’s highly
                 complex systems. Dealing with change while striving for minimum downtime requires a variety of skills.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 5




                 Preventing security problems: Security challenges are ongoing and constantly changing. Your management
                 solution should incorporate plans to address the threats to your systems and information in the form of
                 both Web-based attacks and hackers.

                 Using emerging or challenging technologies effectively: New technologies hold great promise for businesses
                 by enabling cost reductions and flexibility. Even so, the benefits from these technologies can be elusive due
                 to the learning curve that users face in understanding them and effectively dealing with their complexity.

                 Maintaining server software and firmware: Applying emergency security fixes or even routine software
                 changes can be a daunting task for your staff. To avoid negative impacts on your application availability
                 and performance requires planning and careful execution, including provisions for backing out failed
                 updates.

                 Having indicators of status and trends for specific infrastructure and activities: Information on the status of
                 systems and applications is important in infrastructure management, especially in problem situations. This
                 information is also needed for capacity planning. However, obtaining and analyzing operational and trend
                 information is time consuming and complex.

                 Having the right tools for the job: There are many tools, from commercial products to home-grown tools,
                 which can be used to manage IT infrastructures. Having just the right toolset for your environment
                 requires balancing human aspects, types of tools, number of tools, level of integration and secure use. Lack
                 of such balance reflects itself in ineffective support for business goals or unduly high software or staff
                 operations costs.

                 Deploying infrastructure and tools rapidly with the proper level of ongoing management: The fast pace of
                 change in today’s business environment requires the need to rapidly deploy systems and the tools to
                 provide ongoing support, especially for the mission-critical components of your IT infrastructure. These
                 activities can be routine, but are important for meeting service-level commitments and supporting new
                 business initiatives.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 6




                 Plan for effective infrastructure management
                 As you evaluate your current infrastructure management capabilities and consider outsourcing and
                 managed services providers, focus on solutions that address the above key challenges. A focus on value
                 should shape your goals, with cost and complexity playing a major factor in your evaluation and
                 consideration. With this focus, you can then determine the best approach to achieving your goals in the
                 context of specific tactics, as shown in Figure 2.



                                                                 Cost and complexity




                                                                                                        Context
                                                            Goals                        Tactics
                                                      What are we                         What can
                                                       trying to                          we do to
                                       Value




                                                       achieve?                          achieve it?




                                                                   Business alignment
                 Figure 2. Strategy framework for an effective IT management solution.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 7




                 Based on this framework, consider the following recommendations for solutions to address the eight key
                 challenges we have previously identified:

                 Detecting and handling incidents and problems
                 In addressing this challenge, the goal should be to provide robust incident and problem handling, resulting
                 in the smoothest possible operation. If possible, this solution should use preemptive actions to prevent
                 failures.

                 The proven tactics to achieve this goal include proactive and passive monitoring to detect incidents and
                 problems. Using technology to automatically handle incidents, open problem records and assign priority is
                 also important to reduce labor costs. The use of innovative tools to anticipate and correct problems before
                 they occur is another labor-saving approach. It is also useful to provide automated software support that
                 makes it easier for a system administrator to resolve incidents and problems. Assigning support personnel
                 based on the severity of the incident or problem to improve response time is a proven way to prioritize
                 work in conjunction with using a service-level agreement (SLA). An example SLA is one that has the goal
                 of resolving 90 percent of Severity 1 problems in under four hours. Following rigorous problem handling
                 and management steps to ensure effective problem resolution is also important. So is involving a
                 specialized service manager and a multidisciplinary team.

                 The business value of effective detection and handling of incidents and problems is reflected in
                 higher availability of IT resources, resulting in infrastructure and applications that function better for
                 the company.

                 Handling changes with minimal impact on availability
                 In addressing this challenge, the goal should be to manage change in a manner that results in highly
                 predictable outcomes.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 8




                 To achieve this goal, one proven tactic is to have the team participate at least weekly in change-
                 management planning. Prepare for change by planning activities and estimating the time required. Test
                 changes prior to their implementation and prepare backout activities in the event of a failed change to
                 restore the system to its previous condition. Using a skilled change manager to benefit from experience of
                 successful and failed changes is a proven way to improve the quality of change success.

                 As shown in the previous example, the business value of handling changes with minimal impact on
                 availability is reflected in higher availability of IT resources, resulting in systems and applications that
                 function better for the company.

                 Preventing security problems
                 In addressing this challenge, the goal should be services and support that effectively manage security risk
                 while maintaining the necessary business agility.

                 To achieve this goal, one proven tactic is to use information security controls based on an industry
                 standard and explain them in a living document. Implement key security variables such as password length
                 and update frequency early in the process and perform security remediation as required for servers and
                 other devices to refresh and update your security posture. Look for security exposures during the ongoing
                 support period. For a closed-end process, specify the frequency of these analyses with monthly reporting on
                 key security attributes and activities related to servers and other devices.

                 The business value of preventing security problems is the reduced financial risk associated with
                 security breaches.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 9




                 Using emerging or challenging technologies effectively
                 In addressing this challenge, the goal should be a focus on emerging and challenging technologies such as
                 virtualization and high availability configurations, resulting in sustained benefits from the use of this
                 technology. Virtualization provides flexibility to achieve rapid change and high utilization of your existing
                 IT resources. High availability technology supports business resiliency and your requirements for
                 continuous application availability.

                 To achieve this goal, one of the proven tactics is to focus on skills support for virtual machines and logical
                 partitions, using change windows to make dynamic changes to production servers—like adding processor or
                 memory resources to an image. Develop the skills of your staff in a variety of high availability software,
                 including MC/ServiceGuard, IBM HACMP™, Linux® HA or Red Hat Cluster Suite, Microsoft® Cluster
                 Services, Sun Cluster or Veritas Cluster Services and VMware HA.

                 The business value of using these technologies includes lower costs, higher application availability and
                 improved business flexibility as compared to obsolete technology approaches.

                 Maintaining server software and firmware
                 In addressing this challenge, the goal should be a balanced collection of proactive and reactive activities
                 supported by effective software products and tools.

                 To achieve this goal, one of the proven tactics is to proactively monitor servers as well as to use monitoring
                 software. Startup tasks may involve refreshing operating system processes, establishing startup sequences
                 and changing priorities as appropriate. Other server support activities involve a range of activities including
                 patching, configuration and log file maintenance, using remote tools to perform operational procedures,
                 server security activities for identity and access and support for virtualization software.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 10




                 The business value of server monitoring and management is a more reliable server operation that
                 proactively monitors systems, resulting in higher availability through early detection of incidents and
                 problems. In addition, comprehensive management results in fewer software incompatibility issues. Finally,
                 remaining current with software patches and levels ensures support is available when necessary for the
                 software supplier.

                 Having indicators of status and trends for specific infrastructure and activities
                 In addressing this challenge, the goal should be a dynamic reporting capability as well as monthly reports
                 that provide a good way to understand the activities and performance of the service. An operational or
                 business dashboard is also useful if you can justify the high cost of information integration.

                 To achieve this goal, one of the proven tactics is to post reports on a portal for easy access. Also, make use
                 of tools that focus on server resource management and generate performance and capacity reports to help
                 you analyze trends. It is also important to generate and post reports that focus on security management.
                 A portal can also be used to enter problem records and change notifications while also providing links to
                 other needed tools, portlets and services that support ongoing activities.

                 The business value of useful reporting is to provide feedback on the effectiveness of the service that is
                 being provided and to report on elements that may have been missed during the daily operation. An
                 example is servers with out-of-date signature or antivirus files. Dynamic reporting is also useful to support
                 functional disciplines such as performance and capacity management.

                 Having the right tools for the job
                 In addressing this challenge, the goal should be to use mature tools and processes that deliver optimal
                 service and support your SLAs.

                 To achieve this goal, the proven tactics include the use of tools that support disciplines or activities that
                 need to be carried out, such as the following.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 11




                 Availability management
                 The focus of basic availability management is determining the up or down status of a device or resource.
                 An example of a tool that supports this capability is IBM Tivoli® NetView®, which provides basic
                 availability monitoring as well as smart logic to minimize the occurrence of false alerts. The logic performs
                 multiple checks to determine if a device is truly unavailable.

                 Hardware monitoring
                 The purpose of hardware monitoring is to pay special attention to system events that affect hardware.
                 These events might include power failure, tampering, temperature changes and voltage irregularities.
                 IBM Systems Director is an effective tool for both hardware monitoring and software monitoring of
                 server resources.

                 Software monitoring
                 Software monitoring of server resources is aimed at periodically querying key system elements to determine
                 irregularities, if any. The presence of these incidents, even if intermittent, usually indicates a loss of IT
                 service quality. Monitored system elements include processor workload, processor status, processor
                 consumption and system thrashing. IBM Tivoli Monitoring is a tool that makes such monitoring possible.

                 Notification handling
                 Notification handling aims at informing a systems administrator that an event has occurred or a threshold
                 has been exceeded. The notification can take a number of forms—e-mail, short message or page text.
                 TelAlert from NSAi is an example of a tool that can be used in this manner to notify teams or individuals
                 of problems.

                 Performance and capacity management
                 Performance and capacity management involves the gathering of and reporting on data that is specifically
                 focused on the performance characteristics of devices and their capacity over time. An IBM proprietary
                 tool called Server Resource Management (SRM), for instance, is a valuable tool to assist with server
                 performance and capacity trend analysis. Figure 3 shows a sample performance report from SRM on
                 virtualized partitions.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 12




                 Figure 3. Performance report on virtualized partitions.



                 Security management
                 The focus of security management is both internal and external. Three important areas for security are
                 within a local system, among distributed processes and in data and over networks and communications.

                 Examples of security management tools are Fusion, an internal IBM security compliance tool, and
                 IBM Vulnerability Management Service, a comprehensive program designed to help organizations
                 implement the tools, methodologies and best practices required to address today’s dynamic vulnerability
                 landscape. Fusion helps improve efficiency through centralized server management. Some Fusion functions
                 are operating system security patch management, antivirus status checking, security log management,
                 compliance checking and workflow remediation, systematic attack detection and server information. IBM’s
                 delivery compliance administration support team uses Fusion as well as other tools to help manage
                 efficient server security-audit compliance based on the contracted security policy and Operating System
                 Authorized Program Analysis Reports (OS APAR).

                 IBM Vulnerability Management Service analyzes your IT infrastructure through the following processes:

                 ●     Vulnerability discovery
                 ●     Prioritization of assets
                 ●     Delegation of remediation tasks
                 ●     Dynamic protection
                 ●     Verification
                 ●     Customized reporting
Gaining efficiency and business value through effective management of your IT infrastructure
Page 13




                 Configuration management
                 The focus of configuration management is to identify, capture, organize and maintain configuration
                 information for use by other processes. A key challenge associated with configuration management is
                 supporting the dynamic nature of systems, networks and applications.

                 Configuration tools vary greatly in scope—from keeping a basic inventory of the items to utilizing a full
                 data model that employs dynamic discovery capabilities. One such tool is the IBM internal Configuration
                 Management Integrator, which uses a configuration management database to maintain configuration
                 information about supported features and devices.

                 System administration
                 The focus of system administration is to perform tasks that support devices, especially servers. The system
                 administrator installs and maintains software products and tools, patches software and performs problem
                 determination, participates in change-management activities and supports application programmers as
                 necessary—in short, performs most activities associated with keeping servers up and running. An example
                 of a system administrator tool is Service Delivery Portal (SDP), which is an IBM internal, Web-based
                 information integration platform for server system administrators. SDP consolidates operational data from
                 client environments. SDP is a single dashboard that standardizes and simplifies the user interface,
                 achieving centralized and consistent execution of tasks.

                 Information access
                 The aim of information access is to provide easy access to reports, an operational dashboard and tools
                 and related subsystems. Information access is important because it can serve as a window into the
                 infrastructure management service.

                 Typically, access to information is provided by way of a portal. IBM Services Connection, as shown in
                 Figure 4, is a primary interface for organizations to access reports and tools. It also supports information
                 access for IBM Remote Managed Infrastructure Services.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 14




                 Figure 4. IBM’s Services Connection Web portal for IBM Remote Managed Infrastructure Services.



                 Automation
                 The automation functional perspective, or discipline, is complex to describe, because it is both a
                 standalone function and one that is embedded in other functional perspectives, such as operations and
                 problems. For example, Parity is an IBM internal tool that is used to proactively and automatically solve
                 problems. Parity checks when a process or communication of a software client is not working properly. If
                 the process is not working due to a dependent component on a different client, Parity uses known recovery
                 methods to restore the functionality of the dependent client.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 15




                 EnVision, another IBM internal automation tool, can automatically open problem records for access and
                 handling. Developed by an IBM team responsible for enterprise systems management (ESM) tools
                 integration, the EnVision tool is a single sign-on, front-end Web portal to access and manage multiple
                 problem management systems. Near-real-time information from disparate systems is organized and
                 consolidated into a centralized Web portal for easy access and manageability. The EnVision integration tool
                 collectively organizes problem tickets, details, priorities and statuses from multiple problem management
                 systems into a single-access Web portal.

                 Remote access
                 Remote access tools such as RemotelyAnywhere by LogMeIn and OpenSSH, an open source tool for secure
                 access, can assist with reaching infrastructure elements such as servers in a secure and productive manner.
                 OpenSSH is integrated into base systems such as OpenBSD, FreeBSD, BSDi BSD/OS, NetBSD,
                 Computone, Stallion, Cygwin, e-smith server and gateway, Mac OS X Version 10.1, HP Procurve Switch
                 4108GL 2524/2512, IBM AIX®, and SunSHH in Sun Solaris 9.

                 Problem and change management
                 Managing problems is important because users expect timely correction and resolution. Change
                 management is closely linked to problem management because change can introduce risk to the stability of
                 your systems environment. An important consideration for change management is the need for written
                 backout procedures and a process to reduce the risks of failed changes.

                 ManageNow, another internal IBM Web-based tool, supports problem and change management and uses
                 enterprise systems management to store and manage problem and change information.

                 The business value of having the right tools is measured in terms of the effectiveness of the service at a
                 manageable and sustainable cost. Table 1 summarizes all the tools listed in this section, organized by
                 activity or discipline.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 16




                  Table 1. Tools in context

                  Activity or discipline                               Tool example

                  Basic availability management                        NetView

                  Hardware monitoring                                  IBM Director

                  Software monitoring of resources                     IBM Tivoli Monitoring

                  Notification handling                                 TelAlert

                  Performance and capacity management                  Server Resource Management (SRM)

                  Security management                                  Fusion

                  Configuration management                              Configuration Management Integrator

                  System administration                                Service Delivery Portal and Knowledge Base

                  Information access                                   IBM Services Connection

                  Automation                                           Parity and EnVision

                  Remote access                                        RemotelyAnywhere and Open SSH

                  Problem and change management                        ManageNow and enterprise systems management



                  Deploying infrastructure and tools rapidly with a proper level of ongoing management
                  In addressing this challenge, the goal should be rapid deployment through pre-engineered and solid
                  ongoing support using a service manager.

                  The proven tactics for deployment to achieve this goal include using a model project plan that is based on
                  prebuilt components with a project manager to ensure that your deployment goes smoothly. A delivery
                  architect—a specialized role—helps to serve as a technical complement to the project manager.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 17




                  The proven tactics for ongoing support are to use well-defined ongoing support activities using desk
                  procedures to help provide your enterprise with an optimum degree of ongoing management. While a
                  specialized service delivery manager can help ensure that the ongoing support goes smoothly, you could
                  also consider using other specialized roles, such as security specialists, change managers and duty
                  managers.

                  The business value of deploying infrastructure with a proper level of ongoing management is more rapid
                  deployment (time value of money) and more reliable and predictable outcomes.


                  Focus on service areas of growing importance
                  Three areas of growing importance include batch processing, backup and restore, and middleware and
                  database support services.

                  Batch processing

                  Planned, batch workloads are growing in significance in midrange systems. It is important to handle this
                  workload in a planned fashion using an automated tool. This way, as batch windows decrease in duration,
                  you can plan for and automate batch workloads.

                  Backup and restore

                  Backup and restore, like batch processing, is an instance of a time-critical service that is subject to a
                  shrinking or nearly nonexistent time window. Make the best use of backup windows by using technology to
                  leverage automated approaches. Also, use backup-while-active when possible. For a rapid restore of the
                  operating system and environment in the event of a disk failure, backups should be independent of
                  incremental copies.

                  Middleware and database support services

                  With the dominance of databases and middleware, managed services providers have begun offering support
                  for products in this category. Middleware and database services are not new, but extensive adoption by
                  companies worldwide is making them more relevant.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 18




                 The business value of middleware and database support services is help with the daily activities of software
                 management as well as the skill of experienced personnel who come along with the service. This results in
                 the ability to better deploy existing support personnel, improve handling of problems and changes, and
                 more rapidly deploy new systems and applications.


                 Consider outsourcing and managed services
                 Using outsourcing and managed services is a strategic way to drive efficiency and create business value.
                 These services can offer:

                 ●    Broad and deep skills needed to support a heterogeneous computing environment. It is
                      obviously more difficult for you to employ these skills at an affordable cost.
                 ●    Redeployment of your key human resources to more strategic activities rather than
                      maintaining existing systems. Even as you use service providers to manage your infrastructure, your
                      employees can build the future of your company.
                 ●    Experience with processes and tools. This experience is particularly deep because these providers
                      serve many clients, all of whom look for cost-efficient services.
                 ●    Lower cost for a higher level of service. Economies of scale make significant process improvements
                      more affordable.


                 This is not a comprehensive list of reasons, but a compelling list, all the same for you to seriously consider
                 using an outsourcing or managed services provider.


                 Summary
                 Supporting a dynamic business and resilient IT environment requires effective management of your server
                 infrastructure and network devices. By focusing on the activities or disciplines and tools necessary to carry
                 efficient support and delivery services, you can improve your own management capabilities and evaluate
                 the capabilities of potential outsourcing and managed service providers.
Gaining efficiency and business value through effective management of your IT infrastructure
Page 19




                 Infrastructure management checklist
                 Use the following table as a checklist to help you evaluate your infrastructure management effectiveness.

                 Table 2: Infrastructure management effectiveness checklist

                 Detecting and handling incidents and problems                       Maintaining server software and firmware

                 ●   Monitoring to detect incidents and problems?                    ●   Proactively administering servers as well as using
                 ●   Using technology to automatically handle incidents, open            monitoring software?
                     problem records and assign priority?                            ●   Managing server platform support activities like patching
                 ●   Using tools to anticipate and correct problems before they          and log file maintenance?
                     occur?                                                          ●   Performing server security administration for identity and
                 ●   Providing automated support for system administrator to             access?
                     resolve incidents and problems?                                 ●   Providing specific focus and support for virtualization?
                 ●   Assigning support personnel based on the severity of the        ●   Providing high availability software support including
                     incident or problem?                                                periodic testing?
                 ●   Using Service-level Agreements?
                 ●   Following rigorous problem handling and management
                     steps to ensure effective problem resolution?
                 ●   Utilizing a specialized service manager and a
                     multidisciplinary team as needed?

                 Handling changes with minimal impact on availability                Having inflexible indicators of status and trends for specific
                                                                                     infrastructure and activities

                 ●   Implementing team participation in change-management            ●   Posting reports on a portal for easy access?
                     planning?                                                       ●   Providing tools that focus on server resource management
                 ●   Preparing for change by planning activities and estimating          and generate performance and capacity reports to analyze
                     time required?                                                      trends and manage security?
                 ●   Testing changes prior to their implementation and               ●   Setting up a portal to enter problem records and change
                     preparing backout activities in the event of a failed change?       notifications?
                 ●   Using a skilled change manager to benefit from experience        ●   Providing links to other needed tools, portlets and services
                     of previous changes?                                                that support ongoing activities?
Gaining efficiency and business value through effective management of your IT infrastructure
Page 20




                  Preventing security problems                                            Having precise tools for the job

                  ●   Using information security controls based on an industry            ●   Support for availability management?
                      standard?                                                           ●   Hardware monitoring?
                  ●   Implementing key security variables such as password                ●   Software monitoring of key computer resources?
                      length and update frequency early in the process?                   ●   Flexible notification handling?
                  ●   Performing security remediation as required for servers and         ●   Support for performance and capacity management?
                      other devices?                                                      ●   Support for security management?
                  ●   Looking for security exposures during the ongoing support           ●   Support for configuration management?
                      period and specifying the frequency of these analyses?              ●   Support for system administration?
                  ●   Reporting monthly on key security attributes and activities         ●   Easy access to information?
                      related to servers and other devices?                               ●   Automation of routine processes?
                                                                                          ●   Standardized remote access?
                                                                                          ●   Support for problem and change management?

                  Using emerging or challenging technologies effectively                  Deploying infrastructure and tools rapidly

                  ●   Focusing on skills support for virtual machines and logical         ●   Use of a model project plan that is based on prebuilt
                      partitions?                                                             components?
                  ●   Using change windows to make dynamic changes to                     ●   Use of a project manager to ensure that your deployment
                      production servers?                                                     goes smoothly?
                  ●   Developing skills in a variety of high availability software like   ●   Use of a delivery architect?
                      IBM HACMP and VMware HA?
                                                                                          Proper level of ongoing management

                                                                                          ●   Well-defined ongoing support activities using desk
                                                                                              procedures?
                                                                                          ●   Use of a service delivery manager?
                                                                                          ●   Use of security specialists, change managers and duty
                                                                                              managers?

                                                                                          Focusing on service areas of growing importance

                                                                                          ●   Use of planned batch processing?
                                                                                          ●   Use of technology to make best use of backup windows?
                                                                                          ●   Specialized support for middleware and database?
Notes
Notes
Notes
For more information                                                            © Copyright IBM Corporation 2009
                                                                                  IBM Global Services
To learn more about IBM Remote Managed Infrastructure Services, please            Route 100
                                                                                  Somers, NY 10589
contact your IBM marketing representative or IBM Business Partner, or visit
                                                                                  U.S.A.
the following Web site: ibm.com/services/server                                   Produced in the United States of America
                                                                                  December 2009
Dr. Joseph Gulla is an Executive IT Specialist for IBM working as a senior        All Rights Reserved
member of the System Services Center of Excellence. His projects include          IBM, the IBM logo and ibm.com are trademarks
                                                                                  or registered trademarks of International
architecture of managed services and hosting services in Europe and Asia.         Business Machines Corporation in the United
Dr. Gulla is also a faculty member of the Nova Southeastern University where      States, other countries, or both. If these and
                                                                                  other IBM trademarked terms are marked on
he teaches distributed computing, enterprise architecture and systems             their first occurrence in this information with a
development process. He has published and presented over 60 papers and            trademark symbol (® or ™), these symbols
                                                                                  indicate U.S. registered or common law
presentations in a wide variety of forums, including the Technical Leadership     trademarks owned by IBM at the time this
Exchange (TLE), the High Availability “Best Practices” Topical Conference,        information was published. Such trademarks
                                                                                  may also be registered or common law
Internet Society Conference (INet), Professional Leadership Technical             trademarks in other countries. A current list of
Exchange (PLTE), Planet Tivoli, Enterprise Systems Management Share Net,          IBM trademarks is available on the Web at
                                                                                  “Copyright and trademark information” at
IBM Security Seminars and the Northeast Information Systems Users Group           ibm.com/legal/copytrade.shtml
(NEISUG). His publications include Design and Implementation of a                 Linux is a registered trademark of Linus Torvalds
Prototype Toolset for Full Life-Cycle Management of Web-Based Applications,       in the United States, other countries, or both.
                                                                                  Microsoft is a trademark of Microsoft
published as an IBM technical report in 2003.                                     Corporation in the United States, other
                                                                                  countries, or both.
                                                                                  Other product, company or service names may
                                                                                  be trademarks or service marks of others.
                                                                                  Use of the information herein is at the recipient’s
                                                                                  own risk. Information herein may be changed or
                                                                                  updated without notice. IBM may also make
                                                                                  improvements and/or changes in the products
                                                                                  and/or the programs described herein at any
                                                                                  time without notice. References in this
                                                                                  publication to IBM products or services do not
                                                                                  imply that IBM intends to make them available in
                                                                                  all countries in which IBM operates.




                                                                                  SSW03005-USEN-00

More Related Content

Viewers also liked

Proyecto final
Proyecto finalProyecto final
Proyecto finalPOCOPICO
 
Revista digital Nuevo Milenio
Revista digital Nuevo MilenioRevista digital Nuevo Milenio
Revista digital Nuevo MilenioSilvia Ruiz
 
Smart growth principles combined with fuzzy ahp and dea approach to the trans...
Smart growth principles combined with fuzzy ahp and dea approach to the trans...Smart growth principles combined with fuzzy ahp and dea approach to the trans...
Smart growth principles combined with fuzzy ahp and dea approach to the trans...Alexander Decker
 
Storyboard
StoryboardStoryboard
Storyboardgruni99
 
Analysis and Design of Conventional Controller for Speed Control of DC Motor ...
Analysis and Design of Conventional Controller for Speed Control of DC Motor ...Analysis and Design of Conventional Controller for Speed Control of DC Motor ...
Analysis and Design of Conventional Controller for Speed Control of DC Motor ...IJERA Editor
 
Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...
Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...
Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...Diana Matiz Arenas
 
Ravi project
Ravi projectRavi project
Ravi projectgary6h
 
What is postcolonial_literature_
What is postcolonial_literature_What is postcolonial_literature_
What is postcolonial_literature_Pato_Ch
 
Contexto de-formación
Contexto de-formaciónContexto de-formación
Contexto de-formacióncidelahoz
 
Streatham High Surgery - Outstanding CQC Inspection Nov 2014
Streatham High Surgery - Outstanding CQC Inspection Nov 2014Streatham High Surgery - Outstanding CQC Inspection Nov 2014
Streatham High Surgery - Outstanding CQC Inspection Nov 2014omarudin
 

Viewers also liked (15)

Proyecto final
Proyecto finalProyecto final
Proyecto final
 
Revista digital Nuevo Milenio
Revista digital Nuevo MilenioRevista digital Nuevo Milenio
Revista digital Nuevo Milenio
 
Smart growth principles combined with fuzzy ahp and dea approach to the trans...
Smart growth principles combined with fuzzy ahp and dea approach to the trans...Smart growth principles combined with fuzzy ahp and dea approach to the trans...
Smart growth principles combined with fuzzy ahp and dea approach to the trans...
 
Storyboard
StoryboardStoryboard
Storyboard
 
Analysis and Design of Conventional Controller for Speed Control of DC Motor ...
Analysis and Design of Conventional Controller for Speed Control of DC Motor ...Analysis and Design of Conventional Controller for Speed Control of DC Motor ...
Analysis and Design of Conventional Controller for Speed Control of DC Motor ...
 
cd-2-Batch id-33
cd-2-Batch id-33cd-2-Batch id-33
cd-2-Batch id-33
 
Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...
Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...
Act.5 feminismo grupo 6 diana matiz-leidy matiz-mireya mogollon-sandra lozano...
 
Ravi project
Ravi projectRavi project
Ravi project
 
What is postcolonial_literature_
What is postcolonial_literature_What is postcolonial_literature_
What is postcolonial_literature_
 
Sony Corp
Sony CorpSony Corp
Sony Corp
 
Biology the lesson of the kaibab
Biology the lesson of the kaibabBiology the lesson of the kaibab
Biology the lesson of the kaibab
 
Contexto de-formación
Contexto de-formaciónContexto de-formación
Contexto de-formación
 
Ctsv Iii
Ctsv IiiCtsv Iii
Ctsv Iii
 
Streatham High Surgery - Outstanding CQC Inspection Nov 2014
Streatham High Surgery - Outstanding CQC Inspection Nov 2014Streatham High Surgery - Outstanding CQC Inspection Nov 2014
Streatham High Surgery - Outstanding CQC Inspection Nov 2014
 
Anemia in pregnancy
Anemia in pregnancyAnemia in pregnancy
Anemia in pregnancy
 

More from IBM India Smarter Computing

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments IBM India Smarter Computing
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...IBM India Smarter Computing
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceIBM India Smarter Computing
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM India Smarter Computing
 

More from IBM India Smarter Computing (20)

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Gaining Efficiency And Business Value Through Effective Management Of Your IT Infrastructure

  • 1. IBM Global Technology Services December 2009 Gaining efficiency and business value through effective management of your IT infrastructure Eight challenges to overcome for optimal service delivery and cost savings
  • 2. Gaining efficiency and business value through effective management of your IT infrastructure Page 2 Table of Contents Introduction Understand key challenges of infrastructure management .................................................... 3 Plan for effective infrastructure management .................................................................................. 6 Detecting and handling incidents and problems ..................................................................................... 7 Handling changes with minimal impact on availability.......................................................................... 7 Preventing security problems ......................................................................................................................... 8 Using emerging or challenging technologies effectively ...................................................................... 9 Maintaining server software and firmware ................................................................................................. 9 Having indicators of status and trends for specific infrastructure activities ................................. 10 Having the right tools for the job .................................................................................................................. 10 Deploying infrastructure and tools rapidly with a proper level of ongoing management ......... 16 Focus on service areas of growing importance .............................................................................. 17 Consider outsourcing and managed services .................................................................................. 18 Summary .................................................................................................................................................................... 18 Infrastructure management checklist .................................................................................................... 19
  • 3. Gaining efficiency and business value through effective management of your IT infrastructure Page 3 Introduction Managing today’s complex server environments, networks and IT infrastructures is challenging. Most organizations have tools and disciplines in place to provide basic availability management including hardware and software monitoring capabilities. However, your staff may not have the skills or time to support and implement notification handling, performance and capacity management, security management, configuration management and automation. With the pressure to do more with less, how can you balance the need to drive down costs and also improve delivery of system administration, information access, remote access and problem and change management? This paper surveys the challenges and solutions for effective management of your server infrastructures and network devices. We discuss important disciplines such as availability management and the tools you need to support a complex IT environment. Use of outsourcing and managed services is demonstrated as a strategic way to drive efficiency and create business value. You may choose to use this paper as a tool or checklist to evaluate and improve your in-house handling of infrastructure management or to evaluate potential services providers. Understand key challenges of infrastructure management An infrastructure typically consists of a broadly heterogeneous collection of elements such as servers, virtual machines, logical partitions, routers, switches, wireless appliances, disks, processors, operating systems, middleware and database instances, and batch jobs. All of these elements can be mapped, more or less, into a simple framework as shown in Figure 1.
  • 4. Gaining efficiency and business value through effective management of your IT infrastructure Page 4 Applications, services Middleware Operating system Platform Computer and network hardware Figure 1. Software and hardware service layers in distributed systems. The management of your distributed and complex IT infrastructure is often a significant portion of your total cost of ownership. Getting costs under control while also meeting your service-level commitments requires a focus on the following eight areas of infrastructure management challenges: Detecting and handling incidents and problems: Incidents and problems are a way of life for systems that involve hardware, software and people. Detecting and handling problems effectively is simply not easy. Handling problems requires discipline, imagination and experience. Handling changes with minimal impact on availability: Change is frequently required in today’s highly complex systems. Dealing with change while striving for minimum downtime requires a variety of skills.
  • 5. Gaining efficiency and business value through effective management of your IT infrastructure Page 5 Preventing security problems: Security challenges are ongoing and constantly changing. Your management solution should incorporate plans to address the threats to your systems and information in the form of both Web-based attacks and hackers. Using emerging or challenging technologies effectively: New technologies hold great promise for businesses by enabling cost reductions and flexibility. Even so, the benefits from these technologies can be elusive due to the learning curve that users face in understanding them and effectively dealing with their complexity. Maintaining server software and firmware: Applying emergency security fixes or even routine software changes can be a daunting task for your staff. To avoid negative impacts on your application availability and performance requires planning and careful execution, including provisions for backing out failed updates. Having indicators of status and trends for specific infrastructure and activities: Information on the status of systems and applications is important in infrastructure management, especially in problem situations. This information is also needed for capacity planning. However, obtaining and analyzing operational and trend information is time consuming and complex. Having the right tools for the job: There are many tools, from commercial products to home-grown tools, which can be used to manage IT infrastructures. Having just the right toolset for your environment requires balancing human aspects, types of tools, number of tools, level of integration and secure use. Lack of such balance reflects itself in ineffective support for business goals or unduly high software or staff operations costs. Deploying infrastructure and tools rapidly with the proper level of ongoing management: The fast pace of change in today’s business environment requires the need to rapidly deploy systems and the tools to provide ongoing support, especially for the mission-critical components of your IT infrastructure. These activities can be routine, but are important for meeting service-level commitments and supporting new business initiatives.
  • 6. Gaining efficiency and business value through effective management of your IT infrastructure Page 6 Plan for effective infrastructure management As you evaluate your current infrastructure management capabilities and consider outsourcing and managed services providers, focus on solutions that address the above key challenges. A focus on value should shape your goals, with cost and complexity playing a major factor in your evaluation and consideration. With this focus, you can then determine the best approach to achieving your goals in the context of specific tactics, as shown in Figure 2. Cost and complexity Context Goals Tactics What are we What can trying to we do to Value achieve? achieve it? Business alignment Figure 2. Strategy framework for an effective IT management solution.
  • 7. Gaining efficiency and business value through effective management of your IT infrastructure Page 7 Based on this framework, consider the following recommendations for solutions to address the eight key challenges we have previously identified: Detecting and handling incidents and problems In addressing this challenge, the goal should be to provide robust incident and problem handling, resulting in the smoothest possible operation. If possible, this solution should use preemptive actions to prevent failures. The proven tactics to achieve this goal include proactive and passive monitoring to detect incidents and problems. Using technology to automatically handle incidents, open problem records and assign priority is also important to reduce labor costs. The use of innovative tools to anticipate and correct problems before they occur is another labor-saving approach. It is also useful to provide automated software support that makes it easier for a system administrator to resolve incidents and problems. Assigning support personnel based on the severity of the incident or problem to improve response time is a proven way to prioritize work in conjunction with using a service-level agreement (SLA). An example SLA is one that has the goal of resolving 90 percent of Severity 1 problems in under four hours. Following rigorous problem handling and management steps to ensure effective problem resolution is also important. So is involving a specialized service manager and a multidisciplinary team. The business value of effective detection and handling of incidents and problems is reflected in higher availability of IT resources, resulting in infrastructure and applications that function better for the company. Handling changes with minimal impact on availability In addressing this challenge, the goal should be to manage change in a manner that results in highly predictable outcomes.
  • 8. Gaining efficiency and business value through effective management of your IT infrastructure Page 8 To achieve this goal, one proven tactic is to have the team participate at least weekly in change- management planning. Prepare for change by planning activities and estimating the time required. Test changes prior to their implementation and prepare backout activities in the event of a failed change to restore the system to its previous condition. Using a skilled change manager to benefit from experience of successful and failed changes is a proven way to improve the quality of change success. As shown in the previous example, the business value of handling changes with minimal impact on availability is reflected in higher availability of IT resources, resulting in systems and applications that function better for the company. Preventing security problems In addressing this challenge, the goal should be services and support that effectively manage security risk while maintaining the necessary business agility. To achieve this goal, one proven tactic is to use information security controls based on an industry standard and explain them in a living document. Implement key security variables such as password length and update frequency early in the process and perform security remediation as required for servers and other devices to refresh and update your security posture. Look for security exposures during the ongoing support period. For a closed-end process, specify the frequency of these analyses with monthly reporting on key security attributes and activities related to servers and other devices. The business value of preventing security problems is the reduced financial risk associated with security breaches.
  • 9. Gaining efficiency and business value through effective management of your IT infrastructure Page 9 Using emerging or challenging technologies effectively In addressing this challenge, the goal should be a focus on emerging and challenging technologies such as virtualization and high availability configurations, resulting in sustained benefits from the use of this technology. Virtualization provides flexibility to achieve rapid change and high utilization of your existing IT resources. High availability technology supports business resiliency and your requirements for continuous application availability. To achieve this goal, one of the proven tactics is to focus on skills support for virtual machines and logical partitions, using change windows to make dynamic changes to production servers—like adding processor or memory resources to an image. Develop the skills of your staff in a variety of high availability software, including MC/ServiceGuard, IBM HACMP™, Linux® HA or Red Hat Cluster Suite, Microsoft® Cluster Services, Sun Cluster or Veritas Cluster Services and VMware HA. The business value of using these technologies includes lower costs, higher application availability and improved business flexibility as compared to obsolete technology approaches. Maintaining server software and firmware In addressing this challenge, the goal should be a balanced collection of proactive and reactive activities supported by effective software products and tools. To achieve this goal, one of the proven tactics is to proactively monitor servers as well as to use monitoring software. Startup tasks may involve refreshing operating system processes, establishing startup sequences and changing priorities as appropriate. Other server support activities involve a range of activities including patching, configuration and log file maintenance, using remote tools to perform operational procedures, server security activities for identity and access and support for virtualization software.
  • 10. Gaining efficiency and business value through effective management of your IT infrastructure Page 10 The business value of server monitoring and management is a more reliable server operation that proactively monitors systems, resulting in higher availability through early detection of incidents and problems. In addition, comprehensive management results in fewer software incompatibility issues. Finally, remaining current with software patches and levels ensures support is available when necessary for the software supplier. Having indicators of status and trends for specific infrastructure and activities In addressing this challenge, the goal should be a dynamic reporting capability as well as monthly reports that provide a good way to understand the activities and performance of the service. An operational or business dashboard is also useful if you can justify the high cost of information integration. To achieve this goal, one of the proven tactics is to post reports on a portal for easy access. Also, make use of tools that focus on server resource management and generate performance and capacity reports to help you analyze trends. It is also important to generate and post reports that focus on security management. A portal can also be used to enter problem records and change notifications while also providing links to other needed tools, portlets and services that support ongoing activities. The business value of useful reporting is to provide feedback on the effectiveness of the service that is being provided and to report on elements that may have been missed during the daily operation. An example is servers with out-of-date signature or antivirus files. Dynamic reporting is also useful to support functional disciplines such as performance and capacity management. Having the right tools for the job In addressing this challenge, the goal should be to use mature tools and processes that deliver optimal service and support your SLAs. To achieve this goal, the proven tactics include the use of tools that support disciplines or activities that need to be carried out, such as the following.
  • 11. Gaining efficiency and business value through effective management of your IT infrastructure Page 11 Availability management The focus of basic availability management is determining the up or down status of a device or resource. An example of a tool that supports this capability is IBM Tivoli® NetView®, which provides basic availability monitoring as well as smart logic to minimize the occurrence of false alerts. The logic performs multiple checks to determine if a device is truly unavailable. Hardware monitoring The purpose of hardware monitoring is to pay special attention to system events that affect hardware. These events might include power failure, tampering, temperature changes and voltage irregularities. IBM Systems Director is an effective tool for both hardware monitoring and software monitoring of server resources. Software monitoring Software monitoring of server resources is aimed at periodically querying key system elements to determine irregularities, if any. The presence of these incidents, even if intermittent, usually indicates a loss of IT service quality. Monitored system elements include processor workload, processor status, processor consumption and system thrashing. IBM Tivoli Monitoring is a tool that makes such monitoring possible. Notification handling Notification handling aims at informing a systems administrator that an event has occurred or a threshold has been exceeded. The notification can take a number of forms—e-mail, short message or page text. TelAlert from NSAi is an example of a tool that can be used in this manner to notify teams or individuals of problems. Performance and capacity management Performance and capacity management involves the gathering of and reporting on data that is specifically focused on the performance characteristics of devices and their capacity over time. An IBM proprietary tool called Server Resource Management (SRM), for instance, is a valuable tool to assist with server performance and capacity trend analysis. Figure 3 shows a sample performance report from SRM on virtualized partitions.
  • 12. Gaining efficiency and business value through effective management of your IT infrastructure Page 12 Figure 3. Performance report on virtualized partitions. Security management The focus of security management is both internal and external. Three important areas for security are within a local system, among distributed processes and in data and over networks and communications. Examples of security management tools are Fusion, an internal IBM security compliance tool, and IBM Vulnerability Management Service, a comprehensive program designed to help organizations implement the tools, methodologies and best practices required to address today’s dynamic vulnerability landscape. Fusion helps improve efficiency through centralized server management. Some Fusion functions are operating system security patch management, antivirus status checking, security log management, compliance checking and workflow remediation, systematic attack detection and server information. IBM’s delivery compliance administration support team uses Fusion as well as other tools to help manage efficient server security-audit compliance based on the contracted security policy and Operating System Authorized Program Analysis Reports (OS APAR). IBM Vulnerability Management Service analyzes your IT infrastructure through the following processes: ● Vulnerability discovery ● Prioritization of assets ● Delegation of remediation tasks ● Dynamic protection ● Verification ● Customized reporting
  • 13. Gaining efficiency and business value through effective management of your IT infrastructure Page 13 Configuration management The focus of configuration management is to identify, capture, organize and maintain configuration information for use by other processes. A key challenge associated with configuration management is supporting the dynamic nature of systems, networks and applications. Configuration tools vary greatly in scope—from keeping a basic inventory of the items to utilizing a full data model that employs dynamic discovery capabilities. One such tool is the IBM internal Configuration Management Integrator, which uses a configuration management database to maintain configuration information about supported features and devices. System administration The focus of system administration is to perform tasks that support devices, especially servers. The system administrator installs and maintains software products and tools, patches software and performs problem determination, participates in change-management activities and supports application programmers as necessary—in short, performs most activities associated with keeping servers up and running. An example of a system administrator tool is Service Delivery Portal (SDP), which is an IBM internal, Web-based information integration platform for server system administrators. SDP consolidates operational data from client environments. SDP is a single dashboard that standardizes and simplifies the user interface, achieving centralized and consistent execution of tasks. Information access The aim of information access is to provide easy access to reports, an operational dashboard and tools and related subsystems. Information access is important because it can serve as a window into the infrastructure management service. Typically, access to information is provided by way of a portal. IBM Services Connection, as shown in Figure 4, is a primary interface for organizations to access reports and tools. It also supports information access for IBM Remote Managed Infrastructure Services.
  • 14. Gaining efficiency and business value through effective management of your IT infrastructure Page 14 Figure 4. IBM’s Services Connection Web portal for IBM Remote Managed Infrastructure Services. Automation The automation functional perspective, or discipline, is complex to describe, because it is both a standalone function and one that is embedded in other functional perspectives, such as operations and problems. For example, Parity is an IBM internal tool that is used to proactively and automatically solve problems. Parity checks when a process or communication of a software client is not working properly. If the process is not working due to a dependent component on a different client, Parity uses known recovery methods to restore the functionality of the dependent client.
  • 15. Gaining efficiency and business value through effective management of your IT infrastructure Page 15 EnVision, another IBM internal automation tool, can automatically open problem records for access and handling. Developed by an IBM team responsible for enterprise systems management (ESM) tools integration, the EnVision tool is a single sign-on, front-end Web portal to access and manage multiple problem management systems. Near-real-time information from disparate systems is organized and consolidated into a centralized Web portal for easy access and manageability. The EnVision integration tool collectively organizes problem tickets, details, priorities and statuses from multiple problem management systems into a single-access Web portal. Remote access Remote access tools such as RemotelyAnywhere by LogMeIn and OpenSSH, an open source tool for secure access, can assist with reaching infrastructure elements such as servers in a secure and productive manner. OpenSSH is integrated into base systems such as OpenBSD, FreeBSD, BSDi BSD/OS, NetBSD, Computone, Stallion, Cygwin, e-smith server and gateway, Mac OS X Version 10.1, HP Procurve Switch 4108GL 2524/2512, IBM AIX®, and SunSHH in Sun Solaris 9. Problem and change management Managing problems is important because users expect timely correction and resolution. Change management is closely linked to problem management because change can introduce risk to the stability of your systems environment. An important consideration for change management is the need for written backout procedures and a process to reduce the risks of failed changes. ManageNow, another internal IBM Web-based tool, supports problem and change management and uses enterprise systems management to store and manage problem and change information. The business value of having the right tools is measured in terms of the effectiveness of the service at a manageable and sustainable cost. Table 1 summarizes all the tools listed in this section, organized by activity or discipline.
  • 16. Gaining efficiency and business value through effective management of your IT infrastructure Page 16 Table 1. Tools in context Activity or discipline Tool example Basic availability management NetView Hardware monitoring IBM Director Software monitoring of resources IBM Tivoli Monitoring Notification handling TelAlert Performance and capacity management Server Resource Management (SRM) Security management Fusion Configuration management Configuration Management Integrator System administration Service Delivery Portal and Knowledge Base Information access IBM Services Connection Automation Parity and EnVision Remote access RemotelyAnywhere and Open SSH Problem and change management ManageNow and enterprise systems management Deploying infrastructure and tools rapidly with a proper level of ongoing management In addressing this challenge, the goal should be rapid deployment through pre-engineered and solid ongoing support using a service manager. The proven tactics for deployment to achieve this goal include using a model project plan that is based on prebuilt components with a project manager to ensure that your deployment goes smoothly. A delivery architect—a specialized role—helps to serve as a technical complement to the project manager.
  • 17. Gaining efficiency and business value through effective management of your IT infrastructure Page 17 The proven tactics for ongoing support are to use well-defined ongoing support activities using desk procedures to help provide your enterprise with an optimum degree of ongoing management. While a specialized service delivery manager can help ensure that the ongoing support goes smoothly, you could also consider using other specialized roles, such as security specialists, change managers and duty managers. The business value of deploying infrastructure with a proper level of ongoing management is more rapid deployment (time value of money) and more reliable and predictable outcomes. Focus on service areas of growing importance Three areas of growing importance include batch processing, backup and restore, and middleware and database support services. Batch processing Planned, batch workloads are growing in significance in midrange systems. It is important to handle this workload in a planned fashion using an automated tool. This way, as batch windows decrease in duration, you can plan for and automate batch workloads. Backup and restore Backup and restore, like batch processing, is an instance of a time-critical service that is subject to a shrinking or nearly nonexistent time window. Make the best use of backup windows by using technology to leverage automated approaches. Also, use backup-while-active when possible. For a rapid restore of the operating system and environment in the event of a disk failure, backups should be independent of incremental copies. Middleware and database support services With the dominance of databases and middleware, managed services providers have begun offering support for products in this category. Middleware and database services are not new, but extensive adoption by companies worldwide is making them more relevant.
  • 18. Gaining efficiency and business value through effective management of your IT infrastructure Page 18 The business value of middleware and database support services is help with the daily activities of software management as well as the skill of experienced personnel who come along with the service. This results in the ability to better deploy existing support personnel, improve handling of problems and changes, and more rapidly deploy new systems and applications. Consider outsourcing and managed services Using outsourcing and managed services is a strategic way to drive efficiency and create business value. These services can offer: ● Broad and deep skills needed to support a heterogeneous computing environment. It is obviously more difficult for you to employ these skills at an affordable cost. ● Redeployment of your key human resources to more strategic activities rather than maintaining existing systems. Even as you use service providers to manage your infrastructure, your employees can build the future of your company. ● Experience with processes and tools. This experience is particularly deep because these providers serve many clients, all of whom look for cost-efficient services. ● Lower cost for a higher level of service. Economies of scale make significant process improvements more affordable. This is not a comprehensive list of reasons, but a compelling list, all the same for you to seriously consider using an outsourcing or managed services provider. Summary Supporting a dynamic business and resilient IT environment requires effective management of your server infrastructure and network devices. By focusing on the activities or disciplines and tools necessary to carry efficient support and delivery services, you can improve your own management capabilities and evaluate the capabilities of potential outsourcing and managed service providers.
  • 19. Gaining efficiency and business value through effective management of your IT infrastructure Page 19 Infrastructure management checklist Use the following table as a checklist to help you evaluate your infrastructure management effectiveness. Table 2: Infrastructure management effectiveness checklist Detecting and handling incidents and problems Maintaining server software and firmware ● Monitoring to detect incidents and problems? ● Proactively administering servers as well as using ● Using technology to automatically handle incidents, open monitoring software? problem records and assign priority? ● Managing server platform support activities like patching ● Using tools to anticipate and correct problems before they and log file maintenance? occur? ● Performing server security administration for identity and ● Providing automated support for system administrator to access? resolve incidents and problems? ● Providing specific focus and support for virtualization? ● Assigning support personnel based on the severity of the ● Providing high availability software support including incident or problem? periodic testing? ● Using Service-level Agreements? ● Following rigorous problem handling and management steps to ensure effective problem resolution? ● Utilizing a specialized service manager and a multidisciplinary team as needed? Handling changes with minimal impact on availability Having inflexible indicators of status and trends for specific infrastructure and activities ● Implementing team participation in change-management ● Posting reports on a portal for easy access? planning? ● Providing tools that focus on server resource management ● Preparing for change by planning activities and estimating and generate performance and capacity reports to analyze time required? trends and manage security? ● Testing changes prior to their implementation and ● Setting up a portal to enter problem records and change preparing backout activities in the event of a failed change? notifications? ● Using a skilled change manager to benefit from experience ● Providing links to other needed tools, portlets and services of previous changes? that support ongoing activities?
  • 20. Gaining efficiency and business value through effective management of your IT infrastructure Page 20 Preventing security problems Having precise tools for the job ● Using information security controls based on an industry ● Support for availability management? standard? ● Hardware monitoring? ● Implementing key security variables such as password ● Software monitoring of key computer resources? length and update frequency early in the process? ● Flexible notification handling? ● Performing security remediation as required for servers and ● Support for performance and capacity management? other devices? ● Support for security management? ● Looking for security exposures during the ongoing support ● Support for configuration management? period and specifying the frequency of these analyses? ● Support for system administration? ● Reporting monthly on key security attributes and activities ● Easy access to information? related to servers and other devices? ● Automation of routine processes? ● Standardized remote access? ● Support for problem and change management? Using emerging or challenging technologies effectively Deploying infrastructure and tools rapidly ● Focusing on skills support for virtual machines and logical ● Use of a model project plan that is based on prebuilt partitions? components? ● Using change windows to make dynamic changes to ● Use of a project manager to ensure that your deployment production servers? goes smoothly? ● Developing skills in a variety of high availability software like ● Use of a delivery architect? IBM HACMP and VMware HA? Proper level of ongoing management ● Well-defined ongoing support activities using desk procedures? ● Use of a service delivery manager? ● Use of security specialists, change managers and duty managers? Focusing on service areas of growing importance ● Use of planned batch processing? ● Use of technology to make best use of backup windows? ● Specialized support for middleware and database?
  • 21. Notes
  • 22. Notes
  • 23. Notes
  • 24. For more information © Copyright IBM Corporation 2009 IBM Global Services To learn more about IBM Remote Managed Infrastructure Services, please Route 100 Somers, NY 10589 contact your IBM marketing representative or IBM Business Partner, or visit U.S.A. the following Web site: ibm.com/services/server Produced in the United States of America December 2009 Dr. Joseph Gulla is an Executive IT Specialist for IBM working as a senior All Rights Reserved member of the System Services Center of Excellence. His projects include IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International architecture of managed services and hosting services in Europe and Asia. Business Machines Corporation in the United Dr. Gulla is also a faculty member of the Nova Southeastern University where States, other countries, or both. If these and other IBM trademarked terms are marked on he teaches distributed computing, enterprise architecture and systems their first occurrence in this information with a development process. He has published and presented over 60 papers and trademark symbol (® or ™), these symbols indicate U.S. registered or common law presentations in a wide variety of forums, including the Technical Leadership trademarks owned by IBM at the time this Exchange (TLE), the High Availability “Best Practices” Topical Conference, information was published. Such trademarks may also be registered or common law Internet Society Conference (INet), Professional Leadership Technical trademarks in other countries. A current list of Exchange (PLTE), Planet Tivoli, Enterprise Systems Management Share Net, IBM trademarks is available on the Web at “Copyright and trademark information” at IBM Security Seminars and the Northeast Information Systems Users Group ibm.com/legal/copytrade.shtml (NEISUG). His publications include Design and Implementation of a Linux is a registered trademark of Linus Torvalds Prototype Toolset for Full Life-Cycle Management of Web-Based Applications, in the United States, other countries, or both. Microsoft is a trademark of Microsoft published as an IBM technical report in 2003. Corporation in the United States, other countries, or both. Other product, company or service names may be trademarks or service marks of others. Use of the information herein is at the recipient’s own risk. Information herein may be changed or updated without notice. IBM may also make improvements and/or changes in the products and/or the programs described herein at any time without notice. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. SSW03005-USEN-00