SlideShare uma empresa Scribd logo
1 de 32
Islamic Azad University
           Science & Research Campus

               IT Management
Structured System Analysis & Design Method

      Configuration Management

                 Instructor
                Dr.Motadel

               Presented by:
              Hamed Godazgar
              Ali Mollabagher
               Eshrat Shafaat
         nd
        2 Semester of 2008-2009              1
In God We Trust




      Copyright © 2008-2009 Ali-
                                          2
  Mollabagher.com | All rights reserved
Copyright © 2008-2009 Ali-
                                        3
Mollabagher.com | All rights reserved
Content

• Why Configuration Management ?
• What Is Configuration Management ?
• History
• Configuration Items
• Planning
• Configuration Management Control
• Benefits
• Costs & Risks
• Conclusion
• References
                            Copyright © 2008-2009 Ali-
                                                                4
                        Mollabagher.com | All rights reserved
Why Presenting Configuration Management ?




The Information Technology Infrastructure Library (ITIL) is a set of
  concepts and policies for managing information technology (IT)
  infrastructure, development and operations & Configuration Management
  is one of these standards.




                                   Copyright © 2008-2009 Ali-
                                                                       5
                               Mollabagher.com | All rights reserved
Why we use Configuration Management ?


It is used to track the system after change as it require, change
  occur due to following reasons.


                       To make system cross-platform


                        Accommodating new functionality


                     Tailored for particular user requirements




                            Copyright © 2008-2009 Ali-
                                                                    6
                        Mollabagher.com | All rights reserved
What Is Configuration Management ?



  Define         Manage                 Control         Audit




       Changes made to the original system




     Establish system                      Maintain system
         integrity                            integrity

                  Copyright © 2008-2009 Ali-
                                                                7
              Mollabagher.com | All rights reserved
History

1960s           1970s                                           1990s




Started




The American Government - Military Standards




                          Emerging many other standards and publications

                            Copyright © 2008-2009 Ali-
                                                                        8
                        Mollabagher.com | All rights reserved
Configuration Items

                                                                    Program code
            Standards, and procedures
                                                                       listings
              Maintenance
               requests                             Testing, operatio
                                                    n, and execution
    Design                                                plans
 specifications
                                        Manuals
                        (user, operation, command, and system)

                     System
                  specifications                 Problem and error reports


            Set of resources to support configuration management
an aggregation of hardware, software, or documentation which is designed for
                             configuration control
                                Copyright © 2008-2009 Ali-
                                                                                   9
                            Mollabagher.com | All rights reserved
Planning



                       1.Establish a configuration management plan


                   2.Responsible developers and maintainers must be
                                       identified

Planning
                                    3.Budget must be defined


                     4.Must be ensure that the appropriate tools and
                              documentation are available.


                             5.Configuration items are collected.




               Copyright © 2008-2009 Ali-
                                                                       10
           Mollabagher.com | All rights reserved
Configuration Control



                                           1.Establishing a baseline


                                                 2.Version control
Configuration
   control
                                             3.Freezing the system


                                                  4.Benchmarks


                                              5. Regression testing


                                        6.Establishing a new baseline
                      Copyright © 2008-2009 Ali-
                                                                        11
                  Mollabagher.com | All rights reserved
Initial line as a reference point for all other measurements.




            outcome or milestone of system development




       The version of the system on which the final system test is performed might
                               serve as the initial baseline.




                               Copyright © 2008-2009 Ali-
                                                                            12
                           Mollabagher.com | All rights reserved
Copyright © 2008-2009 Ali-
                                        13
Mollabagher.com | All rights reserved
In subsequent releases,

 the major number is increased when there are significant jumps in

functionality,

 the minor number is incremented when only minor features or significant

fixes have been added, and

 the revision number is incremented when minor bugs are fixed.


                                 Copyright © 2008-2009 Ali-
                                                                       14
                             Mollabagher.com | All rights reserved
Copyright © 2008-2009 Ali-
                                        15
Mollabagher.com | All rights reserved
Designating development stage

          0                                 For alpha status
          1                                  For beta status
          2                             For release candidate
          3                                For public release



1.2.0.1                                  Instead of 1.2-a
1.2.1.2             Instead of 1.2-b2 (beta with some bug fixes)
1.2.2.3                                  Instead of 1.2-rc
1.2.3.0               Instead of 1.2-r (commercial distribution)
1.2.3.5   Instead of 1.2-r5 (commercial distribution with many bug fixes)
                    Copyright © 2008-2009 Ali-
                                                                      16
                Mollabagher.com | All rights reserved
Windows 95                                       4.0
 Windows 98                                      4.10
Windows Me                                       4.90
Windows 2000                                    NT 5.0
 Windows XP                                     NT 5.1
Windows 2003                                    NT 5.2
Windows Vista                                   NT 6.0
 Windows 7                                      NT 6.1



                  Copyright © 2008-2009 Ali-
                                                         17
              Mollabagher.com | All rights reserved
Copyright © 2008-2009 Ali-
                                        18
Mollabagher.com | All rights reserved
Involves archiving the entire system, including :

   The executable programs
   Data files
   Source code,
   Related documentation.


The archive can be used to reestablish the pre-change version.


                         Copyright © 2008-2009 Ali-
                                                             19
                     Mollabagher.com | All rights reserved
At the time the system is frozen,
benchmark measurements
(execution time, response time, and the like)
should be taken for the system.




                         Copyright © 2008-2009 Ali-
                                                             20
                     Mollabagher.com | All rights reserved
To measure how the change affected response time and
other standard performance metrics.



Benchmark measurements taken on the baseline is the key
to regression testing.




                      Copyright © 2008-2009 Ali-
                                                           21
                  Mollabagher.com | All rights reserved
After approval is granted, the production system is frozen, the
new version of the test system becomes the production
system, and a new baseline is established.




                        Copyright © 2008-2009 Ali-
                                                              22
                    Mollabagher.com | All rights reserved
Configuration auditing and reporting



 The purpose of configuration auditing is to ensure that the approved
changes have been implemented.




The purpose of configuration reporting is to ensure that the changes
are broadcast




                           Copyright © 2008-2009 Ali-
                                                                         23
                       Mollabagher.com | All rights reserved
Benefits of Configuration Management

  Improves                Decreases

    Product protection         Rework


     Product visibility      Confusion


     Product control         Project Risk

        Team
     communication

        Customer
       Confidence                           24
Costs of Configuration Management

Costs are outweighed by benefits, because Configuration Management allows handling of a
large volume of changes, thus keeping quality. Configuration Management control reduces
risks of viruses, wrong software, fraud, theft, and so on.

       Staff costs for developing and running procedures


       Hardware and software configuration identification


       Hardware and software for the CMDB & DSL


       Customization of Configuration Management tool


       Integration with other Service Management tools


       Training and education
                                                                                     25
Risks of Configuration Management

CIs with too much or too little detail


Interfaces to other systems in which CI information is stored


Keep the information in the CMDB accurate


Roles and responsibilities


Lack of configuration control


Overambitious schedules and unrealistic expectations


No commitment from management
                                 Copyright © 2008-2009 Ali-
                                                                     26
                             Mollabagher.com | All rights reserved
Copyright © 2008-2009 Ali-
                                        27
Mollabagher.com | All rights reserved
Conclusion

• Configuration Management is a component of ITIL Standard
  for implementing IT in enterprises

• Changes are inevitable in the system so keeping track of
  changes is an essential task .

• The duty of configuration management is to define, manage
  changes by planning and controlling them from analyzing to
  the end of system existence.




                         Copyright © 2008-2009 Ali-
                                                             28
                     Mollabagher.com | All rights reserved
References
1.The information system consultant’s handbook : system Analysis and Design
/ chapter 80/configuration management

1.http://www.atlasfarhang.com/History.aspx

2.IBM.Press.Implementing.ITIL.Configuration.Management

3.^ APMG (2008). quot;ITIL® Service Management Practices: V3 Qualifications Schemequot;

(HTML). http://www.itil-officialsite.com/nmsruntime/saveasdialog.asp?lID=572&sID=86

. Retrieved on 2009-02-24.
1.^ Office of Government Commerce (2006). “
Best Practice portfolio: new contracts awarded for publishing and accreditation servicesquot;

(HTML). http://www.ogc.gov.uk/About_OGC_news_4906.asp

. Retrieved on 2006-09-19.
1.^ Office of Government Commerce (2008). quot;Best Management Practice: ITIL® V3 and ISO/IEC 20000quot;

(HTML). http://www.best-management-practice.com/gempdf/ITIL_and_ISO_20000_March08.pdf

                                            Copyright © 2008-2009 Ali-
                                                                                               29
                                        Mollabagher.com | All rights reserved
References
. Retrieved on 2009-02-24.
1.^ The IT Skeptic (2008). quot;Three reasons why ISO20000 certification is not ITIL V3 certificationquot;

(HTML). http://www.itskeptic.org/node/581

Retrieved on 2009-02-24.
1.^ IBM Global Services (2004). quot;IBM and the IT Infrastructure Libraryquot;

(PDF). http://www.ibm.com/services/us/igs/pdf/wp-g510-3008-03f-supports-provides-itil-
capabilities-solutions.pdf

. Retrieved on 2006-05-31.
1.^ IBM Global Services (2003). quot;IBM's commitment to ITIL (archived)quot;
(HTML). http://web.archive.org/web/20070304184624/http://www-
935.ibm.com/services/us/index.wss/detail/its/a1000593?cntxt=a1000429

Retrieved on 2007-03-04.
1.^ Van Schaik, E. A. (1985). A Management System for the Information Business. Englewood
Cliffs, NJ, Prentice-Hall, Inc. ISBN 0-13-549965-8
2.^ Van Schaik, E. A. (2006 2nd Ed.). A Management system for the Information Business. Red
Swan Publishing. ISBN 1933703032
3.^ Nolan, Richard, 1974, 1982. Managing the Data Resource Function. St. Paul, Minnesota, West
Publishing. ISBN 0829900039 (1982 ed.) Copyright © 2008-2009 Ali-
                                                                                                     30
4.^ Office of Government Commerce. ITIL Refresh | All rights reserved
                                        Mollabagher.com Statement
References
. Retrieved February 13, 2006.
1.^ Office of Government Commerce (UK)CCTA and OGC

. Retrieved May 5, 2005.
1.^ Office of Government Commerce (2000). Service Support. The Stationery Office. ISBN 0-11-
330015-8.
2.^ Office of Government Commerce (2001). Service Delivery. IT Infrastructure Library. The
Stationery Office. ISBN 0-11-330017-4.
3.^ Office of Government Commerce (2002). Planning To Implement Service Management. The
Stationery Office. ISBN 0-11-330877-9.
4.^ Cazemier, Jacques A.; Overbeek, Paul L.; Peters, Louk M. (2000). Security Management. The
Stationery Office. ISBN 0-11-330014-X.
5.^ Office of Government Commerce (2002). ICT Infrastructure Management. The Stationery
Office. ISBN 0-11-330865-5.
6.^ Office of Government Commerce (2005). The Business Perspective. The Stationery Office.
ISBN 0-11-330894-9.
7.^ Office of Government Commerce (2002). Application Management. The Stationery Office.
ISBN 0-11-330866-3.
8.^ Office of Government Commerce (2005). ITIL Small Scale Implementation. The Stationery
Office. ISBN 0-11-330980-5.
9.^ van Bon, J.(Editor) (2002). The guide to IT service management. Addison Wesley. ISBN 0-201-
73792-2.
10.^ Meyer, Dean, 2005. quot;Beneath theCopyright © 2008-2009 Ali-
                                        Buzz: ITILquot;
                                                                                              31
                                 Mollabagher.com | All rights reserved
References


CIO Magazine, March 31, 2005
1.^ van Herwaarden, H. and F. Grift (2002). quot;IPW(tm) and the IPW Stadia Model(tm) (IPWSM)quot;.
The guide to IT service management. J. Van Bon. London, Addison-Wesley: 97-115.

•   http://techrepublic.com.com/2001-6240-0.html




                                     Copyright © 2008-2009 Ali-
                                                                                              32
                                 Mollabagher.com | All rights reserved

Mais conteúdo relacionado

Semelhante a Configuration Management (Ali Mollabagher.Com)

Controller MIgration & Connectivity 11.10.09
Controller MIgration & Connectivity 11.10.09Controller MIgration & Connectivity 11.10.09
Controller MIgration & Connectivity 11.10.09mgk918
 
Automation testing strategy, approach & planning
Automation testing  strategy, approach & planningAutomation testing  strategy, approach & planning
Automation testing strategy, approach & planningSivaprasanthRentala1975
 
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...IBM Sverige
 
Safeguarding Your SAP System Availability And Performance
Safeguarding Your SAP System Availability And PerformanceSafeguarding Your SAP System Availability And Performance
Safeguarding Your SAP System Availability And PerformanceDave Fox
 
Development Platform as a Service - erfarenheter efter ett års användning - ...
Development Platform as a Service - erfarenheter efter ett års användning -  ...Development Platform as a Service - erfarenheter efter ett års användning -  ...
Development Platform as a Service - erfarenheter efter ett års användning - ...IBM Sverige
 
Application Quality with Visual Studio 2010
Application Quality with Visual Studio 2010Application Quality with Visual Studio 2010
Application Quality with Visual Studio 2010Anna Russo
 
Java on zSystems zOS
Java on zSystems zOSJava on zSystems zOS
Java on zSystems zOSTim Ellison
 
Optimize DevOps and Agile Strategies with Deployment Automation
Optimize DevOps and Agile Strategies with Deployment AutomationOptimize DevOps and Agile Strategies with Deployment Automation
Optimize DevOps and Agile Strategies with Deployment AutomationXebiaLabs
 
Configuration management24
Configuration management24Configuration management24
Configuration management24al-wahidi
 
Tivoli Development Cloud Pennock Final Web
Tivoli Development Cloud Pennock Final WebTivoli Development Cloud Pennock Final Web
Tivoli Development Cloud Pennock Final WebKennisportal
 
EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...
EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...
EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...Steve Speicher
 
Cloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process PhaseCloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process Phasefinteligent
 
IBM zUniversity 2004 : ILOG JRules on IBM eServer zSeries
IBM zUniversity 2004 : ILOG JRules on IBM eServer zSeriesIBM zUniversity 2004 : ILOG JRules on IBM eServer zSeries
IBM zUniversity 2004 : ILOG JRules on IBM eServer zSeriesDan Selman
 
Which One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development EnvironmentWhich One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development EnvironmentBitbar
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 

Semelhante a Configuration Management (Ali Mollabagher.Com) (20)

Controller MIgration & Connectivity 11.10.09
Controller MIgration & Connectivity 11.10.09Controller MIgration & Connectivity 11.10.09
Controller MIgration & Connectivity 11.10.09
 
Automation testing strategy, approach & planning
Automation testing  strategy, approach & planningAutomation testing  strategy, approach & planning
Automation testing strategy, approach & planning
 
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
 
Safeguarding Your SAP System Availability And Performance
Safeguarding Your SAP System Availability And PerformanceSafeguarding Your SAP System Availability And Performance
Safeguarding Your SAP System Availability And Performance
 
Development Platform as a Service - erfarenheter efter ett års användning - ...
Development Platform as a Service - erfarenheter efter ett års användning -  ...Development Platform as a Service - erfarenheter efter ett års användning -  ...
Development Platform as a Service - erfarenheter efter ett års användning - ...
 
Application Quality with Visual Studio 2010
Application Quality with Visual Studio 2010Application Quality with Visual Studio 2010
Application Quality with Visual Studio 2010
 
Java on zSystems zOS
Java on zSystems zOSJava on zSystems zOS
Java on zSystems zOS
 
Optimize DevOps and Agile Strategies with Deployment Automation
Optimize DevOps and Agile Strategies with Deployment AutomationOptimize DevOps and Agile Strategies with Deployment Automation
Optimize DevOps and Agile Strategies with Deployment Automation
 
Sdlc
SdlcSdlc
Sdlc
 
Configuration management24
Configuration management24Configuration management24
Configuration management24
 
Less11 auditing
Less11 auditingLess11 auditing
Less11 auditing
 
Tivoli Development Cloud Pennock Final Web
Tivoli Development Cloud Pennock Final WebTivoli Development Cloud Pennock Final Web
Tivoli Development Cloud Pennock Final Web
 
EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...
EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...
EclipseCon 2013 Learn and share about integrations using Eclipse Lyo, OSLC an...
 
RABIT
RABITRABIT
RABIT
 
Cloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process PhaseCloud Technology: Now Entering the Business Process Phase
Cloud Technology: Now Entering the Business Process Phase
 
IBM zUniversity 2004 : ILOG JRules on IBM eServer zSeries
IBM zUniversity 2004 : ILOG JRules on IBM eServer zSeriesIBM zUniversity 2004 : ILOG JRules on IBM eServer zSeries
IBM zUniversity 2004 : ILOG JRules on IBM eServer zSeries
 
Infor EAM ASE
Infor EAM ASEInfor EAM ASE
Infor EAM ASE
 
Which One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development EnvironmentWhich One Works You The Best: In-House or Cloud-Based Development Environment
Which One Works You The Best: In-House or Cloud-Based Development Environment
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 

Último

Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 

Último (20)

Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 

Configuration Management (Ali Mollabagher.Com)

  • 1. Islamic Azad University Science & Research Campus IT Management Structured System Analysis & Design Method Configuration Management Instructor Dr.Motadel Presented by: Hamed Godazgar Ali Mollabagher Eshrat Shafaat nd 2 Semester of 2008-2009 1
  • 2. In God We Trust Copyright © 2008-2009 Ali- 2 Mollabagher.com | All rights reserved
  • 3. Copyright © 2008-2009 Ali- 3 Mollabagher.com | All rights reserved
  • 4. Content • Why Configuration Management ? • What Is Configuration Management ? • History • Configuration Items • Planning • Configuration Management Control • Benefits • Costs & Risks • Conclusion • References Copyright © 2008-2009 Ali- 4 Mollabagher.com | All rights reserved
  • 5. Why Presenting Configuration Management ? The Information Technology Infrastructure Library (ITIL) is a set of concepts and policies for managing information technology (IT) infrastructure, development and operations & Configuration Management is one of these standards. Copyright © 2008-2009 Ali- 5 Mollabagher.com | All rights reserved
  • 6. Why we use Configuration Management ? It is used to track the system after change as it require, change occur due to following reasons. To make system cross-platform Accommodating new functionality Tailored for particular user requirements Copyright © 2008-2009 Ali- 6 Mollabagher.com | All rights reserved
  • 7. What Is Configuration Management ? Define Manage Control Audit Changes made to the original system Establish system Maintain system integrity integrity Copyright © 2008-2009 Ali- 7 Mollabagher.com | All rights reserved
  • 8. History 1960s 1970s 1990s Started The American Government - Military Standards Emerging many other standards and publications Copyright © 2008-2009 Ali- 8 Mollabagher.com | All rights reserved
  • 9. Configuration Items Program code Standards, and procedures listings Maintenance requests Testing, operatio n, and execution Design plans specifications Manuals (user, operation, command, and system) System specifications Problem and error reports Set of resources to support configuration management an aggregation of hardware, software, or documentation which is designed for configuration control Copyright © 2008-2009 Ali- 9 Mollabagher.com | All rights reserved
  • 10. Planning 1.Establish a configuration management plan 2.Responsible developers and maintainers must be identified Planning 3.Budget must be defined 4.Must be ensure that the appropriate tools and documentation are available. 5.Configuration items are collected. Copyright © 2008-2009 Ali- 10 Mollabagher.com | All rights reserved
  • 11. Configuration Control 1.Establishing a baseline 2.Version control Configuration control 3.Freezing the system 4.Benchmarks 5. Regression testing 6.Establishing a new baseline Copyright © 2008-2009 Ali- 11 Mollabagher.com | All rights reserved
  • 12. Initial line as a reference point for all other measurements. outcome or milestone of system development The version of the system on which the final system test is performed might serve as the initial baseline. Copyright © 2008-2009 Ali- 12 Mollabagher.com | All rights reserved
  • 13. Copyright © 2008-2009 Ali- 13 Mollabagher.com | All rights reserved
  • 14. In subsequent releases,  the major number is increased when there are significant jumps in functionality,  the minor number is incremented when only minor features or significant fixes have been added, and  the revision number is incremented when minor bugs are fixed. Copyright © 2008-2009 Ali- 14 Mollabagher.com | All rights reserved
  • 15. Copyright © 2008-2009 Ali- 15 Mollabagher.com | All rights reserved
  • 16. Designating development stage 0 For alpha status 1 For beta status 2 For release candidate 3 For public release 1.2.0.1 Instead of 1.2-a 1.2.1.2 Instead of 1.2-b2 (beta with some bug fixes) 1.2.2.3 Instead of 1.2-rc 1.2.3.0 Instead of 1.2-r (commercial distribution) 1.2.3.5 Instead of 1.2-r5 (commercial distribution with many bug fixes) Copyright © 2008-2009 Ali- 16 Mollabagher.com | All rights reserved
  • 17. Windows 95 4.0 Windows 98 4.10 Windows Me 4.90 Windows 2000 NT 5.0 Windows XP NT 5.1 Windows 2003 NT 5.2 Windows Vista NT 6.0 Windows 7 NT 6.1 Copyright © 2008-2009 Ali- 17 Mollabagher.com | All rights reserved
  • 18. Copyright © 2008-2009 Ali- 18 Mollabagher.com | All rights reserved
  • 19. Involves archiving the entire system, including : The executable programs Data files Source code, Related documentation. The archive can be used to reestablish the pre-change version. Copyright © 2008-2009 Ali- 19 Mollabagher.com | All rights reserved
  • 20. At the time the system is frozen, benchmark measurements (execution time, response time, and the like) should be taken for the system. Copyright © 2008-2009 Ali- 20 Mollabagher.com | All rights reserved
  • 21. To measure how the change affected response time and other standard performance metrics. Benchmark measurements taken on the baseline is the key to regression testing. Copyright © 2008-2009 Ali- 21 Mollabagher.com | All rights reserved
  • 22. After approval is granted, the production system is frozen, the new version of the test system becomes the production system, and a new baseline is established. Copyright © 2008-2009 Ali- 22 Mollabagher.com | All rights reserved
  • 23. Configuration auditing and reporting  The purpose of configuration auditing is to ensure that the approved changes have been implemented. The purpose of configuration reporting is to ensure that the changes are broadcast Copyright © 2008-2009 Ali- 23 Mollabagher.com | All rights reserved
  • 24. Benefits of Configuration Management Improves Decreases Product protection Rework Product visibility Confusion Product control Project Risk Team communication Customer Confidence 24
  • 25. Costs of Configuration Management Costs are outweighed by benefits, because Configuration Management allows handling of a large volume of changes, thus keeping quality. Configuration Management control reduces risks of viruses, wrong software, fraud, theft, and so on. Staff costs for developing and running procedures Hardware and software configuration identification Hardware and software for the CMDB & DSL Customization of Configuration Management tool Integration with other Service Management tools Training and education 25
  • 26. Risks of Configuration Management CIs with too much or too little detail Interfaces to other systems in which CI information is stored Keep the information in the CMDB accurate Roles and responsibilities Lack of configuration control Overambitious schedules and unrealistic expectations No commitment from management Copyright © 2008-2009 Ali- 26 Mollabagher.com | All rights reserved
  • 27. Copyright © 2008-2009 Ali- 27 Mollabagher.com | All rights reserved
  • 28. Conclusion • Configuration Management is a component of ITIL Standard for implementing IT in enterprises • Changes are inevitable in the system so keeping track of changes is an essential task . • The duty of configuration management is to define, manage changes by planning and controlling them from analyzing to the end of system existence. Copyright © 2008-2009 Ali- 28 Mollabagher.com | All rights reserved
  • 29. References 1.The information system consultant’s handbook : system Analysis and Design / chapter 80/configuration management 1.http://www.atlasfarhang.com/History.aspx 2.IBM.Press.Implementing.ITIL.Configuration.Management 3.^ APMG (2008). quot;ITIL® Service Management Practices: V3 Qualifications Schemequot; (HTML). http://www.itil-officialsite.com/nmsruntime/saveasdialog.asp?lID=572&sID=86 . Retrieved on 2009-02-24. 1.^ Office of Government Commerce (2006). “ Best Practice portfolio: new contracts awarded for publishing and accreditation servicesquot; (HTML). http://www.ogc.gov.uk/About_OGC_news_4906.asp . Retrieved on 2006-09-19. 1.^ Office of Government Commerce (2008). quot;Best Management Practice: ITIL® V3 and ISO/IEC 20000quot; (HTML). http://www.best-management-practice.com/gempdf/ITIL_and_ISO_20000_March08.pdf Copyright © 2008-2009 Ali- 29 Mollabagher.com | All rights reserved
  • 30. References . Retrieved on 2009-02-24. 1.^ The IT Skeptic (2008). quot;Three reasons why ISO20000 certification is not ITIL V3 certificationquot; (HTML). http://www.itskeptic.org/node/581 Retrieved on 2009-02-24. 1.^ IBM Global Services (2004). quot;IBM and the IT Infrastructure Libraryquot; (PDF). http://www.ibm.com/services/us/igs/pdf/wp-g510-3008-03f-supports-provides-itil- capabilities-solutions.pdf . Retrieved on 2006-05-31. 1.^ IBM Global Services (2003). quot;IBM's commitment to ITIL (archived)quot; (HTML). http://web.archive.org/web/20070304184624/http://www- 935.ibm.com/services/us/index.wss/detail/its/a1000593?cntxt=a1000429 Retrieved on 2007-03-04. 1.^ Van Schaik, E. A. (1985). A Management System for the Information Business. Englewood Cliffs, NJ, Prentice-Hall, Inc. ISBN 0-13-549965-8 2.^ Van Schaik, E. A. (2006 2nd Ed.). A Management system for the Information Business. Red Swan Publishing. ISBN 1933703032 3.^ Nolan, Richard, 1974, 1982. Managing the Data Resource Function. St. Paul, Minnesota, West Publishing. ISBN 0829900039 (1982 ed.) Copyright © 2008-2009 Ali- 30 4.^ Office of Government Commerce. ITIL Refresh | All rights reserved Mollabagher.com Statement
  • 31. References . Retrieved February 13, 2006. 1.^ Office of Government Commerce (UK)CCTA and OGC . Retrieved May 5, 2005. 1.^ Office of Government Commerce (2000). Service Support. The Stationery Office. ISBN 0-11- 330015-8. 2.^ Office of Government Commerce (2001). Service Delivery. IT Infrastructure Library. The Stationery Office. ISBN 0-11-330017-4. 3.^ Office of Government Commerce (2002). Planning To Implement Service Management. The Stationery Office. ISBN 0-11-330877-9. 4.^ Cazemier, Jacques A.; Overbeek, Paul L.; Peters, Louk M. (2000). Security Management. The Stationery Office. ISBN 0-11-330014-X. 5.^ Office of Government Commerce (2002). ICT Infrastructure Management. The Stationery Office. ISBN 0-11-330865-5. 6.^ Office of Government Commerce (2005). The Business Perspective. The Stationery Office. ISBN 0-11-330894-9. 7.^ Office of Government Commerce (2002). Application Management. The Stationery Office. ISBN 0-11-330866-3. 8.^ Office of Government Commerce (2005). ITIL Small Scale Implementation. The Stationery Office. ISBN 0-11-330980-5. 9.^ van Bon, J.(Editor) (2002). The guide to IT service management. Addison Wesley. ISBN 0-201- 73792-2. 10.^ Meyer, Dean, 2005. quot;Beneath theCopyright © 2008-2009 Ali- Buzz: ITILquot; 31 Mollabagher.com | All rights reserved
  • 32. References CIO Magazine, March 31, 2005 1.^ van Herwaarden, H. and F. Grift (2002). quot;IPW(tm) and the IPW Stadia Model(tm) (IPWSM)quot;. The guide to IT service management. J. Van Bon. London, Addison-Wesley: 97-115. • http://techrepublic.com.com/2001-6240-0.html Copyright © 2008-2009 Ali- 32 Mollabagher.com | All rights reserved

Notas do Editor

  1. A management process for establishing and maintaining consistency of a product’s performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. -EIA Standard 649The control of changes made throughout the system lifecycle. Allows changes to be evaluated before they are approved. Considers interrelationships among system componentsThe goals of using CM are to ensure the integrity of a product and to make its evolution more manageable.
  2. 1970S-The American government developed a number of military standards, which included configuration management1990S-Many other standards and publications discussing configuration management have emerged.
  3. Knowledge about customers is mainly captured by offer  management, service management, complaint  management and, if available, contract management.  Campaign management and service management  are the main user processes of knowledge about  customers, because both processes personalize their  services as based on user criteria.