Skip to main content

Posts

Showing posts from February, 2012

Monitoring Types

I often get asked when discussing operational activities or event management about how we should monitor our environment.   There are several methods to accomplish this depending on what you’re monitoring, what resources you have available and the criticality of what you’re monitoring.   Defining these elements will then help you choose one or more of the following methods. Active monitoring: Ongoing device interrogation to determine its status. Resource intensive. Usually used proactively for critical devices or systems Passive monitoring: Transmits event to a listening device. Most commonly used method Requires good definition of events and instrumentation of systems being monitored. Reactive Monitoring: Requests or triggers action following an event or failure Used for exceptions and normal operations Can be used to diagnose which device is causing the failure and under what conditions. Proactive Monitoring: Used to detect event patterns that can indicate

Customer Portfolio (CP): A starter tool for BRM

The purpose of Business Relationship Management (BRM) is to establish and maintain a business relationship between the IT service provider (SP) and the customer.   This relationship needs to be based on an understanding of the customer and their business needs (what services the customer needs now and in the future).   BRM must also help to establish an understanding of the requirements (utility & warranty) a customer is going to expect and to insure the service providers ability to meet those expectations. The customer portfolio is a database used to record all customers of the IT service provider.   It is used by many processes but is defined and maintained in the business relation management process.   It provides insight into the customer and is developed from the point of view of the business relationship manger.   It allows the service provider to understand who the customers are and make the distinction between customers and users.   This enables the BRM to be able to

Monitor Control Loops

One of the lesser utilized yet powerful ideas in ITIL is the concept of systems or feedback loops. ITIL defines a system as A group of interacting, interrelated or interdependent components that form a unified whole, operating together for a common purpose. There are two types of systems: ·          Open-loop systems – value of outcome has no influence on input; performs a specific activity regardless of environmental conditions ·          Closed-loop systems – value of outcome influences input; responds to changes in the environment Using these concepts we can establish a powerful approach for managing and improving the ITIL processes we have implemented. One technique is called the Monitor-Control Loop. The loop consists of a set of steps that produces feedback to help improve individual process steps, the process as a whole, the stages of the lifecycle and the lifecycle as a whole. ·          Begin the loop by conducting an individual process step by taking inputs and