CMDB Configuration Management DataBase Key Messages n Review of developments to date n Long term and short term implementations n Agreement on Configuration.

Slides:



Advertisements
Similar presentations
ManageEngine IT360 Product Overview
Advertisements

IT Asset Management Status Update 02/15/ Agenda What is Asset Management and What It Is Not Scope of Asset Management Status of Key Efforts Associated.
Steve Lewis J.D. Edwards & Company
Distributed Data Processing
Design Validation CSCI 5801: Software Engineering.
Mobile Application Architecture Initiative Steve Wheat Chief IT Architect.
Where is IT Asset Management in ITIL? Nicole Conboy, NCA IT Service & Asset Management Consultant.
1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based.
A Successful RHIO Implementation
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Chapter 19: Network Management Business Data Communications, 4e.
© Prentice Hall CHAPTER 14 Managing Technological Resources.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
CASE Tools CIS 376 Bruce R. Maxim UM-Dearborn. Prerequisites to Software Tool Use Collection of useful tools that help in every step of building a product.
“DOK 322 DBMS” Y.T. Database Design Hacettepe University Department of Information Management DOK 322: Database Management Systems.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Maintaining and Updating Windows Server 2008
ITIL: Why Your IT Organization Should Care Service Support
Defining Services for Your IT Service Catalog
ITIL Process Management An Overview of Service Management Processes Presented by Jerree Catlin, Sue Silkey & Thelma Simons.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Configuration Management System
Initial slides for Layered Service Architecture
Data Center Infrastructure
IS 466 ADVANCED TOPICS IN INFORMATION SYSTEMS LECTURER : NOUF ALMUJALLY 3 – 10 – 2011 College Of Computer Science and Information, Information Systems.
Software Configuration Management
Adaptive Processes © Adaptive ProcessesSimpler, Faster, Better Overview of ITIL Information Technology Infrastructure Library.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
 Copyright 2001 Perot Systems Europe. All rights reserved Architecture Model Introduction Tim Taylor.
EMI SA2: Quality Assurance (EMI-SA2 Work Package) Alberto Aimar (CERN) WP Leader.
Asset Record Does Not Equal CI: The confusion between Asset and Configuration Management Christine M. Russo Manager, IT Asset Management and Property.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
ITIL Process Management An Overview of Service Management Processes Thanks to Jerree Catlin, Sue Silkey & Thelma Simons University of Kansas.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Implementing a Client Level Database Using CAREWare Across the System of Care 2008 Ryan White HIV/AIDS Program Grantee Meeting Presented by: Kevin McNeal.
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
DCML – The Standard that Enables ITIL Compliance.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Software Quality Assurance
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
ANKITHA CHOWDARY GARAPATI
6 November 2013 Created for IEA Conference Presented by: M. Cristina Ferrari NAVFAC SW Environmental Program Manager Naval Facilities Engineering Command.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
Cloud Computing Use Case Draft v2.
CMDBs: Above and Beyond…
25 April Unified Cryptologic Architecture: A Framework for a Service Based Architecture Unified Cryptologic Architecture: A Framework for a Service.
State of Georgia Release Management Training
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
Modul ke: Fakultas Program Studi Teknologi Pusat Data 13 FASILKOM Teknik Informatika Infrastruktur Pusat Data.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
6/13/2015 Visit the Sponsor tables to enter their end of day raffles. Turn in your completed Event Evaluation form at the end of the day in the Registration.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
ITIL® Service Asset & Configuration Management Foundations Service Transition Thatcher Deane 02/17/2010.
GDT Automated Scheduling and Operations with C2O.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
ServiceNow Configuration Management Deep Dive Training.
Cloud Management Mechanisms
Release Management Release Management.
ITIL: Why Your IT Organization Should Care Service Support
ITIL: Why Your IT Organization Should Care Service Support
Cloud Management Mechanisms
Configuration Management DataBase
Database Design Hacettepe University
ITIL: Why Your IT Organization Should Care Service Support
CHAPTER 5 THE DATA RESOURCE
Presentation transcript:

CMDB Configuration Management DataBase

Key Messages n Review of developments to date n Long term and short term implementations n Agreement on Configuration Item Ownership

Process Architecture - EDS Shared Data Repository

a logical collection of data that is shared by all elements of the architecture at all levels. Access to the Shared Data Repository must, of necessitity, be carefully controlled; each data store in the repository will have a single owner, though there may be several readers and updaters who are given authority to access the store. (EDS SOW)

Configuration Management Data Base CMDB Repository for the information related to the managed and managing devices and applications in the JE environment

Correlation Engine Stores network and application typology and dependency data. Used to determine probable root cause for events in the managed environment that occur within close temporal proximity to each other

Configuration Management Policies n The CMDB represents the actual Production environment within JE n Federal jurisdiction over Enterprise as a collective entity n JE will define the core desktop environment for the customer n External consultants must conform to CMS

Configuration Item Policies n CI is line item in CMDB n External Consultants may own CIs – JE resource assigned to track compliance n Federal control over CI labelling n CIs in secure area n CIs have version numbers n CIs must pass environmental testing before released to production

CMDB Access Principles n Maximize data integrity n Minimize data maintenance costs n Start small & demonstrate benefits n Acknowledge cultural impediments & develop plans to address them n single data entry at source

CMDB Access Points TSC - North Bay Who are the COs for these CIs ? TSC - North Bay What’s happening that affects this CI ?

CMDB Access Points Is there a bigger problem here ? Who can potentially be affected ?

CMDB Access Points Where is that CI anyway ? How many devices will we need replaced next year ?

CMDB Access Points P.O P.O. EquipmentRefresh Examine E-Form Update CI

CMDB Access Points New Products Environment Simulated Testing New Image New Image Entered as New CI

CMDB Access Points P.O P.O. EquipmentRefresh Examine E-Form Update CI Image Assigned to WS CI

CMDB Platform Migrations MS Access Active Server Page SQL McAfee Help Desk SQL Replace June 2000 Replace Replication or Distributed DBMS

CI Ownership - Issues n Aligning Responsibility, Authority and Work associated with CMDB population and maintenance n Overcoming cultural impediments n Distinguish Federal and Local responsibilities n Institutionalizing responsibility n Accommodating desires of different participants

CMDB Structure - seven categories TechnologyTechnology ApplicationsApplications DataData CommunicationsCommunications IT Management SecuritySecurity Interface devices, utility service, application cooperation, distribution service, base platforms Mission & Business Critical & Productivity Applications Data Base/Warehouse, Document management/modeling Production servers/workstations, network schematics, Common Object Environments (COE) ITSM Processes, SLA Mgmt, Performance monitoring Policies & Principles, Virus Mgmt, Security/Control mechanisms Are these categories correct ? SystemsSystems CASE, programming and test tools End

CMDB Structure - Technology To Legend

CMDB Structure - Network Platforms To Legend

CMDB Structure - Applications To Legend

CMDB Structure - Data To Legend

CMDB Structure - Communications To Legend

CMDB Structure - ITSM

CMDB Structure - Infrastructure Management Services To Legend

CMDB Structure - Security To Legend

CMDB Structure - System Development To Legend

Thank you for your participation Together we can make it happen