SlideShare a Scribd company logo
1 of 14
Download to read offline
US 20090240510A1
(12) Patent Application Publication (10) Pub. No.: US 2009/0240510 A1
(19) United States
Hopkins et a]. (43) Pub. Date: Sep. 24, 2009
(54) BALANCED SCORECARD METHOD FOR Publication Classi?cation
DETERMINING AN IMPACT ON A BUSINESS (51) Int Cl
SERVICE CAUsED BY DEGRADED G06Q 10/00 (200601)
OPERATION OF AN IT SYSTEM (52) US. Cl. .......................................................... .. 705/1
COMPONENT
(57) ABSTRACT
(76) Inventors: Lloyd B. Hopkins, Manchester
(GB); Colin Grif?ths, Manchester
(GB); Andrew D. Johnson, NeW
York, NY (US); Jonathan D. Miles,
Manchester (GB); Paul
Bosomworth, Manchester (GB);
Grant Glading, Manchester (GB)
Correspondence Address:
Russ Weinzimmer
614 Nashua Street, Suite 53
Milford, NH 03055 (US)
A “balanced scorecard” method is disclosed for determining
degrees of impact on business service elements (BSE’s)
caused by degradations of con?guration items (CI’s) in an
underlying IT system. The formulas are used by an Impact
Calculation Engine (ICE) of a Business Services Manage
ment (BSM) system. They provide enhanced accuracy by
accounting for “service aspects” of alerts (using categories
such as performance, availability, security, enduser, capacity,
and ?nancial) and/or degrees of CI degradation (in some
embodiments using OSI Standards). The method eliminates
manual assignment of degrees of impact. Preferred embodi
ments convert alerts to a common alert format, determine a
separate degree of impact for each service aspect, and use
default formulas When custom formulas are not provided.
Some embodiments use a service subscription Wizard to at
I I IISiO  Balanced Scorecard
impact Caiculation Engine (ICE)
(21) Appl' NO’: 12/050’339 least partly automate the assignment of CI-to-BSE relation
ships. Different balanced scorecards can apply to the same
(22) Filed: Mar. 18, 2008 BSE at different times, dates, usage levels, etc.
Service M an _ ‘I i I 2
Subscription 308 on‘ 0mg '
Wizard f , , OE , ,QQQ .. Alert
I . E
l
I Convert to Common f SOS l
| Aiert Format i
I 303 & E
I f’ I
I Reconciiiaiion] Fame f 502 i1 Engine I
I all A? £ 201% EI V : w’ i
l
| Ci identity ) E
' 30A 305
I I04 i
I N f‘, f] E
I Reiated Service 03! Severity T E
l B$E(S) Aspect(s) (or Severities) J E
g I
I i
‘ i
‘ i
‘ i
l i
I i
E
I
‘ impacton Each Service a
Aspect of Each BSE
Ea?Ew
mmama.....................................wm?tm
US 2009/0240510 A1
...........................H‘.........................@
imamMN.mmiN
EmaM
WEE
H
Emamsmmhsmmaam
Wn
3“.
Sep. 24, 2009 Sheet 1 0f 8
mm
Patent Application Publication
v
US 2009/0240510 A1Sep. 24, 2009 Sheet 2 0f 8Patent Application Publication
mw
m:
“Q8QQWEEQE5
US 2009/0240510 A1
.iN:
Sep. 24, 2009 Sheet 3 0f 8
mavmamm@EEQ
Patent Application Publication
Patent Application Publication Sep. 24, 2009 Sheet 4 0f 8 US 2009/0240510 A1
CE
iaiianshi
Assénmnts
mg
ars
iiiiiiiiiii ‘fl
511:}
a"? impact
(if eiaia x eras a? impaci
veraii imam an
Eash SE
Prim“ Art
Patent Application Publication Sep. 24, 2009 Sheet 5 0f 8 US 2009/0240510 A1
38
Wizard
?mnveri i0
ieri Farai
veréiyg
(0r Sevri?es)
SEG
Patent Application Publication Sep. 24, 2009 Sheet 6 0f 8
Sewém Aggssi Awégnmam miss
US 2009/0240510 A1
S2
Qamman Aim Farina? :. Sgrvma As mi
Qbgaat Ciasg p
QPU Pe?mmame
Lsgin Sesuriiy
m
Q$§ SSevarity Agségn?mm Ruies ~= QPU
QQmmQn Aim Fmmat
Sevgrity Lgvei Q$E $€v$my
> 8G Qréticai
> Ti’? and < 8G Maia?
> $9 and < “FG Mimi“
> 5% and < ?g Warning
>46 and < 50 Enimmatian
< 4G Cigar
Patent Application Publication Sep. 24, 2009 Sheet 7 0f 8 US 2009/0240510 A1
inimmatignai x '3
0 w
56%
6%
Enimaiionai x i
m
%
Patent Application Publication Sep. 24, 2009 Sheet 8 0f 8 US 2009/0240510 A1
mg
mow
‘NEE25G...“
wwmiwxmmwimimwixrQ
m>mimmmmgmmM5335
Em
US 2009/0240510 A1
BALANCED SCORECARD METHOD FOR
DETERMINING AN IMPACT ON A BUSINESS
SERVICE CAUSED BY DEGRADED
OPERATION OF AN IT SYSTEM
COMPONENT
FIELD OF THE INVENTION
[0001] The invention generally relates to management of
Information Technology systems, and more speci?cally to
business services management systems.
BACKGROUND OF THE INVENTION
[0002] Almost every business uses some form of“Informa
tion Technology” system, or IT system, to support various
activities that contribute to the delivery of a product and/or a
service. A typical business IT system is composed of a plu
rality of “Con?guration Items” or “CI’s” that can include
personal computers, printers, fax machines, scanners, rout
ers, servers, and such like. Depending on its nature and siZe,
a business can be partly or even totally dependent on its IT
system or systems, and may not be able to deliver its products
and/or services if the IT system fails.
[0003] Many businesses offer services that are delivered
mostly or even entirely by IT systems, With little or no direct
human activity. Examples include automated bank tellers,
online banking systems, online travel reservation systems,
online dating services, online auction sites, and such like. The
IT systems that enable these kinds of complex business ser
vices are typically very large, being composed of hundreds,
thousands, or even tens of thousands of CI’s that are fre
quently distributed over multiple locations.
[0004] Most large IT systems include softWare and tools
that track individual CI’s and issue one or more “alerts”
Whenever the operation of a CI is degraded in some Way.
Additional software and hardWare tools are often used to
track these alerts and to provide for convenient monitoring of
the IT system. HoWever, in the case ofvery large IT systems
that support complex business services it can be dif?cult to
relate CI degradations and failures to actual impacts on busi
ness services. For example, complete failure of one CI may
have very little impact, While even a slight degradation of
another CI may have signi?cant consequences. Hence, time
and effort can be inef?ciently expended, and delivery of ser
vices (and hence revenues) can be unnecessarily reduced, if
CI problems are addressed only on the basis ofthe severity of
the CI failures.
[0005] Business Services Management, or BSM, is a type
of software management tool that addresses this problem by
relating CI’s to business services and using these relation
ships to determine the impact that degradation or failure of a
CI Will have on the business service. Inmany cases, a business
service is conceptually divided into a plurality of business
service elements (BSE’s), and CI’s are related to the BSE’s so
as to better characteriZe the impact of a CI degradation.
[0006] While BSM systems are a signi?cant improvement
compared to traditional IT monitoring systems, knoWn BSM
systems suffer from several problems that limit their practi
cality and accuracy. From a practical standpoint, implemen
tation ofa BSM system typically requires manual assignment
of relationships of CI’s to BSE’s, as Well as manual assign
ment ofdegrees ofimpact, usually expressed as percentages,
Sep. 24, 2009
to each CI-to-BSE relationship. For IT systems that include
thousands or even tens ofthousands of CI’s, this process can
be prohibitive.
[0007] Tools are sometimes available to aid in the assign
ment ofCI’s to BSE’s. For example, auto discovery tools and
application dependency mapping tools can provide a list or
hierarchy of CI’s that are then assigned to a BSE. HoWever,
signi?cant manual data cleansing and manipulation is still
usually required.
[0008] In addition, calculating the BSE impact of CI fail
ures by simply identifying Which CI’s have failed, noting
Which BSE’s the CI’s are related to, and totaling up the
pre-assigned percentages of impact of the associated CI-to
BSE relationships is simplistic, and can provide only a very
approximate estimate ofthe true impact ofCI degradation on
the functioning of a business service.
SUMMARY OF THE INVENTION
[0009] A method is claimed that uses an impact calculation
engine Which incorporates the use of formulas contained in
one or more “balanced scorecards” to determine the degree of
impact on business services and/or business service elements
(BSE’s) causedby degraded operation ofa CI that is part ofan
underlying IT system. The balanced scorecard formulas pro
vide an accurate determination of business service or BSE
impacts by taking into account the natures or types of CI
degradation, herein referred to as CI service aspects, and/or
the degrees of severity of the CI degradations. Use of bal
anced scorecards also eliminates the need to manually assign
degrees of impact to each CI-to-BSE relationship.
[0010] Balanced scorecards contain de?nitions detailing
required service levels for business services. These usually
include multiple requirements tracked over speci?c periods
of time. The de?nitions form part of the data used in the
balanced scorecard and are considered by the impact calcu
lation engine When ascertaining service impacts.
[0011] Preferred embodiments provide an even more accu
rate determination of impacts by determining separate
degrees of impact for each type of service aspect. Further
preferred embodiments minimiZe the dif?culty of imple
menting the method by using default balanced scorecard for
mulas Whenever custom formulas are not provided, thereby
eliminating the need to manually provide a balanced score
card for every combination of BSE and service aspect. In
addition, some preferred embodiments employ a service sub
scription WiZard that automatically speci?es and stores at
least some CI-to-BSE relationships, initially and/or on an
ongoing basis, thereby improving the accuracy ofthe CI-to
BSE database and consequently enhancing the accuracy of
impact determinations. Use of a service subscription WiZard
also reduces or eliminates the need to manually assign CI-to
BSE relationships, thereby greatly reducing the dif?culty of
implementing and maintaining the method.
[0012] The method includes receiving alerts regarding
degraded operation of CI’s, extracting CI identities from the
alerts, and determining the BSE’s to Which the degraded CI’s
are related. The method further includes extracting from each
alert the nature ofthe CI degradation (herein referred to as the
“service aspect”) and/or the severity of the CI degradation,
and determining the impacts on the BSE’s according to “bal
anced scorecar ” formulas that take into account the service
aspects and/or the severities of the alerts.
[0013] In preferred embodiments, alerts are converted into
a common alert format that alloWs informationto be extracted
US 2009/0240510 A1
from all received alerts in a consistent manner. In some pre
ferred embodiments CI-to-BSE relationships are determined
at least partly by retrieving information from a Con?guration
Management Database (“CMDB”) included inthe IT system.
In some of these embodiments, a “reconciliation engine” is
used to assist in reconciling the formats of CI identifying
information as supplied in alerts and as used in the CMDB.
[0014] In otherpreferred embodiments, each service aspect
extracted from an alert is characterized by assigning it to a
service aspect category, and in some of these embodiments
the service aspect categories include performance, availabil
ity, security, end user, capacity, and/or ?nancial. In still other
preferred embodiments severities of CI degradation are
assigned according to the Open Systems Interconnect
(“OSI”) standard.
[0015] In preferred embodiments a default balanced score
card is used to determine the impacts of degraded CI’s on
BSE’s except When it is overridden by a custom balanced
scorecard, and in some ofthese embodiments balanced score
cards can be applicable only to a subset of the BSE’s that
includes at least one BSE, and/or a custom balanced score
card can be applicable only to a subset of service aspect
categories that includes at least one service aspect category.
[0016] In further preferred embodiments, more than one
balanced scorecard can be associated With the same BSE and
service aspect, such that exactly one of the balanced score
cards is applicable under any set ofcircumstances, but differ
ent balanced scorecards are applicable under different sets of
circumstances. These sets of circumstances are sometimes
referredto as Service LevelAgreement Criteria, or “SLAC’s.”
In some of these embodiments, the SLAC’s under Which
different balanced scorecards are applicable to the BSE and
service aspect include different times ofday, different dates of
the year, different days ofthe Week, different usage levels of
the BSE, different usage levels ofthe business service, and/or
other user de?ned criteria, such as IC usage levels or netWork
tra?ic levels In addition, it is possible to manually select the
desired balanced scorecard inreal-time. A collection ofone or
more SLAC’s canbe applied to any individual BSE or a group
of BSE’s.
[0017] In preferred embodiments, the method further
includes a service subscription WiZard that at least partly
automates the assignment ofrelationships ofCI’s to BSE’s, In
some of these preferred embodiments the service subscrip
tion WiZard automatically assigns relationships of CI’s to
BSE’s during the initial implementation ofthe method, and in
some of these preferred embodiments the service subscrip
tion Wizard automatically creates and modi?es assigned rela
tionships ofCI’s to BSE’s on an ongoing basis Whenever a CI
is added to the IT system, a CI is removed from the IT system,
and/or the usage of a CI Within the IT system is modi?ed.
BRIEF DESCRIPTION OF THE DRAWINGS
[0018] FIG. 1A is a functional diagram that illustrates the
basic elements included in a typical BSM system ofthe prior
art;
[0019] FIG. 1B is a functional diagram that illustrates the
structure of a typical BSM con?guration model of the prior
art;
[0020] FIG. 1C is an example of the structure of FIG. 1B
applied to an online banking business service;
[0021] FIG. 2 is a functional diagram that illustrates hoW
BSE impacts caused by degraded operation ofa CI are deter
mined in a typical BSM system of the prior art;
Sep. 24, 2009
[0022] FIG. 3 is a functional diagram that illustrates hoW
BSE impacts caused by degraded operation ofa CI are deter
mined in a preferred embodiment of the present invention;
[0023] FIG. 4 is a table that presents examples from a
preferred embodiment ofrules used to extract service impacts
from alerts;
[0024] FIG. 5 is a table that presents examples from a
preferred embodiment ofrules used to assign OSI degrees of
severity to numerical severity levels extracted from alerts;
[0025] FIG. 6 is a table that presents a default balanced
scorecard from a preferred embodiment;
[0026] FIG. 7 is a table that presents a custom balanced
scorecard from a preferred embodiment; and
[0027] FIG. 8 is a table that presents examples of service
subscription rules used by a service subscription WiZard in a
preferred embodiment.
DETAILED DESCRIPTION OF PREFERRED
EMBODIMENTS
[0028] With reference to FIG. 1A, a business service, or a
business service element (BSE) 100 Within a business ser
vice, is supported by an IT system composed ofa plurality of
con?guration items (CI’s) 102 such as servers, routers, print
ers, databases, user nodes, and such like. In a typical business
services management (BSM) system ofthe prior art, relation
ships 104 ofCI’s to BSE’s are manually assigned, and degrees
of impact 106, usually expressed as percentages, are manu
ally assigned to the relationships 104. For example, if tWo
servers 102 support a speci?c BSE 100, each of the servers
102 might be assigned a degree ofimpact 104 onthat BSE 100
of 50%. An enumeration of the CI’s 102 in the IT system
together With the CI-to-BSE relationships 104 and associated
degrees ofimpact 106 are typically stored by a prior art BSM
in a Con?guration Management Database, or “CMDB” 108.
[0029] IT systems that support complex business services
usually include softWare and/or hardWare tools 110 that
monitor the CI’s 102 and issue reports 112 on CI status, and
When the operation ofa CI becomes degraded or is anticipated
to become degraded, due to a failure, a sloWdoWn, a rise in
usage above acceptable limits, and such like, these softWare
and/or hardWare tools 110 generate alerts 112 that contain
diagnostic information such as the identity of the CI, the
nature ofthe degradation (CPU, login, and such like) and the
severity ofthe degradation (100%, 50%, and such like). In a
typical prior art BSM system, these status reports and alerts
112 are received by an Impact Calculation Engine (“ICE”)
114 that analyZes the status reports and alerts 112 according
to information obtained from the CMDB 110 and estimates
the resulting degrees of impact 116 on the BSE’s
[0030] FIG. 1B is a conceptual diagram of a con?guration
model for a business service 118 that is composed of a plu
rality ofBSE’s 100. In general, each CI 102 can be related 104
to more than one BSE 100. The degrees ofimpact 106 do not
necessarily total 100% for each BSE 100. For example, a BSE
100 may be related to more than one CI 102, but failure of
only one of the related CI’s 102 may cause total failure of
(100% impact to) the BSE 100. Also, degrees ofimpact can
re?ect the priorities of a business, as Well as impacts on
functionality. Even a slight degradation of a BSE 100 that is
vital to generating sales or revenue may be assigned a higher
degree of impact than complete failure of a BSE 100 that is
less critical to the success of the business. In general BSE’s
100 can be subdivided into a plurality ofdaughter BSE’s 120.
US 2009/0240510 A1
In such cases, manual assignment are included in the CMDB
108 ofdegrees ofimpact 106 ofthe daughter BSE’s 120 on the
parent BSE’s 100.
[0031] An example ofthe con?guration model of FIG. 1B
is presented in FIG. 1C, Where the business service 118 is an
online banking service, the BSE’s 100 include subcompo
nents such as logging in, checking balances, transferring
funds, and opening accounts. The opening accounts BSE 100
is further divided into daughter BSE’s 120 than include entry
of customer details and veri?cation of the customer’s social
security number. The CI’s 102 include several servers, rout
ers, and databases, and in general a BSE 100 is dependent on
more than one CI 102 and a CI 102 can be related to more than
one BSE 100. Note that FIG. 1C is intended only to be
illustrative, and shoWs only a small part of What Would be
included in an actual online banking service and underlying
IT system.
[0032] FIG. 2 illustrates the operation of an impact calcu
lation engine (ICE) used in a typical prior art BSM system to
determine the impact ofa degraded CI 102 on a BSE 100, 120.
Upon actual or anticipated degradation ofthe operation ofthe
CI 102, an alert 200 is issuedby a CI monitoring tool 112. The
alert is analyZed, or “parsed,” 202 to determine the identity
204 of the degraded CI 102 that gave rise to the alert 200.
Information is then retrieved regarding the CI 102 from a
Con?guration Management Database (CMDB) 108 that has
been previously populated 206 With relationships 104 ofCI’s
102 to BSE’s 100, 120 and With degrees of impact 106
assigned to the relationships 104.
[0033] Typically, in the prior art, relationships 104 of CI’s
102 to BSE’s 100, 120 are entered manually into the CMDB
108. Degrees of impact 106 of the relationships 104 are
entered either manually, or according to a simpli?ed calcula
tion method. For example, if 10 server CI’s are related 104 to
a certain BSE 100, 120, some prior art systems Will automati
cally assign an equal degree of impact 106 to each of the 10
relationships 104, storing a 10% degree of impact 106 in the
CMDB 108 for each of the relationships 104. Regardless of
hoW they are entered, degrees of impact 106 are typically
stored in the prior art as ?xed values in the CMDB 108.
[0034] Once the information is retrieved from the CMDB
108 regarding relationships 104 and degrees ofimpact 106, a
simple calculation 208 then adds together the degrees of
impact 106 from all alerts 200 for each BSE 100, 120 so as to
determine an estimated overall service impact 210 for each
BSE 100, 120. Typically, for such prior art BSM’s, a degraded
CI 102 is treated as having simply failed, With no regard for
the nature or the degree of severity of the degradation.
[0035] In contrast, FIG. 3 illustrates the process used by a
preferred embodiment of the present invention to determine
the impact ofa degraded CI 102 on a BSE 100, 120. When an
alert 200 is generated due to actual or anticipated degradation
ofthe operation ofa CI 102, the alert 200 is ?rst converted to
a common alert format 300. In general, alerts 200 are gener
ated by different and often unrelated softWare and hardWare
tools that may be provided by different manufacturers or third
party vendors of CI monitoring tools 112. Thus, While alerts
200 are usually issued as text messages, they can differ sig
ni?cantly in their formats. As is discussed beloW, the current
invention relies on extracting more information from alerts
200 than is typical of the prior art, and so it is useful in
preferred embodiments of the present invention to convert
alerts 200 into a common alert format 300 so that subsequent
analysis can be carried out in a consistent fashion.
Sep. 24, 2009
[0036] Once an alert 200 has been converted into a common
alert format 300, it is analyZed, or “parsed” 302, and the
identity of the degraded CI 204 is extracted, along With the
nature of the degradation, herein referred to as the service
aspect 304, and the severity of the degradation, Which in
preferred embodiments is converted to a standard Open Sys
tems Interconnect or OSI severity 306. In the preferred
embodiment ofFIG. 3, the service aspect 304 is characteriZed
by assigning it to a standard service aspect category, Where
the standard service aspect categories are performance, avail
ability, security, end user, capacity, and ?nancial.
[0037] The identity of the degraded CI 204 extracted from
the alert 200 is compared to a Con?guration Management
Database (CMDB) 108 that contains information regarding
relationships 104 of CI’s 102 to BSE’s 100, 120. In the pre
ferred embodiment of FIG. 3, at least some ofthe CI-to-BSE
relationships 104 stored in the CMDB 108 are automatically
determined by a service subscription WiZard 308 that uses
subscription rules to automatically assign CI’s 102 to BSE’s
100, 120, bothWhenthe BSM system is initially implemented
and on an ongoing basis as changes are made to the IT infra
structure.
[0038] If the identi?er for the CI 204 stored in the CMDB
108 does not match the CI identi?er 204 that is included in the
alert 200 generated by the CI monitoring tool 112, a recon
ciliation engine 303 is used to map the CI identi?er 204 in the
alert 200 to the identi?er stored in the CMDB 108. The
reconciliation engine 303 uses sample alerts from the CI
monitoring tool 112 to help a user understand the identi?er
format used in alerts 200 generated by the CI monitoring tool
112 and compare it to the format of the corresponding iden
ti?er stored in the CMDB 108. In preferred embodiments, the
reconciliation engine 303 does this by highlighting details of
Where the formats do not match. The user can then modify
either the source data for the CMDB 108 or the alert format
from the CI monitoring tool 112. In preferred embodiments,
basic rules can also be established and used to automatically
reformat identi?ers from alerts 200 so as to match the format
used in the CMDB 108.
[0039] Once information has been retrieved from the
CMDB 108 regarding BSE’s 100, 120 that have relationships
104 to degraded CI’s that have caused alerts 200, this infor
mation is combined With the service aspect 304 and OSI
severity 306 information also parsed 302 from the alert 200,
and a balanced scorecard formula 310 that takes all of this
information into account is used to determine the cumulative
impact 312 ofall currently active alerts on each service aspect
of each BSE 100, 120. In the case ofparent BSE’s 100, 120
that are composed of daughter BSE’s 120, each alert that is
related to a daughter BSE 120 is considered to also be related
to the parent BSE 100, 120 for purposes of determining
impacts using the balanced scorecard 310. In the preferred
embodiment of FIG. 3, custom balanced scorecards 310 can
be speci?ed Wherever needed for any speci?c service aspect
of any speci?c BSE 100, 120, or for any combination of
service aspects and BSE’s 100, 120. For example, a custom
balanced scorecard 312 could apply only to the performance
service aspect ofa login BSE 100, 120, it could apply to all
service aspects ofa login BSE 100, 120, it could apply to only
the performance and security service aspects ofonly the login
and transfer funds BSE’s 100, 120, and so forth. Multiple
custom balanced scorecards 312 can also be supplied for the
same combination of service aspect(s) and BSE(s) 100, 120,
such that different custom balanced scorecards 312 are active
US 2009/0240510 A1
under different conditions. For example, one custom bal
anced scorecard 312 could apply during daytime business
hours, While another custom balanced scorecard 312 could
apply outside ofdaytime business hours. Or different custom
balanced scorecards 312 could apply on Week days and on
Weekends. Another possibility is that different custom bal
anced scorecards 312 could apply at different levels ofusage
of a business service 118 or a BSE 100, 120. Whenever a
custom balanced scorecard 312 is not speci?ed, a default
balanced scorecard 312 is used.
[0040] FIG. 4 is a table that gives example ofrules that are
used to assign service aspects 304 extracted from alerts 200 to
service aspect categories. In these examples, after an alert 200
is converted into the common alert format 300 and parsed
302, a so-called “object class” 400 ofthe alert 200 is extracted
and a service aspect category 402 is assigned according to the
text of the object class 400. Speci?cally, in the example of
FIG. 4, any alert 200 With an object class 400 containing the
text “CPU” 404 is assigned to the “Performance” category
406, While any alert 200 With an object class 400 containing
the text “Login” 404 is assigned to the “security” service
aspect category 406.
[0041] An example is given in the table ofFIG. 5 ofsimilar
rules that are used to assign degrees of severity 500 extracted
from parsed alerts to OSI standard severity levels 306, 502.
This example applies to alerts generated by a CI monitoring
tool 112 that happens to assign numerical degrees ofseverity
500 to alerts 200, Where the numerical values range from 0 to
100. Numerical severities greater than 80 504 are deemed to
be “critical” 506, betWeen “70” and “80” 504 they are deemed
to be “major” 506, severities betWeen 60 and 70 504 are
considered “minor” 506, those betWeen 50 and 60 504 are
“Wamings” 506, severities betWeen 40 and 50 504 are deemed
for “information” only 506, and beloW 40 504 the severity is
considered to be an indication that there is no degradation of
the CI, Which is expressed as an OSI severity of “clear” 506.
[0042] A default balanced scorecard formula 310 of a pre
ferred embodiment is illustrated in the table ofFIG. 6. A total
is compiled of all alerts 200 received 600 according to the
service aspect 304 and OSI severity level 306 of each alert
200. The resulting impact 602 on each service aspect 304 of
each BSE 100, 120 is then determined according to the rules
speci?ed in the balanced scorecard 310. In the preferred
embodiment of FIG. 6, if even one critical alert 200 is
received 604, the impact on all related BSE’s 100, 120 for the
service aspect 304 ofthat alert 200 is determined to be 100%
606. Similarly, a single major alert results in an impact of75%
on all related BSE’s 100, 120 for the service aspect 304 ofthe
alert 200. If more than one alert 200 causes an impact on the
same service aspect 304 ofthe same BSE 100, 120, the impact
that is greatest among the alerts is determined to be the impact
on that service aspect 304 of that BSE 100, 120.
[0043] FIG. 7 presents a table that describes a custom bal
anced scorecard 310 ofa preferred embodiment. The custom
balanced scorecard 310 applies only to the Login BSE 100,
120, andonly to the Performance and Security service aspects
304. According rules given in the table 700, a single alert 200
With a critical OSI severity level 306 from a CI 102 related to
the login BSE 100, 120 and With a Performance or Security
service aspect 304 Will result in a 100% impact 702 on that
service aspect 304 ofthat BSE 100, 120. In addition, While a
single alert 200 With a Warning OSI severity level 306 Will
have no impact 702, if four or more such alerts 200 are
received, the impact Will be determined to be 100%. Simi
Sep. 24, 2009
larly, a single alert 200 related to the Login BSE 100, 120 With
a Performance or Security service aspect 304 andWith an OSI
severity level 306 ofMajor Will have only a 50% impact 702,
and tWo or more such alerts 200 are required before there is a
75% impact 702.
[0044] FIG. 8 is a table that presents examples ofrules used
by a service subscription WiZard 308 in a preferred embodi
ment to automatically enter relationships ofCI’s 102 to BSE’s
100, 120 into a CMDB 108. In this example, information is
retrieved by the service subscription WiZard 308 from infor
mation resources provided by the IT system regarding CI’s
102 included in the IT system. The information includes
“Object Types” 800 that designate the types of CI’s 102 and
“Object Domains” 802 that designate the sections of the IT
system Where the CI’s 102 are implemented. Rules have been
entered into the service subscription WiZard 308 that assign
CI’s 102 to BSE’s 100, 120,804 according to their object type
800 and object domain 802. For example, an Oracle server
806 in the “Live” domain 808 Will be recorded in the CMDB
108 as being related to the Login BSE 100, 120. An Oracle
server 806 in the Financial domain 808 Will be recorded in the
CMDB 108 as being related to both the Login and Check
Balance BSE’s 100, 120. And a Router 806 in the Central
O?ice domain 808 Will be recorded in the CMDB 108 as
being related to all BSE’s 100, 120.
[0045] Other modi?cations and implementations Will
occur to those skilled in the art Without departing from the
spirit and the scope ofthe invention as claimed. Accordingly,
the above description is not intended to limit the invention
except as indicated in the folloWing claims.
What is claimed is:
1. Amethod for analyZing alerts regarding degraded opera
tion of Con?guration Items (“CI’s”) so as to determine
impacts on business service elements (“BSE’s”) that com
pose a business service, the CI’s being part of an IT system
that supports the business service and each CI being related to
at least one BSE, the method comprising:
receiving the alerts;
extracting from the alerts identities ofthe CI’s;
determining the BSE’s to Which the CI’s are related;
extracting from each alert at least one of the nature of the
degraded operation (herein referred to as the “service
aspect”) and the severity ofthe degraded operation; and
determining the impacts on the BSE’s caused by the
degraded operation of the CI’s according to “balanced
scorecard” formulas that take into account the at least
one ofthe service aspects and the severities ofthe alerts.
2. The method of claim 1, further comprising converting
alerts after they are received into a common alert format that
alloWs information to be extracted from all received alerts in
a consistent manner.
3. The method of claim 1, Wherein determination of the
BSE’s to Which the CI’s are related is accomplished at least
partly by obtaining information from a Con?guration Man
agement Database (“CMDB”) in Which at least some rela
tionships betWeen CI’s and BSE’s are stored.
4. The method of claim 3, further comprising a reconcili
ation engine that at least facilitates the association of infor
mation identifying a CI in an alert With information identify
ing the CI in the CMDB.
5. The method of claim 1, Wherein each service aspect
extracted from an alert is characterized by assigning the ser
vice aspect to a service aspect category.
US 2009/0240510 A1
6. The method of claim 5, wherein the service aspect cat
egories include at least one ofperformance, availability, secu
rity, end user, capacity, and ?nancial.
7. The method of claim 1, Wherein severities of degraded
CI operation extracted from alerts are assigned values accord
ing to the Open Systems Interconnect (“OSI”) standard.
8. The method of claim 1, Wherein a default balanced
scorecard is used to determine the impacts on BSE’s of
degraded operation of CI’s except When a custom balanced
scorecard is applicable.
9. The method of claim 1, Wherein a balanced scorecard
can be applicable only to a subset of the BSE’s that includes
at least one BSE.
10. The method of claim 1, Wherein a balanced scorecard
can be applicable only to a subset of service aspects that
includes at least one service aspect.
11. The method ofclaim 1, Wherein a plurality ofbalanced
scorecards can be associated With the same BSE and service
aspect, such that exactly one of the plurality of balanced
scorecards is applicable to the BSE and service aspect under
any set of circumstances but different balanced scorecards
from the plurality ofbalanced scorecards are applicable to the
BSE and service aspect under different sets ofcircumstances.
12. The method of claim 11, Wherein the balanced score
card that is applicable to the BSE and the service aspect is
selected from the plurality ofbalanced scorecards associated
With the BSE and the service aspect by at least one ofreal time
manual selection, and automatic selection according to at
least one of:
a time of day;
a date;
a day ofthe Week;
Sep. 24, 2009
a usage level of the BSE;
a usage level of the business service;
a usage level of a;
a netWork traf?c level; and
other service level agreement criteria, herein referred to as
SLAC’s.
13. The method of claim 12, Wherein a SLAC can be used
in relation to more than one BSE as a criterion for selecting an
applicable balanced scorecard.
14. The method of claim 1, Wherein at least some of the
balanced scorecard formulas provide a separate degree of
impact for each service aspect extracted from an alert.
15. The method of claim 1, further comprising a service
subscription WiZard that at least partially automates the
assignment of relationships of CI’s to BSE’s.
16. The method of claim 15, Wherein the service subscrip
tion WiZard automatically assigns relationships of CI’s to
BSE’s during an initial implementation of the method.
17. The method of claim 15, Wherein the service subscrip
tion WiZard automatically creates and modi?es assigned rela
tionships ofCI’s to BSE’s When changes to the con?guration
of CI’s Within the IT system take place.
18. The method of claim 15, Wherein the service subscrip
tion WiZard automatically obtains information from data
sources available Within the IT system regarding at least one
of enumeration of CI’s in the IT system and con?guration of
CI’s in the IT system.
19. The method of claim 15, Wherein the service subscrip
tion WiZard maintains a database of information regarding
relationships of CI’s to BSE’s in a Con?guration Manage
ment Database

More Related Content

Viewers also liked

Final Year Project Report
Final Year Project ReportFinal Year Project Report
Final Year Project ReportSean Mc Garry
 
Um time, múltiplos projetos: soluções ágeis para o nosso dia a dia
Um time, múltiplos projetos: soluções ágeis para o nosso dia a diaUm time, múltiplos projetos: soluções ágeis para o nosso dia a dia
Um time, múltiplos projetos: soluções ágeis para o nosso dia a diaGUGP SUCESU-RS
 
Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...
Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...
Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...Enablon Publisher
 
How to Create Content that Converts (2016)
How to Create Content that Converts (2016) How to Create Content that Converts (2016)
How to Create Content that Converts (2016) Taboola
 
Gestão de Requisitos em Projetos
Gestão de Requisitos em ProjetosGestão de Requisitos em Projetos
Gestão de Requisitos em ProjetosGUGP SUCESU-RS
 
Discovery: Intersection of Content and Conversion
Discovery: Intersection of Content and ConversionDiscovery: Intersection of Content and Conversion
Discovery: Intersection of Content and ConversionTaboola
 
Tally.ERPp Features.
Tally.ERPp Features.Tally.ERPp Features.
Tally.ERPp Features.Jack Jhalak
 
Managing a 14 TB reporting datawarehouse with postgresql
Managing a 14 TB reporting datawarehouse with postgresql Managing a 14 TB reporting datawarehouse with postgresql
Managing a 14 TB reporting datawarehouse with postgresql Soumya Ranjan Subudhi
 
Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1
Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1
Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1Sarah McLellan
 
Presentacion con dias positivas en power point
Presentacion con dias positivas en power pointPresentacion con dias positivas en power point
Presentacion con dias positivas en power pointpaolasillagana
 

Viewers also liked (18)

directeur (trice) assurance et controle qualité
directeur (trice) assurance et controle qualitédirecteur (trice) assurance et controle qualité
directeur (trice) assurance et controle qualité
 
FARMACRAZY
FARMACRAZYFARMACRAZY
FARMACRAZY
 
Fiche promotionnelle des stages
Fiche promotionnelle des stagesFiche promotionnelle des stages
Fiche promotionnelle des stages
 
Exceldor - technicien controle qualité
Exceldor - technicien controle qualitéExceldor - technicien controle qualité
Exceldor - technicien controle qualité
 
Programme AQIA 2016
Programme AQIA 2016Programme AQIA 2016
Programme AQIA 2016
 
Affichage poste-cq-les-viandes-forget
Affichage poste-cq-les-viandes-forgetAffichage poste-cq-les-viandes-forget
Affichage poste-cq-les-viandes-forget
 
Final Year Project Report
Final Year Project ReportFinal Year Project Report
Final Year Project Report
 
Um time, múltiplos projetos: soluções ágeis para o nosso dia a dia
Um time, múltiplos projetos: soluções ágeis para o nosso dia a diaUm time, múltiplos projetos: soluções ágeis para o nosso dia a dia
Um time, múltiplos projetos: soluções ágeis para o nosso dia a dia
 
Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...
Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...
Wizness Publisher Tutorial N°2: ¿Como crear y publicar tu informe GRI G4 en l...
 
How to Create Content that Converts (2016)
How to Create Content that Converts (2016) How to Create Content that Converts (2016)
How to Create Content that Converts (2016)
 
Gestão de Requisitos em Projetos
Gestão de Requisitos em ProjetosGestão de Requisitos em Projetos
Gestão de Requisitos em Projetos
 
Discovery: Intersection of Content and Conversion
Discovery: Intersection of Content and ConversionDiscovery: Intersection of Content and Conversion
Discovery: Intersection of Content and Conversion
 
Tally.ERPp Features.
Tally.ERPp Features.Tally.ERPp Features.
Tally.ERPp Features.
 
Constellation
ConstellationConstellation
Constellation
 
Managing a 14 TB reporting datawarehouse with postgresql
Managing a 14 TB reporting datawarehouse with postgresql Managing a 14 TB reporting datawarehouse with postgresql
Managing a 14 TB reporting datawarehouse with postgresql
 
Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1
Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1
Christmas-A5-Brochure-FINAL_HOH_No-Year_Digital-1
 
Presentacion con dias positivas en power point
Presentacion con dias positivas en power pointPresentacion con dias positivas en power point
Presentacion con dias positivas en power point
 
Todos los documentos
Todos los documentosTodos los documentos
Todos los documentos
 

Similar to US20090240510

A Real-Time Information System For Multivariate Statistical Process Control
A Real-Time Information System For Multivariate Statistical Process ControlA Real-Time Information System For Multivariate Statistical Process Control
A Real-Time Information System For Multivariate Statistical Process ControlAngie Miller
 
VIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORK
VIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORKVIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORK
VIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORKIRJET Journal
 
Condition based maintenance
Condition based maintenanceCondition based maintenance
Condition based maintenanceCristian Garcia
 
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
Note on ‘Mapping’  CAAT Audit technique with  3 practical examplesNote on ‘Mapping’  CAAT Audit technique with  3 practical examples
Note on ‘Mapping’ CAAT Audit technique with 3 practical examplesAnmolDhale2
 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event ManagementJade Global
 
A Model Supporting Business Continuity Auditing And Planning In Information S...
A Model Supporting Business Continuity Auditing And Planning In Information S...A Model Supporting Business Continuity Auditing And Planning In Information S...
A Model Supporting Business Continuity Auditing And Planning In Information S...Cynthia King
 
Condition Monitoring and Maintenance Management for Precision Component Manuf...
Condition Monitoring and Maintenance Management for Precision Component Manuf...Condition Monitoring and Maintenance Management for Precision Component Manuf...
Condition Monitoring and Maintenance Management for Precision Component Manuf...IRJET Journal
 
IRJET- E – Healthcare System
IRJET-  	  E – Healthcare SystemIRJET-  	  E – Healthcare System
IRJET- E – Healthcare SystemIRJET Journal
 
Lindy do telecommunications_revenueassurance
Lindy do telecommunications_revenueassuranceLindy do telecommunications_revenueassurance
Lindy do telecommunications_revenueassuranceSilas Musakali
 
CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...
CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...
CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...ijmvsc
 
Simulation for predictive maintenance using weighted training algorithms in ...
Simulation for predictive maintenance using weighted training  algorithms in ...Simulation for predictive maintenance using weighted training  algorithms in ...
Simulation for predictive maintenance using weighted training algorithms in ...IJECEIAES
 
Web based Grievance handling system
Web based Grievance handling systemWeb based Grievance handling system
Web based Grievance handling systemFAKHRUN NISHA
 
EMA Report: The Future of IT Service Management: Five Key Directions for Change
EMA Report: The Future of IT Service Management: Five Key Directions for ChangeEMA Report: The Future of IT Service Management: Five Key Directions for Change
EMA Report: The Future of IT Service Management: Five Key Directions for ChangeCAROL MALIA
 

Similar to US20090240510 (20)

System Analysts_CSV
System Analysts_CSVSystem Analysts_CSV
System Analysts_CSV
 
A Real-Time Information System For Multivariate Statistical Process Control
A Real-Time Information System For Multivariate Statistical Process ControlA Real-Time Information System For Multivariate Statistical Process Control
A Real-Time Information System For Multivariate Statistical Process Control
 
Ijcet 06 07_005
Ijcet 06 07_005Ijcet 06 07_005
Ijcet 06 07_005
 
VIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORK
VIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORKVIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORK
VIRTUAL CLINIC: A CDSS ASSISTEDTELEMEDICINE FRAMEWORK
 
Condition based maintenance
Condition based maintenanceCondition based maintenance
Condition based maintenance
 
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
Note on ‘Mapping’  CAAT Audit technique with  3 practical examplesNote on ‘Mapping’  CAAT Audit technique with  3 practical examples
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event Management
 
17.pdf
17.pdf17.pdf
17.pdf
 
A Model Supporting Business Continuity Auditing And Planning In Information S...
A Model Supporting Business Continuity Auditing And Planning In Information S...A Model Supporting Business Continuity Auditing And Planning In Information S...
A Model Supporting Business Continuity Auditing And Planning In Information S...
 
Condition Monitoring and Maintenance Management for Precision Component Manuf...
Condition Monitoring and Maintenance Management for Precision Component Manuf...Condition Monitoring and Maintenance Management for Precision Component Manuf...
Condition Monitoring and Maintenance Management for Precision Component Manuf...
 
CCEMS
CCEMSCCEMS
CCEMS
 
IRJET- E – Healthcare System
IRJET-  	  E – Healthcare SystemIRJET-  	  E – Healthcare System
IRJET- E – Healthcare System
 
Lindy do telecommunications_revenueassurance
Lindy do telecommunications_revenueassuranceLindy do telecommunications_revenueassurance
Lindy do telecommunications_revenueassurance
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...
CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...
CMMS- Streamlining Maintenance management for Food and Beverage Industry to c...
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
Simulation for predictive maintenance using weighted training algorithms in ...
Simulation for predictive maintenance using weighted training  algorithms in ...Simulation for predictive maintenance using weighted training  algorithms in ...
Simulation for predictive maintenance using weighted training algorithms in ...
 
Web based Grievance handling system
Web based Grievance handling systemWeb based Grievance handling system
Web based Grievance handling system
 
EMA Report: The Future of IT Service Management: Five Key Directions for Change
EMA Report: The Future of IT Service Management: Five Key Directions for ChangeEMA Report: The Future of IT Service Management: Five Key Directions for Change
EMA Report: The Future of IT Service Management: Five Key Directions for Change
 

US20090240510

  • 1. US 20090240510A1 (12) Patent Application Publication (10) Pub. No.: US 2009/0240510 A1 (19) United States Hopkins et a]. (43) Pub. Date: Sep. 24, 2009 (54) BALANCED SCORECARD METHOD FOR Publication Classi?cation DETERMINING AN IMPACT ON A BUSINESS (51) Int Cl SERVICE CAUsED BY DEGRADED G06Q 10/00 (200601) OPERATION OF AN IT SYSTEM (52) US. Cl. .......................................................... .. 705/1 COMPONENT (57) ABSTRACT (76) Inventors: Lloyd B. Hopkins, Manchester (GB); Colin Grif?ths, Manchester (GB); Andrew D. Johnson, NeW York, NY (US); Jonathan D. Miles, Manchester (GB); Paul Bosomworth, Manchester (GB); Grant Glading, Manchester (GB) Correspondence Address: Russ Weinzimmer 614 Nashua Street, Suite 53 Milford, NH 03055 (US) A “balanced scorecard” method is disclosed for determining degrees of impact on business service elements (BSE’s) caused by degradations of con?guration items (CI’s) in an underlying IT system. The formulas are used by an Impact Calculation Engine (ICE) of a Business Services Manage ment (BSM) system. They provide enhanced accuracy by accounting for “service aspects” of alerts (using categories such as performance, availability, security, enduser, capacity, and ?nancial) and/or degrees of CI degradation (in some embodiments using OSI Standards). The method eliminates manual assignment of degrees of impact. Preferred embodi ments convert alerts to a common alert format, determine a separate degree of impact for each service aspect, and use default formulas When custom formulas are not provided. Some embodiments use a service subscription Wizard to at I I IISiO Balanced Scorecard impact Caiculation Engine (ICE) (21) Appl' NO’: 12/050’339 least partly automate the assignment of CI-to-BSE relation ships. Different balanced scorecards can apply to the same (22) Filed: Mar. 18, 2008 BSE at different times, dates, usage levels, etc. Service M an _ ‘I i I 2 Subscription 308 on‘ 0mg ' Wizard f , , OE , ,QQQ .. Alert I . E l I Convert to Common f SOS l | Aiert Format i I 303 & E I f’ I I Reconciiiaiion] Fame f 502 i1 Engine I I all A? £ 201% EI V : w’ i l | Ci identity ) E ' 30A 305 I I04 i I N f‘, f] E I Reiated Service 03! Severity T E l B$E(S) Aspect(s) (or Severities) J E g I I i ‘ i ‘ i ‘ i l i I i E I ‘ impacton Each Service a Aspect of Each BSE
  • 3. v US 2009/0240510 A1Sep. 24, 2009 Sheet 2 0f 8Patent Application Publication
  • 4. mw m: “Q8QQWEEQE5 US 2009/0240510 A1 .iN: Sep. 24, 2009 Sheet 3 0f 8 mavmamm@EEQ Patent Application Publication
  • 5. Patent Application Publication Sep. 24, 2009 Sheet 4 0f 8 US 2009/0240510 A1 CE iaiianshi Assénmnts mg ars iiiiiiiiiii ‘fl 511:} a"? impact (if eiaia x eras a? impaci veraii imam an Eash SE Prim“ Art
  • 6. Patent Application Publication Sep. 24, 2009 Sheet 5 0f 8 US 2009/0240510 A1 38 Wizard ?mnveri i0 ieri Farai veréiyg (0r Sevri?es) SEG
  • 7. Patent Application Publication Sep. 24, 2009 Sheet 6 0f 8 Sewém Aggssi Awégnmam miss US 2009/0240510 A1 S2 Qamman Aim Farina? :. Sgrvma As mi Qbgaat Ciasg p QPU Pe?mmame Lsgin Sesuriiy m Q$§ SSevarity Agségn?mm Ruies ~= QPU QQmmQn Aim Fmmat Sevgrity Lgvei Q$E $€v$my > 8G Qréticai > Ti’? and < 8G Maia? > $9 and < “FG Mimi“ > 5% and < ?g Warning >46 and < 50 Enimmatian < 4G Cigar
  • 8. Patent Application Publication Sep. 24, 2009 Sheet 7 0f 8 US 2009/0240510 A1 inimmatignai x '3 0 w 56% 6% Enimaiionai x i m %
  • 9. Patent Application Publication Sep. 24, 2009 Sheet 8 0f 8 US 2009/0240510 A1 mg mow ‘NEE25G...“ wwmiwxmmwimimwixrQ m>mimmmmgmmM5335 Em
  • 10. US 2009/0240510 A1 BALANCED SCORECARD METHOD FOR DETERMINING AN IMPACT ON A BUSINESS SERVICE CAUSED BY DEGRADED OPERATION OF AN IT SYSTEM COMPONENT FIELD OF THE INVENTION [0001] The invention generally relates to management of Information Technology systems, and more speci?cally to business services management systems. BACKGROUND OF THE INVENTION [0002] Almost every business uses some form of“Informa tion Technology” system, or IT system, to support various activities that contribute to the delivery of a product and/or a service. A typical business IT system is composed of a plu rality of “Con?guration Items” or “CI’s” that can include personal computers, printers, fax machines, scanners, rout ers, servers, and such like. Depending on its nature and siZe, a business can be partly or even totally dependent on its IT system or systems, and may not be able to deliver its products and/or services if the IT system fails. [0003] Many businesses offer services that are delivered mostly or even entirely by IT systems, With little or no direct human activity. Examples include automated bank tellers, online banking systems, online travel reservation systems, online dating services, online auction sites, and such like. The IT systems that enable these kinds of complex business ser vices are typically very large, being composed of hundreds, thousands, or even tens of thousands of CI’s that are fre quently distributed over multiple locations. [0004] Most large IT systems include softWare and tools that track individual CI’s and issue one or more “alerts” Whenever the operation of a CI is degraded in some Way. Additional software and hardWare tools are often used to track these alerts and to provide for convenient monitoring of the IT system. HoWever, in the case ofvery large IT systems that support complex business services it can be dif?cult to relate CI degradations and failures to actual impacts on busi ness services. For example, complete failure of one CI may have very little impact, While even a slight degradation of another CI may have signi?cant consequences. Hence, time and effort can be inef?ciently expended, and delivery of ser vices (and hence revenues) can be unnecessarily reduced, if CI problems are addressed only on the basis ofthe severity of the CI failures. [0005] Business Services Management, or BSM, is a type of software management tool that addresses this problem by relating CI’s to business services and using these relation ships to determine the impact that degradation or failure of a CI Will have on the business service. Inmany cases, a business service is conceptually divided into a plurality of business service elements (BSE’s), and CI’s are related to the BSE’s so as to better characteriZe the impact of a CI degradation. [0006] While BSM systems are a signi?cant improvement compared to traditional IT monitoring systems, knoWn BSM systems suffer from several problems that limit their practi cality and accuracy. From a practical standpoint, implemen tation ofa BSM system typically requires manual assignment of relationships of CI’s to BSE’s, as Well as manual assign ment ofdegrees ofimpact, usually expressed as percentages, Sep. 24, 2009 to each CI-to-BSE relationship. For IT systems that include thousands or even tens ofthousands of CI’s, this process can be prohibitive. [0007] Tools are sometimes available to aid in the assign ment ofCI’s to BSE’s. For example, auto discovery tools and application dependency mapping tools can provide a list or hierarchy of CI’s that are then assigned to a BSE. HoWever, signi?cant manual data cleansing and manipulation is still usually required. [0008] In addition, calculating the BSE impact of CI fail ures by simply identifying Which CI’s have failed, noting Which BSE’s the CI’s are related to, and totaling up the pre-assigned percentages of impact of the associated CI-to BSE relationships is simplistic, and can provide only a very approximate estimate ofthe true impact ofCI degradation on the functioning of a business service. SUMMARY OF THE INVENTION [0009] A method is claimed that uses an impact calculation engine Which incorporates the use of formulas contained in one or more “balanced scorecards” to determine the degree of impact on business services and/or business service elements (BSE’s) causedby degraded operation ofa CI that is part ofan underlying IT system. The balanced scorecard formulas pro vide an accurate determination of business service or BSE impacts by taking into account the natures or types of CI degradation, herein referred to as CI service aspects, and/or the degrees of severity of the CI degradations. Use of bal anced scorecards also eliminates the need to manually assign degrees of impact to each CI-to-BSE relationship. [0010] Balanced scorecards contain de?nitions detailing required service levels for business services. These usually include multiple requirements tracked over speci?c periods of time. The de?nitions form part of the data used in the balanced scorecard and are considered by the impact calcu lation engine When ascertaining service impacts. [0011] Preferred embodiments provide an even more accu rate determination of impacts by determining separate degrees of impact for each type of service aspect. Further preferred embodiments minimiZe the dif?culty of imple menting the method by using default balanced scorecard for mulas Whenever custom formulas are not provided, thereby eliminating the need to manually provide a balanced score card for every combination of BSE and service aspect. In addition, some preferred embodiments employ a service sub scription WiZard that automatically speci?es and stores at least some CI-to-BSE relationships, initially and/or on an ongoing basis, thereby improving the accuracy ofthe CI-to BSE database and consequently enhancing the accuracy of impact determinations. Use of a service subscription WiZard also reduces or eliminates the need to manually assign CI-to BSE relationships, thereby greatly reducing the dif?culty of implementing and maintaining the method. [0012] The method includes receiving alerts regarding degraded operation of CI’s, extracting CI identities from the alerts, and determining the BSE’s to Which the degraded CI’s are related. The method further includes extracting from each alert the nature ofthe CI degradation (herein referred to as the “service aspect”) and/or the severity of the CI degradation, and determining the impacts on the BSE’s according to “bal anced scorecar ” formulas that take into account the service aspects and/or the severities of the alerts. [0013] In preferred embodiments, alerts are converted into a common alert format that alloWs informationto be extracted
  • 11. US 2009/0240510 A1 from all received alerts in a consistent manner. In some pre ferred embodiments CI-to-BSE relationships are determined at least partly by retrieving information from a Con?guration Management Database (“CMDB”) included inthe IT system. In some of these embodiments, a “reconciliation engine” is used to assist in reconciling the formats of CI identifying information as supplied in alerts and as used in the CMDB. [0014] In otherpreferred embodiments, each service aspect extracted from an alert is characterized by assigning it to a service aspect category, and in some of these embodiments the service aspect categories include performance, availabil ity, security, end user, capacity, and/or ?nancial. In still other preferred embodiments severities of CI degradation are assigned according to the Open Systems Interconnect (“OSI”) standard. [0015] In preferred embodiments a default balanced score card is used to determine the impacts of degraded CI’s on BSE’s except When it is overridden by a custom balanced scorecard, and in some ofthese embodiments balanced score cards can be applicable only to a subset of the BSE’s that includes at least one BSE, and/or a custom balanced score card can be applicable only to a subset of service aspect categories that includes at least one service aspect category. [0016] In further preferred embodiments, more than one balanced scorecard can be associated With the same BSE and service aspect, such that exactly one of the balanced score cards is applicable under any set ofcircumstances, but differ ent balanced scorecards are applicable under different sets of circumstances. These sets of circumstances are sometimes referredto as Service LevelAgreement Criteria, or “SLAC’s.” In some of these embodiments, the SLAC’s under Which different balanced scorecards are applicable to the BSE and service aspect include different times ofday, different dates of the year, different days ofthe Week, different usage levels of the BSE, different usage levels ofthe business service, and/or other user de?ned criteria, such as IC usage levels or netWork tra?ic levels In addition, it is possible to manually select the desired balanced scorecard inreal-time. A collection ofone or more SLAC’s canbe applied to any individual BSE or a group of BSE’s. [0017] In preferred embodiments, the method further includes a service subscription WiZard that at least partly automates the assignment ofrelationships ofCI’s to BSE’s, In some of these preferred embodiments the service subscrip tion WiZard automatically assigns relationships of CI’s to BSE’s during the initial implementation ofthe method, and in some of these preferred embodiments the service subscrip tion Wizard automatically creates and modi?es assigned rela tionships ofCI’s to BSE’s on an ongoing basis Whenever a CI is added to the IT system, a CI is removed from the IT system, and/or the usage of a CI Within the IT system is modi?ed. BRIEF DESCRIPTION OF THE DRAWINGS [0018] FIG. 1A is a functional diagram that illustrates the basic elements included in a typical BSM system ofthe prior art; [0019] FIG. 1B is a functional diagram that illustrates the structure of a typical BSM con?guration model of the prior art; [0020] FIG. 1C is an example of the structure of FIG. 1B applied to an online banking business service; [0021] FIG. 2 is a functional diagram that illustrates hoW BSE impacts caused by degraded operation ofa CI are deter mined in a typical BSM system of the prior art; Sep. 24, 2009 [0022] FIG. 3 is a functional diagram that illustrates hoW BSE impacts caused by degraded operation ofa CI are deter mined in a preferred embodiment of the present invention; [0023] FIG. 4 is a table that presents examples from a preferred embodiment ofrules used to extract service impacts from alerts; [0024] FIG. 5 is a table that presents examples from a preferred embodiment ofrules used to assign OSI degrees of severity to numerical severity levels extracted from alerts; [0025] FIG. 6 is a table that presents a default balanced scorecard from a preferred embodiment; [0026] FIG. 7 is a table that presents a custom balanced scorecard from a preferred embodiment; and [0027] FIG. 8 is a table that presents examples of service subscription rules used by a service subscription WiZard in a preferred embodiment. DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS [0028] With reference to FIG. 1A, a business service, or a business service element (BSE) 100 Within a business ser vice, is supported by an IT system composed ofa plurality of con?guration items (CI’s) 102 such as servers, routers, print ers, databases, user nodes, and such like. In a typical business services management (BSM) system ofthe prior art, relation ships 104 ofCI’s to BSE’s are manually assigned, and degrees of impact 106, usually expressed as percentages, are manu ally assigned to the relationships 104. For example, if tWo servers 102 support a speci?c BSE 100, each of the servers 102 might be assigned a degree ofimpact 104 onthat BSE 100 of 50%. An enumeration of the CI’s 102 in the IT system together With the CI-to-BSE relationships 104 and associated degrees ofimpact 106 are typically stored by a prior art BSM in a Con?guration Management Database, or “CMDB” 108. [0029] IT systems that support complex business services usually include softWare and/or hardWare tools 110 that monitor the CI’s 102 and issue reports 112 on CI status, and When the operation ofa CI becomes degraded or is anticipated to become degraded, due to a failure, a sloWdoWn, a rise in usage above acceptable limits, and such like, these softWare and/or hardWare tools 110 generate alerts 112 that contain diagnostic information such as the identity of the CI, the nature ofthe degradation (CPU, login, and such like) and the severity ofthe degradation (100%, 50%, and such like). In a typical prior art BSM system, these status reports and alerts 112 are received by an Impact Calculation Engine (“ICE”) 114 that analyZes the status reports and alerts 112 according to information obtained from the CMDB 110 and estimates the resulting degrees of impact 116 on the BSE’s [0030] FIG. 1B is a conceptual diagram of a con?guration model for a business service 118 that is composed of a plu rality ofBSE’s 100. In general, each CI 102 can be related 104 to more than one BSE 100. The degrees ofimpact 106 do not necessarily total 100% for each BSE 100. For example, a BSE 100 may be related to more than one CI 102, but failure of only one of the related CI’s 102 may cause total failure of (100% impact to) the BSE 100. Also, degrees ofimpact can re?ect the priorities of a business, as Well as impacts on functionality. Even a slight degradation of a BSE 100 that is vital to generating sales or revenue may be assigned a higher degree of impact than complete failure of a BSE 100 that is less critical to the success of the business. In general BSE’s 100 can be subdivided into a plurality ofdaughter BSE’s 120.
  • 12. US 2009/0240510 A1 In such cases, manual assignment are included in the CMDB 108 ofdegrees ofimpact 106 ofthe daughter BSE’s 120 on the parent BSE’s 100. [0031] An example ofthe con?guration model of FIG. 1B is presented in FIG. 1C, Where the business service 118 is an online banking service, the BSE’s 100 include subcompo nents such as logging in, checking balances, transferring funds, and opening accounts. The opening accounts BSE 100 is further divided into daughter BSE’s 120 than include entry of customer details and veri?cation of the customer’s social security number. The CI’s 102 include several servers, rout ers, and databases, and in general a BSE 100 is dependent on more than one CI 102 and a CI 102 can be related to more than one BSE 100. Note that FIG. 1C is intended only to be illustrative, and shoWs only a small part of What Would be included in an actual online banking service and underlying IT system. [0032] FIG. 2 illustrates the operation of an impact calcu lation engine (ICE) used in a typical prior art BSM system to determine the impact ofa degraded CI 102 on a BSE 100, 120. Upon actual or anticipated degradation ofthe operation ofthe CI 102, an alert 200 is issuedby a CI monitoring tool 112. The alert is analyZed, or “parsed,” 202 to determine the identity 204 of the degraded CI 102 that gave rise to the alert 200. Information is then retrieved regarding the CI 102 from a Con?guration Management Database (CMDB) 108 that has been previously populated 206 With relationships 104 ofCI’s 102 to BSE’s 100, 120 and With degrees of impact 106 assigned to the relationships 104. [0033] Typically, in the prior art, relationships 104 of CI’s 102 to BSE’s 100, 120 are entered manually into the CMDB 108. Degrees of impact 106 of the relationships 104 are entered either manually, or according to a simpli?ed calcula tion method. For example, if 10 server CI’s are related 104 to a certain BSE 100, 120, some prior art systems Will automati cally assign an equal degree of impact 106 to each of the 10 relationships 104, storing a 10% degree of impact 106 in the CMDB 108 for each of the relationships 104. Regardless of hoW they are entered, degrees of impact 106 are typically stored in the prior art as ?xed values in the CMDB 108. [0034] Once the information is retrieved from the CMDB 108 regarding relationships 104 and degrees ofimpact 106, a simple calculation 208 then adds together the degrees of impact 106 from all alerts 200 for each BSE 100, 120 so as to determine an estimated overall service impact 210 for each BSE 100, 120. Typically, for such prior art BSM’s, a degraded CI 102 is treated as having simply failed, With no regard for the nature or the degree of severity of the degradation. [0035] In contrast, FIG. 3 illustrates the process used by a preferred embodiment of the present invention to determine the impact ofa degraded CI 102 on a BSE 100, 120. When an alert 200 is generated due to actual or anticipated degradation ofthe operation ofa CI 102, the alert 200 is ?rst converted to a common alert format 300. In general, alerts 200 are gener ated by different and often unrelated softWare and hardWare tools that may be provided by different manufacturers or third party vendors of CI monitoring tools 112. Thus, While alerts 200 are usually issued as text messages, they can differ sig ni?cantly in their formats. As is discussed beloW, the current invention relies on extracting more information from alerts 200 than is typical of the prior art, and so it is useful in preferred embodiments of the present invention to convert alerts 200 into a common alert format 300 so that subsequent analysis can be carried out in a consistent fashion. Sep. 24, 2009 [0036] Once an alert 200 has been converted into a common alert format 300, it is analyZed, or “parsed” 302, and the identity of the degraded CI 204 is extracted, along With the nature of the degradation, herein referred to as the service aspect 304, and the severity of the degradation, Which in preferred embodiments is converted to a standard Open Sys tems Interconnect or OSI severity 306. In the preferred embodiment ofFIG. 3, the service aspect 304 is characteriZed by assigning it to a standard service aspect category, Where the standard service aspect categories are performance, avail ability, security, end user, capacity, and ?nancial. [0037] The identity of the degraded CI 204 extracted from the alert 200 is compared to a Con?guration Management Database (CMDB) 108 that contains information regarding relationships 104 of CI’s 102 to BSE’s 100, 120. In the pre ferred embodiment of FIG. 3, at least some ofthe CI-to-BSE relationships 104 stored in the CMDB 108 are automatically determined by a service subscription WiZard 308 that uses subscription rules to automatically assign CI’s 102 to BSE’s 100, 120, bothWhenthe BSM system is initially implemented and on an ongoing basis as changes are made to the IT infra structure. [0038] If the identi?er for the CI 204 stored in the CMDB 108 does not match the CI identi?er 204 that is included in the alert 200 generated by the CI monitoring tool 112, a recon ciliation engine 303 is used to map the CI identi?er 204 in the alert 200 to the identi?er stored in the CMDB 108. The reconciliation engine 303 uses sample alerts from the CI monitoring tool 112 to help a user understand the identi?er format used in alerts 200 generated by the CI monitoring tool 112 and compare it to the format of the corresponding iden ti?er stored in the CMDB 108. In preferred embodiments, the reconciliation engine 303 does this by highlighting details of Where the formats do not match. The user can then modify either the source data for the CMDB 108 or the alert format from the CI monitoring tool 112. In preferred embodiments, basic rules can also be established and used to automatically reformat identi?ers from alerts 200 so as to match the format used in the CMDB 108. [0039] Once information has been retrieved from the CMDB 108 regarding BSE’s 100, 120 that have relationships 104 to degraded CI’s that have caused alerts 200, this infor mation is combined With the service aspect 304 and OSI severity 306 information also parsed 302 from the alert 200, and a balanced scorecard formula 310 that takes all of this information into account is used to determine the cumulative impact 312 ofall currently active alerts on each service aspect of each BSE 100, 120. In the case ofparent BSE’s 100, 120 that are composed of daughter BSE’s 120, each alert that is related to a daughter BSE 120 is considered to also be related to the parent BSE 100, 120 for purposes of determining impacts using the balanced scorecard 310. In the preferred embodiment of FIG. 3, custom balanced scorecards 310 can be speci?ed Wherever needed for any speci?c service aspect of any speci?c BSE 100, 120, or for any combination of service aspects and BSE’s 100, 120. For example, a custom balanced scorecard 312 could apply only to the performance service aspect ofa login BSE 100, 120, it could apply to all service aspects ofa login BSE 100, 120, it could apply to only the performance and security service aspects ofonly the login and transfer funds BSE’s 100, 120, and so forth. Multiple custom balanced scorecards 312 can also be supplied for the same combination of service aspect(s) and BSE(s) 100, 120, such that different custom balanced scorecards 312 are active
  • 13. US 2009/0240510 A1 under different conditions. For example, one custom bal anced scorecard 312 could apply during daytime business hours, While another custom balanced scorecard 312 could apply outside ofdaytime business hours. Or different custom balanced scorecards 312 could apply on Week days and on Weekends. Another possibility is that different custom bal anced scorecards 312 could apply at different levels ofusage of a business service 118 or a BSE 100, 120. Whenever a custom balanced scorecard 312 is not speci?ed, a default balanced scorecard 312 is used. [0040] FIG. 4 is a table that gives example ofrules that are used to assign service aspects 304 extracted from alerts 200 to service aspect categories. In these examples, after an alert 200 is converted into the common alert format 300 and parsed 302, a so-called “object class” 400 ofthe alert 200 is extracted and a service aspect category 402 is assigned according to the text of the object class 400. Speci?cally, in the example of FIG. 4, any alert 200 With an object class 400 containing the text “CPU” 404 is assigned to the “Performance” category 406, While any alert 200 With an object class 400 containing the text “Login” 404 is assigned to the “security” service aspect category 406. [0041] An example is given in the table ofFIG. 5 ofsimilar rules that are used to assign degrees of severity 500 extracted from parsed alerts to OSI standard severity levels 306, 502. This example applies to alerts generated by a CI monitoring tool 112 that happens to assign numerical degrees ofseverity 500 to alerts 200, Where the numerical values range from 0 to 100. Numerical severities greater than 80 504 are deemed to be “critical” 506, betWeen “70” and “80” 504 they are deemed to be “major” 506, severities betWeen 60 and 70 504 are considered “minor” 506, those betWeen 50 and 60 504 are “Wamings” 506, severities betWeen 40 and 50 504 are deemed for “information” only 506, and beloW 40 504 the severity is considered to be an indication that there is no degradation of the CI, Which is expressed as an OSI severity of “clear” 506. [0042] A default balanced scorecard formula 310 of a pre ferred embodiment is illustrated in the table ofFIG. 6. A total is compiled of all alerts 200 received 600 according to the service aspect 304 and OSI severity level 306 of each alert 200. The resulting impact 602 on each service aspect 304 of each BSE 100, 120 is then determined according to the rules speci?ed in the balanced scorecard 310. In the preferred embodiment of FIG. 6, if even one critical alert 200 is received 604, the impact on all related BSE’s 100, 120 for the service aspect 304 ofthat alert 200 is determined to be 100% 606. Similarly, a single major alert results in an impact of75% on all related BSE’s 100, 120 for the service aspect 304 ofthe alert 200. If more than one alert 200 causes an impact on the same service aspect 304 ofthe same BSE 100, 120, the impact that is greatest among the alerts is determined to be the impact on that service aspect 304 of that BSE 100, 120. [0043] FIG. 7 presents a table that describes a custom bal anced scorecard 310 ofa preferred embodiment. The custom balanced scorecard 310 applies only to the Login BSE 100, 120, andonly to the Performance and Security service aspects 304. According rules given in the table 700, a single alert 200 With a critical OSI severity level 306 from a CI 102 related to the login BSE 100, 120 and With a Performance or Security service aspect 304 Will result in a 100% impact 702 on that service aspect 304 ofthat BSE 100, 120. In addition, While a single alert 200 With a Warning OSI severity level 306 Will have no impact 702, if four or more such alerts 200 are received, the impact Will be determined to be 100%. Simi Sep. 24, 2009 larly, a single alert 200 related to the Login BSE 100, 120 With a Performance or Security service aspect 304 andWith an OSI severity level 306 ofMajor Will have only a 50% impact 702, and tWo or more such alerts 200 are required before there is a 75% impact 702. [0044] FIG. 8 is a table that presents examples ofrules used by a service subscription WiZard 308 in a preferred embodi ment to automatically enter relationships ofCI’s 102 to BSE’s 100, 120 into a CMDB 108. In this example, information is retrieved by the service subscription WiZard 308 from infor mation resources provided by the IT system regarding CI’s 102 included in the IT system. The information includes “Object Types” 800 that designate the types of CI’s 102 and “Object Domains” 802 that designate the sections of the IT system Where the CI’s 102 are implemented. Rules have been entered into the service subscription WiZard 308 that assign CI’s 102 to BSE’s 100, 120,804 according to their object type 800 and object domain 802. For example, an Oracle server 806 in the “Live” domain 808 Will be recorded in the CMDB 108 as being related to the Login BSE 100, 120. An Oracle server 806 in the Financial domain 808 Will be recorded in the CMDB 108 as being related to both the Login and Check Balance BSE’s 100, 120. And a Router 806 in the Central O?ice domain 808 Will be recorded in the CMDB 108 as being related to all BSE’s 100, 120. [0045] Other modi?cations and implementations Will occur to those skilled in the art Without departing from the spirit and the scope ofthe invention as claimed. Accordingly, the above description is not intended to limit the invention except as indicated in the folloWing claims. What is claimed is: 1. Amethod for analyZing alerts regarding degraded opera tion of Con?guration Items (“CI’s”) so as to determine impacts on business service elements (“BSE’s”) that com pose a business service, the CI’s being part of an IT system that supports the business service and each CI being related to at least one BSE, the method comprising: receiving the alerts; extracting from the alerts identities ofthe CI’s; determining the BSE’s to Which the CI’s are related; extracting from each alert at least one of the nature of the degraded operation (herein referred to as the “service aspect”) and the severity ofthe degraded operation; and determining the impacts on the BSE’s caused by the degraded operation of the CI’s according to “balanced scorecard” formulas that take into account the at least one ofthe service aspects and the severities ofthe alerts. 2. The method of claim 1, further comprising converting alerts after they are received into a common alert format that alloWs information to be extracted from all received alerts in a consistent manner. 3. The method of claim 1, Wherein determination of the BSE’s to Which the CI’s are related is accomplished at least partly by obtaining information from a Con?guration Man agement Database (“CMDB”) in Which at least some rela tionships betWeen CI’s and BSE’s are stored. 4. The method of claim 3, further comprising a reconcili ation engine that at least facilitates the association of infor mation identifying a CI in an alert With information identify ing the CI in the CMDB. 5. The method of claim 1, Wherein each service aspect extracted from an alert is characterized by assigning the ser vice aspect to a service aspect category.
  • 14. US 2009/0240510 A1 6. The method of claim 5, wherein the service aspect cat egories include at least one ofperformance, availability, secu rity, end user, capacity, and ?nancial. 7. The method of claim 1, Wherein severities of degraded CI operation extracted from alerts are assigned values accord ing to the Open Systems Interconnect (“OSI”) standard. 8. The method of claim 1, Wherein a default balanced scorecard is used to determine the impacts on BSE’s of degraded operation of CI’s except When a custom balanced scorecard is applicable. 9. The method of claim 1, Wherein a balanced scorecard can be applicable only to a subset of the BSE’s that includes at least one BSE. 10. The method of claim 1, Wherein a balanced scorecard can be applicable only to a subset of service aspects that includes at least one service aspect. 11. The method ofclaim 1, Wherein a plurality ofbalanced scorecards can be associated With the same BSE and service aspect, such that exactly one of the plurality of balanced scorecards is applicable to the BSE and service aspect under any set of circumstances but different balanced scorecards from the plurality ofbalanced scorecards are applicable to the BSE and service aspect under different sets ofcircumstances. 12. The method of claim 11, Wherein the balanced score card that is applicable to the BSE and the service aspect is selected from the plurality ofbalanced scorecards associated With the BSE and the service aspect by at least one ofreal time manual selection, and automatic selection according to at least one of: a time of day; a date; a day ofthe Week; Sep. 24, 2009 a usage level of the BSE; a usage level of the business service; a usage level of a; a netWork traf?c level; and other service level agreement criteria, herein referred to as SLAC’s. 13. The method of claim 12, Wherein a SLAC can be used in relation to more than one BSE as a criterion for selecting an applicable balanced scorecard. 14. The method of claim 1, Wherein at least some of the balanced scorecard formulas provide a separate degree of impact for each service aspect extracted from an alert. 15. The method of claim 1, further comprising a service subscription WiZard that at least partially automates the assignment of relationships of CI’s to BSE’s. 16. The method of claim 15, Wherein the service subscrip tion WiZard automatically assigns relationships of CI’s to BSE’s during an initial implementation of the method. 17. The method of claim 15, Wherein the service subscrip tion WiZard automatically creates and modi?es assigned rela tionships ofCI’s to BSE’s When changes to the con?guration of CI’s Within the IT system take place. 18. The method of claim 15, Wherein the service subscrip tion WiZard automatically obtains information from data sources available Within the IT system regarding at least one of enumeration of CI’s in the IT system and con?guration of CI’s in the IT system. 19. The method of claim 15, Wherein the service subscrip tion WiZard maintains a database of information regarding relationships of CI’s to BSE’s in a Con?guration Manage ment Database