SlideShare a Scribd company logo
1 of 18
Download to read offline
CA Council for
Technical Excellence
Information
Mining and the
CMDB
CA Architects’
Conference
Presented By:
David A Messineo
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
The Challenge –
Find the Architectural Risks?
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Using Your Intuition
E
F
D
A
H
G
J
B
K
L
M
C
Q
P
O
N
> Assume A, B, C are Services
> What questions would you ask?
> Without having additional information what risks might you
possibly assume exists?
> What led you to think that way?
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 20094
What would Charlie do?
> Mathematics has an inner beauty but
only satisfies its true capabilities
when driven by interpretation by
novices and experts alike
> NUMB3RS – It’s not just a bunch of
actors acting like geniuses to
entertain you – it’s actually a true
model for how math is functional
> Using Math is all about identifying the
germ of an idea, making reasonable
assumptions, building a model, and
applying it to real life
> The CMDB is one such example using
the concept of “Network Algebra” (i.e
Graph Theory)
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 20095
Automating Architecture – a possibility?
> Automate Root-Cause
Analysis
> Provide a portal to encourage
the building of “knowledge
rules” and role-based
interfaces
> Identify Architectural Flaws
> Automate policy-based
availability, capacity, and IT
continuity management
> Support a rigorous ever-
changing services model
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Real – World Example(s)
E
F
D
A
H
G
J
B
K
L
M
C
Q
P
O
N
> Example #1: Identify where there may be a high degree
of risk for making architectural changes
> Example #2: Identify where there may be an existing
architectural risks for IT Continuity
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 20097
Data Collection
Strategies for “finding” evidence
> Instrumental relationships – how configuration items
support one another operationally through a hierarchy
> Communication relations – linkages between actors,
what channels they use and the messages between them
> Boundary relationships – how services & systems are
bounded through support of common goals (e.g. SLA)
> Authority / power relations – how the configuration of
a CI is managed through policy
> Transaction relations – how services & systems are
related through common transactions
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 20098
Key Mathematical Terms
Part 1 – Core Terms
> Node (Point)
> Link (Line)
> Graph
> Network
> Path
> Length = # Links
 Yellow = 6
 Red = 2
> Distance = Min # Points
 Node A / Node Q = 5
Node
Link
Network
Graph
Path
Z
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 20099
Key Mathematical Terms
Part 2 – Common Terms
> Adjacent (adjacency)
> Degree = # Links
 Degree (E) = 1
 Degree (G) = 2
 Degree (A) = 5
> Neighborhood
> Inclusiveness
 = Linked – Not Linked
 Graph = 16 – 1 = 15
> Density
 # of Links / Possible Links
Node
Link
Network
Graph
Path
Adjacent
Z
Neighborhood
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Density
No. of connected
points
0 2 3 4 4 4
Inclusiveness 0 0.5 0.7 1.0 1.0 1.0
Sum of Degrees 0 2 4 6 8 12
No of lines 0 1 2 3 4 6
Density 0 0.1 0.3 0.5 0.7 1.0
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 200911
Key Mathematical Terms
Part 3 – Advanced Terms
> Local Centrality (Absolute)
> Local Centrality (Relative)
> Global Centrality
Node
Link
Network
Graph
Path
Adjacent
Z
Neighborhood
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Centality
E
F
D
A
H
G
J
B
K
L
M
C
Q
P
O
N
A,C B G,M J, K, L All
other
points
5 5 2 1 1
.33 .33 .13 .07 .07
43 33 37 48 57Global Centrality
Local
Centrality
Absolute
Relative
<
J
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Applying Your Intuition
Centrality and Density
> Example #1: Identify where there may be a high degree
of risk for making architectural changes
 Change Risk Analysis
– Centrality: Identifies areas where a “small” change may
have huge impacts
– Density: Identifies areas where the planning for a change
may become complicated
> Example #2: Identify where there may be an
architectural risks for IT Continuity
 IT Continuity / Availability
– Centrality: Identifies architectural points where IT
Continuity may require additional attention
– Density: Identifies where there may too much money or
resources be dedicated to Continuity
Software Tools
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Network Views – Image 1 (Pajek)
15
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Network Views – Image 2 (Pajek)
16
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Network Mathematics (Pajek)
17
CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade
names, services marks and logos referenced herein belong to their respective companies.
CA Architects’ Conference
April 20-22, 2009
Building Your Own Sandbox
> The Simple Way
 Download Pajek, Text2Pajek, Excel2Pakek
 Use Excel to Model Data
 Convert to Pajek format from Excel and load into Pajek
> Using CA Technology
 Setup the CA CMDB
 Place Sample Data into the CA CMDB
 Run SQL Extraction Script & BCP Script (contact me)
 Convert to Pajek format from CSV txt and load into Pajek
> Ultra Cool
 Download MAGE and enter the world of 3-D Visualization

More Related Content

Viewers also liked

IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business WorldsIT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business WorldsNovell
 
Building a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground UpBuilding a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground UpNovell
 
Kunalhasija CMDB &amp; ITIL
Kunalhasija CMDB &amp; ITILKunalhasija CMDB &amp; ITIL
Kunalhasija CMDB &amp; ITILKunal Hasija
 
IT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignIT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignEvergreen Systems
 
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service CatalogsService Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service CatalogsEvergreen Systems
 
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...Evergreen Systems
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery ToolsAntonio Rolle
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB EnigmaAxios Systems
 
Running the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4ITRunning the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4ITcccamericas
 
IT4IT Overview (A new standard for IT management)
IT4IT Overview (A new standard for IT management)IT4IT Overview (A new standard for IT management)
IT4IT Overview (A new standard for IT management)Charles Betz
 
Defining Services for a Service Catalog
Defining Services for a Service CatalogDefining Services for a Service Catalog
Defining Services for a Service CatalogAxios Systems
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDBManageEngine
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model OverviewMark Peacock
 

Viewers also liked (15)

IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business WorldsIT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
 
Building a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground UpBuilding a Configuration Management Database from the Ground Up
Building a Configuration Management Database from the Ground Up
 
Kunalhasija CMDB &amp; ITIL
Kunalhasija CMDB &amp; ITILKunalhasija CMDB &amp; ITIL
Kunalhasija CMDB &amp; ITIL
 
IT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service DesignIT Service Catalogs: 5 Keys to Good Service Design
IT Service Catalogs: 5 Keys to Good Service Design
 
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service CatalogsService Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
Service Catalog Essentials: 5 Keys to Good Service Design in IT Service Catalogs
 
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB Enigma
 
CMDB as a Corporate Asset
CMDB as a Corporate AssetCMDB as a Corporate Asset
CMDB as a Corporate Asset
 
Building a devops CMDB
Building a devops CMDBBuilding a devops CMDB
Building a devops CMDB
 
Running the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4ITRunning the Business of IT on ServiceNow using IT4IT
Running the Business of IT on ServiceNow using IT4IT
 
IT4IT Overview (A new standard for IT management)
IT4IT Overview (A new standard for IT management)IT4IT Overview (A new standard for IT management)
IT4IT Overview (A new standard for IT management)
 
Defining Services for a Service Catalog
Defining Services for a Service CatalogDefining Services for a Service Catalog
Defining Services for a Service Catalog
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDB
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model Overview
 

Similar to Information Mining and the CMDB

IBM Demo Presentation
IBM Demo PresentationIBM Demo Presentation
IBM Demo Presentationortonius
 
BIM: The Promise of an Integrated Approach to Project Delivery
BIM: The Promise of an Integrated Approach to Project DeliveryBIM: The Promise of an Integrated Approach to Project Delivery
BIM: The Promise of an Integrated Approach to Project DeliveryAWC|WEST
 
Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006CABA
 
Hoodoo Digital - Golden Thread Presentation
Hoodoo Digital - Golden Thread PresentationHoodoo Digital - Golden Thread Presentation
Hoodoo Digital - Golden Thread PresentationPeter Nash
 
WHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARKWHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARKAndrew Kenyon
 
Gerry Miller Representative Projects
Gerry Miller Representative ProjectsGerry Miller Representative Projects
Gerry Miller Representative ProjectsGerry Miller
 
resume_mel nowlin_2017_01_09
resume_mel nowlin_2017_01_09resume_mel nowlin_2017_01_09
resume_mel nowlin_2017_01_09Mel Nowlin, RCDD
 
Micro services Architecture
Micro services ArchitectureMicro services Architecture
Micro services ArchitectureAraf Karsh Hamid
 
1- SCS Capabilities Statement Monica
1- SCS Capabilities Statement Monica1- SCS Capabilities Statement Monica
1- SCS Capabilities Statement MonicaSyed A. Shah
 
TechnoStruct I MEP Design Engineering I BIM Consulting I LBE San Francisco
TechnoStruct I MEP Design Engineering I BIM Consulting I LBE San FranciscoTechnoStruct I MEP Design Engineering I BIM Consulting I LBE San Francisco
TechnoStruct I MEP Design Engineering I BIM Consulting I LBE San FranciscoTechnostruct LLC
 
Guy Di Mambro Resume And Presentation Updated
Guy Di Mambro Resume And Presentation UpdatedGuy Di Mambro Resume And Presentation Updated
Guy Di Mambro Resume And Presentation Updatedgtdimambro
 
Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...
Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...
Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...Codemotion
 
Telco 2.0 'two-sided' business model - Intro
Telco 2.0 'two-sided' business model - IntroTelco 2.0 'two-sided' business model - Intro
Telco 2.0 'two-sided' business model - IntroSimon Torrance
 
Bim 2010 nmifma
Bim 2010 nmifmaBim 2010 nmifma
Bim 2010 nmifmaryanzll
 
brown_eac.ppt
brown_eac.pptbrown_eac.ppt
brown_eac.pptpkumars
 
Cloud Computing Crash Course
Cloud Computing Crash CourseCloud Computing Crash Course
Cloud Computing Crash Coursebpeccoralo
 

Similar to Information Mining and the CMDB (20)

IBM Demo Presentation
IBM Demo PresentationIBM Demo Presentation
IBM Demo Presentation
 
BIM: The Promise of an Integrated Approach to Project Delivery
BIM: The Promise of an Integrated Approach to Project DeliveryBIM: The Promise of an Integrated Approach to Project Delivery
BIM: The Promise of an Integrated Approach to Project Delivery
 
Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006Iibc Ahr Bit Jan242006
Iibc Ahr Bit Jan242006
 
Manage the Margin
Manage the MarginManage the Margin
Manage the Margin
 
Hoodoo Digital - Golden Thread Presentation
Hoodoo Digital - Golden Thread PresentationHoodoo Digital - Golden Thread Presentation
Hoodoo Digital - Golden Thread Presentation
 
WHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARKWHSG ICT Presentation Slides ARK
WHSG ICT Presentation Slides ARK
 
Gerry Miller Representative Projects
Gerry Miller Representative ProjectsGerry Miller Representative Projects
Gerry Miller Representative Projects
 
resume_mel nowlin_2017_01_09
resume_mel nowlin_2017_01_09resume_mel nowlin_2017_01_09
resume_mel nowlin_2017_01_09
 
Micro services Architecture
Micro services ArchitectureMicro services Architecture
Micro services Architecture
 
1- SCS Capabilities Statement Monica
1- SCS Capabilities Statement Monica1- SCS Capabilities Statement Monica
1- SCS Capabilities Statement Monica
 
TechnoStruct I MEP Design Engineering I BIM Consulting I LBE San Francisco
TechnoStruct I MEP Design Engineering I BIM Consulting I LBE San FranciscoTechnoStruct I MEP Design Engineering I BIM Consulting I LBE San Francisco
TechnoStruct I MEP Design Engineering I BIM Consulting I LBE San Francisco
 
Guy Di Mambro Resume And Presentation Updated
Guy Di Mambro Resume And Presentation UpdatedGuy Di Mambro Resume And Presentation Updated
Guy Di Mambro Resume And Presentation Updated
 
Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...
Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...
Alexio Cassani - Start-up & API Economy: opportunità e benefici | Codemotion ...
 
Telco 2.0 'two-sided' business model - Intro
Telco 2.0 'two-sided' business model - IntroTelco 2.0 'two-sided' business model - Intro
Telco 2.0 'two-sided' business model - Intro
 
Bim 2010 nmifma
Bim 2010 nmifmaBim 2010 nmifma
Bim 2010 nmifma
 
Bmccomplaint
BmccomplaintBmccomplaint
Bmccomplaint
 
brown_eac.ppt
brown_eac.pptbrown_eac.ppt
brown_eac.ppt
 
Bimarabia3en
Bimarabia3enBimarabia3en
Bimarabia3en
 
Hoja de Vida en Español, actualizada a 2013
Hoja de Vida en Español, actualizada a 2013Hoja de Vida en Español, actualizada a 2013
Hoja de Vida en Español, actualizada a 2013
 
Cloud Computing Crash Course
Cloud Computing Crash CourseCloud Computing Crash Course
Cloud Computing Crash Course
 

More from David Messineo

CA PPM Rationalizaiton
CA PPM RationalizaitonCA PPM Rationalizaiton
CA PPM RationalizaitonDavid Messineo
 
Executive Overview of End-user Request Management
Executive Overview of End-user Request ManagementExecutive Overview of End-user Request Management
Executive Overview of End-user Request ManagementDavid Messineo
 
ITIL V3 and the Unified Service Model
ITIL V3 and the Unified Service ModelITIL V3 and the Unified Service Model
ITIL V3 and the Unified Service ModelDavid Messineo
 
Common Service Definition
Common Service DefinitionCommon Service Definition
Common Service DefinitionDavid Messineo
 
AA5 - I1 EITM and the Use Case Factory
AA5 - I1 EITM and the Use Case FactoryAA5 - I1 EITM and the Use Case Factory
AA5 - I1 EITM and the Use Case FactoryDavid Messineo
 
Deployment Methodology
Deployment MethodologyDeployment Methodology
Deployment MethodologyDavid Messineo
 
from-big-data-comes-small-worlds-messineo.PDF
from-big-data-comes-small-worlds-messineo.PDFfrom-big-data-comes-small-worlds-messineo.PDF
from-big-data-comes-small-worlds-messineo.PDFDavid Messineo
 
building-an-agile-organization-a-process-guide-for-effective-collaboration
building-an-agile-organization-a-process-guide-for-effective-collaborationbuilding-an-agile-organization-a-process-guide-for-effective-collaboration
building-an-agile-organization-a-process-guide-for-effective-collaborationDavid Messineo
 
Organizing Asset Management Today
Organizing Asset Management TodayOrganizing Asset Management Today
Organizing Asset Management TodayDavid Messineo
 
Manage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service LevelsManage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service LevelsDavid Messineo
 
ITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachDavid Messineo
 
CA World 2010 - customer success develop an ITIL-centric service focus to bet...
CA World 2010 - customer success develop an ITIL-centric service focus to bet...CA World 2010 - customer success develop an ITIL-centric service focus to bet...
CA World 2010 - customer success develop an ITIL-centric service focus to bet...David Messineo
 
CA World 2010 - leveraging cloud computing to build a lean change management ...
CA World 2010 - leveraging cloud computing to build a lean change management ...CA World 2010 - leveraging cloud computing to build a lean change management ...
CA World 2010 - leveraging cloud computing to build a lean change management ...David Messineo
 
IT Demand and Delivery Management
IT Demand and Delivery ManagementIT Demand and Delivery Management
IT Demand and Delivery ManagementDavid Messineo
 
Volume 4 Issue 6 Financial Mgmt[1]
Volume 4 Issue 6 Financial Mgmt[1]Volume 4 Issue 6 Financial Mgmt[1]
Volume 4 Issue 6 Financial Mgmt[1]David Messineo
 
Energy Management - Business Case
Energy Management - Business CaseEnergy Management - Business Case
Energy Management - Business CaseDavid Messineo
 

More from David Messineo (20)

CA PPM Rationalizaiton
CA PPM RationalizaitonCA PPM Rationalizaiton
CA PPM Rationalizaiton
 
Executive Overview of End-user Request Management
Executive Overview of End-user Request ManagementExecutive Overview of End-user Request Management
Executive Overview of End-user Request Management
 
ITIL V3 and the Unified Service Model
ITIL V3 and the Unified Service ModelITIL V3 and the Unified Service Model
ITIL V3 and the Unified Service Model
 
Common Service Definition
Common Service DefinitionCommon Service Definition
Common Service Definition
 
CTE Mentoring Program
CTE Mentoring ProgramCTE Mentoring Program
CTE Mentoring Program
 
AA5 - I1 EITM and the Use Case Factory
AA5 - I1 EITM and the Use Case FactoryAA5 - I1 EITM and the Use Case Factory
AA5 - I1 EITM and the Use Case Factory
 
Deployment Methodology
Deployment MethodologyDeployment Methodology
Deployment Methodology
 
DaveInTheBox v3
DaveInTheBox v3DaveInTheBox v3
DaveInTheBox v3
 
Passing the Torch
Passing the TorchPassing the Torch
Passing the Torch
 
from-big-data-comes-small-worlds-messineo.PDF
from-big-data-comes-small-worlds-messineo.PDFfrom-big-data-comes-small-worlds-messineo.PDF
from-big-data-comes-small-worlds-messineo.PDF
 
building-an-agile-organization-a-process-guide-for-effective-collaboration
building-an-agile-organization-a-process-guide-for-effective-collaborationbuilding-an-agile-organization-a-process-guide-for-effective-collaboration
building-an-agile-organization-a-process-guide-for-effective-collaboration
 
Organizing Asset Management Today
Organizing Asset Management TodayOrganizing Asset Management Today
Organizing Asset Management Today
 
Manage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service LevelsManage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service Levels
 
ITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachITAM and CCM - A Unified Approach
ITAM and CCM - A Unified Approach
 
CA World 2010 - customer success develop an ITIL-centric service focus to bet...
CA World 2010 - customer success develop an ITIL-centric service focus to bet...CA World 2010 - customer success develop an ITIL-centric service focus to bet...
CA World 2010 - customer success develop an ITIL-centric service focus to bet...
 
CA World 2010 - leveraging cloud computing to build a lean change management ...
CA World 2010 - leveraging cloud computing to build a lean change management ...CA World 2010 - leveraging cloud computing to build a lean change management ...
CA World 2010 - leveraging cloud computing to build a lean change management ...
 
IT Demand and Delivery Management
IT Demand and Delivery ManagementIT Demand and Delivery Management
IT Demand and Delivery Management
 
Myths of a CMDB
Myths of a CMDBMyths of a CMDB
Myths of a CMDB
 
Volume 4 Issue 6 Financial Mgmt[1]
Volume 4 Issue 6 Financial Mgmt[1]Volume 4 Issue 6 Financial Mgmt[1]
Volume 4 Issue 6 Financial Mgmt[1]
 
Energy Management - Business Case
Energy Management - Business CaseEnergy Management - Business Case
Energy Management - Business Case
 

Information Mining and the CMDB

  • 1. CA Council for Technical Excellence Information Mining and the CMDB CA Architects’ Conference Presented By: David A Messineo
  • 2. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 The Challenge – Find the Architectural Risks?
  • 3. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Using Your Intuition E F D A H G J B K L M C Q P O N > Assume A, B, C are Services > What questions would you ask? > Without having additional information what risks might you possibly assume exists? > What led you to think that way?
  • 4. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 20094 What would Charlie do? > Mathematics has an inner beauty but only satisfies its true capabilities when driven by interpretation by novices and experts alike > NUMB3RS – It’s not just a bunch of actors acting like geniuses to entertain you – it’s actually a true model for how math is functional > Using Math is all about identifying the germ of an idea, making reasonable assumptions, building a model, and applying it to real life > The CMDB is one such example using the concept of “Network Algebra” (i.e Graph Theory)
  • 5. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 20095 Automating Architecture – a possibility? > Automate Root-Cause Analysis > Provide a portal to encourage the building of “knowledge rules” and role-based interfaces > Identify Architectural Flaws > Automate policy-based availability, capacity, and IT continuity management > Support a rigorous ever- changing services model
  • 6. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Real – World Example(s) E F D A H G J B K L M C Q P O N > Example #1: Identify where there may be a high degree of risk for making architectural changes > Example #2: Identify where there may be an existing architectural risks for IT Continuity
  • 7. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 20097 Data Collection Strategies for “finding” evidence > Instrumental relationships – how configuration items support one another operationally through a hierarchy > Communication relations – linkages between actors, what channels they use and the messages between them > Boundary relationships – how services & systems are bounded through support of common goals (e.g. SLA) > Authority / power relations – how the configuration of a CI is managed through policy > Transaction relations – how services & systems are related through common transactions
  • 8. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 20098 Key Mathematical Terms Part 1 – Core Terms > Node (Point) > Link (Line) > Graph > Network > Path > Length = # Links  Yellow = 6  Red = 2 > Distance = Min # Points  Node A / Node Q = 5 Node Link Network Graph Path Z
  • 9. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 20099 Key Mathematical Terms Part 2 – Common Terms > Adjacent (adjacency) > Degree = # Links  Degree (E) = 1  Degree (G) = 2  Degree (A) = 5 > Neighborhood > Inclusiveness  = Linked – Not Linked  Graph = 16 – 1 = 15 > Density  # of Links / Possible Links Node Link Network Graph Path Adjacent Z Neighborhood
  • 10. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Density No. of connected points 0 2 3 4 4 4 Inclusiveness 0 0.5 0.7 1.0 1.0 1.0 Sum of Degrees 0 2 4 6 8 12 No of lines 0 1 2 3 4 6 Density 0 0.1 0.3 0.5 0.7 1.0
  • 11. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 200911 Key Mathematical Terms Part 3 – Advanced Terms > Local Centrality (Absolute) > Local Centrality (Relative) > Global Centrality Node Link Network Graph Path Adjacent Z Neighborhood
  • 12. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Centality E F D A H G J B K L M C Q P O N A,C B G,M J, K, L All other points 5 5 2 1 1 .33 .33 .13 .07 .07 43 33 37 48 57Global Centrality Local Centrality Absolute Relative < J
  • 13. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Applying Your Intuition Centrality and Density > Example #1: Identify where there may be a high degree of risk for making architectural changes  Change Risk Analysis – Centrality: Identifies areas where a “small” change may have huge impacts – Density: Identifies areas where the planning for a change may become complicated > Example #2: Identify where there may be an architectural risks for IT Continuity  IT Continuity / Availability – Centrality: Identifies architectural points where IT Continuity may require additional attention – Density: Identifies where there may too much money or resources be dedicated to Continuity
  • 15. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Network Views – Image 1 (Pajek) 15
  • 16. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Network Views – Image 2 (Pajek) 16
  • 17. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Network Mathematics (Pajek) 17
  • 18. CA Internal Confidential — Copyright © 2009 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective companies. CA Architects’ Conference April 20-22, 2009 Building Your Own Sandbox > The Simple Way  Download Pajek, Text2Pajek, Excel2Pakek  Use Excel to Model Data  Convert to Pajek format from Excel and load into Pajek > Using CA Technology  Setup the CA CMDB  Place Sample Data into the CA CMDB  Run SQL Extraction Script & BCP Script (contact me)  Convert to Pajek format from CSV txt and load into Pajek > Ultra Cool  Download MAGE and enter the world of 3-D Visualization