SlideShare a Scribd company logo
1 of 4
Download to read offline
itSM Solutions®
DITY™ Newsletter
Reprint
This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and
have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals
who want a workable, practical guide to implementing ITIL best practices -- without the hype.

become a member
(It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm)

Publisher
itSM Solutions™ LLC
31 South Talbert Blvd #295
Lexington, NC 27292
Phone (336) 510-2885
Fax (336) 798-6296
Find us on the web at: http://www.itsmsolutions.com.
To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com
For information on obtaining copies of this guide contact: sales@itsmsolutions.com
Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the
permission of the Controller of HMSO and the Office of Government Commerce.
Notice of Rights / Restricted Rights Legend
All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of
the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner
License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof
beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited.
Notice of Liability
This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not
limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor
itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused
directly or indirectly by the contents of this guide.
Trademarks
itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a
Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent
and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No.
0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be
trademarks or registered trademarks of their respective companies.
Availability Management in Action

Instructor Portal

Downloads

Newsletters

---------------------------------------------

DITY™ Newsletter
Vol. 3.6 • February 7, 2007

Availability Management in Action

digg (discuss or comment) on this article. Show your support for DITY!
Subscribe Its Free!

RSS Stay up to date!

Print page

PDF Pass it around!

Availability Management intimidates many new practitioners, and they often leave it to last or
skip it altogether. This is too bad, because even without a formal ITIL program, Availability
Management can yield dramatic results, as one of my clients, a major University, found out...
By Hank Marquis

Lots of people get intimidated by the math and scope of Availability Management. It is
too bad, because you can get quite a few quick wins by applying some simple
Availability Management techniques.
I am going to illustrate this by describing the story of a University that I worked with.
They used Availability Management to take back control of their infrastructure.
The University had issues of availability with one of their underpinning contracts (UC) with a
telecom provider. They kept losing service. They would open an incident, which would invariably
close as “no trouble found” or “came clear while testing” in a few days. They were simply not able
to get the attention of the service provider.
Then they became aware of availability management, took some action, and not only got their
file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol3iss6.htm (1 of 3)2/1/2007 11:12:18 AM
Availability Management in Action

issues resolved, but got some cash back in the process. Once again, actually getting benefits from
ITIL “ain't sexy” but “it sure is valuable.”
Based on my personal experience, following I describe how a major University was able to improve
quality and reduce costs through focused application of the basic ITIL concept of Availability
Management.
The Issue
The University, which shall remain nameless, was having issues with a carrier. The IT
department at the University supported several distributed campuses, all connected by wide area
network (WAN) circuits from the regional carrier (who shall also remain nameless to protect the
guilty!)
About every week a WAN circuit would fail and either disconnect the campus, or cause significant
delays on other circuits due to saturation as the traffic re-routed. The result was significant
negative impact on the campus, professors, researchers, administrators, and students. Not a pretty
picture.
Whenever this happened, University IT would open a ticket with the carrier. After a couple of days
the circuit would “miraculously” recover, and the incident would close. A follow-up with the carrier
invariably yielded that classic telco response: “we didn't do anything, but does it work now?” and
the ticket would be closed as NTF (No Trouble Found) or CWT (Came Clear While Testing).
Let me translate here. In other words, the telco had an intermittent problem that they could not
find, and when the fiddled around with enough things the systems would recover on their own.
Since the telco never got to the root cause, the underlying root cause of the incidents remained.
This is the classic “chronic” incident and problem.
The Solution
My customer, director of the University IT organization decided to take action. He obtained a copy
of the UC with the telco, which he read very carefully. As do most UCs there was small print
mentioning that any degradation in availability greater than a set amount would authorize the
University for a refund to be applied to the next months bill.
Of course, the issue was how to document these outages in a manner acceptable to the telco. He
decided to collect WAN interface utilization metrics from the routers connected to the problem
circuits. He gathered them regularly and created a database of information. This was what ITIL
would describe as an Availability Management Database (AMDB).
Over time he gathered enough outage information with enough granularity to be able to see
exactly (too within a few seconds) when the circuit went down, and when it came back up. He did
would open a ticket as required in the UC, but he monitored the circuit himself.
He then produced a report showing all the outages in the month, which he associated with telco

trouble tickets reference numbers.
Finally, he created an invoice, and sent the telco a bill, asking that the amount due the University
be applied to his next months bill.
The Results
As you might expect, the telco was not happy with his bill. After all, telcos bill users, not the other
file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol3iss6.htm (2 of 3)2/1/2007 11:12:18 AM
Availability Management in Action

way round. It didn't take long (just a few months) for the telco to decide they had to resolve this
issue once and for all, and that is exactly what they did. And until it was resolved, the University
indeed got credits off their bill.
When the telco, now driven to identify the root cause, actually resolved the issue, the quality of
service to the many campuses greatly improved. All users were much happier, as was my client.
The Moral
The solution to this real life clients problems was not sexy, but it was valuable. And yes, they could
have done all this without the ITIL. I agree that this was “simple common sense” -- but isn't that
all the ITIL really presents?
The difference is between knowing and doing. The ITIL presents what you should do, and offers
many angles to appreciate the job at hand. However, ITIL does nothing. It is how you, the
practitioner applies the techniques described in the ITIL that matters.
Having an Availability Management Database (AMDB) or even a CMDB is not the goal. In this
example, the benefit came from using the ITIL model as a reference to understand and talk about
the issue, and then creating an AMDB with the express purpose of solving a problem.
This is the sort of focused, pragmatic and results oriented approach any organization can take,
even without a formal ITIL program. So don't get caught up in all the hype, and don't get
intimidated. You can do it yourself!
Subscribe Its Free!

RSS Stay up to date!

PDF Pass it around!

Where to go from here:
q
q
q
q

digg (discuss or comment) on this article. Show your support for DITY!
Subscribe to our newsletter and get new skills delivered right to your Inbox, click here.
Download this article in PDF format for use at your own convenience, click here.
Use your favorite RSS reader to stay up to date, click here.

Related articles:
q

Browse back-issues of the DITY Newsletter, click here.

Home

Methodology

About Us

Products

Contact Us

file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol3iss6.htm (3 of 3)2/1/2007 11:12:18 AM

More Related Content

What's hot

Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes HomeChris Dancy
 
Technology in financial services
Technology in financial servicesTechnology in financial services
Technology in financial servicesLuis Caldeira
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Livingstone Advisory
 
12 Step Program for Codependent Help Desks
12 Step Program for Codependent Help Desks12 Step Program for Codependent Help Desks
12 Step Program for Codependent Help DesksChris Dancy
 
Advanced Analytics
Advanced AnalyticsAdvanced Analytics
Advanced AnalyticsTom Keeley
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Livingstone Advisory
 
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...Livingstone Advisory
 
A Study on Giving Commonsense to Machines
A Study on Giving Commonsense to MachinesA Study on Giving Commonsense to Machines
A Study on Giving Commonsense to MachinesIRJET Journal
 
Accretive Health - Quality Management in Health Care
Accretive Health - Quality Management in Health CareAccretive Health - Quality Management in Health Care
Accretive Health - Quality Management in Health CareAccretiveHealth
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Livingstone Advisory
 
3852 Itmv3 Ebook 2
3852 Itmv3 Ebook 23852 Itmv3 Ebook 2
3852 Itmv3 Ebook 2Anuradha
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the gameLivingstone Advisory
 
Xcelewrite
XcelewriteXcelewrite
Xcelewritepsrinath
 
How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...
How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...
How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...Dana Gardner
 
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived RisksEnterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived RisksThe 2.0 Adoption Council
 

What's hot (19)

Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes Home
 
Technology in financial services
Technology in financial servicesTechnology in financial services
Technology in financial services
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?
 
12 Step Program for Codependent Help Desks
12 Step Program for Codependent Help Desks12 Step Program for Codependent Help Desks
12 Step Program for Codependent Help Desks
 
Advanced Analytics
Advanced AnalyticsAdvanced Analytics
Advanced Analytics
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
 
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
 
A Study on Giving Commonsense to Machines
A Study on Giving Commonsense to MachinesA Study on Giving Commonsense to Machines
A Study on Giving Commonsense to Machines
 
Accretive Health - Quality Management in Health Care
Accretive Health - Quality Management in Health CareAccretive Health - Quality Management in Health Care
Accretive Health - Quality Management in Health Care
 
The next industrial revolution
The next industrial revolutionThe next industrial revolution
The next industrial revolution
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
 
NLOGIX
NLOGIXNLOGIX
NLOGIX
 
3852 Itmv3 Ebook 2
3852 Itmv3 Ebook 23852 Itmv3 Ebook 2
3852 Itmv3 Ebook 2
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the game
 
Horse meat or beef? (3) D Murphy, National Grid, 21/3/13
Horse meat or beef? (3) D Murphy, National Grid, 21/3/13Horse meat or beef? (3) D Murphy, National Grid, 21/3/13
Horse meat or beef? (3) D Murphy, National Grid, 21/3/13
 
Xcelewrite
XcelewriteXcelewrite
Xcelewrite
 
How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...
How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...
How Texmark Chemicals Pursues Analysis-Rich, IoT-Pervasive Path to the ‘Refin...
 
HR practices and technology induced change
HR practices and technology induced changeHR practices and technology induced change
HR practices and technology induced change
 
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived RisksEnterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
 

Viewers also liked (19)

Dit yvol2iss46
Dit yvol2iss46Dit yvol2iss46
Dit yvol2iss46
 
Dit yvol5iss6
Dit yvol5iss6Dit yvol5iss6
Dit yvol5iss6
 
Dit yvol3iss25
Dit yvol3iss25Dit yvol3iss25
Dit yvol3iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol4iss31
Dit yvol4iss31Dit yvol4iss31
Dit yvol4iss31
 
Dit yvol4iss11
Dit yvol4iss11Dit yvol4iss11
Dit yvol4iss11
 
Dit yvol2iss31
Dit yvol2iss31Dit yvol2iss31
Dit yvol2iss31
 
Dit yvol5iss1
Dit yvol5iss1Dit yvol5iss1
Dit yvol5iss1
 
Dit yvol2iss38
Dit yvol2iss38Dit yvol2iss38
Dit yvol2iss38
 
Dit yvol3iss35
Dit yvol3iss35Dit yvol3iss35
Dit yvol3iss35
 
Dit yvol3iss47
Dit yvol3iss47Dit yvol3iss47
Dit yvol3iss47
 
Dit yvol3iss18
Dit yvol3iss18Dit yvol3iss18
Dit yvol3iss18
 
Dit yvol3iss13
Dit yvol3iss13Dit yvol3iss13
Dit yvol3iss13
 
Dit yvol4iss08
Dit yvol4iss08Dit yvol4iss08
Dit yvol4iss08
 
Dit yvol4iss25
Dit yvol4iss25Dit yvol4iss25
Dit yvol4iss25
 
Dit yvol5iss14
Dit yvol5iss14Dit yvol5iss14
Dit yvol5iss14
 
Dit yvol3iss30
Dit yvol3iss30Dit yvol3iss30
Dit yvol3iss30
 
Dit yvol3iss44
Dit yvol3iss44Dit yvol3iss44
Dit yvol3iss44
 
Dit yvol4iss40
Dit yvol4iss40Dit yvol4iss40
Dit yvol4iss40
 

Similar to Dit yvol3iss6 (20)

Dit yvol1iss2
Dit yvol1iss2Dit yvol1iss2
Dit yvol1iss2
 
Dit yvol2iss35
Dit yvol2iss35Dit yvol2iss35
Dit yvol2iss35
 
Dit yvol1iss5
Dit yvol1iss5Dit yvol1iss5
Dit yvol1iss5
 
Dit yvol2iss39
Dit yvol2iss39Dit yvol2iss39
Dit yvol2iss39
 
Dit yvol1iss7
Dit yvol1iss7Dit yvol1iss7
Dit yvol1iss7
 
Dit yvol2iss17
Dit yvol2iss17Dit yvol2iss17
Dit yvol2iss17
 
Dit yvol1iss4
Dit yvol1iss4Dit yvol1iss4
Dit yvol1iss4
 
Dit yvol2iss49
Dit yvol2iss49Dit yvol2iss49
Dit yvol2iss49
 
Dit yvol2iss14
Dit yvol2iss14Dit yvol2iss14
Dit yvol2iss14
 
Dit yvol2iss50
Dit yvol2iss50Dit yvol2iss50
Dit yvol2iss50
 
Dit yvol2iss43
Dit yvol2iss43Dit yvol2iss43
Dit yvol2iss43
 
Dit yvol3iss5
Dit yvol3iss5Dit yvol3iss5
Dit yvol3iss5
 
Dit yvol2iss27
Dit yvol2iss27Dit yvol2iss27
Dit yvol2iss27
 
Dit yvol2iss6
Dit yvol2iss6Dit yvol2iss6
Dit yvol2iss6
 
Dit yvol2iss41
Dit yvol2iss41Dit yvol2iss41
Dit yvol2iss41
 
Dit yvol1iss3
Dit yvol1iss3Dit yvol1iss3
Dit yvol1iss3
 
Dit yvol3iss8
Dit yvol3iss8Dit yvol3iss8
Dit yvol3iss8
 
Dit yvol2iss30
Dit yvol2iss30Dit yvol2iss30
Dit yvol2iss30
 
Dit yvol3iss3
Dit yvol3iss3Dit yvol3iss3
Dit yvol3iss3
 
Dit yvol2iss16
Dit yvol2iss16Dit yvol2iss16
Dit yvol2iss16
 

More from Rick Lemieux

More from Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 
Dit yvol5iss20
Dit yvol5iss20Dit yvol5iss20
Dit yvol5iss20
 

Recently uploaded

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Recently uploaded (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Dit yvol3iss6

  • 1. itSM Solutions® DITY™ Newsletter Reprint This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals who want a workable, practical guide to implementing ITIL best practices -- without the hype. become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm) Publisher itSM Solutions™ LLC 31 South Talbert Blvd #295 Lexington, NC 27292 Phone (336) 510-2885 Fax (336) 798-6296 Find us on the web at: http://www.itsmsolutions.com. To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com For information on obtaining copies of this guide contact: sales@itsmsolutions.com Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the permission of the Controller of HMSO and the Office of Government Commerce. Notice of Rights / Restricted Rights Legend All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited. Notice of Liability This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused directly or indirectly by the contents of this guide. Trademarks itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies.
  • 2. Availability Management in Action Instructor Portal Downloads Newsletters --------------------------------------------- DITY™ Newsletter Vol. 3.6 • February 7, 2007 Availability Management in Action digg (discuss or comment) on this article. Show your support for DITY! Subscribe Its Free! RSS Stay up to date! Print page PDF Pass it around! Availability Management intimidates many new practitioners, and they often leave it to last or skip it altogether. This is too bad, because even without a formal ITIL program, Availability Management can yield dramatic results, as one of my clients, a major University, found out... By Hank Marquis Lots of people get intimidated by the math and scope of Availability Management. It is too bad, because you can get quite a few quick wins by applying some simple Availability Management techniques. I am going to illustrate this by describing the story of a University that I worked with. They used Availability Management to take back control of their infrastructure. The University had issues of availability with one of their underpinning contracts (UC) with a telecom provider. They kept losing service. They would open an incident, which would invariably close as “no trouble found” or “came clear while testing” in a few days. They were simply not able to get the attention of the service provider. Then they became aware of availability management, took some action, and not only got their file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol3iss6.htm (1 of 3)2/1/2007 11:12:18 AM
  • 3. Availability Management in Action issues resolved, but got some cash back in the process. Once again, actually getting benefits from ITIL “ain't sexy” but “it sure is valuable.” Based on my personal experience, following I describe how a major University was able to improve quality and reduce costs through focused application of the basic ITIL concept of Availability Management. The Issue The University, which shall remain nameless, was having issues with a carrier. The IT department at the University supported several distributed campuses, all connected by wide area network (WAN) circuits from the regional carrier (who shall also remain nameless to protect the guilty!) About every week a WAN circuit would fail and either disconnect the campus, or cause significant delays on other circuits due to saturation as the traffic re-routed. The result was significant negative impact on the campus, professors, researchers, administrators, and students. Not a pretty picture. Whenever this happened, University IT would open a ticket with the carrier. After a couple of days the circuit would “miraculously” recover, and the incident would close. A follow-up with the carrier invariably yielded that classic telco response: “we didn't do anything, but does it work now?” and the ticket would be closed as NTF (No Trouble Found) or CWT (Came Clear While Testing). Let me translate here. In other words, the telco had an intermittent problem that they could not find, and when the fiddled around with enough things the systems would recover on their own. Since the telco never got to the root cause, the underlying root cause of the incidents remained. This is the classic “chronic” incident and problem. The Solution My customer, director of the University IT organization decided to take action. He obtained a copy of the UC with the telco, which he read very carefully. As do most UCs there was small print mentioning that any degradation in availability greater than a set amount would authorize the University for a refund to be applied to the next months bill. Of course, the issue was how to document these outages in a manner acceptable to the telco. He decided to collect WAN interface utilization metrics from the routers connected to the problem circuits. He gathered them regularly and created a database of information. This was what ITIL would describe as an Availability Management Database (AMDB). Over time he gathered enough outage information with enough granularity to be able to see exactly (too within a few seconds) when the circuit went down, and when it came back up. He did would open a ticket as required in the UC, but he monitored the circuit himself. He then produced a report showing all the outages in the month, which he associated with telco trouble tickets reference numbers. Finally, he created an invoice, and sent the telco a bill, asking that the amount due the University be applied to his next months bill. The Results As you might expect, the telco was not happy with his bill. After all, telcos bill users, not the other file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol3iss6.htm (2 of 3)2/1/2007 11:12:18 AM
  • 4. Availability Management in Action way round. It didn't take long (just a few months) for the telco to decide they had to resolve this issue once and for all, and that is exactly what they did. And until it was resolved, the University indeed got credits off their bill. When the telco, now driven to identify the root cause, actually resolved the issue, the quality of service to the many campuses greatly improved. All users were much happier, as was my client. The Moral The solution to this real life clients problems was not sexy, but it was valuable. And yes, they could have done all this without the ITIL. I agree that this was “simple common sense” -- but isn't that all the ITIL really presents? The difference is between knowing and doing. The ITIL presents what you should do, and offers many angles to appreciate the job at hand. However, ITIL does nothing. It is how you, the practitioner applies the techniques described in the ITIL that matters. Having an Availability Management Database (AMDB) or even a CMDB is not the goal. In this example, the benefit came from using the ITIL model as a reference to understand and talk about the issue, and then creating an AMDB with the express purpose of solving a problem. This is the sort of focused, pragmatic and results oriented approach any organization can take, even without a formal ITIL program. So don't get caught up in all the hype, and don't get intimidated. You can do it yourself! Subscribe Its Free! RSS Stay up to date! PDF Pass it around! Where to go from here: q q q q digg (discuss or comment) on this article. Show your support for DITY! Subscribe to our newsletter and get new skills delivered right to your Inbox, click here. Download this article in PDF format for use at your own convenience, click here. Use your favorite RSS reader to stay up to date, click here. Related articles: q Browse back-issues of the DITY Newsletter, click here. Home Methodology About Us Products Contact Us file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol3iss6.htm (3 of 3)2/1/2007 11:12:18 AM