This document is a deployment guide for IBM Tivoli Application Dependency Discovery Manager V7.1. It provides an overview of TADDM, including its functions, architecture and how it fits within IBM Service Management. The guide also covers installing and configuring TADDM, customizing discovery profiles, integrating with other IBM products, and tips for using TADDM.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, Agents, and Catalog Manager. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer environment, disaster recovery procedures, and planning for each ITLM component. Finally, it walks through setting up the ITLM Administration Server with steps for installing required software like IBM DB2 and WebSphere and configuring the DB2 schema. The document aims to help IT professionals successfully set up their ITLM license management environment.
This document provides a complete guide for planning and deploying IBM Tivoli Identity Manager 5.0. It includes guidance on the business context for identity management, planning a client engagement, profiling the client environment, and designing an identity management solution. The guide covers topics such as centralized user management, access control models, organizational structure, policies, and integrating with existing systems. It is intended to help consultants and customers successfully implement an identity management project.
The document is a manual for Tivoli Business Systems Manager Version 2.1. It provides an overview of the product, which allows for end-to-end business impact management through integrated systems management. The manual details the product structure, components, functions, database structure, user interface, and planning requirements for implementation. It is intended to help users understand and implement the key capabilities of Tivoli Business Systems Manager.
This document provides guidance for planning and deploying IBM Tivoli Access Manager for e-business V6.0. It includes sections on planning the implementation project, designing the access control security solution for a sample company called TAMCO, installing prerequisite software and the Access Manager components, and configuring the Access Manager system and single sign-on. The goal is to help customers successfully implement Access Manager to securely manage access to web applications and resources.
This document provides an overview and guide for planning and implementing IBM's Tivoli Data Warehouse Version 1.3. It discusses key concepts in data warehousing and business intelligence. The document also covers planning a data warehouse project, including requirements, design considerations, and best practices. Implementation topics include hardware and software requirements, physical and logical design options, database sizing, security, and more. The goal is to help IT professionals successfully deploy Tivoli Data Warehouse.
This document provides an overview and guide for using Business Objects reporting tools with Tivoli Data Warehouse 1.2. It covers Business Objects products and platform, installing Business Objects desktop components, configuring Business Objects for Tivoli Data Warehouse, creating reports, advanced reporting and security features, and deploying reports. The document contains examples and step-by-step instructions for setting up Business Objects and generating simple to advanced reports on Tivoli Data Warehouse data.
This document provides guidance on best practices for implementing IBM Tivoli License Manager. It begins with an overview of the product and discusses business perspectives and challenges related to license management. It then covers key aspects of the project engagement and delivery phases. The document focuses on solution design considerations, including gathering requirements, defining scope, architectural decisions, and the physical design of IBM Tivoli License Manager components. It provides information on sizing, scalability, communications, and operating system support.
This document provides an overview and insider's guide to IBM Tivoli Management Services Warehouse and Reporting. It discusses the architecture and internals of Tivoli Data Warehouse, best practices for deployment configurations, and step-by-step instructions for configuring various components like the Warehouse Proxy and Summarization and Pruning agent. It also demonstrates how to integrate Tivoli Data Warehouse with other Tivoli products for reporting.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, Agents, and Catalog Manager. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer environment, disaster recovery procedures, and planning for each ITLM component. Finally, it walks through setting up the ITLM Administration Server with steps for installing required software like IBM DB2 and WebSphere and configuring the DB2 schema. The document aims to help IT professionals successfully set up their ITLM license management environment.
This document provides a complete guide for planning and deploying IBM Tivoli Identity Manager 5.0. It includes guidance on the business context for identity management, planning a client engagement, profiling the client environment, and designing an identity management solution. The guide covers topics such as centralized user management, access control models, organizational structure, policies, and integrating with existing systems. It is intended to help consultants and customers successfully implement an identity management project.
The document is a manual for Tivoli Business Systems Manager Version 2.1. It provides an overview of the product, which allows for end-to-end business impact management through integrated systems management. The manual details the product structure, components, functions, database structure, user interface, and planning requirements for implementation. It is intended to help users understand and implement the key capabilities of Tivoli Business Systems Manager.
This document provides guidance for planning and deploying IBM Tivoli Access Manager for e-business V6.0. It includes sections on planning the implementation project, designing the access control security solution for a sample company called TAMCO, installing prerequisite software and the Access Manager components, and configuring the Access Manager system and single sign-on. The goal is to help customers successfully implement Access Manager to securely manage access to web applications and resources.
This document provides an overview and guide for planning and implementing IBM's Tivoli Data Warehouse Version 1.3. It discusses key concepts in data warehousing and business intelligence. The document also covers planning a data warehouse project, including requirements, design considerations, and best practices. Implementation topics include hardware and software requirements, physical and logical design options, database sizing, security, and more. The goal is to help IT professionals successfully deploy Tivoli Data Warehouse.
This document provides an overview and guide for using Business Objects reporting tools with Tivoli Data Warehouse 1.2. It covers Business Objects products and platform, installing Business Objects desktop components, configuring Business Objects for Tivoli Data Warehouse, creating reports, advanced reporting and security features, and deploying reports. The document contains examples and step-by-step instructions for setting up Business Objects and generating simple to advanced reports on Tivoli Data Warehouse data.
This document provides guidance on best practices for implementing IBM Tivoli License Manager. It begins with an overview of the product and discusses business perspectives and challenges related to license management. It then covers key aspects of the project engagement and delivery phases. The document focuses on solution design considerations, including gathering requirements, defining scope, architectural decisions, and the physical design of IBM Tivoli License Manager components. It provides information on sizing, scalability, communications, and operating system support.
This document provides an overview and insider's guide to IBM Tivoli Management Services Warehouse and Reporting. It discusses the architecture and internals of Tivoli Data Warehouse, best practices for deployment configurations, and step-by-step instructions for configuring various components like the Warehouse Proxy and Summarization and Pruning agent. It also demonstrates how to integrate Tivoli Data Warehouse with other Tivoli products for reporting.
This document provides a deployment guide for IBM Tivoli Compliance Insight Manager. It begins with an overview of the product architecture and components, including the Tivoli Compliance Insight Manager cluster, Enterprise Server, Standard Server, actuators, Management Console, iView Web portal, databases, and component architecture. It then discusses the product processes of collection, mapping and loading, data aggregation and consolidation, and reporting and presentation. The document also provides guidance on planning for customer engagement, including defining solution tasks and scope. It includes a case study of implementing the solution for a fictional company called Gym and Health Incorporation.
This document provides an overview of managing storage with IBM's Tivoli software, including:
- Integrating Tivoli Storage Manager with Tivoli Enterprise for centralized storage management across distributed environments.
- Automatically reacting to storage events.
- Practical examples of configuring and using Tivoli Framework, Tivoli Distributed Monitoring, Tivoli Software Distribution, and Tivoli Inventory for storage management tasks.
This document provides an overview and introduction to IBM Tivoli Storage Area Network Manager. It discusses why SAN management is needed as storage environments have become more complex. It also covers the components, functions, and highlights of IBM Tivoli SAN Manager version 1.2, including its ability to discover SAN topology and iSCSI environments, monitor events, provide reports, and integrate with other vendor management applications. The document is intended to help readers understand how IBM Tivoli SAN Manager can help manage and monitor SAN environments.
The document provides an overview and installation instructions for integrating multiple IBM Tivoli products. It discusses security integration using LDAP and single sign-on. Product installations covered include IBM Service Management, Tivoli Monitoring, Tivoli Netcool, Tivoli Workload Scheduler, Tivoli Usage and Accounting Manager, and Tivoli Storage Productivity Center. The document is intended to help customers integrate these products in their environments.
This document provides an overview and planning guide for implementing an availability and performance monitoring solution based on IBM's Tivoli portfolio and following an ITIL-based management approach. It discusses key concepts in ITIL, availability management, and capacity management. It also introduces IBM's service management framework and blueprint. Additionally, it provides overviews of the various Tivoli products for resource monitoring, composite application management, event correlation, business service management, mainframe management, and process management. Finally, it includes sample scenarios for monitoring UNIX servers, web applications, networks, and a complex retail environment.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center (TPC) version 3.1. It describes the key components and features of TPC, including how it collects and manages storage data using standards like SNMP, SLP, CIM and WBEM. The document also covers installation prerequisites, user account configuration, supported storage subsystems and best practices for server sizing and security.
This document provides an overview of asset management processes using IBM's Tivoli Asset Management for IT. It discusses reviewing asset management life cycles and processes, and applying Tivoli Asset Management for IT to manage the asset life cycle from acquisition to retirement. The document contains practical examples of implementing asset management processes using Tivoli's applications for discovery, reconciliation, and tracking assets through their life cycles.
This document provides a deployment guide for IBM Tivoli Usage and Accounting Manager V7.1. It discusses planning the solution environment including hardware and software prerequisites. It also covers installing and configuring the product, including the database, server components, and data collection packs. Finally it demonstrates basic product usage through setting up accounting resources, running a data collection job, and generating reports. The document aims to help deploy and demonstrate the key capabilities of the IBM financial management solution.
The document describes an integrated identity management solution implemented at a large international bank, What Bank International (WBI), using IBM Tivoli security products. It discusses WBI's business needs, current IT architecture challenges with user identities and access management. The solution implemented a phased approach to first enable self-service access management and then integrate additional identity management capabilities. The solution holistically addressed WBI's security needs of access control, identity management, audit, directory services and privacy using components from IBM Tivoli portfolio.
This document provides an overview of software configuration management (SCM) using IBM Rational ClearCase and ClearQuest products. It discusses SCM strategies for version control, configuration management, process management, and problem tracking. The document also maps IBM Rational products to SCM areas and provides terminology for ClearCase and ClearQuest concepts. Overall, the document aims to help readers understand SCM and how to plan an SCM solution using ClearCase and ClearQuest.
This document provides an overview and deployment planning guide for IBM Tivoli Configuration Management Database (CCMDB). It discusses the key components of CCMDB including the user interface, discovery server, base services, and process manager products. It also covers planning the installation, including requirements for hardware, software, and network infrastructure to support CCMDB. The goal is to help IT professionals understand the architecture and successfully deploy CCMDB.
This document provides an overview and deployment planning guide for IBM Tivoli Configuration Management Database (CCMDB). It discusses the CCMDB architecture and components, including the user interface, discovery server, base services, and process manager products. It also covers planning the CCMDB installation, including required components, capacities, and high availability considerations. The guide aims to help readers understand CCMDB and effectively plan their deployment.
This document discusses implementing a reporting environment using Tivoli Decision Support for Storage Management Analysis (TDSfSMA). TDSfSMA allows users to solve real-world TSM performance problems by providing concise summaries and answering questions about system health and resource requirements. It provides an out-of-the-box reporting solution by loading TSM data into a relational database for analysis using OLAP tools. The document covers architectural considerations, configuration and installation, operational procedures, and reporting procedures for using TDSfSMA.
This document provides guidance for planning and deploying IBM Tivoli Access Manager for e-business V6.0. It includes sections on planning for customer engagement, analyzing the customer's environment and business needs, designing the solution, installing required components, and configuring Access Manager. The goal is to help users fully implement access control management based on best practices.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center (TPC) version 3.1. Key points include:
- TPC is a storage management software that allows users to monitor and manage storage devices from multiple vendors through a single interface.
- New features in v3.1 include support for additional devices and improved reporting capabilities.
- TPC uses open standards like SNMP, SLP, CIM and WBEM to collect data from storage systems and present it to users.
- The document provides installation planning guidance covering hardware requirements, port configurations, security considerations and supported storage platforms.
- Detailed installation instructions are included for Windows 2003, covering
The document is an integration guide for IBM Tivoli Service Request Manager V7.1. It covers integration best practices and architectures. It includes demonstration scenarios for integrating the Tivoli Service Request Manager with other products like event management solutions, other service desk solutions, IBM Tivoli Directory Integrator, and more. The guide explains the integration components, benefits, scenarios, and provides instructions for specific integrations.
This document provides instructions for installing and configuring IBM TotalStorage Productivity Center V2.3. It discusses the Productivity Center software suite and key concepts underpinning its architecture. The document also covers planning considerations for installation, such as prerequisites, security setup, and testing. Detailed steps are provided for installing the base Productivity Center components and optional modules.
This document provides instructions for installing and setting up IBM TotalStorage Productivity Center V2.3. It discusses the required prerequisites, including software, ports, and user accounts. It also describes planning considerations like the lab environment setup. The document then covers the step-by-step installation process and important post-installation configuration tasks to ensure proper functionality.
This document provides guidance on deploying IBM Tivoli Composite Application Manager for Web Resources V6.2. It begins with an overview of the solution and its architecture. It then discusses planning the deployment, including required hardware, software, and typical environment sizes. The document also includes guidance on installing and configuring the various components as well as usage scenarios once deployed.
This document provides guidance on planning and deploying IBM Tivoli Composite Application Manager for Web Resources V6.2 (ITCAM) to monitor Web application server performance. It discusses the ITCAM architecture and how it interconnects with J2EE and WebSphere data collectors. It also covers hardware and software prerequisites, typical deployment environments, and provides a sample project plan for setting up ITCAM with tasks such as environment preparation, software installation, and customizing the product.
This document provides a deployment guide for IBM Tivoli Compliance Insight Manager. It begins with an overview of the product architecture and components, including the Tivoli Compliance Insight Manager cluster, Enterprise Server, Standard Server, actuators, Management Console, iView Web portal, databases, and component architecture. It then discusses the product processes of collection, mapping and loading, data aggregation and consolidation, and reporting and presentation. The document also covers planning for customer engagement, including services engagement preparation, solution scope and components, and defining solution tasks. Finally, it provides an example customer environment of Gym and Health Incorporation to illustrate a potential deployment design.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), which is a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, agents, and database. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer-division-node hierarchy, disaster recovery procedures, and planning for each ITLM component. Finally, it includes step-by-step instructions for setting up an example ITLM environment with Administration and Runtime Servers on AIX and Windows.
This document provides a deployment guide for IBM Tivoli Compliance Insight Manager. It begins with an overview of the product architecture and components, including the Tivoli Compliance Insight Manager cluster, Enterprise Server, Standard Server, actuators, Management Console, iView Web portal, databases, and component architecture. It then discusses the product processes of collection, mapping and loading, data aggregation and consolidation, and reporting and presentation. The document also provides guidance on planning for customer engagement, including defining solution tasks and scope. It includes a case study of implementing the solution for a fictional company called Gym and Health Incorporation.
This document provides an overview of managing storage with IBM's Tivoli software, including:
- Integrating Tivoli Storage Manager with Tivoli Enterprise for centralized storage management across distributed environments.
- Automatically reacting to storage events.
- Practical examples of configuring and using Tivoli Framework, Tivoli Distributed Monitoring, Tivoli Software Distribution, and Tivoli Inventory for storage management tasks.
This document provides an overview and introduction to IBM Tivoli Storage Area Network Manager. It discusses why SAN management is needed as storage environments have become more complex. It also covers the components, functions, and highlights of IBM Tivoli SAN Manager version 1.2, including its ability to discover SAN topology and iSCSI environments, monitor events, provide reports, and integrate with other vendor management applications. The document is intended to help readers understand how IBM Tivoli SAN Manager can help manage and monitor SAN environments.
The document provides an overview and installation instructions for integrating multiple IBM Tivoli products. It discusses security integration using LDAP and single sign-on. Product installations covered include IBM Service Management, Tivoli Monitoring, Tivoli Netcool, Tivoli Workload Scheduler, Tivoli Usage and Accounting Manager, and Tivoli Storage Productivity Center. The document is intended to help customers integrate these products in their environments.
This document provides an overview and planning guide for implementing an availability and performance monitoring solution based on IBM's Tivoli portfolio and following an ITIL-based management approach. It discusses key concepts in ITIL, availability management, and capacity management. It also introduces IBM's service management framework and blueprint. Additionally, it provides overviews of the various Tivoli products for resource monitoring, composite application management, event correlation, business service management, mainframe management, and process management. Finally, it includes sample scenarios for monitoring UNIX servers, web applications, networks, and a complex retail environment.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center (TPC) version 3.1. It describes the key components and features of TPC, including how it collects and manages storage data using standards like SNMP, SLP, CIM and WBEM. The document also covers installation prerequisites, user account configuration, supported storage subsystems and best practices for server sizing and security.
This document provides an overview of asset management processes using IBM's Tivoli Asset Management for IT. It discusses reviewing asset management life cycles and processes, and applying Tivoli Asset Management for IT to manage the asset life cycle from acquisition to retirement. The document contains practical examples of implementing asset management processes using Tivoli's applications for discovery, reconciliation, and tracking assets through their life cycles.
This document provides a deployment guide for IBM Tivoli Usage and Accounting Manager V7.1. It discusses planning the solution environment including hardware and software prerequisites. It also covers installing and configuring the product, including the database, server components, and data collection packs. Finally it demonstrates basic product usage through setting up accounting resources, running a data collection job, and generating reports. The document aims to help deploy and demonstrate the key capabilities of the IBM financial management solution.
The document describes an integrated identity management solution implemented at a large international bank, What Bank International (WBI), using IBM Tivoli security products. It discusses WBI's business needs, current IT architecture challenges with user identities and access management. The solution implemented a phased approach to first enable self-service access management and then integrate additional identity management capabilities. The solution holistically addressed WBI's security needs of access control, identity management, audit, directory services and privacy using components from IBM Tivoli portfolio.
This document provides an overview of software configuration management (SCM) using IBM Rational ClearCase and ClearQuest products. It discusses SCM strategies for version control, configuration management, process management, and problem tracking. The document also maps IBM Rational products to SCM areas and provides terminology for ClearCase and ClearQuest concepts. Overall, the document aims to help readers understand SCM and how to plan an SCM solution using ClearCase and ClearQuest.
This document provides an overview and deployment planning guide for IBM Tivoli Configuration Management Database (CCMDB). It discusses the key components of CCMDB including the user interface, discovery server, base services, and process manager products. It also covers planning the installation, including requirements for hardware, software, and network infrastructure to support CCMDB. The goal is to help IT professionals understand the architecture and successfully deploy CCMDB.
This document provides an overview and deployment planning guide for IBM Tivoli Configuration Management Database (CCMDB). It discusses the CCMDB architecture and components, including the user interface, discovery server, base services, and process manager products. It also covers planning the CCMDB installation, including required components, capacities, and high availability considerations. The guide aims to help readers understand CCMDB and effectively plan their deployment.
This document discusses implementing a reporting environment using Tivoli Decision Support for Storage Management Analysis (TDSfSMA). TDSfSMA allows users to solve real-world TSM performance problems by providing concise summaries and answering questions about system health and resource requirements. It provides an out-of-the-box reporting solution by loading TSM data into a relational database for analysis using OLAP tools. The document covers architectural considerations, configuration and installation, operational procedures, and reporting procedures for using TDSfSMA.
This document provides guidance for planning and deploying IBM Tivoli Access Manager for e-business V6.0. It includes sections on planning for customer engagement, analyzing the customer's environment and business needs, designing the solution, installing required components, and configuring Access Manager. The goal is to help users fully implement access control management based on best practices.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center (TPC) version 3.1. Key points include:
- TPC is a storage management software that allows users to monitor and manage storage devices from multiple vendors through a single interface.
- New features in v3.1 include support for additional devices and improved reporting capabilities.
- TPC uses open standards like SNMP, SLP, CIM and WBEM to collect data from storage systems and present it to users.
- The document provides installation planning guidance covering hardware requirements, port configurations, security considerations and supported storage platforms.
- Detailed installation instructions are included for Windows 2003, covering
The document is an integration guide for IBM Tivoli Service Request Manager V7.1. It covers integration best practices and architectures. It includes demonstration scenarios for integrating the Tivoli Service Request Manager with other products like event management solutions, other service desk solutions, IBM Tivoli Directory Integrator, and more. The guide explains the integration components, benefits, scenarios, and provides instructions for specific integrations.
This document provides instructions for installing and configuring IBM TotalStorage Productivity Center V2.3. It discusses the Productivity Center software suite and key concepts underpinning its architecture. The document also covers planning considerations for installation, such as prerequisites, security setup, and testing. Detailed steps are provided for installing the base Productivity Center components and optional modules.
This document provides instructions for installing and setting up IBM TotalStorage Productivity Center V2.3. It discusses the required prerequisites, including software, ports, and user accounts. It also describes planning considerations like the lab environment setup. The document then covers the step-by-step installation process and important post-installation configuration tasks to ensure proper functionality.
This document provides guidance on deploying IBM Tivoli Composite Application Manager for Web Resources V6.2. It begins with an overview of the solution and its architecture. It then discusses planning the deployment, including required hardware, software, and typical environment sizes. The document also includes guidance on installing and configuring the various components as well as usage scenarios once deployed.
This document provides guidance on planning and deploying IBM Tivoli Composite Application Manager for Web Resources V6.2 (ITCAM) to monitor Web application server performance. It discusses the ITCAM architecture and how it interconnects with J2EE and WebSphere data collectors. It also covers hardware and software prerequisites, typical deployment environments, and provides a sample project plan for setting up ITCAM with tasks such as environment preparation, software installation, and customizing the product.
This document provides a deployment guide for IBM Tivoli Compliance Insight Manager. It begins with an overview of the product architecture and components, including the Tivoli Compliance Insight Manager cluster, Enterprise Server, Standard Server, actuators, Management Console, iView Web portal, databases, and component architecture. It then discusses the product processes of collection, mapping and loading, data aggregation and consolidation, and reporting and presentation. The document also covers planning for customer engagement, including services engagement preparation, solution scope and components, and defining solution tasks. Finally, it provides an example customer environment of Gym and Health Incorporation to illustrate a potential deployment design.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), which is a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, agents, and database. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer-division-node hierarchy, disaster recovery procedures, and planning for each ITLM component. Finally, it includes step-by-step instructions for setting up an example ITLM environment with Administration and Runtime Servers on AIX and Windows.
This document provides an overview and guide for installing and administering IBM AIX Enterprise Edition. It describes the key components of AIX Enterprise Edition including DB2, IBM Tivoli Monitoring, Tivoli Asset and Discovery for Distributed Management, and IBM Tivoli Usage and Accounting Manager. It also provides guidance on planning, sizing, installing, configuring, and operating each component. The document is intended as a reference for system administrators working with AIX Enterprise Edition.
This document provides an overview and guidelines for developing workflows and automation packages for IBM Tivoli Intelligent Orchestrator V3.1. It discusses the architectural design of an automated provisioning solution using Tivoli Intelligent Orchestrator, including defining the scope and functionality of automation packages and workflows. It also provides practical guidance on topics like authentication, documentation standards, and setting up a development environment. The intended audience is IT professionals tasked with implementing automated provisioning and orchestration solutions using Tivoli Intelligent Orchestrator.
This document provides an overview of asset management processes using IBM's Tivoli Asset Management for IT software. It discusses reviewing asset management life cycles and processes, and how to apply Tivoli Asset Management for IT to implement those processes. The document contains practical examples and discusses topics like the initial data load process, defining asset management roles and entities, and how to procure software. It is intended to help IT organizations learn how to implement effective asset management.
This document provides an overview of asset management processes using IBM's Tivoli Asset Management for IT. It discusses reviewing asset management life cycles and processes, and applying Tivoli Asset Management for IT to manage the asset life cycle from acquisition to retirement. The document contains practical examples of implementing asset management processes using Tivoli's applications for discovery, reconciliation, and tracking assets through their life cycles.
This document provides an overview and instructions for installing and using IBM TotalStorage Productivity Center, a suite of software products for managing disk subsystems and replication. It includes chapters on the Productivity Center overview, key concepts, and installing the Productivity Center suite. The document contains information on Common Information Model (CIM), Service Location Protocol (SLP), and installing prerequisite products like IBM Director.
This document provides best practices for planning and implementing large scale IBM Tivoli Monitoring environments. It discusses hardware sizing, scalability considerations, and performance optimization for the Tivoli Enterprise Monitoring Server, Tivoli Enterprise Portal Server, Tivoli Data Warehouse, and Tivoli Enterprise Monitoring agents. Firewall configuration and historical data collection are also addressed. The goal is to help customers deploy Tivoli Monitoring in a way that meets their monitoring needs as their environments grow to support thousands of devices and applications.
This document provides an overview of implementing the Tivoli Enterprise Console (TEC). It discusses planning requirements such as the management software, managed devices, event sources, and rule policies. It then covers installing the required relational database management system (RDBMS), either Oracle or Sybase. Finally, it describes setting up the Tivoli Management Framework, installing the TEC software, configuring distributed monitoring and scripts, and deploying event adapters.
This document provides an overview of IBM Tivoli Key Lifecycle Manager for z/OS, including how it works, how to plan an implementation, and how to install and configure the solution components. It discusses encryption of data on tape and disk using different methods, considerations for capacity planning, high availability and disaster recovery. The document also includes checklists for planning and installing Tivoli Key Lifecycle Manager.
This document provides a 3-page summary of the key points from a technical paper about IBM Tivoli Security Solutions for Microsoft software environments:
1. It explains IBM's security framework and service management strategy, which focuses on visibility, controls, and automation. It also discusses common security standards.
2. It provides an overview of IBM Tivoli security products and their support for Microsoft operating systems and middleware, including IBM Tivoli Directory Server, IBM Tivoli Access Manager, IBM Tivoli Identity Manager, and IBM Tivoli Security Information and Event Manager.
3. It describes how IBM Tivoli security solutions can integrate with Microsoft software environments to provide security compliance, identity and access management
Similar to Deployment guide series ibm tivoli application dependency discovery manager v7.1 sg247616 (20)
This document provides the table of contents and introduction for the PostgreSQL 15.1 documentation. It describes that PostgreSQL is an open-source object-relational database system that uses and extends the SQL language combined with many features that safely store and scale the most complicated data workloads. The documentation is copyrighted by the PostgreSQL Global Development Group and provides instructions for how to report bugs and get further information.
This document provides the table of contents and introduction for the PostgreSQL 14.6 documentation. It describes that PostgreSQL is an open-source object-relational database system that uses and extends the SQL language combined with many features that safely store and scale the most complicated data workloads. The documentation is copyrighted by the PostgreSQL Global Development Group and provides instructions for how to report bugs and get further information.
This document provides instructions for a lab exercise on getting started with IBM MobileFirst Platform. It introduces the key concepts of MobileFirst Platform Studio and walks through steps to import a sample banking application project, examine the project structure, add an Android environment, and preview the application in the Mobile Browser Simulator and an Android device. It also demonstrates how to invoke adapters and use the MobileFirst Platform Console and Operational Analytics. The lab aims to familiarize users with the MobileFirst Platform development tools and features.
The IBM MobileFirst Platform provides mobile application development tools and services. It allows developers to integrate backend data, continuously improve apps based on user feedback, and deliver personalized experiences. The platform provides modular services for contextualizing apps, securing data, and gaining insights from usage data. It supports both hybrid and native mobile application development.
IBM MobileFirst Foundation provides tools for developing hybrid, native, and mobile web applications using standards-based technologies. This proof of technology session will demonstrate how to use IBM MobileFirst Foundation to accelerate mobile app development, provide management of deployed apps, and utilize capabilities like in-app notifications, operational analytics, and sentiment analysis. The agenda includes presentations and hands-on labs covering app development, backend integration, app lifecycle management, quality assurance, and the MobileFirst architecture. The session is intended for IT professionals interested in a mobile application platform and will be offered free of charge with breakfast provided.
The document describes adding a mobile coupons ("My Offers") feature to the IBMBank mobile application. It involves using the MobileFirst Platform Service Discovery wizard to generate an adapter for a SOAP web service, adding HTML/JS to display offer data from the service, and implementing local storage of selected offers using the JSON Store database. Key steps include discovering and testing the SOAP service, importing JS files, initializing JSON Store, modifying the app code to retrieve and save offers, and previewing the updated app.
This document provides instructions for a lab exercise on getting started with IBM MobileFirst Platform. It introduces the key concepts of MobileFirst Platform Studio and walks through steps to import a sample banking application project, examine the project structure, add an Android environment, and preview the application in the Mobile Browser Simulator and an Android device. It also demonstrates how to invoke backend services using adapters and view analytics data from the MobileFirst Operations Console. The document contains detailed steps, screenshots and explanations to help users learn fundamental MobileFirst Platform development tasks.
This document describes a lab exercise to demonstrate application management functions in IBM MobileFirst using the MobileFirst Operations Console. The lab will:
1. Deploy an initial version of an IBMBank mobile application to a MobileFirst Server.
2. Publish an updated version of the application to fix a bug, and test the "Direct Update" feature which pushes changes to client devices.
3. Configure application status notifications via the MobileFirst Operations Console and see them displayed on an Android emulator.
This document provides an overview of IBM MobileFirst Platform's operational analytics features. It describes how the analytics platform collects and analyzes data from mobile applications, servers, and devices to provide visibility into performance and usage. The analytics console contains various views and capabilities for searching logs, viewing charts and reports, and diagnosing issues. It summarizes the different data sources, events captured, and the client and server APIs used to log additional analytics data. The document then outlines the steps to access the analytics console and walk through its key pages and functionality.
This document provides instructions for using the MobileFirst Quality Assurance tool on Bluemix to perform sentiment analysis. It first gives a brief overview of MobileFirst Quality Assurance and its capabilities. It then outlines the steps to set up a Mobile Quality Assurance service instance on Bluemix and link it to an iOS app. Finally, it describes how to view the sentiment analysis results in production, including overall sentiment scores, attribute dashboards, comparison to other apps, and attribute trend statistics.
The document describes an exercise using IBM Mobile Quality Assurance (MQA) to test a mobile banking application and report bugs. Students will launch an Android emulator containing the instrumented app. They can test the app functionality and use MQA's in-app notification to report bugs found, such as a misspelled button label. MQA will capture screenshots which students can annotate to describe the issue. All bug reports are uploaded to MQA and viewed by instructors in Bluemix to share with the class. The goal is to introduce MQA's capabilities for mobile app testing and feedback.
This document provides an overview and instructions for installing and configuring the Tivoli Management Environment (TME) platform. It discusses planning the installation, installing TME software on UNIX and PC nodes, configuring the TME management regions and resources, creating administrators and policy regions, and diagnosing common installation issues. It also provides guidance on setting up backups and describes capabilities of the Tivoli/Courier deployment application for managing file packages.
This document provides an overview of firewalls and demilitarized zones (DMZs), and summarizes Tivoli Framework solutions for communicating across firewalls in a secure manner. It describes how Tivoli Framework 3.7.1 introduced single port bulk data transfer and endpoint upcall port consolidation to reduce open ports. The Firewall Solutions Toolbox further improves security with endpoint and gateway proxies, relays to cross multiple DMZs adhering to no direct routing, and supporting unidirectional communications. It also describes the event sink for collecting events from non-Tivoli sources.
This document provides an overview of planning and implementing Tivoli Data Warehouse Version 1.3. It discusses the key components of Tivoli Data Warehouse including the control center server, source databases, central data warehouse, data marts, warehouse agents, and Crystal Enterprise server. It also covers planning considerations such as hardware and software requirements, physical and logical design choices, database sizing, security, network traffic, and skills required. The document is intended as a guide for implementing and managing a Tivoli Data Warehouse.
This document provides an overview and comparison of IBM tape library solutions for backing up IBM xSeries servers. It discusses factors to consider when selecting a tape library such as capacity, number of drives, and scalability. It also provides configuration details for backing up to tape libraries using Tivoli Storage Manager, VERITAS Backup Exec, and CA ARCserve. Recovery procedures using the backup software and Tivoli Disaster Recovery Manager are also covered.
This document provides a release guide for IBM Tivoli Storage Productivity Center Version 4.2. It includes information on the new features and functions of Tivoli Storage Productivity Center V4.2, an overview of the product architecture and family, and instructions for installing Tivoli Storage Productivity Center on Windows and Linux systems. The document covers preinstallation steps, installing prerequisite software like DB2, and installing the Tivoli Storage Productivity Center servers, graphical user interface (GUI), and command line interface (CLI).
This document discusses data synchronization features in IBM Tivoli Directory Integrator 6.1, including delta detection, delta tagging, and delta application. Delta detection discovers changes in a data source and retrieves only the modified data. Delta tagging stores change information in the retrieved data using operation codes. Delta application then uses these tags to efficiently propagate only necessary changes to target systems.
This document discusses strategies for migrating and consolidating storage using IBM TotalStorage products. It describes migrating a storage volume from one SAN to another using IBM SAN Volume Controller without interrupting access. It also outlines two methods for migrating data between tape technologies using IBM Tivoli Storage Manager: migrating individual nodes or migrating entire storage pools to a new tape technology.
This document provides guidance on deploying IBM Tivoli Composite Application Manager for WebSphere (ITCAM for WebSphere). It includes sample code, installation instructions, and assistance with scope development for a services engagement with ITCAM for WebSphere. The document covers planning the engagement, demonstrating the key capabilities of ITCAM for WebSphere through a sample implementation, and implementing the full ITCAM for WebSphere solution. It also discusses complementary solutions that can be bundled with an ITCAM for WebSphere engagement.
This document provides guidance on migrating from IBM Service Level Reporter (SLR) to Tivoli Performance Reporter for OS/390. It describes the key differences between the two products and discusses different migration approaches. The bulk of the document consists of examples and step-by-step instructions for migrating different types of SLR data, including predefined SLR tables, user-defined tables, parameter tables, and reports. It also covers related tasks like setting purge conditions.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Deployment guide series ibm tivoli application dependency discovery manager v7.1 sg247616
1. Front cover
Deployment Guide Series: IBM
Tivoli Application Dependency
Discovery Manager V7.1
Learn about TADDM functions and
architecture
Get tips for installing and using
TADDM
Customize and tune
TADDM
Vasfi Gucer
Vincent Abbosh
Sara C Brumfield
Martin Marino
David Ross
Ghufran Shah
Roger Turner
ibm.com/redbooks
2.
3. International Technical Support Organization
IBM Tivoli Application Dependency Discovery
Manager V7.1 Deployment Guide
August 2008
SG24-7616-00
24. Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business
Machines Corporation in the United States, other countries, or both. These and other IBM trademarked
terms are marked on their first occurrence in this information with the appropriate symbol (® or ™),
indicating US registered or common law trademarks owned by IBM at the time this information was
published. Such trademarks may also be registered or common law trademarks in other countries. A current
list of IBM trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
AIX® Micromuse® RS/6000®
DB2® Netcool® System z®
i5/OS® PartnerWorld® Tivoli Enterprise Console®
IBM® Redbooks® Tivoli®
Intelligent Device Discovery® Redbooks (logo) ® WebSphere®
The following terms are trademarks of other companies:
ITIL is a registered trademark, and a registered community trademark of the Office of Government
Commerce, and is registered in the U.S. Patent and Trademark Office.
IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency
which is now part of the Office of Government Commerce.
SUSE, the Novell logo, and the N logo are registered trademarks of Novell, Inc. in the United States and
other countries.
Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation
and/or its affiliates.
SAP, and SAP logos are trademarks or registered trademarks of SAP AG in Germany and in several other
countries.
Java, and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other
countries, or both.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
xxii IBM Tivoli Application Dependency Discovery Manager V7.1 Deployment Guide
26. on developing Information Technology Infrastructure Library (ITIL®)-based
Service Management solutions.
Sara C Brumfield is a Software Engineer at IBM, currently working in the Tivoli
Support Center. Her career has included many diverse projects, including
developing system management tools for AIX®, starting the hosted services
group for a startup, and recruiting development tools vendors for the RS/6000®
server platform. Sara holds a Bachelors degree from Rice University, with majors
in Computer Science and the Study of Women and Gender.
Martin Marino is an IT Specialist within the IBM Global Technology Services
group in IBM Argentina. He has specialized in Tivoli products since 2003. He is
currently working with TADDM for Strategic Outsourcing clients in Argentina and
Latin America. His areas of expertise include Tivoli Monitoring, Tivoli
Configuration Manager, Tivoli Remote Control, and Tivoli Management
Framework.
David Ross is a Technical Course Developer with IBM Tivoli in the United
States. A former classroom instructor and network administrator, he has been
with IBM for over eight years. He holds a degree in Secondary Education with a
Mathematics minor from Texas A&M University and another in Computer Science
from the University of Texas Permian Basin. He has developed both classroom
and Web-based training materials on products involving security, network
management, service desk support, and system automation. He has spent the
past two years focused on the Information Technology Service Management
(ITSM) products, particularly TADDM and CCMDB. In addition to course
development, he has taught Tivoli courses and delivered lectures in classrooms
and conferences around the world.
Ghufran Shah is a IBM Certified Advanced Deployment Professional in
Enterprise, Provisioning, and Business Application Management Solutions. He
has ten years of experience in Systems Development and Enterprise Systems
Management. He holds a degree in Computer Science from the University of
Bradford. His areas of expertise include Tivoli Systems Management
Architecture, Implementation, and Tivoli Training, together with Business Process
Improvement. He has written extensively about event Management, Monitoring,
and Business Systems Management integration and has taught IBM Tivoli
courses worldwide.
Roger Turner is a Senior Managing Consultant with the IBM Software Services
for Tivoli (ISST) organization. He has been with for IBM for 28 years, the past 12
years as a consultant with the ISST organization. As an ISST consultant, he has
been working with clients to implement business system and service
management products, including Global Enterprise Manager, Tivoli Business
Systems Manager (TBSM) 2.1 and 3.1, and Tivoli Business Service Manager
4.1. He has worked with clients in many focus areas, including banking,
xxiv IBM Tivoli Application Dependency Discovery Manager V7.1 Deployment Guide
27. insurance, government, financial services, retail, and health. For the past 2 1/2
years, he has also been working with clients to implement the Tivoli Application
Dependency Discovery Manager (TADDM) product. His area of expertise
includes the integration of TBSM and TADDM. He holds numerous certifications,
including ITIL Service Management - Service Support and Service Delivery,
TBSM 3.1 distributed and TBSM 3.1 mainframe, and TADDM 7.1.
Thanks to the following people for their contributions to this project:
Arzu Gucer
International Technical Support Organization, Austin Center
Ed Bernal, Byron Gehman, and Mike Mallo
IBM USA
The team would like to express special thanks to Jan Erik Hoel from IBM Norway
for his contributions to Chapter 8, “Performance considerations” on page 343 and
Chapter 9, “Troubleshooting” on page 367.
Thanks to the authors of the previous editions of this book:
Authors of IBM Tivoli Application Dependency Discovery Manager
Capabilities and Best Practices, SG24-7519, which was published in
February 2008, were:
– Bart Jacob
– Bhavesh Adhia
– Karim Badr
– Qing Chun Huang
– Carol S. Lawrence
– Martin Marino
– Petra Unglaub-Lloyd
Become a published author
Join us for a two- to six-week residency program! Help write a book dealing with
specific products or solutions, while getting hands-on experience with
leading-edge technologies. You will have the opportunity to team with IBM
technical professionals, Business Partners, and Clients.
Your efforts will help increase product acceptance and client satisfaction. As a
bonus, you will develop a network of contacts in IBM development labs, and
increase your productivity and marketability.
Preface xxv
28. Find out more about the residency program, browse the residency index, and
apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our books to be as helpful as possible. Send us your comments about
this book or other IBM Redbooks publications in one of the following ways:
Use the online Contact us review IBM Redbooks publications form found at:
ibm.com/redbooks
Send your comments in an e-mail to:
redbooks@us.ibm.com
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
xxvi IBM Tivoli Application Dependency Discovery Manager V7.1 Deployment Guide
32. 1.1 Information Technology Infrastructure Library
Information Technology Infrastructure Library (ITIL) is an internationally
recognized framework that provides comprehensive best practice guidelines for
all aspects of end-to-end Service Management. ITIL includes people, processes,
products, and the use of partners. It began in the 1980s when the UK
Government initiated an exercise to standardize its diverse IT processes.
ITIL has evolved over the years to cover Service Support and Service Delivery,
and in 2007, Version 3 was launched, which includes a life cycle management
approach in five core volumes: Service Strategy, Service Design, Service
Transition, Service Operation, and Continual Service Improvement.
The best practices contained in ITIL are independent of tool, vendor, or industry
and can be applied to an organization of any size. ITIL encourages organizations
to adapt and adopt its suggestions to meet business needs and improve
processes. Though there is a significant amount of detail in the books that make
up the library, the books are not themselves the solution to all IT management
issues. The processes require significant work to deploy at a level of detail
enabling day-to-day use, with dependencies on the three key components
(process, people, and tools) of a management system.
Even though there are many references to ITIL as a standard, it is not a
standard. Organizations cannot comply with ITIL. It is a set of guidelines that an
organization can adopt and adapt to their needs.
1.1.1 ITIL Version 3
ITIL Version 3 focuses on best practices throughout the service life cycle. It
focuses essentially on service and solution life cycle management, including five
core volumes: Service Strategy, Service Design, Service Transition, Service
Operation, and Continual Service Improvement. Further discussion of ITIL
Version 3 is outside the scope of this book.
1.1.2 Critical success factors to implement ITIL
Because ITIL is a framework of best practices and not a methodology, it only
describes what needs to be done. ITIL does not provide guidance for how to
implement the processes, so each company chooses the best way to fit ITIL to its
requirements.
4 IBM Tivoli Application Dependency Discovery Manager V7.1 Deployment Guide
33. A key mind-set when implementing ITIL is “adopt and adapt“. “Adopt” ITIL as a
common language and reference point for IT Service Management, and “adapt”
ITIL best practices to achieve business objectives.
Generally, IT organizations do not implement all of the ITIL processes, because
they do not have sufficient budget, and they determine that they do not need all
of the processes. Initially, implementing a subset of all processes can be seen as
a way to avoid extra costs. However, depending on the processes that you
choose to implement, excluding other processes might result in less benefit from
those processes that you implement. For example, choosing to implement
Change and Release processes without implementing Configuration might result
in an inaccurate impact assessment when approving changes.
You must carefully select the service management processes, taking into
consideration the relationship among all processes in addition to the cost
perspective and implementation complexity of individual processes.
A successful implementation of IT Service Management must:
Be aligned with business needs - business-driven not technology-driven
Improve staff awareness about business goals
Be adapted to the culture of the organization. This adaptation must be done
when defining the roles, responsibilities, tools, processes, procedures, tasks,
and so on. After IBM Service Management is implemented, it must be
rigorously followed.
Have its processes clearly defined, documented, and available
Have its main processes integrated with each other
Have its inputs measurable and repeatable
Have IT processes supported by tools and customized to fit the processes
defined
Have processes easily changed as necessary
Be integrated with external suppliers
Include properly training and communicating to all people who will use or
provide IT services
Have clearly measurable and repeatable key performance indicators
A successful IBM Service Management implementation needs to result in
improved IT client satisfaction, better resource utilization, and improved client
perception of IT service quality.
Chapter 1. IBM Service Management overview 5
34. 1.2 IBM and ITIL
IBM initially contributed to ITIL with its systems management concept “yellow
books” and continues to contribute as a developer, reviewer, and user of ITIL.
IBM contributed in many ways to ITIL Version 2, including authoring, quality
reviews, project management, and additional support through the IT Service
Management Forum. The focus of Version 2 was on process management
practices required to enable service management. The ITIL service support and
delivery publications contain significant contributions from IBM. The ITIL
application management book, co-written by authors from IBM and other
companies, is the basis for the life cycle concept in ITIL Version 3. It lays the
basic groundwork for how to integrate service management practices throughout
the solution life cycle.
IBM supports the development of updates and refreshes to industry-accepted
best practices, including supporting the ITIL Advisory Group through quality
reviews and other briefings. Thought leaders also serve on the ITIL Advisory
Group and other working groups to contribute as the need arises. IBM views ITIL
as a valuable set of publications that promote best practices in service
management. From a strategic outsourcing perspective, ITIL is requested by
many IBM clients all around the globe. Companies that are implementing
improvements to their service management capabilities consider ITIL a good
place to start.
1.3 IBM Service Management
IBM has developed thought leadership to improve the “state of the art” in service
management for the last 25 years and has supported other companies in their
efforts as well. In addition to the advancement of management disciplines and
technologies, IBM recognized early on that acceptance of common practices and
standards is vital to achieving improved value from information technology (IT).
Advances in technologies and management disciplines provide the greatest
value when they become part of and extend the body of generally accepted
practices and open standards. IBM supports the advancement of practices and
open standards, such as ITIL (the IT Infrastructure Library®), COBIT (Control
Objectives for Information Technology), ISO IEC 20000, and Carnegie Mellon
University’s e-Sourcing Capability Model (e-SCM). The fundamental
characteristics of service management require integration and agreement on
standards, not only between tools and roles within IT, but also among
organizations and even industries.
6 IBM Tivoli Application Dependency Discovery Manager V7.1 Deployment Guide
35. IT service management is the integrated set of activities required to ensure the
cost and quality of IT services valued by the client. It is the management of
client-valued IT capabilities through effective processes, organization,
information, and technology, including:
Aligning IT with business objectives
Managing IT services and solutions throughout their life cycles
Service management processes, such as those processes described in ISO
IEC 20000, ITIL, and the Process Reference Model for IT.
1.3.1 Why businesses need ISM
Today’s enterprises face an ever-increasing problem of managing their IT
processes to deliver IT services in a manner that is:
Efficient
Reliable
Secure
Consistent
At the same time, the complexity of the infrastructure needed to deliver these
IT-enabled business services has been increasing rapidly. Figure 1-1 shows a
simple example of the complexity of IT environments.
Figure 1-1 Infrastructure complexity
Chapter 1. IBM Service Management overview 7
36. Several of the key challenges faced by businesses include:
Complexity: The root cause of the problems that IT organizations face lies in
the dramatic increase of business complexity due to heterogeneity of
environments and the interconnection of applications (composite
applications). Architectural and organizational issues, accelerating the
proliferation of composite applications and hardware entities, and worldwide
operations spanning multiple time zones all contribute to reducing the
efficiency and effectiveness of the IT organization.
Change: Complexity makes for hard-to-manage infrastructures that often
break when changed and whose management requires a discipline that few
companies achieve without flaws. Increasing workloads, more stringent
service-level assurance requirements, staff turnover, and new market
opportunities all lead to pressure for change in the IT organization. Change is
the leading cause of service or application disruption today, and it often
results in visible business impact. In fact, our experience suggests that nearly
80 percent of all critical outages can be traced to faulty change management.
Cost: Currently, operational IT labor cost constitutes almost 70 percent of the
total IT budget of businesses. In the late 1990s, half of the IT labor budget
was devoted to new application development, and half of the IT labor budget
was devoted to operations. Because IT budgets have been held flat, the chief
information officers of IT organizations have faced two unappealing choices:
shift resources from new application development or reduce the level of
support for current applications. Both options serve to reduce the efficiency
and effectiveness of IT.
Governance and compliance: The introduction of government regulations,
such as the Sarbanes-Oxley Act (SOX) and the Health Insurance Portability
and Accountability Act (HIPAA) in the United States, have put an additional
burden on the IT organization. IT must now support the needs of the business
to audit for compliance through the institution of better process controls and
the maintenance of audit trails for IT infrastructure changes. This support
requires careful consideration because of the penalties of noncompliance,
including criminal and civil liabilities and adverse public opinion.
1.3.2 IBM Service Management overview
For many businesses, service excellence is increasingly a competitive
differentiator, because organizations need to rapidly adapt to changing
conditions in the marketplace and create and deploy new services quickly and
efficiently. However, service excellence can only be achieved through effective
and efficient service management.
A fundamental goal of IT Service Management is the management of IT services
and infrastructure with the same kinds of quality control that enterprises strive to
8 IBM Tivoli Application Dependency Discovery Manager V7.1 Deployment Guide
37. use for all business processes. When this management is achieved, businesses
have the confidence to deploy new and updated services that are critical to their
missions.
An effective IT Service Management capability reduces the time needed to
deliver a company’s IT services according to business policies and reduces the
labor cost of the people involved in executing the processes by replacing manual
IT process management with autonomic management.
IBM Service Management is an approach designed to automate and simplify the
management of business services. It concentrates on four areas of study:
Technology integration and standards
Improved collaboration among IT personnel spread across organizational
silos
Best practices-based process modules to enable automated process
execution
Sharing business critical IT information to improve decision making
In finding workable solutions to these areas, IBM solutions cover four key areas:
Process Managers that provide automated ITIL-aligned workflows for key IT
processes
An open, standards-based IBM IT Service Management platform
Integration between process tasks and operational management products to
automate the running of those tasks from the process flow
Best practices to help pull it all together
These four key areas are pictured in Figure 1-2 on page 10.
Chapter 1. IBM Service Management overview 9
38. IBM Service Management
Process Management
Service Management
Platform
Operational Management
Best Practices and Services
Figure 1-2 IBM Service Management
1.3.3 IBM Service Management architecture
The IBM Service Management architecture is illustrated in Figure 1-2. Note
several of the major components:
A user interface that provides access to IT personnel across multiple
disciplines and areas of concern
A process layer to coordinate workflows and process management across the
ITIL catalog (service delivery and support, change management, storage
management, and so on)
An operational management component shown by the operational
management products (OMPs) and the integration modules
A central information component represented as the Configuration
Management Database (CMDB) and the supporting functions
TADDM is a crucial element in the CMDB component. If used with IBM Service
Management software, such as the IBM Tivoli Change and Configuration
Management Database (CCMDB), TADDM is the primary means of populating
the CMDB through discovery.
10 IBM Tivoli Application Dependency Discovery Manager V7.1 Deployment Guide
39. The CMDB also has requirements, which are addressed by TADDM. Part of the
functionality that must be offered or supported by the CMDB includes:
Common data model for the entire IT environment (including relationship
information):
– Physical components (computers, devices, and so on)
– Logical components (business services, applications, and so on)
Automatic discovery and change tracking
Reconciliation capabilities in order to effectively integrate from multiple
sources of data
Visual display of relationships and dependencies
1.4 TADDM and IBM Service Management
In this section, we discuss the role that TADDM plays in IBM Service
Management in meeting the CMDB requirements that were outlined in the
previous section.
1.4.1 Common data model
The common data model (CDM) that is used by TADDM defines the following
constructs:
Models: Models consist of attributes, classes, and relationships.
Classes: Classes represent IT entities and can participate in relationships. An
example is ComputerSystem.
Attributes: Attributes are defined separately from classes and can be reused
in any number of class definitions. An example is GUID, the globally-unique
identifier.
Relationships: Relationships are strongly typed entities apart from classes.
All relationships are binary (having only two objects defined in the
relationship). An example is runsOn, where one entity, such as Aix (the
operating system), actually is executing and requires the execution
environment provided by another component (ComputerSystem). The
relationship can be described as Aix runsOn ComputerSystem.
Data types: Data types are similar to the data types in programming
languages. An example is String as in the attribute Description is of type
String.
Chapter 1. IBM Service Management overview 11