SlideShare a Scribd company logo
1 of 39
UNIT ONE
INTRODUCTION & IT INFRASTRUCTURE
AKSHAY RAMCHANDRA PATIL
INTRODUCTION
• Information Technology
• IT Infrastructure Management
• Introduction—IT Infrastructure Management
• Challenges in IT Infrastructure Management
• Design Issues of IT Organizations and IT Infrastructure
• Determining Customers' Requirements
• IT Systems Management Process
• IT Service Management Process
• Information System Design Process
INFORMATION
TECHNOLOGY VS
COMPUTER
SCIENCE
WHAT IS
INFORMATION
TECHNOLOGY
• Information technology (IT) is the use of any computers,
storage, networking and other physical
devices, infrastructure and processes to create, process, store,
secure and exchange all forms of electronic data. Typically, IT is
used in the context of business operations, as opposed to
technology used for personal or entertainment purposes. The
comm
• The Harvard Business Review coined the term information
technology to make a distinction between purpose-built
machines designed to perform a limited scope of functions,
and general-purpose computing machines that could be
programmed for various tasks. As the IT industry evolved from
the mid-20th century, computing capability increased, while
device cost and energy consumption decreased, a cycle that
continues today when new technologies emerge.ercial use of
IT encompasses both computer technology and
telecommunications.
WHAT DOES INFORMATION TECHNOLOGY
ENCOMPASS?
• The IT department ensures that the organization's systems, networks, data and
applications all connect and function properly. The IT team handles three major
areas:
1. deploys and maintains business applications, services and infrastructure
(servers, networks, storage);
2. monitors, optimizes and troubleshoots the performance of applications,
services and infrastructure; and
3. oversees the security and governance of applications, services and
infrastructure.
RESPONSIBILITIES
AND ROLES
• Administration. Administrators handle the day-to-day
deployment, operation and monitoring of an IT
environment, including systems, networks and applications.
• Support. Help desk staff specialize in answering questions,
gathering information and directing troubleshooting efforts
for hardware and software.
• Applications. Businesses rely on software to perform work.
Some applications are procured and deployed from third
parties, such as email server applications.
• Compliance. Businesses are obligated to observe varied
government- and industry-driven regulatory requirements.
IT staff play a major role in securing and monitoring access
to business data and applications to ensure that such
resources are used according to established business
governance policy that meets regulatory requirements.
This Photo by Unknown Author is licensed under CC BY-ND
EXAMPLES OF INFORMATION TECHNOLOGY
• Server upgrade. One or more data center servers near the end of their
operational and maintenance lifecycle.
• Security monitoring. Businesses routinely employ tools to monitor and log
activity in applications, networks and system IT staff receive alerts of potential
threats or noncompliant behavior -- such as a user attempting to access a
restricted file -- check logs and other reporting tools to investigate and
determine the root cause of the alert and take prompt action to address and
remediate the threat, often driving changes and improvements to security
posture that can prevent similar events in the future.
• New software. The business determines a need for a new mobile application that can allow
customers to log in and access account information or conduct other transactions from
smartphones and tablets. Developers work to create and refine a suitable application according to a
planned roadmap. Operations staff posts each iteration of the new mobile application for download
and deploy the back-end components of the app to the organization's infrastructure.
• Business improvement. A business requires more availability from a critical application to help with
revenue or business continuance strategies. The IT staff might be called upon to architect a high-
availability cluster to provide greater performance and resilience for the application to ensure that
the application can continue to function in the face of single outages. This can be paired with
enhancements to data storage protection and recovery.
• User support. Developers are building a major upgrade for a vital business application. Developers
and admins will collaborate to create new documentation for the upgrade. IT staff might deploy the
upgrade for limited beta testing -- allowing a select group of users to try the new version -- while
also developing and delivering comprehensive training that prepares all users for the new version's
eventual release.
CHALLENGES IN IT INFRASTRUCTURE
MANAGEMENT
• Most of the global tech analysts understand that there are several challenges
related to IT infrastructure that the companies face. The main challenges are
regarding computing platforms, data acquisition, compute provisioning and
management, data storage architectures, data analytics, and networks and
communication
• Lack of Powerful Computing Platforms
Challenge - The major challenge in growing processing power of computers
has been the lack of energy and space to power supercomputers. IT managers
have always been on the lookout for better and faster systems which will help
in the faster processing of the large amounts of data available today.
Solution - A simple solution to this challenge would be to employ new
general purpose graphical processors or multi-core platforms. By using better
systems, the existing software will have to be optimized and adjusted to
provide the best results. Many projects have been started to develop faster
computers which will be available at low costs and energy needs.
This Photo by Unknown Author is licensed under CC BY
• Data Acquisition Problems
Challenge - Firewalls which protect emails, applications and web browsing can cause important packet losses in
the TCP/IP networks. This can result in important data loss and reduce the network speeds considerably, making
the online collaboration impossible. Similar losses can occur due to the switches and routers which do not have
the required high-speed memory.
Solution - IT managers need to look out for high-performance computing resources with huge data sets and a
secure bridge to collaborate with dispersed scientific teams. They will also need to employ more sophisticated
means to collect, filter and store using high-speed networks.
• Lack of Efficient Data Storage Architectures
Challenge - Cloud storage has taken over in most of the cases in the modern world. Though it is a cost-effective
and scalable alternative for data storage for IT managers, it does not provide the required data storage
architectures which can accommodate a variety of applications. The IT community needs something more
flexible which is beyond space and cost in cloud storage options.
Solution - It is important that the cloud storage options become more flexible to improve the IT infrastructure.
It should be easy to optimize the cloud storage architecture according to the application which is being
deployed. It needs to be more reliable, efficient and be able to handle a variety of applications and needs of the
user community. The cloud storage options need to serve as long-term and archival instead of a short-term
solution for the IT community.
• Dearth of Ways to Improve Data Analytics
Challenge - Currently there are not many methods in place which can be used by IT managers to separate
quality data from the humongous data sets. It is important to identify patterns in the data and correctly
analyze it and use it to take business decisions in infrastructure management.
Solution - The best solution to solve this problem would be to have an ideal system which would consist
of a standards-based framework facilitating easy data transfer between different tools and layers. This will
help in faster data transfer and hence better data analysis. This analytics would be used for industrial
control systems and for network and IT monitoring.
• Improper Networks and Connectivity
Challenge - For any organization to work smoothly, it is important that there is a good and reliable
network in place. Without a reliable network connection, IT infrastructure management can be a difficult
task for any IT manager of the organization. New software-based methods and network architecture
design are required for the optimization of data.
Solution - The ability to migrate the IP address would help to allow application services to be migrated to
other hardware. Another solution to this challenge would be to add intelligence to the wired as well as
Wi-Fi network connections. This will help the networks to optimize the traffic delivery to contain costs and
improve the service.
DETERMINING CUSTOMERS' REQUIREMENTS
• A good SRS document, should properly categorize
and organise the requirements into different
sections (IEEE 830). As per the IEEE 830 guidelines,
there are two important categories of user
requirements are the following:
• Functional requirements
• Non-functional requirements
FUNCTIONAL REQUIREMENT
• A Functional Requirement (FR) is a description of the service that the software
must offer. It describes a software system or its component. A function is nothing
but inputs to the software system, its behavior, and outputs.
• It can be a calculation, data manipulation, business process, user interaction, or
any other specific functionality which defines what function a system is likely to
perform. Functional Requirements in Software Engineering are also
called Functional Specification.
WHAT SHOULD BE INCLUDED IN THE FUNCTIONAL REQUIREMENTS
DOCUMENT
• Functional Requirements of a system should include the following
things:
• Details of operations conducted in every screen
• Data handling logic should be entered into the system
• It should have descriptions of system reports or other outputs
• Complete information about the workflows performed by the
system
• It should clearly define who will be allowed to
create/modify/delete the data in the system
• How the system will fulfill applicable regulatory and compliance
needs should be captured in the functional document
BEST PRACTICE OF FUNCTIONAL REQUIREMENT
• Do not combine two requirements into one. Keep the requirements
granular.
• You should make each requirement as complete and accurate as possible.
• The document should draft all the technical requirements.
• Map all requirements to the objectives and principles which contributes
to successful software delivery
• Elicit requirements using interviews, workshops and casual
communications.
• If there is any known, verified constraint which materially affects a
requirement then it is a critical state that should be documented.
• It is necessary that you document all the assumption in the document.
NON
FUNCTIONAL
REQUIREMENT
• Non-Functional Requirements are the
constraints or the requirements imposed on the
system. They specify the quality attribute of the
software. Non-Functional Requirements deal with
issues like scalability, maintainability,
performance, portability, security, reliability, and
many more. Non-Functional Requirements
address vital issues of quality for software
systems. If NFRs not addressed properly, the
results can include:
• Users, clients, and developers are unsatisfied.
• Inconsistent software.
• Time and cost overrun to fix the software which
was prepared without keeping NFRs in mind.
TYPES OF
NON
FUNCTIONAL
REQUIREMENT
• Performance constraints –
Reliability, security, response time, etc.
• Operating constraints –
These include physical constraints (size, weight), personnel
availability, skill level considerations, system accessibility
for maintenance, etc.
• Interface constraints –
These describe how the system is to interface with its
environment, users, and other systems. For example, user
interfaces and their qualities (e.g., user-friendliness).
• Economic constraints –
Immediate and/or long-term costs.
• Lifecycle requirements – Quality of the design:
These measured in terms such as maintainability, enhance
ability, portability.
WHAT IS SYSTEM MANAGEMENT
Systems management refers to the centralized
administration of the IT (Information
Technology) in an organization. The concept
covers a broad set of subsystems that are
needed to monitor and manage IT systems
correctly.
Managing IT systems is essential for organizing
and running your business. Good system
management is the backbone of an IT-based
organization.
When implemented effectively, it makes the
delivery of IT much easier, making the
employees adapt faster and be more
productive.
Systems Management consists of a wide range
of IT functions or subsets aimed at maintaining
or improving infrastructure, network,
applications, services, OSs, among many others.
Systems Management oversees many IT
requirements such as, (but not limited to):
SYSTEM MANAGEMENT AND PROCESSES
Availability
management
Capacity
planning
Change
management
Configuration
management
Disaster
recovery
Facilities
management
Network
management
Performance
and tuning
Problem
management
Production
acceptance
Storage
management
Strategic
security
STRATEGIC
PROCESSES Production acceptance
Capacity planning
Strategic security
Disaster recovery
Facilities management
TACTICAL PROCESSES
AVAILABILITY
MANAGEMENT
PERFORMANCE
AND TUNING
CHANGE
MANAGEMENT
PROBLEM
MANAGEMENT
STORAGE
MANAGEMENT
NETWORK
MANAGEMENT
CONFIGURATION
MANAGEMENT
IT SERVICE MANAGEMENT
PROCESS
• IT service management (ITSM) is
the process of designing,
delivering, managing, and
improving the IT services an
organization provides to its end
users. ITSM is focused on aligning
IT processes and services with
business objectives to help an
organization grow.
BENEFITS OF EFFICIENT ITSM PROCESSES
Lower costs for IT
operations
Higher returns on IT
investments
Minimal service
outages
Ability to establish
well-defined,
repeatable, and
manageable IT
processes
Efficient analysis
of IT problems to
reduce repeat
incidents
Improved efficiency
of IT help desk teams
Well-defined roles
and responsibilities
Clear expectations
on service levels and
service availability
Risk-free
implementation of IT
changes
Better transparency
into IT processes and
services
SERVICE DESIGN
• This stage's main aim is planning and designing the IT services the organization offers
to meet business demands. It involves creating and designing new services as well as
assessing current services and making relevant improvements. There are several
elements to IT service design:
• Design coordination
• Service catalogue management
• Risk management
• Service level management
• Capacity management
• Availability management
• IT service continuity management, Information security, Compliance, Architecture
management
• Supplier management
SERVICE STRATEGY
• This stage forms the foundation or the framework
of an organization's ITSM process building. It
involves defining the services that the organization
will offer, strategically planning processes, and
recognizing and developing the required assets to
keep processes moving. Service strategy for any
organization includes the following aspects:
• Strategy management
• Service portfolio management
• Financial management
• Demand and capacity management
• Business relationship management
SERVICE
TRANSITION
• Once the designs for IT services and their processes have
been finalized, it's important to build them and test them
out to ensure that processes flow. IT teams need to ensure
that the designs don't disrupt services in any way,
especially when existing IT service processes are upgraded
or redesigned. This calls for change management,
evaluation, and risk management. No transition happens
without risks and it's important to be proactive during
transitions.
• Change management and evaluation
• Project management
• Knowledge management
• Service asset and configuration Management
• Release and deployment management
SERVICE
OPERATION
• This phase involves implementing the tried and tested new
or modified designs in a live environment. While in this
stage, the processes have already been tested and the
issues fixed, but new processes are bound to have hiccups
especially when customers start using the services. IT teams
therefore need to closely monitor processes and workflows
and be proactive in ensuring continuity in service delivery.
TheITIL frameworkdefines the following as some of the
main processes in the service operation stage:
• Incident and request fulfillment management
• Problem management
• Technical management
CONTINUAL
SERVICE
IMPROVEMENT
(CSI)
• Implementing IT processes successfully shouldn't
be the final stage in any organization. There's
always room for improvement and new
development based on issues that pop up,
customer needs and demands, and user feedback.
Key performance indicators (KPIs) and metrics
play a significant role in identifying areas that
need improvement or change. For better
understanding, read this blog on the important
KPIs for any organization. The following are a few
of the aspects of CSI:
• IT service review
• Process evaluation
• CSI initiatives management
WHAT IS INFORMATION SYSTEM?
• The system is a collection of various elements or entities that are
used to process input into an output. Inputs and outputs can be
either raw or intact data into information — depending on the
processing designed to work in the system.
• Meanwhile, information is the result of data processing used for a
particular purpose. As for what data means is raw facts that have
not been processed and can not provide stimulus for users to take
action.
• Thus, an information system can be interpreted as a set of
interconnected elements to process a given input into a particular
output produced. The next stage of an information system is a
MIS (Management Information System) which has a higher
complexity with the final goal being used for the needs of analysis
and decision making.
WHAT IS INFORMATION
SYSTEMS DEVELOPMENT?
• As the name suggests, information system development or
commonly known as SLC (Systems Life Cycle) or SLDC (Software
Development Life Cycle) is a process of making and changing the
system and the model and methodology used. In other words, an
SDLC is the preparation of a new system to replace the old system,
both in whole and only partially.
• Development of information systems is generally done because of
problems that cannot be accommodated by the old system. For
example, the hospital where you work make an overhaul SIMRS
(Sistem Informasi Manajemen Rumah Sakit/Hospital Management
Information System) because of applications that previously could
not do bridging with BPJS. Considering the fact that the
government has required it, then inevitably the hospital must
adjust the SIMRS it already has.
• As for carrying out an information system development, the
related team will consist of several personnel, namely the project
coordinator, system analyst and design, network designer,
programmer, technician (hardware), administrator, software tester,
graphic designer, and documentary.
INFORMATION SYSTEM DEVELOPMENT STAGES
• System Survey
The SLDC phase also consists of three main points: system
identification, selection, and system planning.
1. System Identification: This process is to identify the problems
facing the company and the system it has. The team will look
for any opportunities that can be done to overcome this.
2. Selection: The selection phase will apply evaluation points to
the development project to ensure the solutions are created in
accordance with the company’s expected targets.
3. System Planning: This step is the step of developing a formal
plan to start working on and implementing the information
system development concept that has been chosen.
NEEDS ANALYSIS
• System requirements analysis is a technique for
solving problems by decomposing the
components of the system. The aim is none
other than to find out more about how each
component works and the interaction between
one component with other components.
• Some aspects that need to be targeted in the
needs analysis in the development of
information systems include business users, job
analysis, business processes, agreed rules,
problems and solutions, business tools, and
business plans.
DESIGN
• The design or design of system development is
intended to provide a complete blueprint as a
guideline for the IT team (especially
programmers) in making applications. Thus the IT
team no longer makes decisions or works in a
sporadic way.
IMPLEMENTATION
THE STAGE OF DEVELOPING THIS INFORMATION SYSTEM IS TO WORK
ON A PREVIOUSLY DESIGNED DEVELOPMENT.
TESTING
• A system needs to be tested to ensure that the
development carried out is appropriate or not with the
expected results. Tests that are applied are various, such
as performance, input efficiency, syntax (program logic),
output, and so on.
• This information system development stage requires
preparation of various supporting aspects. In addition to
applications, hardware readiness and several other
related facilities also need to be prepared. As for
implementation, several activities carried out include
data migration (conversion), training for users, and trials.
CHANGE AND MAINTENANCE
• This step covers the whole process in order to ensure the
continuity, smoothness and improvement of the system.
In addition to monitoring the system at a certain time,
maintenance also includes activities to anticipate minor
bugs (bugs), system improvements, and anticipation of
some risks from factors outside the system.
• Thus information about the development of information
systems or SLDC. May be useful!
QUESTIONS?

More Related Content

Similar to UnitOnePresentationSlides.pptx

Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Riverbed Technology
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionArlene Smith
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldEMC
 
The Future of Convergence Paper
The Future of Convergence PaperThe Future of Convergence Paper
The Future of Convergence PaperHitachi Vantara
 
Best practices in networks and infrastructure
Best practices in networks and infrastructureBest practices in networks and infrastructure
Best practices in networks and infrastructurenicholas njoroge
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavSandep Jadhav
 
Platforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern EngineeringPlatforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern EngineeringDATAVERSITY
 
Bending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT SimplificationBending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT SimplificationCognizant
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloudSougata Mitra
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
Improving Datacenter Performance through Capacity Planning – Netmagic
Improving Datacenter Performance through Capacity Planning – NetmagicImproving Datacenter Performance through Capacity Planning – Netmagic
Improving Datacenter Performance through Capacity Planning – NetmagicNetmagic Solutions Pvt. Ltd.
 
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Iver Band
 
Information technology Infrastructure
Information technology Infrastructure Information technology Infrastructure
Information technology Infrastructure huma sh
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementNIIT Technologies
 
Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...
Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...
Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...mattdenesuk
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 

Similar to UnitOnePresentationSlides.pptx (20)

GIS POV
GIS POVGIS POV
GIS POV
 
FINAL VER - 2015_09
FINAL VER - 2015_09FINAL VER - 2015_09
FINAL VER - 2015_09
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined World
 
The Future of Convergence Paper
The Future of Convergence PaperThe Future of Convergence Paper
The Future of Convergence Paper
 
Best practices in networks and infrastructure
Best practices in networks and infrastructureBest practices in networks and infrastructure
Best practices in networks and infrastructure
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep Jadhav
 
Platforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern EngineeringPlatforming the Major Analytic Use Cases for Modern Engineering
Platforming the Major Analytic Use Cases for Modern Engineering
 
AtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White PapaerAtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White Papaer
 
Bending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT SimplificationBending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT Simplification
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloud
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Improving Datacenter Performance through Capacity Planning – Netmagic
Improving Datacenter Performance through Capacity Planning – NetmagicImproving Datacenter Performance through Capacity Planning – Netmagic
Improving Datacenter Performance through Capacity Planning – Netmagic
 
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
 
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
 
Information technology Infrastructure
Information technology Infrastructure Information technology Infrastructure
Information technology Infrastructure
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure management
 
Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...
Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...
Big Data, Physics, and the Industrial Internet: How Modeling & Analytics are ...
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 

More from BLACKSPAROW

DICTIONARY USING.pptx
DICTIONARY USING.pptxDICTIONARY USING.pptx
DICTIONARY USING.pptxBLACKSPAROW
 
Soft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptxSoft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptxBLACKSPAROW
 
Unit 6 - PART2.pptx
Unit 6 - PART2.pptxUnit 6 - PART2.pptx
Unit 6 - PART2.pptxBLACKSPAROW
 
digital signature algo.pptx
digital signature algo.pptxdigital signature algo.pptx
digital signature algo.pptxBLACKSPAROW
 

More from BLACKSPAROW (13)

DICTIONARY USING.pptx
DICTIONARY USING.pptxDICTIONARY USING.pptx
DICTIONARY USING.pptx
 
ix d.pptx
ix d.pptxix d.pptx
ix d.pptx
 
Soft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptxSoft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptx
 
Unit 6 - PART2.pptx
Unit 6 - PART2.pptxUnit 6 - PART2.pptx
Unit 6 - PART2.pptx
 
Unit 4.pptx
Unit 4.pptxUnit 4.pptx
Unit 4.pptx
 
80386-1.pptx
80386-1.pptx80386-1.pptx
80386-1.pptx
 
24.pptx
24.pptx24.pptx
24.pptx
 
1791.pptx
1791.pptx1791.pptx
1791.pptx
 
UNIT 3.pptx
UNIT 3.pptxUNIT 3.pptx
UNIT 3.pptx
 
UNIT 2.pptx
UNIT 2.pptxUNIT 2.pptx
UNIT 2.pptx
 
Unit four .pptx
Unit four .pptxUnit four .pptx
Unit four .pptx
 
ECC_basics.ppt
ECC_basics.pptECC_basics.ppt
ECC_basics.ppt
 
digital signature algo.pptx
digital signature algo.pptxdigital signature algo.pptx
digital signature algo.pptx
 

Recently uploaded

《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...wyqazy
 
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书Fir La
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityJohanAspro
 
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书Fir La
 
Cyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberAgent, Inc.
 
Short-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptxShort-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptxHenryBriggs2
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书Fir La
 
如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书
如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书
如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书Fis s
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCRSapana Sha
 
定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一Fir La
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd
 
Methanex Investor Presentation (April 2024)
Methanex Investor Presentation (April 2024)Methanex Investor Presentation (April 2024)
Methanex Investor Presentation (April 2024)Methanex Corporation
 

Recently uploaded (20)

《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
《加州大学圣克鲁兹分校学位证书复制》Q微信741003700美国学历疑难问题指南|挂科被加州大学圣克鲁兹分校劝退没有毕业证怎么办?《UCSC毕业证购买|加...
 
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
如何办理北卡罗来纳大学教堂山分校毕业证(文凭)UNC学位证书
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanity
 
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Serviceyoung  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Serviceyoung call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
 
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
如何办理密苏里大学堪萨斯分校毕业证(文凭)UMKC学位证书
 
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
Cyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdfCyberagent_For New Investors_EN_240424.pdf
Cyberagent_For New Investors_EN_240424.pdf
 
Short-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptxShort-, Mid-, and Long-term gxxoals.pptx
Short-, Mid-, and Long-term gxxoals.pptx
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Uttam Nagar Delhi reach out to us at 🔝9953056974🔝
 
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
如何办理东俄勒冈大学毕业证(文凭)EOU学位证书
 
Falcon Invoice Discounting - Best Platform
Falcon Invoice Discounting - Best PlatformFalcon Invoice Discounting - Best Platform
Falcon Invoice Discounting - Best Platform
 
如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书
如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书
如何办理(UTS毕业证书)悉尼科技大学毕业证学位证书
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
 
定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
定制(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
Osisko Gold Royalties Ltd - Corporate Presentation, April 23, 2024
 
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
 
Methanex Investor Presentation (April 2024)
Methanex Investor Presentation (April 2024)Methanex Investor Presentation (April 2024)
Methanex Investor Presentation (April 2024)
 

UnitOnePresentationSlides.pptx

  • 1. UNIT ONE INTRODUCTION & IT INFRASTRUCTURE AKSHAY RAMCHANDRA PATIL
  • 2. INTRODUCTION • Information Technology • IT Infrastructure Management • Introduction—IT Infrastructure Management • Challenges in IT Infrastructure Management • Design Issues of IT Organizations and IT Infrastructure • Determining Customers' Requirements • IT Systems Management Process • IT Service Management Process • Information System Design Process
  • 4. WHAT IS INFORMATION TECHNOLOGY • Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. Typically, IT is used in the context of business operations, as opposed to technology used for personal or entertainment purposes. The comm • The Harvard Business Review coined the term information technology to make a distinction between purpose-built machines designed to perform a limited scope of functions, and general-purpose computing machines that could be programmed for various tasks. As the IT industry evolved from the mid-20th century, computing capability increased, while device cost and energy consumption decreased, a cycle that continues today when new technologies emerge.ercial use of IT encompasses both computer technology and telecommunications.
  • 5. WHAT DOES INFORMATION TECHNOLOGY ENCOMPASS? • The IT department ensures that the organization's systems, networks, data and applications all connect and function properly. The IT team handles three major areas: 1. deploys and maintains business applications, services and infrastructure (servers, networks, storage); 2. monitors, optimizes and troubleshoots the performance of applications, services and infrastructure; and 3. oversees the security and governance of applications, services and infrastructure.
  • 6. RESPONSIBILITIES AND ROLES • Administration. Administrators handle the day-to-day deployment, operation and monitoring of an IT environment, including systems, networks and applications. • Support. Help desk staff specialize in answering questions, gathering information and directing troubleshooting efforts for hardware and software. • Applications. Businesses rely on software to perform work. Some applications are procured and deployed from third parties, such as email server applications. • Compliance. Businesses are obligated to observe varied government- and industry-driven regulatory requirements. IT staff play a major role in securing and monitoring access to business data and applications to ensure that such resources are used according to established business governance policy that meets regulatory requirements. This Photo by Unknown Author is licensed under CC BY-ND
  • 7. EXAMPLES OF INFORMATION TECHNOLOGY • Server upgrade. One or more data center servers near the end of their operational and maintenance lifecycle. • Security monitoring. Businesses routinely employ tools to monitor and log activity in applications, networks and system IT staff receive alerts of potential threats or noncompliant behavior -- such as a user attempting to access a restricted file -- check logs and other reporting tools to investigate and determine the root cause of the alert and take prompt action to address and remediate the threat, often driving changes and improvements to security posture that can prevent similar events in the future.
  • 8. • New software. The business determines a need for a new mobile application that can allow customers to log in and access account information or conduct other transactions from smartphones and tablets. Developers work to create and refine a suitable application according to a planned roadmap. Operations staff posts each iteration of the new mobile application for download and deploy the back-end components of the app to the organization's infrastructure. • Business improvement. A business requires more availability from a critical application to help with revenue or business continuance strategies. The IT staff might be called upon to architect a high- availability cluster to provide greater performance and resilience for the application to ensure that the application can continue to function in the face of single outages. This can be paired with enhancements to data storage protection and recovery. • User support. Developers are building a major upgrade for a vital business application. Developers and admins will collaborate to create new documentation for the upgrade. IT staff might deploy the upgrade for limited beta testing -- allowing a select group of users to try the new version -- while also developing and delivering comprehensive training that prepares all users for the new version's eventual release.
  • 9. CHALLENGES IN IT INFRASTRUCTURE MANAGEMENT • Most of the global tech analysts understand that there are several challenges related to IT infrastructure that the companies face. The main challenges are regarding computing platforms, data acquisition, compute provisioning and management, data storage architectures, data analytics, and networks and communication • Lack of Powerful Computing Platforms Challenge - The major challenge in growing processing power of computers has been the lack of energy and space to power supercomputers. IT managers have always been on the lookout for better and faster systems which will help in the faster processing of the large amounts of data available today. Solution - A simple solution to this challenge would be to employ new general purpose graphical processors or multi-core platforms. By using better systems, the existing software will have to be optimized and adjusted to provide the best results. Many projects have been started to develop faster computers which will be available at low costs and energy needs. This Photo by Unknown Author is licensed under CC BY
  • 10. • Data Acquisition Problems Challenge - Firewalls which protect emails, applications and web browsing can cause important packet losses in the TCP/IP networks. This can result in important data loss and reduce the network speeds considerably, making the online collaboration impossible. Similar losses can occur due to the switches and routers which do not have the required high-speed memory. Solution - IT managers need to look out for high-performance computing resources with huge data sets and a secure bridge to collaborate with dispersed scientific teams. They will also need to employ more sophisticated means to collect, filter and store using high-speed networks. • Lack of Efficient Data Storage Architectures Challenge - Cloud storage has taken over in most of the cases in the modern world. Though it is a cost-effective and scalable alternative for data storage for IT managers, it does not provide the required data storage architectures which can accommodate a variety of applications. The IT community needs something more flexible which is beyond space and cost in cloud storage options. Solution - It is important that the cloud storage options become more flexible to improve the IT infrastructure. It should be easy to optimize the cloud storage architecture according to the application which is being deployed. It needs to be more reliable, efficient and be able to handle a variety of applications and needs of the user community. The cloud storage options need to serve as long-term and archival instead of a short-term solution for the IT community.
  • 11. • Dearth of Ways to Improve Data Analytics Challenge - Currently there are not many methods in place which can be used by IT managers to separate quality data from the humongous data sets. It is important to identify patterns in the data and correctly analyze it and use it to take business decisions in infrastructure management. Solution - The best solution to solve this problem would be to have an ideal system which would consist of a standards-based framework facilitating easy data transfer between different tools and layers. This will help in faster data transfer and hence better data analysis. This analytics would be used for industrial control systems and for network and IT monitoring. • Improper Networks and Connectivity Challenge - For any organization to work smoothly, it is important that there is a good and reliable network in place. Without a reliable network connection, IT infrastructure management can be a difficult task for any IT manager of the organization. New software-based methods and network architecture design are required for the optimization of data. Solution - The ability to migrate the IP address would help to allow application services to be migrated to other hardware. Another solution to this challenge would be to add intelligence to the wired as well as Wi-Fi network connections. This will help the networks to optimize the traffic delivery to contain costs and improve the service.
  • 12. DETERMINING CUSTOMERS' REQUIREMENTS • A good SRS document, should properly categorize and organise the requirements into different sections (IEEE 830). As per the IEEE 830 guidelines, there are two important categories of user requirements are the following: • Functional requirements • Non-functional requirements
  • 13. FUNCTIONAL REQUIREMENT • A Functional Requirement (FR) is a description of the service that the software must offer. It describes a software system or its component. A function is nothing but inputs to the software system, its behavior, and outputs. • It can be a calculation, data manipulation, business process, user interaction, or any other specific functionality which defines what function a system is likely to perform. Functional Requirements in Software Engineering are also called Functional Specification.
  • 14. WHAT SHOULD BE INCLUDED IN THE FUNCTIONAL REQUIREMENTS DOCUMENT • Functional Requirements of a system should include the following things: • Details of operations conducted in every screen • Data handling logic should be entered into the system • It should have descriptions of system reports or other outputs • Complete information about the workflows performed by the system • It should clearly define who will be allowed to create/modify/delete the data in the system • How the system will fulfill applicable regulatory and compliance needs should be captured in the functional document
  • 15. BEST PRACTICE OF FUNCTIONAL REQUIREMENT • Do not combine two requirements into one. Keep the requirements granular. • You should make each requirement as complete and accurate as possible. • The document should draft all the technical requirements. • Map all requirements to the objectives and principles which contributes to successful software delivery • Elicit requirements using interviews, workshops and casual communications. • If there is any known, verified constraint which materially affects a requirement then it is a critical state that should be documented. • It is necessary that you document all the assumption in the document.
  • 16. NON FUNCTIONAL REQUIREMENT • Non-Functional Requirements are the constraints or the requirements imposed on the system. They specify the quality attribute of the software. Non-Functional Requirements deal with issues like scalability, maintainability, performance, portability, security, reliability, and many more. Non-Functional Requirements address vital issues of quality for software systems. If NFRs not addressed properly, the results can include: • Users, clients, and developers are unsatisfied. • Inconsistent software. • Time and cost overrun to fix the software which was prepared without keeping NFRs in mind.
  • 17.
  • 18.
  • 19. TYPES OF NON FUNCTIONAL REQUIREMENT • Performance constraints – Reliability, security, response time, etc. • Operating constraints – These include physical constraints (size, weight), personnel availability, skill level considerations, system accessibility for maintenance, etc. • Interface constraints – These describe how the system is to interface with its environment, users, and other systems. For example, user interfaces and their qualities (e.g., user-friendliness). • Economic constraints – Immediate and/or long-term costs. • Lifecycle requirements – Quality of the design: These measured in terms such as maintainability, enhance ability, portability.
  • 20. WHAT IS SYSTEM MANAGEMENT Systems management refers to the centralized administration of the IT (Information Technology) in an organization. The concept covers a broad set of subsystems that are needed to monitor and manage IT systems correctly. Managing IT systems is essential for organizing and running your business. Good system management is the backbone of an IT-based organization. When implemented effectively, it makes the delivery of IT much easier, making the employees adapt faster and be more productive. Systems Management consists of a wide range of IT functions or subsets aimed at maintaining or improving infrastructure, network, applications, services, OSs, among many others. Systems Management oversees many IT requirements such as, (but not limited to):
  • 21. SYSTEM MANAGEMENT AND PROCESSES Availability management Capacity planning Change management Configuration management Disaster recovery Facilities management Network management Performance and tuning Problem management Production acceptance Storage management Strategic security
  • 22. STRATEGIC PROCESSES Production acceptance Capacity planning Strategic security Disaster recovery Facilities management
  • 24. IT SERVICE MANAGEMENT PROCESS • IT service management (ITSM) is the process of designing, delivering, managing, and improving the IT services an organization provides to its end users. ITSM is focused on aligning IT processes and services with business objectives to help an organization grow.
  • 25. BENEFITS OF EFFICIENT ITSM PROCESSES Lower costs for IT operations Higher returns on IT investments Minimal service outages Ability to establish well-defined, repeatable, and manageable IT processes Efficient analysis of IT problems to reduce repeat incidents Improved efficiency of IT help desk teams Well-defined roles and responsibilities Clear expectations on service levels and service availability Risk-free implementation of IT changes Better transparency into IT processes and services
  • 26. SERVICE DESIGN • This stage's main aim is planning and designing the IT services the organization offers to meet business demands. It involves creating and designing new services as well as assessing current services and making relevant improvements. There are several elements to IT service design: • Design coordination • Service catalogue management • Risk management • Service level management • Capacity management • Availability management • IT service continuity management, Information security, Compliance, Architecture management • Supplier management
  • 27. SERVICE STRATEGY • This stage forms the foundation or the framework of an organization's ITSM process building. It involves defining the services that the organization will offer, strategically planning processes, and recognizing and developing the required assets to keep processes moving. Service strategy for any organization includes the following aspects: • Strategy management • Service portfolio management • Financial management • Demand and capacity management • Business relationship management
  • 28. SERVICE TRANSITION • Once the designs for IT services and their processes have been finalized, it's important to build them and test them out to ensure that processes flow. IT teams need to ensure that the designs don't disrupt services in any way, especially when existing IT service processes are upgraded or redesigned. This calls for change management, evaluation, and risk management. No transition happens without risks and it's important to be proactive during transitions. • Change management and evaluation • Project management • Knowledge management • Service asset and configuration Management • Release and deployment management
  • 29. SERVICE OPERATION • This phase involves implementing the tried and tested new or modified designs in a live environment. While in this stage, the processes have already been tested and the issues fixed, but new processes are bound to have hiccups especially when customers start using the services. IT teams therefore need to closely monitor processes and workflows and be proactive in ensuring continuity in service delivery. TheITIL frameworkdefines the following as some of the main processes in the service operation stage: • Incident and request fulfillment management • Problem management • Technical management
  • 30. CONTINUAL SERVICE IMPROVEMENT (CSI) • Implementing IT processes successfully shouldn't be the final stage in any organization. There's always room for improvement and new development based on issues that pop up, customer needs and demands, and user feedback. Key performance indicators (KPIs) and metrics play a significant role in identifying areas that need improvement or change. For better understanding, read this blog on the important KPIs for any organization. The following are a few of the aspects of CSI: • IT service review • Process evaluation • CSI initiatives management
  • 31. WHAT IS INFORMATION SYSTEM? • The system is a collection of various elements or entities that are used to process input into an output. Inputs and outputs can be either raw or intact data into information — depending on the processing designed to work in the system. • Meanwhile, information is the result of data processing used for a particular purpose. As for what data means is raw facts that have not been processed and can not provide stimulus for users to take action. • Thus, an information system can be interpreted as a set of interconnected elements to process a given input into a particular output produced. The next stage of an information system is a MIS (Management Information System) which has a higher complexity with the final goal being used for the needs of analysis and decision making.
  • 32. WHAT IS INFORMATION SYSTEMS DEVELOPMENT? • As the name suggests, information system development or commonly known as SLC (Systems Life Cycle) or SLDC (Software Development Life Cycle) is a process of making and changing the system and the model and methodology used. In other words, an SDLC is the preparation of a new system to replace the old system, both in whole and only partially. • Development of information systems is generally done because of problems that cannot be accommodated by the old system. For example, the hospital where you work make an overhaul SIMRS (Sistem Informasi Manajemen Rumah Sakit/Hospital Management Information System) because of applications that previously could not do bridging with BPJS. Considering the fact that the government has required it, then inevitably the hospital must adjust the SIMRS it already has. • As for carrying out an information system development, the related team will consist of several personnel, namely the project coordinator, system analyst and design, network designer, programmer, technician (hardware), administrator, software tester, graphic designer, and documentary.
  • 33. INFORMATION SYSTEM DEVELOPMENT STAGES • System Survey The SLDC phase also consists of three main points: system identification, selection, and system planning. 1. System Identification: This process is to identify the problems facing the company and the system it has. The team will look for any opportunities that can be done to overcome this. 2. Selection: The selection phase will apply evaluation points to the development project to ensure the solutions are created in accordance with the company’s expected targets. 3. System Planning: This step is the step of developing a formal plan to start working on and implementing the information system development concept that has been chosen.
  • 34. NEEDS ANALYSIS • System requirements analysis is a technique for solving problems by decomposing the components of the system. The aim is none other than to find out more about how each component works and the interaction between one component with other components. • Some aspects that need to be targeted in the needs analysis in the development of information systems include business users, job analysis, business processes, agreed rules, problems and solutions, business tools, and business plans.
  • 35. DESIGN • The design or design of system development is intended to provide a complete blueprint as a guideline for the IT team (especially programmers) in making applications. Thus the IT team no longer makes decisions or works in a sporadic way.
  • 36. IMPLEMENTATION THE STAGE OF DEVELOPING THIS INFORMATION SYSTEM IS TO WORK ON A PREVIOUSLY DESIGNED DEVELOPMENT.
  • 37. TESTING • A system needs to be tested to ensure that the development carried out is appropriate or not with the expected results. Tests that are applied are various, such as performance, input efficiency, syntax (program logic), output, and so on. • This information system development stage requires preparation of various supporting aspects. In addition to applications, hardware readiness and several other related facilities also need to be prepared. As for implementation, several activities carried out include data migration (conversion), training for users, and trials.
  • 38. CHANGE AND MAINTENANCE • This step covers the whole process in order to ensure the continuity, smoothness and improvement of the system. In addition to monitoring the system at a certain time, maintenance also includes activities to anticipate minor bugs (bugs), system improvements, and anticipation of some risks from factors outside the system. • Thus information about the development of information systems or SLDC. May be useful!