2. INTRODUCTION
• Information Technology
• IT Infrastructure Management
• Introduction—IT Infrastructure Management
• Challenges in IT Infrastructure Management
• Design Issues of IT Organizations and IT Infrastructure
• Determining Customers' Requirements
• IT Systems Management Process
• IT Service Management Process
• Information System Design Process
4. WHAT IS
INFORMATION
TECHNOLOGY
• Information technology (IT) is the use of any computers,
storage, networking and other physical
devices, infrastructure and processes to create, process, store,
secure and exchange all forms of electronic data. Typically, IT is
used in the context of business operations, as opposed to
technology used for personal or entertainment purposes. The
comm
• The Harvard Business Review coined the term information
technology to make a distinction between purpose-built
machines designed to perform a limited scope of functions,
and general-purpose computing machines that could be
programmed for various tasks. As the IT industry evolved from
the mid-20th century, computing capability increased, while
device cost and energy consumption decreased, a cycle that
continues today when new technologies emerge.ercial use of
IT encompasses both computer technology and
telecommunications.
5. WHAT DOES INFORMATION TECHNOLOGY
ENCOMPASS?
• The IT department ensures that the organization's systems, networks, data and
applications all connect and function properly. The IT team handles three major
areas:
1. deploys and maintains business applications, services and infrastructure
(servers, networks, storage);
2. monitors, optimizes and troubleshoots the performance of applications,
services and infrastructure; and
3. oversees the security and governance of applications, services and
infrastructure.
6. RESPONSIBILITIES
AND ROLES
• Administration. Administrators handle the day-to-day
deployment, operation and monitoring of an IT
environment, including systems, networks and applications.
• Support. Help desk staff specialize in answering questions,
gathering information and directing troubleshooting efforts
for hardware and software.
• Applications. Businesses rely on software to perform work.
Some applications are procured and deployed from third
parties, such as email server applications.
• Compliance. Businesses are obligated to observe varied
government- and industry-driven regulatory requirements.
IT staff play a major role in securing and monitoring access
to business data and applications to ensure that such
resources are used according to established business
governance policy that meets regulatory requirements.
This Photo by Unknown Author is licensed under CC BY-ND
7. EXAMPLES OF INFORMATION TECHNOLOGY
• Server upgrade. One or more data center servers near the end of their
operational and maintenance lifecycle.
• Security monitoring. Businesses routinely employ tools to monitor and log
activity in applications, networks and system IT staff receive alerts of potential
threats or noncompliant behavior -- such as a user attempting to access a
restricted file -- check logs and other reporting tools to investigate and
determine the root cause of the alert and take prompt action to address and
remediate the threat, often driving changes and improvements to security
posture that can prevent similar events in the future.
8. • New software. The business determines a need for a new mobile application that can allow
customers to log in and access account information or conduct other transactions from
smartphones and tablets. Developers work to create and refine a suitable application according to a
planned roadmap. Operations staff posts each iteration of the new mobile application for download
and deploy the back-end components of the app to the organization's infrastructure.
• Business improvement. A business requires more availability from a critical application to help with
revenue or business continuance strategies. The IT staff might be called upon to architect a high-
availability cluster to provide greater performance and resilience for the application to ensure that
the application can continue to function in the face of single outages. This can be paired with
enhancements to data storage protection and recovery.
• User support. Developers are building a major upgrade for a vital business application. Developers
and admins will collaborate to create new documentation for the upgrade. IT staff might deploy the
upgrade for limited beta testing -- allowing a select group of users to try the new version -- while
also developing and delivering comprehensive training that prepares all users for the new version's
eventual release.
9. CHALLENGES IN IT INFRASTRUCTURE
MANAGEMENT
• Most of the global tech analysts understand that there are several challenges
related to IT infrastructure that the companies face. The main challenges are
regarding computing platforms, data acquisition, compute provisioning and
management, data storage architectures, data analytics, and networks and
communication
• Lack of Powerful Computing Platforms
Challenge - The major challenge in growing processing power of computers
has been the lack of energy and space to power supercomputers. IT managers
have always been on the lookout for better and faster systems which will help
in the faster processing of the large amounts of data available today.
Solution - A simple solution to this challenge would be to employ new
general purpose graphical processors or multi-core platforms. By using better
systems, the existing software will have to be optimized and adjusted to
provide the best results. Many projects have been started to develop faster
computers which will be available at low costs and energy needs.
This Photo by Unknown Author is licensed under CC BY
10. • Data Acquisition Problems
Challenge - Firewalls which protect emails, applications and web browsing can cause important packet losses in
the TCP/IP networks. This can result in important data loss and reduce the network speeds considerably, making
the online collaboration impossible. Similar losses can occur due to the switches and routers which do not have
the required high-speed memory.
Solution - IT managers need to look out for high-performance computing resources with huge data sets and a
secure bridge to collaborate with dispersed scientific teams. They will also need to employ more sophisticated
means to collect, filter and store using high-speed networks.
• Lack of Efficient Data Storage Architectures
Challenge - Cloud storage has taken over in most of the cases in the modern world. Though it is a cost-effective
and scalable alternative for data storage for IT managers, it does not provide the required data storage
architectures which can accommodate a variety of applications. The IT community needs something more
flexible which is beyond space and cost in cloud storage options.
Solution - It is important that the cloud storage options become more flexible to improve the IT infrastructure.
It should be easy to optimize the cloud storage architecture according to the application which is being
deployed. It needs to be more reliable, efficient and be able to handle a variety of applications and needs of the
user community. The cloud storage options need to serve as long-term and archival instead of a short-term
solution for the IT community.
11. • Dearth of Ways to Improve Data Analytics
Challenge - Currently there are not many methods in place which can be used by IT managers to separate
quality data from the humongous data sets. It is important to identify patterns in the data and correctly
analyze it and use it to take business decisions in infrastructure management.
Solution - The best solution to solve this problem would be to have an ideal system which would consist
of a standards-based framework facilitating easy data transfer between different tools and layers. This will
help in faster data transfer and hence better data analysis. This analytics would be used for industrial
control systems and for network and IT monitoring.
• Improper Networks and Connectivity
Challenge - For any organization to work smoothly, it is important that there is a good and reliable
network in place. Without a reliable network connection, IT infrastructure management can be a difficult
task for any IT manager of the organization. New software-based methods and network architecture
design are required for the optimization of data.
Solution - The ability to migrate the IP address would help to allow application services to be migrated to
other hardware. Another solution to this challenge would be to add intelligence to the wired as well as
Wi-Fi network connections. This will help the networks to optimize the traffic delivery to contain costs and
improve the service.
12. DETERMINING CUSTOMERS' REQUIREMENTS
• A good SRS document, should properly categorize
and organise the requirements into different
sections (IEEE 830). As per the IEEE 830 guidelines,
there are two important categories of user
requirements are the following:
• Functional requirements
• Non-functional requirements
13. FUNCTIONAL REQUIREMENT
• A Functional Requirement (FR) is a description of the service that the software
must offer. It describes a software system or its component. A function is nothing
but inputs to the software system, its behavior, and outputs.
• It can be a calculation, data manipulation, business process, user interaction, or
any other specific functionality which defines what function a system is likely to
perform. Functional Requirements in Software Engineering are also
called Functional Specification.
14. WHAT SHOULD BE INCLUDED IN THE FUNCTIONAL REQUIREMENTS
DOCUMENT
• Functional Requirements of a system should include the following
things:
• Details of operations conducted in every screen
• Data handling logic should be entered into the system
• It should have descriptions of system reports or other outputs
• Complete information about the workflows performed by the
system
• It should clearly define who will be allowed to
create/modify/delete the data in the system
• How the system will fulfill applicable regulatory and compliance
needs should be captured in the functional document
15. BEST PRACTICE OF FUNCTIONAL REQUIREMENT
• Do not combine two requirements into one. Keep the requirements
granular.
• You should make each requirement as complete and accurate as possible.
• The document should draft all the technical requirements.
• Map all requirements to the objectives and principles which contributes
to successful software delivery
• Elicit requirements using interviews, workshops and casual
communications.
• If there is any known, verified constraint which materially affects a
requirement then it is a critical state that should be documented.
• It is necessary that you document all the assumption in the document.
16. NON
FUNCTIONAL
REQUIREMENT
• Non-Functional Requirements are the
constraints or the requirements imposed on the
system. They specify the quality attribute of the
software. Non-Functional Requirements deal with
issues like scalability, maintainability,
performance, portability, security, reliability, and
many more. Non-Functional Requirements
address vital issues of quality for software
systems. If NFRs not addressed properly, the
results can include:
• Users, clients, and developers are unsatisfied.
• Inconsistent software.
• Time and cost overrun to fix the software which
was prepared without keeping NFRs in mind.
17.
18.
19. TYPES OF
NON
FUNCTIONAL
REQUIREMENT
• Performance constraints –
Reliability, security, response time, etc.
• Operating constraints –
These include physical constraints (size, weight), personnel
availability, skill level considerations, system accessibility
for maintenance, etc.
• Interface constraints –
These describe how the system is to interface with its
environment, users, and other systems. For example, user
interfaces and their qualities (e.g., user-friendliness).
• Economic constraints –
Immediate and/or long-term costs.
• Lifecycle requirements – Quality of the design:
These measured in terms such as maintainability, enhance
ability, portability.
20. WHAT IS SYSTEM MANAGEMENT
Systems management refers to the centralized
administration of the IT (Information
Technology) in an organization. The concept
covers a broad set of subsystems that are
needed to monitor and manage IT systems
correctly.
Managing IT systems is essential for organizing
and running your business. Good system
management is the backbone of an IT-based
organization.
When implemented effectively, it makes the
delivery of IT much easier, making the
employees adapt faster and be more
productive.
Systems Management consists of a wide range
of IT functions or subsets aimed at maintaining
or improving infrastructure, network,
applications, services, OSs, among many others.
Systems Management oversees many IT
requirements such as, (but not limited to):
21. SYSTEM MANAGEMENT AND PROCESSES
Availability
management
Capacity
planning
Change
management
Configuration
management
Disaster
recovery
Facilities
management
Network
management
Performance
and tuning
Problem
management
Production
acceptance
Storage
management
Strategic
security
24. IT SERVICE MANAGEMENT
PROCESS
• IT service management (ITSM) is
the process of designing,
delivering, managing, and
improving the IT services an
organization provides to its end
users. ITSM is focused on aligning
IT processes and services with
business objectives to help an
organization grow.
25. BENEFITS OF EFFICIENT ITSM PROCESSES
Lower costs for IT
operations
Higher returns on IT
investments
Minimal service
outages
Ability to establish
well-defined,
repeatable, and
manageable IT
processes
Efficient analysis
of IT problems to
reduce repeat
incidents
Improved efficiency
of IT help desk teams
Well-defined roles
and responsibilities
Clear expectations
on service levels and
service availability
Risk-free
implementation of IT
changes
Better transparency
into IT processes and
services
26. SERVICE DESIGN
• This stage's main aim is planning and designing the IT services the organization offers
to meet business demands. It involves creating and designing new services as well as
assessing current services and making relevant improvements. There are several
elements to IT service design:
• Design coordination
• Service catalogue management
• Risk management
• Service level management
• Capacity management
• Availability management
• IT service continuity management, Information security, Compliance, Architecture
management
• Supplier management
27. SERVICE STRATEGY
• This stage forms the foundation or the framework
of an organization's ITSM process building. It
involves defining the services that the organization
will offer, strategically planning processes, and
recognizing and developing the required assets to
keep processes moving. Service strategy for any
organization includes the following aspects:
• Strategy management
• Service portfolio management
• Financial management
• Demand and capacity management
• Business relationship management
28. SERVICE
TRANSITION
• Once the designs for IT services and their processes have
been finalized, it's important to build them and test them
out to ensure that processes flow. IT teams need to ensure
that the designs don't disrupt services in any way,
especially when existing IT service processes are upgraded
or redesigned. This calls for change management,
evaluation, and risk management. No transition happens
without risks and it's important to be proactive during
transitions.
• Change management and evaluation
• Project management
• Knowledge management
• Service asset and configuration Management
• Release and deployment management
29. SERVICE
OPERATION
• This phase involves implementing the tried and tested new
or modified designs in a live environment. While in this
stage, the processes have already been tested and the
issues fixed, but new processes are bound to have hiccups
especially when customers start using the services. IT teams
therefore need to closely monitor processes and workflows
and be proactive in ensuring continuity in service delivery.
TheITIL frameworkdefines the following as some of the
main processes in the service operation stage:
• Incident and request fulfillment management
• Problem management
• Technical management
30. CONTINUAL
SERVICE
IMPROVEMENT
(CSI)
• Implementing IT processes successfully shouldn't
be the final stage in any organization. There's
always room for improvement and new
development based on issues that pop up,
customer needs and demands, and user feedback.
Key performance indicators (KPIs) and metrics
play a significant role in identifying areas that
need improvement or change. For better
understanding, read this blog on the important
KPIs for any organization. The following are a few
of the aspects of CSI:
• IT service review
• Process evaluation
• CSI initiatives management
31. WHAT IS INFORMATION SYSTEM?
• The system is a collection of various elements or entities that are
used to process input into an output. Inputs and outputs can be
either raw or intact data into information — depending on the
processing designed to work in the system.
• Meanwhile, information is the result of data processing used for a
particular purpose. As for what data means is raw facts that have
not been processed and can not provide stimulus for users to take
action.
• Thus, an information system can be interpreted as a set of
interconnected elements to process a given input into a particular
output produced. The next stage of an information system is a
MIS (Management Information System) which has a higher
complexity with the final goal being used for the needs of analysis
and decision making.
32. WHAT IS INFORMATION
SYSTEMS DEVELOPMENT?
• As the name suggests, information system development or
commonly known as SLC (Systems Life Cycle) or SLDC (Software
Development Life Cycle) is a process of making and changing the
system and the model and methodology used. In other words, an
SDLC is the preparation of a new system to replace the old system,
both in whole and only partially.
• Development of information systems is generally done because of
problems that cannot be accommodated by the old system. For
example, the hospital where you work make an overhaul SIMRS
(Sistem Informasi Manajemen Rumah Sakit/Hospital Management
Information System) because of applications that previously could
not do bridging with BPJS. Considering the fact that the
government has required it, then inevitably the hospital must
adjust the SIMRS it already has.
• As for carrying out an information system development, the
related team will consist of several personnel, namely the project
coordinator, system analyst and design, network designer,
programmer, technician (hardware), administrator, software tester,
graphic designer, and documentary.
33. INFORMATION SYSTEM DEVELOPMENT STAGES
• System Survey
The SLDC phase also consists of three main points: system
identification, selection, and system planning.
1. System Identification: This process is to identify the problems
facing the company and the system it has. The team will look
for any opportunities that can be done to overcome this.
2. Selection: The selection phase will apply evaluation points to
the development project to ensure the solutions are created in
accordance with the company’s expected targets.
3. System Planning: This step is the step of developing a formal
plan to start working on and implementing the information
system development concept that has been chosen.
34. NEEDS ANALYSIS
• System requirements analysis is a technique for
solving problems by decomposing the
components of the system. The aim is none
other than to find out more about how each
component works and the interaction between
one component with other components.
• Some aspects that need to be targeted in the
needs analysis in the development of
information systems include business users, job
analysis, business processes, agreed rules,
problems and solutions, business tools, and
business plans.
35. DESIGN
• The design or design of system development is
intended to provide a complete blueprint as a
guideline for the IT team (especially
programmers) in making applications. Thus the IT
team no longer makes decisions or works in a
sporadic way.
36. IMPLEMENTATION
THE STAGE OF DEVELOPING THIS INFORMATION SYSTEM IS TO WORK
ON A PREVIOUSLY DESIGNED DEVELOPMENT.
37. TESTING
• A system needs to be tested to ensure that the
development carried out is appropriate or not with the
expected results. Tests that are applied are various, such
as performance, input efficiency, syntax (program logic),
output, and so on.
• This information system development stage requires
preparation of various supporting aspects. In addition to
applications, hardware readiness and several other
related facilities also need to be prepared. As for
implementation, several activities carried out include
data migration (conversion), training for users, and trials.
38. CHANGE AND MAINTENANCE
• This step covers the whole process in order to ensure the
continuity, smoothness and improvement of the system.
In addition to monitoring the system at a certain time,
maintenance also includes activities to anticipate minor
bugs (bugs), system improvements, and anticipation of
some risks from factors outside the system.
• Thus information about the development of information
systems or SLDC. May be useful!