Success Is In The Details – Part II

Share on linkedin
Share on facebook
Share on twitter
ITIL 4 guides businesses on how IT works today, how IT will work in the future - Agile, DevOps, etc

In my previous post I discussed what you need to know about servers, storage and networks when undertaking a Discovery project. Today, I’ll discuss a few more items you’ll need to learn about in IT Discovery: applications, services, middleware and contracts.

Applications, Services, and Middleware

The discovery phase must catalog applications, services and middleware, including documenting functionality and applications that depend on them. Failure to recognize and accommodate the following components when reorganizing a data center may cause critical applications to fail:

  • Applications that share information and interact in real-time and are supported by business, core and middleware services.

  • Business services, such as a service used to check in an airline passenger, may draw data from several databases and access the functionality of a variety of applications.

  • Core services support business applications, technology infrastructure and/or middleware. Examples include domain name services (DNS), directory services, authentication services, and FTP services.


    From an end-user perspective, these services operate transparently—as long as they function properly. If a domain name server fails, every application in your organization may be impacted.

  • Middleware services are essential elements that support business operations, including services for queuing and transaction management, transporting data, and coordinating data movement and transaction flows.

Contracts

Hardware and software IT assets may have associated documentation that must be tracked, including contracts, warranty protection, maintenance and service contracts. For example, Service Level Agreements often guarantee the performance, reliability and availability of an IT asset or
service.

Keep in mind that a contract may be affected by a data center transformation. For example, if hardware is moved to a new geographic location to centralize operations, that move might impact service agreements. Or, virtualizing multiple servers into one larger physical server may also affect software contracts.

Share on linkedin
Share on facebook
Share on twitter

Subscribe to Our Newsletter

More to Explore

A digital certificate (which goes by many names such as SSL Certificate, Public Key Certificate, Identity Certificate) is used to provide a valid form of identification to applications, servers, devices or any other network components, by which people and machines…

In any kind of system, a vulnerability points to a “state of being exposed to the possibility of attack or harm.” In the age of information, we have - by the very nature of the way we share, store and…

IT Operations Management (ITOM) refers to the administration of technology and application requirements within an IT organization. Under the ITIL framework, ITOM’s objective is to monitor, control, and execute the routine tasks necessary to support an organization’s IT infrastructure.(Also, see…

CMDB service maps are visual depictions of hierarchical relationships among business services (sometimes also major applications) and their supporting Configuration Items (CIs). Because service maps can provide an instant bird’s eye view of critical dependencies and relationships, their utility lies…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

Introduction  IT Asset Management (ITAM) and inventory management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets but focus on different things. Inventory management can exist…

IT Asset Management (ITAM) and configuration management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets, but focus on different things.Configuration management can exist without IT…

Some people think that an IT service desk is the same thing as an IT help desk. It isn't, as I'm going to explain. Sure, there are some similarities, but there are also many differences. Let's start by exploring what…

To understand the business value of service mapping, it’s important to shift to a service delivery mindset, rather than thinking about delivering infrastructure, equipment, software, and applications. Defining services is relatively simple if thought of as the commoditization of what’s…

Business service mapping – the area of configuration management that perplexes so many IT professionals, yet that which provides the highest value in Configuration Management Database (CMDB) projects. There are several major reasons IT gets stopped when it comes to…