Norm,

You said:
"
I think we're coming at this from two different perspectives.
Agreed--the CMDB might be somewhat useful if you are in an environment
where NO OTHER AUTOMATION TOOLS EXIST.  But I was coming at this from
the perspective that certain "standard" network monitoring/management
tools are already in place--HPOV, AD, SMS, SNMP, etc.
"

  I want to make sure that you understand that I think all of your
stated concerns, and opinions are well thought out and well formed. I
would even go so far as to say that if your company has the time and
resources to train all users on all applications, and the users are
capable of keeping all of that straight then a "specific tool for the
specific job" approach does make sense. And that the CMDB (or any
specific ITIL process for that matter) will likely not replace any of
those "specific tools".

However...
  One of the values/benefits of ITIL is that is that is it unifying
the terms and approaches that are used to deal with IT. I believe that
this should include the UI layer too. Maybe ITIL does not speak to
this(user UI), but I think one the effects of having a CMDB is to
unify the data source behind the UI. And as a likely effect is to
unify the UI. After you consider federation of the data from the CMDB
out to other "specific tools" I think you will start to see why the
CMDB is the key part to ITIL.


The point of the CMDB is to put the map together with. So that you can
attack the data from any "business" or IT angle that you want to start
from. Then walk the rest of the related data back to the more
technical or the more business ends.


Each of the examples you listed start in different places for the
diagnostics. Part of the ITIL Service Desk(SD) process is to unify the
diagnostic process. This allows the caller to "start anywhere" and the
SD can walk through the business and technical details as needed. All
of the "are you someone that we want to help" questions are answered
as well as the pointers out to remote control tools, or real time
network monitoring tools, etc... too. But it starts from a SD screen.
Through the CI's and out to the "specific tools". That generalized
process should solve all the issues you listed. (given that some of
the "specific tools" could include knowledge bases. Word could be an
installed software on a desktop that tells you you can support word
for that user. Some users might not "have support" for MS Word, and
others might.)

And just to pick on the new scenario a bit too...

You said:
"That alone presents issues—how, exactly, do you identify the true
user of a workstation?"

   I think the answer is that there is not only one person in that
list. :) The asset is owned by a part of your company. (There is at
least one group/person.) That asset could be used primarily by one
user, but that is really momentary. (And in some orgs it is as
dependent on the physical location as the logical org.) And that data
could most accurately come from things like actual logs of who used
the asset. (login time logs for a workstation, or a checkout sheet for
a video camera or overhead projector. :) And what business functions
are effected by that asset being "down" (or "lost",etc..) can be
determined if you can know what it is used for, and by whom and when
those things matter. Most of that is not "discoverable", but needed to
be entered manually and kept up to date.


The point of the discovery tool is to do the data entry that can be
done automatically.
The point of the reconciliation engine is to keep matching that raw
data back to the "better" and more business centric data that is
added/wrapped around the discovery data.
The point of the CMDB is to store all of that in a
uniformed/searchable/standard way.


The point of what you push into your CMDB is anything that you think
is needed to be accessible by any of the ITIL processes. You can
search and walk it in one way, with one tool, and then "jump
out"(federate) to more specific details/tools when needed. And that
the amount of details that should be in the CMDB very as much as "what
things" should be in the CMDB. It is about how big your ITIL sphere is
in your company, and what tasks you want your CMDB to be able to do
for you.


And at the end of the day.....

If your company is already "doing ITIL" but not calling it "ITIL" then
there really are no changes to be made. ( Except the words you use to
describe it. )

If however, you find that the process flow is not "ITIL" then your
company should decide if there is any value in changing how your
processes work.
  They may find that there is to much cost for the change (right now)
and that they should not change anything.
  They also could find that there are some of the steps that could be
simplified/consolidated if they shift how they report (monitoring)
outages and changes to the SD before they happen.


IMO, most of the value of ITIL will be hard to measure from a budget
perspective because most of the savings are the phone calls that you
will not get because a more holistic approach to IT has been achieved.
(Again, if your not already doing that. :) ) And that can be a hard
sell to the bean counters. However, most IT shops are not holistic in
their approaches, and that concept is generally a no brainier to an IT
person who has been effected by someone else "change" that "should not
affect anyone else" and did.


Maybe part of the "different perspectives" that we are approaching
ITIL from has more to do with the realities of our IT orgs than the
things that we find important or useful to manage IT type issues. :)


--
Carey Matthew Black
Remedy Skilled Professional (RSP)
ARS = Action Request System(Remedy)

Love, then teach
Solution = People + Process + Tools
Fast, Accurate, Cheap.... Pick two.



On 6/28/07, Kaiser Norm E CIV USAF 96 CS/SCCE <[EMAIL PROTECTED]> wrote:
**
I don't know folks…I'm still not seeing it.  Again, I understand the theory,
but in the REAL WORLD I don't much practicality in it.

You made a great point—if I want to link incident to asset, I could pull
from the auto-discovery inventory…not pull from redundant data in the Remedy
server.

That alone presents issues—how, exactly, do you identify the true user of a
workstation? Here in our environment we have thousands of machines that are
logged onto by multiple users.  Who's the owner? One day a fighter pilot
logs onto machine A to check his email.  The auto-discovery runs and
"identifies" the pilot as the "owner" of machine A.  The next day, the
navigator logs onto machine A and gets an error when he tries to open email.
 So he calls the Help Desk.

The Help Desk analyst says, "Hey…let's use this newfangled ringy-dingy ITSM
thing to figure out what machine he's working on…" but lo and behold the
thing does not show that the navigator is using machine A, because as far as
it knows, machine A is owned by the fighter pilot…

So then you say, "Oh, no, no, no, Norm! You don't set the owner relationship
from a last logon value!" OK, fine…where does it come from, then?

My point—data does not "magically" appear in the CMDB.  It gets there via
two different methods—some automated pull or by hand-jam.  But the automated
pull runs on some delayed schedule from another data source that, in turn,
may run on an automated schedule.  Thus, the data is STALE.

In order to realize the benefits a lot of folks are touting, DATA MUST BE
REAL-TIME or darned-near close to it.

<snip>

From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Kaiser Norm E CIV USAF 96 CS/SCCE
 Sent: Thursday, June 28, 2007 2:40 PM
 To: [email protected]
 Subject: Re: Real-World Value of SMS & CMDB

I think we're coming at this from two different perspectives.
 Agreed--the CMDB might be somewhat useful if you are in an environment
where NO OTHER AUTOMATION TOOLS EXIST.  But I was coming at this from the
perspective that certain "standard" network monitoring/management tools are
already in place--HPOV, AD, SMS, SNMP, etc.

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers 
Are"

Reply via email to