The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. The book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle.
Configuration Management: Theory, Practice, and Application details a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options.The book also describes the importanc
Practical, Real-World ITIL Configuration Management—From Start to Finish The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively, and drives greater business value from all your IT investments. The core of ITIL is configuration management: the discipline of identifying, tracking, and controlling your IT environment’s diverse components to gain accurate and timely information for better decision-making. Now, there’s a practical, start-to-finish guide to ITIL configuration management for every IT leader, manager, and practitioner. ITIL-certified architect and solutions provider Larry Klosterboer helps you establish a clear roadmap for success, customize standard processes to your unique needs, and avoid the pitfalls that stand in your way. You’ll learn how to plan your implementation, deploy tools and processes, administer ongoing configuration management tasks, refine ITIL information, and leverage it for competitive advantage. Throughout, Klosterboer demystifies ITIL’s jargon, illuminates each technique with real-world advice and examples, and helps you focus on the specific techniques that offer maximum business value in your environment. Coverage includes Assessing your current configuration management maturity and setting goals for improvement Gathering and managing requirements to align ITIL with organizational needs Describing the schema of your configuration management database (CMDB) Identifying, capturing, and organizing configuration data Choosing the best tools for your requirements Integrating data and processes to create a unified logical CMDB and configuration management service Implementing pilot projects to demonstrate the value of configuration management and to test your planning Moving from a pilot to wide-scale enterprise deployment Defining roles for deployment and ongoing staffing Leveraging configuration management information: Reporting and beyond Measuring and improving CMDB data accuracy Covers ITIL version 3. Preface xvii Acknowledgments xxi About the Author xxiii Chapter 1: Overview of Configuration Management 1 Part I: Planning for Configuration Management 17 Chapter 2: Gathering and Analyzing Requirements 19 Chapter 3: Determining Scope, Span, and Granularity 37 Chapter 4: Customizing the Configuration Management Process 55 Chapter 5: Planning for Data Population 67 Chapter 6: Putting Together a Useful Project Plan 85 Part II: Implementing Configuration Management 97 Chapter 7: Choosing the Right Tools 99 Chapter 8: Implementing the Process 117 Chapter 9: Populating the Configuration Management Database 127 Chapter 10: Choosing and Running a Pilot Program 137 Chapter 11: Communication and Enterprise Roll Out 149 Part III: Running an Effective Configuration Management System 161 Chapter 12: Building a Configuration Management Team 163 Chapter 13: The Many Uses for Configuration Information 179 Chapter 14: Measuring and Improving CMDB Accuracy 193 Chapter 15: Improving the Business Value of Configuration Management 207 Index 217
Configuration Management Metrics: Product Lifecycle and Engineering Documentation Control Process Measurement and Improvement provides a comprehensive discussion of measurements for configuration management/product lifecycle processes. Each chapter outlines one of the most important measures of merit – the need for written policy and procedures. The best of the best practices as to the optimum standards are listed with an opportunity for the reader to check off those that their company has and those they do not. The book first defines the concept of configuration management (CM) and explains its importance. It then discusses the important metrics in the major CM and related processes. These include: new item release; order entry/fulfillment; request for change; bill of material change cost; and field change. Ancillary processes which may or may not be thought of as part of these major processes are also addressed, including deviations, service parts, publications and field failure reporting. - Provides detailed guidance on developing and implementing measurement systems and reports - Demonstrates methods of graphing and charting data, with benchmarks - A practical resource for the development of Engineering Documentation Control processes - Includes basic principles of Product Lifecycle processes and their measurement
ITIL® Foundation Essentials ITIL 4 Edition is the ultimate revision guide for candidates preparing for the ITIL 4 Foundation exam. It is fully aligned with the Foundation course syllabus and gives a clear and concise overview of the facts. This second edition has been updated to align with amendments to the ITIL® 4 Foundation syllabus.
Understand the benefits of DevOps and continuous delivery and see how they support the agile software development process Key Features Learn how DevOps can accelerate your entire software development life cycle Improve your organization's performance to ensure the smooth production of software and services Get hands-on experience in using efficient DevOps tools to better effect Book Description DevOps is a practical field that focuses on delivering business value as efficiently as possible. DevOps encompasses all code workflows from testing environments to production environments. It stresses cooperation between different roles, and how they can work together more closely, as the roots of the word imply—Development and Operations. Practical DevOps begins with a quick refresher on DevOps and continuous delivery and quickly moves on to show you how DevOps affects software architectures. You'll create a sample enterprise Java application that you’'ll continue to work with through the remaining chapters. Following this, you will explore various code storage and build server options. You will then learn how to test your code with a few tools and deploy your test successfully. In addition to this, you will also see how to monitor code for any anomalies and make sure that it runs as expected. Finally, you will discover how to handle logs and keep track of the issues that affect different processes. By the end of the book, you will be familiar with all the tools needed to deploy, integrate, and deliver efficiently with DevOps. What you will learn Understand how all deployment systems fit together to form a larger system Set up and familiarize yourself with all the tools you need to be efficient with DevOps Design an application suitable for continuous deployment systems with DevOps in mind Store and manage your code effectively using Git, Gerrit, Gitlab, and more Configure a job to build a sample CRUD application Test your code using automated regression testing with Jenkins Selenium Deploy your code using tools such as Puppet, Ansible, Palletops, Chef, and Vagrant Who this book is for If you're a developer or system administrator looking to take on larger responsibilities and understand how the infrastructure that builds today's enterprises works, this is the book for you. This book will also help you greatly if you're an operations worker who would like to better support developers. You do not need any previous knowledge of DevOps to understand the concepts in this book.
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program. Includes ten new chapters Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements Expands its coverage of compliance and governance issues Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks Presents new information on mobile security issues Reorganizes the contents around ISO 27002 The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.
Implement Configuration Management Databases that Deliver Rapid ROI and Sustained Business Value Implementing an enterprise-wide Configuration Management Database (CMDB) is one of the most influential actions an IT organization can take to improve service delivery and bridge the gap between technology and the business. With a well-designed CMDB in place, companies are better positioned to manage and optimize IT infrastructure, applications, and services; automate more IT management tasks; and restrain burgeoning costs. Now, there’s an objective, vendor-independent guide to making a CMDB work in your organization. The CMDB Imperative presents a start-to-finish implementation methodology that works and describes how the CMDB is shifting to the superior Configuration Management System (CMS). Expert CMDB industry analyst Glenn O’Donnell and leading-edge architect and practitioner Carlos Casanova first review the drivers behind a CMDB and the technical, economic, cultural, and political obstacles to success. Drawing on the experiences of hundreds of organizations, they present indispensable guidance on architecting and customizing CMDB solutions to your specific environment. They’ll guide you through planning, implementation, transitioning into production, day-to-day operation and maintenance, and much more. Coverage includes Defining the tasks and activities associated with configuration management Understanding the CMDB’s role in ITIL and the relationship between CMDBs and ITIL v3’s CMS Building software models that accurately represent each entity in your IT environment Ensuring information accuracy via change management and automated discovery Understanding the state of the CMDB market and selling the CMDB within your organization Creating federated CMDB architectures that successfully balance autonomy with centralized control Planning a deployment strategy that sets appropriate priorities and reflects a realistic view of your organization’s maturity Integrating systems and leveraging established and emerging standards Previewing the future of the CMDB/CMS and how it will be impacted by key trends such as virtualization, SOA, mobility, convergence, and “flexi-sourcing”
ITIL® 4 Essentials contains everything you need to know to pass the ITIL 4 Foundation Certificate, plus more. It covers practices and concepts that are not addressed as part of the Foundation syllabus, making it ideal for newly qualified practitioners. This second edition has been updated to align with amendments to the ITIL® 4 Foundation syllabus.
Discover over 100 practical recipes to help you master the art of IT service management for your organization About This Book Unleash the capabilities of Microsoft System Center 2016 Service Manager Master the skills of configuring, deploying, managing, and troubleshooting your Service Manager 2016 This book contains practical recipes that leverage the key and newly added features and functionalities of Microsoft System Center 2016 Service Manager Who This Book Is For This book will be useful to IT professionals including SCSM administrators who want to configure and administer System Center Service Manager 2016 and understand how to solve specific problems and scenarios that arise. It will also be useful to users of Service Manager 2012 who want to learn about the new features and capabilities of the Service Manager 2016 release. It will be ideal if you have Service Manager experience as well as experience with other System Center products. What You Will Learn See a practical implementation of the ITSM framework and processes based on ITIL Deploy and configure the new Service Manager HTML5 Self-Service Portal along with Service Catalog design and configuration Get to know about Incident, Problem, and Change Management processes and configuration Get to grips with performing advanced personalization in Service Manager Discover how to set up and use automation with and within Service Manager 2016 Work with Service Manager Data Warehouse Find out what Security Roles are and how to implement them Learn how to upgrade from SCSM 2012 R2 to SCSM 2016 In Detail System Center Service Manager (SCSM) is an integrated platform that offers a simplified data center management experience by implementing best practices such as Incident Management, Service Request, and Change Control to achieve efficient service delivery across your organization. This book provides you with real-world recipes that can be used immediately and will show you how to configure and administer SCSM 2016. You'll also find out how to solve particular problems and scenarios to take this tool further. You'll start with recipes on implementing ITSM frameworks and processes and configuring Service Level Agreements (SLAs). Then, you'll work through deploying and configuring the HTML5 Self-Service Portal, configuring Incident and Problem Management, and designing and configuring Change and Release Management. You'll also learn about security roles and overall Microsoft SCSM 2016 administration. Toward the end of the book, we'll look at advanced topics, such as presenting the wealth of information stored within the Service Manager Data Warehouse, standardizing SCSM deployments, and implementing automation. Style and approach This book will enlighten you on Microsoft System Center 2016 Service Manager through recipes that can be implemented directly in any enterprise. You can read the book from start to end if you're a beginner, or just open up any chapter and start following the recipes as a reference for advanced users. This book consists of a pool of step-by-step recipes on how to perform activities in Service Manager.