The Secret Sauce of ILM
|
|
- Tamsin Higgins
- 5 years ago
- Views:
Transcription
1 The Secret Sauce of ILM the ILM Assessment Core LeRoy Budnik, Knowledge Transfer
2 Abstract The Secret Sauce of ILM Assessment Professional Services and internal consulting figure prominently in the success of ILM transformations. Yet, in the midst of success, there can be the sense of hitting the ceiling, a limit, a barrier that you cannot pass. A time-based path allows you to remove the barriers. The path negotiates requirements, capabilities, practices, and maturity. This is the core of the ILM consultative process. It is a blend of techno/business skill, architect-client relations and selecting the appropriate methodology. What is the goal? To create Storage Services as a collection of components provided in support of business processes perceived by Customers and Users as a self-contained, single, coherent entities at lowest cost. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 2
3 Objectives In this session, we focus on the Core of ILM consultative process: the measurement of maturity vs. information disciplines. This core is the foundation of most assessment methodologies. We also consider the assessment strategies that work best at various entry points of maturity. As a customer, when you understand both the process and strategy, you can choose the best strategy for your company today. However, because ILM is a way of life, you will choose a different strategy tomorrow. This may sound dry, but it is the secret sauce of the industry. Understand relationship of maturity to information disciplines Identify key ILM disciplines and process in the context of their execution in the infrastructure Determine the most effective ILM assessment strategy for a given scenario The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 3
4 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA and portions are subject to other copyrights 1. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This specific legal notice shall not be removed. This presentation is a project of the SNIA Education Committee. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 4
5 Initial Positioning Forget what you know the existing standards are becoming obsolete! The information crisis will not go away we need to reengineer the infrastructure to meet requirements, it is the only effective path to success Our personal view of the assessment process may prevent our success we have to change as well The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 5
6 Knowledge Statements The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 6
7 Systematic Approach ILM assessment is a systematic approach to enable diverse requirements, including availability, capacity, cost, compliance and governance to be met over time. The process achieves alignment at best cost by summarizing requirements and matching them to capabilities at each requirement state change. The range of solutions available are limited by the value of information, with the goal of minimizing budgets, both capital and expense. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 7
8 Storage Tier A storage tier is a collection of storage capacity that meets requirements with a consistent set of attributes, capabilities and characteristics which may include: Availability Performance Quality of Service Cost Storage Tier Storage Service For example: it is possible that disks in the same array might be treated as different tiers because of RAID Level, data location on a spindle or other characteristics the choice is yours The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 8
9 Storage Service Business View The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 9
10 Storage Service Technical View The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 10
11 Evaluate against the model that follows This will help you to understand: current state and what can be accomplished in a year, successfully The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 11
12 Storage Service Maturity Storage Services Bill of Materials Cost Optimization Efficiency Business Requirements Customer Satisfaction Cost Optimization Effectiveness Efficiency The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 12
13 ILM Strategy The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 13
14 ILM Strategy The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 14
15 ILM Strategy The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 15
16 Assess Assessment is a control process, responsible for gathering requirements, inventorying information and infrastructure, defining storage strategy, preparing gap and financial analysis, and developing next steps to ensure that the storage infrastructure meets business requirements. Manage Discovery Business Requirements Inventory Information Assets Propose Storage Strategy Risk Assessment Project Priority Set verifiable measures Develop Business Case TCO/ROI Analysis Cost by: Resource Service Business Unit (GB) Investment The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 16
17 Classify Classification is the means whereby we order knowledge about requirements and infrastructure. We develop classes that represent a set of information objects that share a common structure and behavior. Identify Information Assets Gather Requirements Availability Capacity Compliance Governance Retention Security Develop Taxonomy Identify Patterns Ontological Reductionism Classify Information Assets by Requirements The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 17
18 Organize Organizing is the process of aligning discovered requirements, patterns and values with current, new and replacement storage capabilities, over time. We develop standardized, reusable infrastructure patterns supported by process to meet enterprise level goals. Match requirements to capabilities Inventory existing capabilities Gap analysis Standardize Storage Services Develop Storage Service Catalog Develop: Operations policies Cookbook (recipes) SWT/AWT Apply automation Minimize cost Maximize service The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 18
19 Educate Education reinforces commitment and skill to support and use the reorganized storage infrastructure. Technical and process standards reduce cost. The storage team shows leadership as an advisor and resource steward. Service design becomes the most valued skill. Crisis is reduced. Skills Alignment Business Impact Awareness Results Based Training Storage Service Culture Identified Responsibility Management Staff Effective, Predictable Performance Partnership Link to business requirement Measured results Satisfaction Perceived Actual The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 19
20 Assessment Process The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 20
21 ILM Assessment Phases The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 21
22 Prepare 0 Firms manage many assets, people, money, plant and customer relationships. Before we work on the information that underpins business process and often causes the business the most frustration, we need to learn as much as we can from external and internal sources SEC 10K Governance Structure Industry/Sector Compliance Asset History Human Financial Physical IP Information and IT Relationship Placement of Responsibility Who will have input to decisions? Who will make the decision? Decisions Principles Architecture Strategy Business Requirements Investment The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 22
23 Set Storage Goal 1 We work with the project sponsor and designated staff members to determine the prioritized goals of the ILM assessment, planning and design efforts. This includes capturing their belief in what the end-result is. Effective use of Storage Cost Control Compliance/Governance Utilization Scalability Service Level Common Measures Profit Return on Equity (ROE) Return on Investment (ROI) Asset utilization Return on Assets (ROA) t Growth / t Cost The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved Knowledge Transfer 23
24 Set Perspective 2 We guide the project sponsor to select a primary view and essential infrastructure characteristics of significance to the business owners or users. This allows us to suppress other views, for the moment, as immaterial or diversionary. As a result, we can focus on capturing expected behavior and requirements, rather than implementation. The objects defined in the view will be associated with all requirements and aggregated metrics over time. Perspectives: Application Business Process Business Object Logical State Physical State The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 24
25 Collect Data & Requirements 3 We use the perspective to identify requirements, yet avoid physical discovery. We discover core business processes and their relationships to the information that drives the them. We also note information centric process opportunities. This is start of formal data classification. Availability Business availability requirements Business Impact Assessment Definition of Unavailability Risk Identification Regulatory Compliance Capacity Business Strategy and Plans IT Strategy and Plans Business requirements Transaction volumes Financial Governance The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 25
26 Sources of Requirements The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 26
27 Develop Storage Strategy 4 We specify and map current and future requirements to storage capabilities. The requirements are the tangible need or intangible want, and the capabilities are the tangible method of meeting need. In its first form, the map enables selection of storage capabilities to meet requirements Map Storage capabilities to requirements Alternative capabilities to requirements Develop Parts list with high-level attributes Bill of materials that summarizes the required capabilities Preliminary catalogue of storage services (portfolio) The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 27
28 Storage Strategy Demonstrates Alignment The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 28
29 Alignment over Time and Instantiation The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 29
30 Strategy is Constructed from Capabilities The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 30
31 Consolidate & Assign 5 We perform discovery at system level, developing findings using the vendor neutral, object language developed in the previous phase. We assigned data collect to the future state categories and then consolidate. Discover Current Storage Capabilities What do they own? Current Storage Services Consumed What do they use? Validate previous work Consolidate and Assign Metrics Capabilities Assign to Perspective Consolidate and aggregate numbers by Perspective The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 31
32 Gap Analysis 6 We document the difference between the required and current storage capabilities. We calculate the difference between required and consumed capabilities. The result is a list of capabilities to acquire or suspend and a list of capabilities that need implementation. An impact and priority statement should accompany the found gaps. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 32
33 Actionable Recommendations 7 The result of developing a plan to get from the current state to the proposed state over some unit of time. There is no expectation that time is immediate, in fact, it is preferable to have a stepped program, with immediate or prioritized improvements. An actionable recommendation differs from a simple recommendation by being a tangible step/benefit pair, accomplished in a reasonable (short) period. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 33
34 Detailed Design 8 Produced on acceptance of the recommendations or on a decision to proceed with specific recommendations. It is probable that a proof of concept design using a hardware subset may be required as part of an assessment. Detailed discovery is a requirement. Detailed design should be close to implementation to avoid rework. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 34
35 Implement 9 Install/Configure technical components, implement new processes, procedures and organizational components, including pilot solution, and rollout to client organization. This step is executed consistent with local consulting methodology and new storage practices. The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 35
36 ILM, the Catalyst for Change The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 36
37 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: trackdatamgmt@snia.org Many thanks to the following individuals for their contributions to this tutorial. SNIA Education Committee LeRoy Budnik, Knowledge Transfer Phil Huml, Knowledge Transfer Bob Rogers, Application Matrix Edgar St. Pierre, EMC Nagina Daneker, HP Gary Zasman, NetApps Adam Mendoza The Secret Sauce of ILM - The ILM Assessment Core 2007 Storage Networking Industry Association. All Rights Reserved. 37
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationHow Cisco IT Improved Development Processes with a New Operating Model
How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick
More informationData Governance. Mark Plessinger / Julie Evans December /7/2017
Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationThreat and Vulnerability Assessment Tool
TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...
More informationTDWI Data Governance Fundamentals: Managing Data as an Asset
TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training
More informationData Warehousing Fundamentals by Mark Peco
Data Warehousing Fundamentals by Mark Peco All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks of their
More informationHow To Reduce the IT Budget and Still Keep the Lights On
How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,
More informationDefining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline
Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The
More informationControlling the Project Pipeline: Managing Constraints to Maximize Outputs
Washington, DC Metro Office Controlling the Project Pipeline: Managing Constraints to Maximize Outputs David Lendry, PMP Director, Project Solutions TenStep of Metro DC, Federal, Maryland & Eastern New
More information<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.
Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationSymantec Data Center Migration Service
Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration
More informationNavigating the Clouds Fortifying ITIL for Cloud Governance
Navigating the Clouds Fortifying ITIL for Cloud Governance DECEMBER 2011 Cloud adoption promises to be an interesting journey for an enterprise with its luring benefits of on-demand models enabling faster
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationData Governance Central to Data Management Success
Data Governance Central to Data Success International Anne Marie Smith, Ph.D. DAMA International DMBOK Editorial Review Board Primary Contributor EWSolutions, Inc Principal Consultant and Director of Education
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationImproving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN
Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?
More informationIn 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.
REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationPlanning and Implementing ITIL in ICT Organisations
CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to
More informationTSC Business Continuity & Disaster Recovery Session
TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationMo n t a n a S t a te Fu n d. FY 2011 Business Plan Performance September 23, 2011
Mo n t a n a S t a te Fu n d FY 2011 Business Plan Performance September 23, 2011 Up to the Challenge September 23, 2011 FY 2011 Business Plan Performance 2 Agenda Introduction Business Plan Key Success
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationCommission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers
Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Ben Vickery Senior Technical Analyst NIST MEP September
More informationEY s data privacy service offering
EY s data privacy service offering How to transform your data privacy capabilities for an EU General Data Protection Regulation (GDPR) world Introduction Data privacy encompasses the rights and obligations
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More informationImportance of the Data Management process in setting up the GDPR within a company CREOBIS
Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different
More informationDATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)
DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) Release 2.2 August 2013. This document was created in collaboration of the leading experts and educators in the field and members of the Certified Data Steward
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationContents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17
iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface vi viii ix x xi 2.7 ITIL conformance or compliance practice adaptation 13 2.8 Getting started Service Lifecycle
More informationTo ITIL and Beyond: Operational Discipline via Process
To ITIL and Beyond: Operational Discipline via Process Glenn O Donnell 1 To ITIL and Beyond: Operational Discipline via Process Building IT credibility with structured process discipline ITIL as a basis
More informationSan Francisco Chapter. Cassius Downs Network Edge LLC
Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology
More informationData Governance Quick Start
Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry
More informationFlorida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government
Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology
More informationQuality Assurance and IT Risk Management
Quality Assurance and IT Risk Deutsche Bank s QA and Testing Transformation Journey Michael Venditti Head of Enterprise Testing Services, Deutsche Bank IT RISK - REGULATORY GOVERNANCE Major shifts in the
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationThe Storage Networking Industry Association (SNIA) Data Preservation and Metadata Projects. Bob Rogers, Application Matrix
The Storage Networking Industry Association (SNIA) Data Preservation and Metadata Projects Bob Rogers, Application Matrix Overview The Self Contained Information Retention Format Rationale & Objectives
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationPave the way: Build a value driven SAP GRC roadmap March 2015
www.pwc.be/erp Pave the way: Build a value driven SAP GRC roadmap March 2015 Agenda Introduction Measuring GRC Progression & Benchmarking GRC Program Roadmap Building a Business Case 2 Introduction Pave
More informationLEVERAGING FLASH MEMORY in ENTERPRISE STORAGE
LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE Luanne Dauber, Pure Storage Author: Matt Kixmoeller, Pure Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationNotes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft
Notes & Lessons Learned from a Field Engineer Robert M. Smith, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may
More informationWAN Application Infrastructure Fueling Storage Networks
WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationAgile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners
Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,
More informationData Protection. Plugging the gap. Gary Comiskey 26 February 2010
Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at
More informationThe ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationWhat is ITIL. Contents
What is ITIL Contents What is ITIL and what are its origins?... 1 Services and Service Management... 2 Service Providers... 3 Stakeholders in Service Management... 3 Utility and Warranty... 4 Best Practices
More informationCloud Archive and Long Term Preservation Challenges and Best Practices
Cloud Archive and Long Term Preservation Challenges and Best Practices Chad Thibodeau, Cleversafe Inc. Sebastian Zangaro, HP Author: Chad Thibodeau, Cleversafe Inc. SNIA Legal Notice The material contained
More informationGOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI
GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles
More informationITIL FOUNDATION NON-TECHNICAL & CERTIFIED TRAINING COURSE SECTOR / IT. Tel: Fax:
SECTOR / IT NON-TECHNICAL & CERTIFIED TRAINING COURSE In this 3 Days exciting and dynamic course, you will get an introduction to the lifecycle of managing IT services to deliver to business expectations.
More informationRightNow Technologies Best Practices Implementation Guide. RightNow Technologies, Inc.
RightNow Technologies Best Practices Implementation Guide RightNow Technologies, Inc. www.rightnow.com http://rightnow.custhelp.com Welcome Welcome to the RightNow Technologies Best Practice Implementation
More informationHealthcare Security Success Story
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationThe Need for a Terminology Bridge. May 2009
May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the
More informationTrends in Data Protection CDP and VTL
Trends in Data Protection CDP and VTL Agnes Lamont, TimeSpring Jason Iehl, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationDeploying Public, Private, and Hybrid. Storage Cloud Environments
Deploying Public, Private, and Hybrid PRESENTATION TITLE GOES HERE Storage Cloud Environments Marty Stogsdill, Oracle Greg Kleiman, NetApp SNIA Legal Notice! The material contained in this tutorial is
More informationProfessional Services for Cloud Management Solutions
Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their
More informationConvergence of BCM and Information Security at Direct Energy
Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc
More informationCitation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
More informationState of Security Operations
State of Security Operations Roberto Sandoval / September 2014 Security Intelligence & Operations Consulting Founded: 2007 The best in the world at building state of the art security operations capabilities/cyber
More informationWhat s a BA to do with Data? Discover and define standard data elements in business terms
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data
More informationThe Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications
The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications By Donna Burbank Managing Director, Global Data Strategy, Ltd www.globaldatastrategy.com Sponsored
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationData Stewardship Core by Maria C Villar and Dave Wells
Data Stewardship Core by Maria C Villar and Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks
More informationPAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..
PAGE - 16 PAGE - 1 Sometimes, the solution is just a benchmark away.. Post Box 301532, Riyadh 11372, Kingdom Of Saudi Arabia. Tel: +966 1 229 1819 Fax: +966 1 229 1801 PAGE - 2 PAGE - 3 The base of automation
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER Audio Configuration Configure your audio settings. The Audio Setup Wizard allows you to configure your volume level, default microphone and recording
More informationSimplifying IT through Virtualization
E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while
More informationBuilding ITSM Beyond ITIL
Building ITSM Beyond ITIL Glenn O Donnell Principal Product Marketing Manager EMC Corporation 1 ITSM is More Than ITIL ITIL is a great innovation for building IT discipline and business alignment ITIL
More informationDigital Service Management (DSM)
Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives
More informationEstablishing Enterprise-Wide Data Governance
Establishing Enterprise-Wide Data Governance Dave Blackstone ODOT - Office of Technical Services Greg Yarbrough Data Transfer Solutions LLC. ODOT s Definition of Data Governance (DG) What is it? Governance
More informationCompetency Definition
Adult Children's Outreach Technical Teen Acquisition Adaptability The ability to effectively process library material orders; knowledge of vendor software, processes, products, and updates x x The ability
More informationConsolidation Committee Final Report
Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia
More informationBetter together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com
Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional
More informationPosition Description IT Auditor
Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationVMware BCDR Accelerator Service
AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution
More informationCloud Disaster Recovery: Public, Private or Hybrid Cloud Solutions Supporting Disaster Recovery
White Paper Cloud Disaster Recovery: Public, Private or Hybrid Cloud Solutions Supporting Disaster Recovery Table of Contents Introduction... 2 Business continuity and disaster recovery development flow...
More informationBetter skilled workforce
Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style
More informationAppendix 3 Disaster Recovery Plan
Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision
More informationITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F
ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:
More informationNational Open Source Strategy
National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications
More informationBuilding YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services
Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data
More informationDetermining Best Fit for ITIL Implementation
Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationFROM TACTIC TO STRATEGY:
FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix
More information