HOME

TheInfoList



OR:

Systems management is enterprise-wide
administration Administration may refer to: Management of organizations * Management, the act of directing people towards accomplishing a goal: the process of dealing with or controlling things or people. ** Administrative assistant, traditionally known as a se ...
of
distributed system Distributed computing is a field of computer science that studies distributed systems, defined as computer systems whose inter-communicating components are located on different networked computers. The components of a distributed system commun ...
s including (and commonly in practice)
computer system A computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic sets of operations known as ''programs'', wh ...
s. Systems management is strongly influenced by
network management Network management is the process of administering and managing computer networks. Services provided by this discipline include fault analysis, performance management, provisioning of networks and maintaining quality of service. Network managem ...
initiatives in
telecommunication Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communication technologies. These means of ...
s. The
application performance management In the fields of information technology and systems management, application performance management (APM) is the monitoring and management of the performance and availability of software applications. APM strives to detect and diagnose complex appli ...
(APM) technologies are now a subset of Systems management. Maximum productivity can be achieved more efficiently through event correlation, system automation and predictive analysis which is now all part of APM.


Discussion

Centralized management has a time and effort trade-off that is related to the size of the company, the expertise of the IT staff, and the amount of technology being used: * For a
small business Small businesses are types of corporations, partnerships, or sole proprietorships which have a small number of employees and/or less annual revenue than a regular-sized business or corporation. Businesses are defined as "small" in terms of being ...
startup with ten computers, automated centralized processes may take more time to learn how to use and implement than just doing the management work manually on each computer. * A very large business with thousands of similar employee computers may clearly be able to save time and money, by having IT staff learn to do systems management automation. * A small branch office of a large corporation may have access to a central IT staff, with the experience to set up automated management of the systems in the branch office, without need for local staff in the branch office to do the work. Systems management may involve one or more of the following tasks: * Hardware inventories. * Server availability monitoring and metrics. * Software inventory and installation. * Anti-virus and anti-malware. * User's activities monitoring. * Capacity monitoring. * Security management. * Storage management. * Network capacity and utilization monitoring. * Identity Access Management * Anti-manipulation management


Functions

Functional groups are provided according to
International Telecommunication Union The International Telecommunication Union (ITU)In the other common languages of the ITU: * * is a list of specialized agencies of the United Nations, specialized agency of the United Nations responsible for many matters related to information ...
Telecommunication Standardization Sector (ITU-T)
Common management information protocol The Common Management Information Protocol (CMIP) is the OSI specified network management protocol. Defined iITU-T Recommendation X.711, ISO/IEC International Standard 9596-1 It provides an implementation for the services defined by the Common ...
(X.700) standard. This framework is also known as Fault, Configuration, Accounting, Performance, Security (FCAPS). ;
Fault management In network management, fault management is the set of functions that detect, isolate, and correct malfunctions in a telecommunications network, compensate for environmental changes, and include maintaining and examining error logs, accepting and ...
:*
Troubleshooting Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process ope ...
, error
logging Logging is the process of cutting, processing, and moving trees to a location for transport. It may include skidder, skidding, on-site processing, and loading of trees or trunk (botany), logs onto logging truck, trucksConfiguration management Configuration management (CM) is a management process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. ...
; Hardware and software inventory ::* ''As we begin the process of automating the management of our technology, what equipment and resources do we have already?'' ::* ''How can this inventorying information be gathered and updated automatically, without direct hands-on examination of each device, and without hand-documenting with a pen and notepad?'' ::* ''What do we need to upgrade or repair?'' ::* ''What can we consolidate to reduce complexity or reduce energy use?'' ::* ''What resources would be better reused somewhere else?'' ::* ''What commercial software are we using that is improperly licensed, and either needs to be removed or more licenses purchased?'' :*
Provisioning Provisioning may refer to: * Provisioning (technology), the equipping of a telecommunications network or IT resources * Provisioning (cruise ship), supplying a vessel for an extended voyage ** Provisioning of USS ''Constitution'' * Provisionin ...
::* ''What software will we need to use in the future?'' ::* ''What training will need to be provided to use the software effectively?'' :*
Software deployment Software deployment is all of the activities that make a software system available for use. Deployment can involve activities on the producer (software developer) side or on the consumer ( user) side or both. Deployment to consumers is a hard t ...
::* ''What steps are necessary to install it on perhaps hundreds or thousands of computers?'' :* Package management ::* ''How do we maintain and update the software we are using, possibly through automated update mechanisms?'' ;
Accounting management Accounting, also known as accountancy, is the process of recording and processing information about economic entities, such as businesses and corporations. Accounting measures the results of an organization's economic activities and conveys ...
:* Billing and statistics gathering ;
Performance management Business performance management (BPM) (also known as corporate performance management (CPM) enterprise performance management (EPM),) is a management approach which encompasses a set of processes and analytical tools to ensure that a business o ...
:* Software metering :* ''Who is using the software and how often?'' ::* ''If the license says only so many copies may be in use at any one time but may be installed in many more places than licensed, then track usage of those licenses.'' ::* ''If the licensed user limit is reached, either prevent more people from using it, or allow overflow and notify accounting that more licenses need to be purchased.'' :* Event and metric monitoring ::* ''How reliable are the computers and software?'' ::* ''What errors or software bugs are preventing staff from doing their job?'' ::* ''What trends are we seeing for hardware failure and life expectancy?'' ;
Security management Security management is the identification of an organization's assets i.e. including people, buildings, machines, systems and information assets, followed by the development, documentation, and implementation of policies and procedures for pr ...
:*
Identity management Identity and access management (IAM or IdAM) or Identity management (IdM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate acce ...
:* Policy management However this standard should not be treated as comprehensive, there are obvious omissions. Some are recently emerging sectors, some are implied and some are just not listed. The primary ones are: * Business Impact functions (also known as Business Systems Management) *
Capacity management Capacity management's goal is to ensure that information technology resources are sufficient to meet upcoming business requirements cost-effectively. One common interpretation of capacity management is described in the ITIL framework. ITIL vers ...
* Real-time Application Relationship Discovery (which supports Configuration Management) *
Security Information and Event Management Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications an ...
functions (SIEM) * Workload scheduling
Performance management Business performance management (BPM) (also known as corporate performance management (CPM) enterprise performance management (EPM),) is a management approach which encompasses a set of processes and analytical tools to ensure that a business o ...
functions can also be split into end-to-end performance measuring and infrastructure component measuring functions. Another recently emerging sector is
operational intelligence An operational definition specifies concrete, replicable procedures designed to represent a construct. In the words of American psychologist S.S. Stevens (1935), "An operation is the performance which we execute in order to make known a concept." F ...
(OI) which focuses on real-time monitoring of business events that relate to business processes, not unlike business activity monitoring (BAM).


Standards

;
Distributed Management Task Force Distributed Management Task Force (DMTF) is a 501(c)(6) nonprofit industry standards organization that creates open manageability standards spanning diverse emerging and traditional IT infrastructures including cloud, virtualization, network, s ...
(DMTF) : Alert Standard Format (ASF) : Common Information Model (CIM) :
Desktop and mobile Architecture for System Hardware Desktop and mobile Architecture for System Hardware (DASH) is a Distributed Management Task Force (DMTF) standard. Description In April 2007 the Desktop and Mobile Working Group (DMWG) of the DMTF started work on an implementation requirements ...
(DASH) : Systems Management Architecture for Server Hardware (SMASH) :
Java Management Extensions Java Management Extensions (JMX) is a Java technology that supplies tools for managing and monitoring applications, system objects, devices (such as printers) and service-oriented networks. Those resources are represented by objects called MBean ...
(JMX)


Academic preparation

Schools that offer or have offered degrees in the field of systems management include the
University of Southern California The University of Southern California (USC, SC, or Southern Cal) is a Private university, private research university in Los Angeles, California, United States. Founded in 1880 by Robert M. Widney, it is the oldest private research university in ...
, the
University of Denver The University of Denver (DU) is a private research university in Denver, Colorado, United States. Founded in 1864, it has an enrollment of approximately 5,700 undergraduate students and 7,200 graduate students. It is classified among "R1: D ...
, Capitol Technology University, and Florida Institute of Technology.


See also

* List of systems management systems * Application service management *
Enterprise service management Service governance is a means of achieving good corporate governance through managing internal corporate services across and throughout an enterprise. It engages stakeholders and delivery channels for the purpose of effectively managing risk, ...
* Business activity monitoring * Business transaction management * Computer Measurement Group *
Event correlation Event correlation is a technique for making sense of a large number of events and pinpointing the few events that are really important in that mass of information. This is accomplished by looking for and analyzing relationships between events. Hi ...
*
Network management Network management is the process of administering and managing computer networks. Services provided by this discipline include fault analysis, performance management, provisioning of networks and maintaining quality of service. Network managem ...
*
Operational intelligence An operational definition specifies concrete, replicable procedures designed to represent a construct. In the words of American psychologist S.S. Stevens (1935), "An operation is the performance which we execute in order to make known a concept." F ...
*
System administration An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administr ...
*
Service governance Service governance is a means of achieving good corporate governance through managing internal corporate services across and throughout an enterprise. It engages stakeholders and delivery channels for the purpose of effectively managing risk, ...


References


Bibliography

*


External links


Standards for Automated Resource Management
{{Management Computer systems System administration