... demand fore-
cast and handing it off to the person responsible for capacity analysis and planning.
The capacity planner takes a look at the types of demand forecasted by the business
unit and ... may be the purchase of new systems, a change in the architecture of certain
components of the platform, such as the data model or the movement of demand
from one...
... that the CTO
creates and runs are the lifeblood of the business units and the heart of the back
office systems that the CFO needs to do his or her job.
We have indicated that the CTO’s organizations ... vision are the CTO’s peers the people who rely on
the CTO for either the availability of the product or the back office systems that run
the company....
... that there is a ben-
efit in thinking about the differences in actions for the restoration of service and the
resolution of problems.
The Components of Incident Management
The ITIL defines the ... consider
improving the process. These signs are derived from the three purposes of processes.
The first is if there is repetitive management of the same task. Reca...
... some
form of the RASCI model, you may also decide to require that the appropriate A, or
owner of the system in question, has signed off on the change and is aware of it. The
primary reason for the ... the end of several hours, each of the teams presents their
Venn diagram for several minutes, each including the reasons for choosing each of
the principle...
... 2 47
decide on green, yellow, or red by analyzing various factor such as the difficulty of
the task, the amount of effort required for the task (the more effort generally the
higher the risk), the ... administrators, and other JAD members; therefore, a very
informal setting is our preference. The formality should come from the fact that there
will be a go or no-go...
... successful scalability of your system and the
adoption of the performance and stress testing processes. As we cautioned previously
in the discussion of the stress test, the creation of the test ... tradeoff. This process of listing out the
tradeoffs, determining pros and cons, and then analyzing each one is the second
method of performing a tradeoff anal...
... the time of the request by looking up the username and determining
the password or performing a geo-location test of the requestor IP address, we have
performed a z-axis split. For the sake of ... exception of the customers for whom we have no sales data and therefore just
represent a contact list. This set of customers actually represents the largest group b...
... abstrac-
tion of the layered model of network architecture. It is used to describe the different compo-
nents of the network and how they are interrelated. There are seven layers, and starting from
the ... the “avail-
ability” of the string of lights was the product of the availability (1 the probability
of failure) of all the lights. If any light had a...
... contains the copy for
which it is a master (33% of the data necessary to run the site) and 50% of the copies
of each of the other sites (16.5% of the data necessary to run the site for a total of an
additional ... over
time for the purposes of comparison. We can compare the rates of errors for each of
our services by error type for the time o...