Feeds

Best practices in virtualisation

A pitch for ITIL

High performance access to file storage

Getting IT aligned with the business's needs and strategies is probably one of the toughest elements of any IT manager's job - yet remains among the most essential, right up there with keeping the lights on.

It's about ensuring that IT delivers a return on investment, demonstrates its business value, provides continuous improvement, and gives the business a competitive advantage, all while demonstrating proper IT governance.

ITIL (IT Infrastructure Library) has become the industry's generally accepted way of going about this. According to the IT Service Management Forum, ITIL is a public framework that describes best practices in IT service management and IT governance. It focuses on the continual measurement and improvement of the quality of IT service delivered, from both a business and a customer perspective. Its scope includes service strategy, design, transition, operation and continual improvement.

Best practice makes (almost) perfect

Essentially, ITIL is a framework, not a set of rules. In the real world, it's about best practices - doing things in a way that have been shown to work and to be effective - along with information sharing, planning and accountability, which means that, if things do go wrong, there is an audit trail to be followed to ensure that the same mistakes don't recur.

Virtualisation in this context is not so much a technology as a means for providing service delivery outcomes, so it affects other ITIL-managed processes.

For example, virtualisation can support better continuity management, allowing for faster disaster recovery. Allied to that is availability management, where virtualisation improves fail-over processes, as it can remove the need for mirroring the entire hardware estate and enable the use of virtual machines instead.

It allows you to improve capacity management, with resources moving around the data centre according to need, not where the hardware happens to be installed. And it boosts the bottom line - service level management - because of its ability to provision new servers and applications quickly and cheaply.

That's not all though. The application of ITIL methodologies to virtualisation itself can help you achieve improved outcomes. ITIL is essentially a process of thinking problems through. It can affect how, for example, you measure and monitor the virtual infrastructure, and can help you decide, for example, whether installing new, more powerful virtualisation hardware will positively affect service delivery.

Layer cake

Opposition to ITIL often centres on the fact that it adds an additional layer of complexity to operations. However, many practitioners also see that as a benefit, because it allows IT managers to explain to themselves and then to stakeholders the risks and benefits of pursuing a particular strategy - whether it originated from business managers or from IT.

It's worth recognising that when a business manager wants a new virtual server now, delivering one in a handful of minutes may in fact not be the best thing for the business as a whole. But just because virtualisation technology allows you to provision a server near-instantly, doesn't always mean that's the right thing to do.

IT managers working in an ITIL-aware organisation are empowered - given a framework -- within which they can ask questions. So it legitimates questions such as whether the need has been fully thought through, and whether other resources are available that could meet this need.

In other words, adopting good practices can help the service provider - that's you - to create an effective service management system that adds value to the business as a whole.

Overall, the outcomes of managing an virtualisation infrastructure using ITIL-based practices should include increased user and customer satisfaction with IT services, better service availability, directly leading to increased business profits and revenue; financial savings from reduced rework, lost time; improved resource management and usage; improved time to market for new products and services; and improved decision making and optimised risk.

So what's not to like? ®

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.