Feeds

Complexity killed the IT quality of service ...

So many dependencies, so much to go wrong

Reducing security risks from open source software

“Ring, ring...”

“IT support. How can I help you?”

“The system’s really slow. It’s taking about a minute to save stuff. Normally it’s only a few seconds.”

“How long has this been going on?”

“About 20 minutes, and the backlog is building up. It slowed down yesterday too, but then seemed to right itself after about 10 minutes so I didn’t bother to call. But the boss didn’t seem too happy about it.”

This day-in-the-life snippet might be all too familiar to some of you but it allows us to talk about a few of the challenges that arise from the complexity of today’s IT environment.

Smoking can kill

It doesn’t matter if the system is an order entry function, a customer service call management function, or whatever: if systems are not performing well the first the IT department hears about it is when a user calls.

And if there is a tangible impact on throughput or productivity, that’s when supervisors, managers and execs get involved and the stakes are raised.

This is why it is important to nip problems in the bud, or better still prevent them from happening in the first place. Letting things drag on, especially when incidents are occurring frequently, leads directly to problems between IT and management, not to mention a difficult life on the front line of IT.

OK, I hear you thinking, but users often don’t help. In our little scenario above, the truth might be that when problems occurred the day before, the accounts clerk took the opportunity to sneak off for a quick cigarette on the fire escape.

Had she reported the problem to IT instead, there would have been an opportunity to investigate and avoid the next day’s more persistent performance issues.

Wouldn’t it have been better if the IT team had visibility of such problems beforehand, instead of relying on users to pick up the phone?

Warning signal

This is clearly where monitoring and management software comes into play. Sadly, research tells us that it something that many IT departments are lacking, and also that getting the budget to invest in better tools is hard.

Even where automated monitoring is in place, the chances are that it is focused on individual components. You might get a red flashing light on a dashboard when a server is struggling, for example, but it often takes the knowledge of the IT ops guys to figure out how significant that is.

If it is running some vital component of your authentication infrastructure, then the failure could be about to cause widespread chaos. If it is one server in a web server farm, then it might not be such a big deal.

Coming back to our skiving, cigarette-smoking user, the system she relies on to do her job is likely to be underpinned by a pretty complex infrastructure.

Go figure

The PC on the desk is running a web browser that connects via a web server to an app server that in turn reads and writes to one or more database servers hooked into a storage area network, with various switches, routers and other network equipment managing the traffic flow.

So when the system is running slowly, where do you begin to investigate? If you are lucky enough to have a monitoring dashboard, it is not unusual for it to be telling you that everything is OK, even though there is obviously a problem. It is what is known as “water melon metrics” – green on the surface hiding a lot of red underneath.

The bit that’s often lacking is an active understanding (beyond the out-of-date architecture diagram on the wall) of the way things work end to end.

Users really don’t care what happens behind the screen in front of them

As a starting point for tackling this problem, the trendy thing to do is to define the capability presented to the user a service, then refer to taking care of the way everything works together with the right level of performance and availability as "service management".

Recently, some vendors and analysts have coined the term service assurance, which is a fancy way of acknowledging that users really don’t care what happens behind the screen in front of them, they just want assurance that the capability will be working well enough when they need it.

Normal chat

The vendors can then talk about “services” and “service levels”, which is often a more natural conversation than the systems one.

The challenge is that the IT department is increasingly expected to just shut up and deal with all that complexity behind the scenes, and all the rhetoric about cloud is reinforcing this services view of the world.

The implications when it comes to architecture, monitoring, management, troubleshooting and even how you organise teams within your IT department can be significant, which means some aspects of IT need a bit of a rethink.

Fortunately, we are here to help with our upcoming service assurance workshop, so watch this space as we tackle some of these hard questions over the coming weeks. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.