Cover image for Delivering utility computing : business-driven IT optimization
Title:
Delivering utility computing : business-driven IT optimization
Personal Author:
Publication Information:
West Sussex, England : Wiley, 2006
ISBN:
9780470015766
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010128723 QA76.9.D5 B86 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Learn how to design and deploy utility computing systems to save costs and improve the value that IT delivers.

The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight. By following the principles of utility computing, also known as on-demand computing, real-time infrastructure, or adaptive enterprise, businesses can improve the IT services they offer, whilst reducing costs and improving agility. Delivering Utility Computing proposes and documents a methodology for delivering utility computing, and provides detailed advice on its principles and benefits. The authors describe a complete and step-by-step process for adapting to a utility computing system, based on proven methodology.

Delivering Utility Computing:

Provides a comprehensive description of the utility model, offering guidance on design, deployment and maintenance issues, and a strong section on service level agreements (SLAs). Explains in detail how to improve efficiencies and achieve cost reduction in the IT department. Adopts a thorough approach, taking into account current baselines, phasing, task involved, success factors and best practice principles. Presents a method rooted in theory, yet broad-based and practical, illustrated throughout with examples and real-world case studies.

This invaluable text provides CIOs, CFOs, system administrators, IT policy makers and professionals looking to develop utility computing practices in their organizations, as well as researchers in computer science, statisticians, engineers, and graduate students, with an in-depth understanding of the concepts and practicalities of utility computing.


Author Notes

Dr Guy Bunker is a member of the Institute of Electrical Engineers (IEE) and holds a PhD in Computer Science and Artificial Neural Networks from King's College London. His current role is Senior Director of Strategic Engineering at VERITAS, managing the Utility Infrastructure Architecture and Futures team. Prior to joining VERITAS 8 years ago, Guy worked for a number of companies including Oracle where he was lead architect for enterprise application development tools. He is an active member of various standards bodies, including the Global Grid Forum and the Grid Market Awareness Council.

Darren Thomson works at VERITAS as a Global Practice Leader of their Utility Computing Practice, responsible for the service development and strategic consulting delivery for companies such as Sky Television. He has also worked at The Morse Group, a European systems integrator focused on the design and implementation of critical IT systems in the Financial Services, Telco and Media industries. As a technical strategist, he has contact with many of today's leading edge companies, including Egenera, VMWare, EMC, Platform Computing and Datacore.


Table of Contents

Time and IT March onp. ix
About the Authorsp. xi
Forewordp. xiii
Acknowledgementsp. xvii
Who Should Read This Book and Why?p. xix
List of Figuresp. xxi
List of Tablesp. xxv
Part 1 Introducing Utility Computingp. 1
1 Introductionp. 3
2 What is Utility Computing?p. 7
2.1 Overviewp. 7
2.2 The Changing Role of ITp. 7
2.3 Utility Computingp. 11
2.4 Return on Investmentp. 17
2.5 Why Now?p. 19
2.6 It is Not All or Nothingp. 21
2.7 Further Implications of Utility Computingp. 27
2.8 Summaryp. 28
Referencep. 28
3 Historical Trends, or 'Is Utility Computing Really New?'p. 29
3.1 Overviewp. 29
3.2 Back to the Beginningp. 29
3.3 Connectivity: The Great Enablerp. 32
3.4 The Web and the Return to Utility Computingp. 34
3.5 Pay-As-You-Grow Data Processingp. 36
3.6 Utility Computing and the Industryp. 37
3.7 Summaryp. 40
4 The Utility Model in Detailp. 43
4.1 Overviewp. 43
4.2 The Essentials of a Utilityp. 44
4.3 The Utility Model in Detail (An Analogy)p. 44
4.4 Should Information Services Be any Different?p. 61
4.5 Summaryp. 62
5 Service Level Agreementsp. 63
5.1 Overviewp. 63
5.2 An Everyday Eventp. 63
5.3 Defining Services and the Service Level Agreementp. 65
5.4 Creating Complex Servicesp. 77
5.5 Managing Servicesp. 79
5.6 Sharing Risk with Suppliersp. 83
5.7 Summaryp. 85
Part 2 Transformational Modelingp. 87
6 Project Justification and Focusp. 89
6.1 Overviewp. 89
6.2 Business Drivers and Project Justificationp. 90
6.3 How to Find Where to Startp. 91
7 The Utility Computing Reference Modelp. 95
7.1 Overviewp. 95
7.2 The Service Layerp. 97
7.3 The Process Layerp. 114
7.4 The Organizational Layerp. 134
8 A Maturity Model for Utility Computingp. 147
8.1 Overviewp. 147
8.2 The Maturity Levels in Detailp. 149
8.3 Creating a Utility Computing Scorecardp. 160
8.4 Moving Up the Maturity Model (Generic Tasks)p. 162
9 A Transformational Approachp. 167
9.1 Overviewp. 167
9.2 The Prepare Phasep. 173
9.3 The Model Phasep. 176
9.4 The Transform Phasep. 179
9.5 The Operate/Innovate Phasep. 182
10 Technology for Utility Computingp. 187
10.1 Overviewp. 187
10.2 Virtualizationp. 187
10.3 Performance Monitoringp. 197
10.4 Reportingp. 199
10.5 Automationp. 200
10.6 Chargeback Accountingp. 203
10.7 Service Level Managementp. 205
10.8 Hardwarep. 208
10.9 Summaryp. 210
Referencep. 210
Part 3 Implications of Utility Computingp. 211
11 Cultural Implicationsp. 213
11.1 Overviewp. 213
11.2 What to Expect, Getting Ready for Transformationp. 214
11.3 Moving From Asset Ownership to Service Level Agreementsp. 224
11.4 Effective Corporate Communicationsp. 226
11.5 Summaryp. 228
12 Developing a Successful Adoption Strategyp. 229
12.1 Overviewp. 229
12.2 Types of Adoption Strategyp. 230
12.3 Choosing a Partnerp. 234
12.4 The Comparison to Outsourcingp. 238
12.5 Securityp. 238
12.6 Good Targets for Utility Computing Adoptionp. 241
12.7 Brown Field Versus Green Field Opportunitiesp. 244
12.8 Using IT Consolidation as a Starting Pointp. 245
12.9 Summaryp. 251
13 Future Trendsp. 253
13.1 Overviewp. 253
13.2 Standardsp. 254
13.3 Packaged Solutionsp. 254
13.4 Service-Oriented Architecturep. 255
13.5 Virtualizationp. 256
13.6 The End of Applications as we Know Them?p. 257
13.7 Grid Computingp. 258
13.8 The Future: An Object Application Environment?p. 260
13.9 Summaryp. 260
14 Afterword: Avoiding the Pitfallsp. 263
14.1 Overviewp. 263
14.2 Returning to Chaosp. 263
14.3 Innovationp. 266
14.4 Summaryp. 268
Appendix A Case Studiesp. 269
A.1 Case Study: Dartmouth College's Campus-Wide Backup Utilityp. 270
A.2 Case Study: Digital TV Co's Disaster Recovery Utilityp. 277
A.3 Case Study: Arsenal Digital Solutions' Information Storage Utilityp. 284
A.4 Case Study: A Telecommunications Server and Application Utilityp. 290
Appendix B Utility Computing Planning Formsp. 295
B.1 Baseliningp. 295
B.2 Baselining 2p. 296
B.3 User Department Viewp. 296
B.4 IT Viewp. 297
B.5 IT Technology Supportp. 297
B.6 IT Planningp. 297
B.7 Cost Savingsp. 297
B.8 Hard Metricsp. 298
Appendix C Initial Utility Computing Reference Model Assessmentp. 299
C.1 Utility Reference Model Assessmentp. 301
C.2 Plotting Your Utility Assessment Resultsp. 317
Appendix D Stakeholders and Objectionsp. 319
Glossaryp. 327
Indexp. 335