摘要:
A system and method is disclosed for managing information technology resources to provide processing capacity to multiple customers with varying requirements in a shared computing environment. The inventive process comprises producing and maintaining a capacity plan that allocates capacity resources, handling requests for additional capacity resources, and analyzing requests for additional capacity resources to identify issues that should be resolved in future allocations.
摘要:
An example of a solution provided here comprises: providing a shared platform that is prepared to accept an incoming customer; for the incoming customer (a) planning a configuration of hardware, software, and network components; (b) designing the configuration; and (c) utilizing at least one configuration management control point; accepting the incoming customer, among multiple customers, on the shared platform; sharing hardware and software, among the multiple customers; and maintaining information concerning the shared platform.
摘要:
A method is disclosed for managing the performance of shared computing resources in furtherance of delivering on-demand IT services to multiple customers. The inventive method comprises predicting the performance of resources allocated among the customers to minimize performance related problems; preventing performance related problems by evaluating the impact of changes in resource allocations; reacting to performance alerts to resolve performance related problems; and determining the appropriate level of resource performance needed in service level agreements, and that these requirements detailed in the service level agreements are achieved. This Performance Management method ensures that the demands of the customers are not affected by the allocation and utilization of the shared IT resources.
摘要:
An example of a solution provided here comprises: providing a shared platform that is prepared to accept an incoming customer; for the incoming customer, (a) utilizing at least one information technology management control point; and (b) porting the incoming customer's application, or boarding the incoming customer's application, or both; accepting the incoming customer, among multiple customers, on the shared platform; and sharing hardware and software, among the multiple customers.
摘要:
A method for analyzing a problem in a distributed processing business system used to provide a service is disclosed. The method comprises identifying the problem; preparing for an audit; performing the audit; reviewing the audit; developing an action plan; developing an execution plan; deploying a solution in accordance with the execution plan; monitoring the deployed solution; and recording lessons learned. Alternatively, the method may be applied to evaluate the capacity of a distributed processing business system to provide a prospective service. In this alternative embodiment, the method comprises identifying the problem; preparing for an audit; performing the audit; reviewing the audit; preparing a rating table; populating the rating table with results from the audit; calculating a service rating based upon the results entered in the rating table; and presenting the service rating to management.
摘要:
A system and method for creating a hybrid invoice for services provided to a customer by an on-demand data center are disclosed. The method comprises providing a shared computing environment wherein computing resources are shared between the customer and at least one other user; allocating sufficient computing resources from the shared computing environment to provide a requested service; recording in a database the number of computing resource units required to provide the requested service; extracting from the database the number of computing resource units consumed by the customer during a billing period; and calculating a cost for providing the number of computing resource units consumed by the customer during the billing period.
摘要:
An on-demand security service ensures isolation of the service provider's customers where the customers share resources at the system, subsystem, and storage level. The security service is provided in a pre-production phase and in a post production phase. The pre-production phase takes place prior to boarding the customer. In the pre-production phase the resources to be protected are defined in a security guide, and using the security guide, physical segregation at the facility, network, and technical and delivery support levels is planned and then implemented. In the post production phase, on going activities are proactive and reactive. Proactive activities include maintaining physical segregation by reviewing and updating the security guide, and testing physical segregation by performing security audits and penetration tests. Observations and finding of the audits and penetration tests are resolved. Reactive activities include identifying isolation failures, coordinating appropriate actions, and resolving the isolation failure. The service may be embodied in a system and in a computer implemented process comprising a security guide file (SGF), a security guide application (SGA), a security implementation application (SIA), a security validation application (SVA), and an event coordination application (ECA).