Everyone presumably loves a good mystery. And in fact the questions “What is a CMDB?” and “What is its relevance in the age of (cloud) (agile) (fill-in-the-blank)?” often provoke such conflicted industry responses that they do suggest the presence of some mystery underfoot.
But we didn’t set out to write a mystery novel per se. Instead, CMDB Systems: Making Change Work in the Age of Cloud and Agile is designed to serve as both a guide and a chronicle of real-world experiences — honoring the mystery by sharing different points of view, while trying to help our readers optimize their CMDB planning for what is increasingly becoming a positive and successful initiative.
What Are We Really Talking About When We Say “CMDB Systems?”
In the words of one of my industry colleagues, the elusive “CMDB unicorn” can possess magic charms, but remains too often a mythic beast. In the popular imagination, the CMDB, or configuration management database, is too often a dumping ground for data that will presumably find value once it’s aggregated — which is something like buying a car without knowing how to drive and expecting to go on a road trip. The results have often met with failure, and indeed, “failure” is the first word of the book.
The name itself doesn’t really help the case. Taken from the IT Infrastructure Library (ITIL) the configuration management database isn’t about configuration management in the common vernacular, and it is really much more than a database. The term works well within ITIL’s specific guidelines, but unfortunately it’s too often a misnomer once it’s taken out into Main Street.
CMDB Systems — as we have come to understand them — require a way of reconciling multiple sources into a modeled view of physical and logical interdependencies. This is becoming an increasingly automated and dynamic capability in many deployments. Moreover as a federated set of resources, CMDB Systems may in some cases involve mashups as much as data stores for certain use cases.
From a process perspective, CMDBs require a more collective, service-aware way of working that should help to prioritize changes, enable more effective capacity planning, and help to accelerate IT’s ability to address critical business and IT initiatives. These may range from the move to cloud, to data center consolidation, to improved business service performance, to name a few.
But successful deployments don’t try to do everything at once. They build from use case to use case in a manner suited to their own, unique environmental requirements — which underscores our reasons for making “CMDB Systems” plural. It also lies behind our preference for not calling them “single sources of truth” but use-case-driven “systems of relevance”.
Like IT organizations, CMDB Systems are not generic, but vary based on use case, scope, resources and even culture. While the term and concept for CMDB is a creation of ITIL, one of the people interviewed in our book led a development team and purchased a CMDB to force operations to become more agile — using scrum!
Why Did We Feel That WE Should Take All This On?
We had more than a mystery of definitions and intentions on our hands when we began writing the book. Enterprise Management Associations has spent more than a decade researching CMDB-related adoptions and providing consulting services to IT organizations with CMDB initiatives. We built on that experience in order to develop our book, and continued to enhance our learning curve with fresh interviews and dialogs with both vendors and IT. In the spirit of the elusive unicorn, our own vision of the CMDB continued to evolve with these new insights, giving the work a journalistic feeling for discovery rather than making it a cut-and-dried academic tutorial. Our goal was as much to paint a landscape as it was to provide a checklist — although we tried to be conscientious about doing both.
Is CMDB/CMS More Relevant Than Ever?
Do we truly believe that in 2015 the CMDB/CMS is more relevant than ever in the real world, or is it still a magic unicorn, more myth than beast?
In answer to this I’ll provide just a few data points. In Ecosystem Cloud: Managing and Optimizing IT Services Across the Full Cloud Mosaic (EMA 2013) data showed that those very successful with their cloud deployments were nearly twice as likely to have CMDBs and/or ADDM capabilities deployed as those who were less successful.
Data just in from EMA research (and therefore not available to us when we wrote the book), shows the following:
■ 80% owned or were about to purchase a CMDB/CMS-related technology. Two years ago it was only 52%.
■ Performance-related service impact edged out asset management and change management as the prime CMDB-related use case for the first time ever in our research.
■ 79% have deployed, or had plans to deploy ADDM.
■ Those who were extremely successful were twice as likely to have a CMDB-related technology deployed as those who were not successful.
■ Those who were only somewhat or not successful were 20 times less likely to have ADDM deployed or in plan.
Has the elusive unicorn come out of the forest yet? And is it ready to do more than merely inspire a hopeful myth? Our data, our conversations, and our consulting experience over the years would suggest, strongly, that the answer is indeed: yes. We hope our book will serve as both a guide, and as a stimulant to industry dialog — to help IT emerge into this new era of mobile, cloud and agile far more proactively, while standing on much more solid ground.
Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...
Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...
"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...
Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...
Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...
What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...
What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...
Of those surveyed, 96% of organizations have a digital transformation strategy, with 57% approaching it as an enterprise-wide priority, with a clear emphasis on speed of business, costs, risk, and customer satisfaction, according to IDC’s Aligning IT Strategies and Business Expectations for Digital Transformation Success, sponsored by EasyVista ...
One of my ongoing areas of focus is analytics, AIOps, and the intersection with AI and machine learning more broadly. Within this space, sad to say, semantic confusion surrounding just what these terms mean echoes the confusions surrounding ITSM ...