IT Monitoring Paradox: Let's Step Outside the Bubble!
March 26, 2014

David Hayward
CA Technologies

Share this

The world is full of paradoxes. To solve them, you have to look at the facts in a different, even nonconventional way. You have to step outside your bubble.

One of the earliest paradoxes is from the ancient Greek thinker Heraclitus. It goes like this: "You cannot step into the same river twice." As Roy Sorenson says in A Brief History of the Paradox, "[Heraclitus] means that you cannot step twice into the same water of a river. There is one river, but many distinct bodies of water flow through it. Heraclitus urges a balance between experience and reason."

Paradoxes are fun to solve, but real-life they can be serious. IT Operations faces paradoxes too, and one in particular day in and day out. Recently, an IT Manager in a FORTUNE 1000 company — let's call him "Joe" — told me that he was called into the distribution center VP's office. The center was at a standstill. Joe showed him that the IT systems supporting the center were meeting all their Service Level Agreements: servers, applications, databases, storage, routers, switches — the whole lot. And the VP's response? "So what. I can’t ship anything."

That's when the light bulb went off in Joe's head. All the IT technologies that underlie the distribution center were running fine, but not the center itself. IT Operations needed another way to look at things, so he could understand the IT environment's status in terms of its impact on the business, not just in terms of how this or that technology silo was behaving.

Like Heraclitus and the river, Joe needed to strike a balance between experience and reason. Joe had plenty of experience — reams of performance monitoring data and proof of SLA compliance for each technology domain — but no way to reason, or monitor, the distribution center business process itself.

Joe started thinking of ITIL — the framework for orienting IT with services, not technologies, in mind. The trouble is, IT operates in a bubble. In fact, lots of bubbles: silo’d teams, silo’d tools, each separately monitoring servers, applications, storage, databases, routers, switches, etc.. No one was monitoring the big picture outside the bubbles. IT Operations Level 1 (the “first line of defense”) was looking at a sea of monitoring screens, events and alerts about technology devices and circuits, and had little or no understanding about how those events and alerts impacted specific business processes.

So even when IT was meeting SLA objectives in each silo, little degradations (i.e., incidents) across silos were adding up and impacting different services (i.e., processes and user experience) in different ways. This was undetectable because there wasn't any way to way to associate all those incidents with specific business services: no operational view and real-time IT operational analytics of business processes across silos.

This is typical. As an analyst from a leading IT research firm recently told me: "The Industry has been trying to solve this problem for decades. It sounds old, but we keep coming back to the same paradox over and over again."

Joe and others like him have embarked on a mission to transform IT Operations from a purely technology monitoring team to a business service reliability monitoring team. They are transforming operations because either they’ll crack the paradox of managing services that they deliver to their business, or the business will outsource operations to someone who can.

Transformation doesn't happen overnight. As the ITIL mantra teaches us, it takes "people, processes and technology" to get IT properly focused on the business and its services. To start, you need to step outside your bubble.

David Hayward is Senior Principal Manager, Solutions Marketing at CA Technologies.

Share this

The Latest

April 18, 2019

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise, according to The 2019 Study on the Cyber Resilient Organization, a study conducted by the Ponemon Institute on behalf of IBM ...

April 17, 2019

People and businesses today make mistakes similar to Troy, when they get too enamored by the latest, flashiest technology. These modern Trojan Horses work through their ability to "wow" us. Cybercriminals find IoT devices an easy target because they are the cool new technology on the block ...

April 16, 2019

Software security flaws cause the majority of product vulnerabilities, according to the 2019 Security Report from Ixia's Application and Threat Intelligence (ATI) Research Center ...

April 15, 2019

The majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on — such as ERP and CRM systems — any differently than how low-value data, applications or services are secured, according to a new survey from CyberArk ...

April 12, 2019

While 97 percent of organizations are currently undertaking or planning to undertake digital transformation initiatives, integration challenges are hindering efforts for 84 percent of organizations, according to the 2019 Connectivity Benchmark Report from MuleSoft ...

April 11, 2019

Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient, according to The State of Public Cloud Monitoring, a report sponsored by Ixia ...

April 10, 2019

Without improvement in time and budget constraints, the majority of tech pros (75 percent) say they will be unable to confidently manage future innovations, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow, a new report from SolarWinds. This reality ultimately puts businesses at risk of performance and competitive advantage losses, making the prioritization of skills and career development for tech pros paramount ...

April 09, 2019

Tech pros have one foot grounded in today's hybrid IT realities while also setting their sights on emerging technology, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow ...

April 08, 2019

This Thursday EMA will be presenting a webinar — Automation, AI and Analytics: Reinventing ITSM — covering recent research. There were quite a few surprises. And in fact, many of the surprises indicated a yet-more-positive outlook than we expected ...

April 05, 2019

Almost three-fourths (69 percent) of organizations have plans to deploy 5G by 2020, according to a new 5G use case and adoption survey by Gartner. Organizations expect 5G networks to be mainly used for IoT communications and video, with operational efficiency being the key driver ...