Tuesday, March 24, 2009

Are SLAs worthwhile?

Should an IT organization offer SLAs to their internal users?
Network World logo

Wide Area Networking Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by F5 Networks
rule

7 Key Challenges You Can't Ignore
Virtualization platforms, such VMware ESX and Microsoft Hyper-V, represent the first form of virtualization that is typically introduced into the data center. While these new infrastructure platforms provide considerable advantages; virtual machines (VMs) also add complexity, scale, and management challenges to your environment. By planning for your migration to virtual machine platforms, and recognizing the inherent challenges, you can make it seamless and optimize your virtual network and storage environment.

rule

Spotlight Story
Are SLAs worthwhile?

Steve Taylor By Steve Taylor and Jim Metzler
The last two newsletters highlighted the dialogue at Network World's recent IT Roadmap conference in Denver and how it emphasized that the challenging economic environment puts pressure on IT organizations to focus even more than they do in normal economic times. With that in mind, the last two newsletters discussed the need for IT organizations to identify their key applications and to establish service-level agreements for them. This newsletter will continue the discussion of internal SLAs for key applications. Read full story

Steve Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials. Jim Metzler is vice president of Ashton, Metzler & Associates.

Related News:

The need to focus Last week in Denver, Network World hosted an event entitled 'IT Roadmap conference.' At that conference Jim moderated two tracks - one track was on Network Management and the other was on Application Delivery. The overall conference was very interactive with a lot of dialogue amongst end users, industry analysts, and vendors. That dialogue highlighted the fact that in 2009 IT organizations need to focus even more than they do in normal economic times. With that in mind, this newsletter and the next two newsletters will discuss the need for IT organizations to focus on a handful of key applications.

Establishing SLAs for key applications The last newsletter highlighted the fact that the dialogue at Network World’s recent IT Roadmap conference in Denver emphasized that the challenging economic environment puts pressure on IT organizations to focus even more than they do in normal economic times. With that in mind, this newsletter will begin to outline a process that IT organizations should follow in order to focus on a handful of key applications.

The changing role of the network engineer The last newsletter examined some of the conventional wisdom that impacts the networking organization. In particular, we looked at the conventional wisdom that says that if the performance of an application is degrading, that the cause is the network. As was pointed out, that kind of defensive approach to managing application performance has led to a new management metric – the mean time to innocence (MTTI). This newsletter will continue the discussion of the conventional wisdom that impacts the networking organization by looking at the changing role of the network engineer. In particular, we'll look at the conventional wisdom that says that the role of the network engineer is limited to just designing the network.

Eliminating the mean time to innocence As is the case with most industries, there is a lot of conventional wisdom that surrounds our industry. By conventional wisdom we mean the set of beliefs that guide how organizations think about Information Technology. The challenge, of course, is that sometimes the conventional wisdom is incorrect and it guides IT organizations in the wrong direction. With that in mind, the next two newsletters will take a look at some of the prevailing conventional wisdom with an eye to whether or not it is indeed accurate.

Multi-Gig File Transfers Windows Server 2008 blogger Glenn Weadock has a dilemma: Vista SP1 uploading a 4-gig virtual machine to a Windows Server 2008 file server (not beta, not R2). The problem: BIG delays . Help him figure out an answer before he resorts to blaming Microsoft.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by F5 Networks
rule

7 Key Challenges You Can't Ignore
Virtualization platforms, such VMware ESX and Microsoft Hyper-V, represent the first form of virtualization that is typically introduced into the data center. While these new infrastructure platforms provide considerable advantages; virtual machines (VMs) also add complexity, scale, and management challenges to your environment. By planning for your migration to virtual machine platforms, and recognizing the inherent challenges, you can make it seamless and optimize your virtual network and storage environment.

rule

Case Study: Successful LAN Support
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/24/09

Today's most-read stories:

  1. No business case for IPv6, survey finds
  2. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  3. IBM/Sun deal could benefit Java, says Google's open source chief
  4. Skype for SIP targets business customers
  5. Voluntary separation scheme for Dell's Malaysian staff
  6. Hidden commands
  7. Ukrainian cybercriminals raked in $10K/day, Finjan reports
  8. E-mail evidence in Madoff case includes another scam
  9. Power grid is found susceptible to cyberattack
  10. Tweeted out of a job: "Cisco Fatty" story
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Free Trial: Fluke's AnalyzeAir
Get the insight you need into the RF sources that impact your wireless LAN with a complimentary trial copy of Fluke Networks' AnalyzeAir software. With the right tools you can easily detect, identify and locate interference. Ensure your Wi-Fi network is safe and secure.
Register for your free software now.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: