Application Continuity

ajaym259General, Resources1 Comment

Application Continuity consists of the activities to maintain and periodically execute the documented Application Disaster Recovery Plan (DRP) in test mode. Application Continuity prepares Organisation for continued service if a disruption occurs, by recreating or restoring the application to the operational state that existed just prior to the disruption.

Application Disaster Recovery Planning

Application Disaster Recovery Planning documents the plans and procedures that make up an Application Disaster Recovery Plan … Read the rest “Application Continuity”

User Support

ajaym259General, Resources2 Comments

User Support supports user requests.  Consists of Functional Support, Audit Support, Security Compliance Assessment and Logging and Monitoring.

Functional Support

Functional Support responds to user-initiated Service Requests that are dispatched by the Incident/ticket management system. Functional support is comprised of questions about application functionality and requests for repeatable, defined Services that do not require change to application code or database level change.

Functional support also covers ad-hoc reporting, which is … Read the rest “User Support”

Processing Support

ajaym259General, Resources2 Comments

Processing Support consists of the application-related activities required to run the production environment. Processing Support activities include scheduled updates of application components (for example tables, parameters, scripts, job schedules, or data loads) with predetermined values that are required for the successful completion of the application’s processing.

Processing Support also includes application monitoring for issues or successful completion of processing. As temporary workarounds are implemented by Service Provider, additional Processing Support … Read the rest “Processing Support”

Perfective Maintenance

ajaym259General, Resources1 Comment

Perfective Maintenance is comprised of three components: Perfective Monitoring, Perfective Analysis, and Perfective Change.

Perfective Monitoring examines application data capacity for the purpose of creating Requests for Change to improve the application’s database, storage capacity and to avoid future incidents. Perfective Monitoring will be restricted to surveillance of application consumables: database and data storage.

Perfective Monitoring does not include Run Time Improvement (RTI) analysis, proactive code flaw analysis, or hosting … Read the rest “Perfective Maintenance”

Application Maintenance

ajaym259General, Resources1 Comment

Application Maintenance consists of the activities to keep an application and its documentation in conformance to existing business and operational requirements. The Application Maintenance does not change (add, modify, or delete) the business functionality provided by the application to the user.

Adaptive Maintenance

Adaptive Maintenance is that portion of Application Maintenance to modify an application and its documentation as necessitated by changes (patches, updates, etc) to the technical environment in … Read the rest “Application Maintenance”

New Mathematical Model Can More Effectively Track Epidemics

ajaym259General, ResourcesLeave a Comment

A new model developed by Princeton and Carnegie Mellon researchers improves tracking of epidemics by accounting for mutations in diseases. Now, the researchers are working to apply their model to allow leaders to evaluate the effects of countermeasures to epidemics before they deploy them.

“We want to be able to consider interventions like quarantines, isolating people, etc., and then see how they affect an epidemic’s spread when the pathogen is … Read the rest “New Mathematical Model Can More Effectively Track Epidemics”

What is IoT? The internet of things explained

ajaym259General, News, ResourcesLeave a Comment

The internet of things (IoT) is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to send data, receive instructions or both.

There’s an incredibly broad range of things that fall under that umbrella: Internet-connected “smart” versions of traditional appliances like refrigerators and light bulbs; gadgets that could only exist in an internet-enabled world like Alexa-style digital assistants; internet-enabled … Read the rest “What is IoT? The internet of things explained”

Known Error Database (KEDB)-III

ajaym259General, ResourcesLeave a Comment

The KEDB implementation

Technically when we talk about the KEDB we are really talking about the Problem Management database rather than a completely separate store of data. At least a decent implementation would have it setup that way.

There is a one-to-one mapping between Known Error and Problem so it makes sense that your standard data representation of a Problem (with its number, assignment data, work notes etc) also holds … Read the rest “Known Error Database (KEDB)-III”

Known Error Database (KEDB)-I

ajaym259General, ResourcesLeave a Comment

Known Error DataBase – KEDB – a repository that describes all of the conditions in your IT systems that might result in an incident for your customers.

Wondering – do you have a Known Error Database? And are you getting the maximum value out of it?

The concept of a KEDB is interesting because it is easy to see how it benefits end users. Also because it is dynamic and … Read the rest “Known Error Database (KEDB)-I”