2009 IEEE International Conference on Services Computing 2009
DOI: 10.1109/scc.2009.50
|View full text |Cite
|
Sign up to set email alerts
|

ITBVM: IT Business Value Modeler

Abstract: Today, enterprise IT environments are complex as never before with individual applications, tiers, or technologies segregated into individual management domains. Typically, the value of business applications and the dependencies between business and IT objects and IT objects among each other is unknown or at least not up to date. Thus, ultimately, the business value of individual IT tasks is unknown. Hence it is very hard to perform global management services such as performance optimization in resource-constr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 17 publications
(20 reference statements)
0
4
0
Order By: Relevance
“…Before any transformation can begin it is necessary to collect information about the current situation with all IT components (discover), their utilization, and interdependencies (Bai et al, 2013). Thus, it is necessary to discover hardware, software, applications inventory (Joukov et al, 2008), business importance of the assets, and related risks they can tolerate (Joukov et al, 2009), aspects of storage (Joukov et al, 2010), and network operation (Ramasamy et al, 2011).…”
Section: Related Workmentioning
confidence: 99%
“…Before any transformation can begin it is necessary to collect information about the current situation with all IT components (discover), their utilization, and interdependencies (Bai et al, 2013). Thus, it is necessary to discover hardware, software, applications inventory (Joukov et al, 2008), business importance of the assets, and related risks they can tolerate (Joukov et al, 2009), aspects of storage (Joukov et al, 2010), and network operation (Ramasamy et al, 2011).…”
Section: Related Workmentioning
confidence: 99%
“…Identifying what IT system components are needed to support each business process activity is a complex undertaking. Previous work (involving some authors of this paper) [3] describes how such a mapping can be performed in an enterprise setting. The first step is the identification of the IT entry points for each business activity.…”
Section: Case Studymentioning
confidence: 99%
“…In an environment of constrained IT budgets, enterprises are increasingly interested in tools and technologies for IT infrastructure optimization that factor in business value as the primary driver. Recent works have explored the linkage between IT system-level optimization actions and business value in the context of job scheduling, resource allocation, and performance, e.g., [3]. However, they do not address the provision of dependability in the presence of malicious attacks at the IT infrastructure level that simultaneously optimizes for the overall business value.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation