Please join the Tivoli User Community (TUC) for these free upcoming events:
Webcast: Tivoli Training and Certification Live - Demonstrations of the
Multimedia Library for Tivoli Software and a Self-Paced Virtual Class
(SPVC) Date: Wednesday August 31st at 11AM or 5PM Eastern Daylight Time (Pick the session that fits your schedule) Special Prize!**All who attend will receive a 50% discount on an SPVC Learn more and register.
Virtual Training Session: Optimize Your IBM Tivoli Monitoring Skills - Free Online IBM Tivoli Monitoring Agents Training Session Date: Thursday, September 1st at 9:30 AM to 3:30 PM Eastern Daylight Time Special Prize!**all who attend will receive 50% off the Monitoring Associate Certification exam Learn more and register.
TUC Live Demo session: TIDE Application Diagnostics Demo - Break free of tortuously slow
application MTTR with Tivoli monitoring & diagnostic solutions Date: Wednesday, September 7, 2011 at 11AM Eastern Daylight Time Learn more and register.
What is the Global
Tivoli User Community (TUC).The TUCis the
online and offline community home for all Tivoli and Maximo
professionals.Through the use of the
community website, members are able to join local user groups, exchange information,
network and learn from each other’s knowledge and experience of using Tivoli
and Maximo products and services.Membership to the TUC is FREE ,click here to become a
registered member of the online community.
Types of user groups include:
Datacenter Management Tool products
Storage management products
Security products Maximo product
Virtual User Groups - covering each product category and meet via the phone and
We're pleased to announced that the IBM Champion program, hosted by developerWorks, has expanded to recognize and reward clients and partners who evangelize and advocate Tivoli Software, share their expertise, and help grow the community.
The IBM Champion program recognizes exceptional contributors to the technical community -- clients and partners who work alongside IBM to build solutions for a smarter planet. An IBM Champion is an individual who leads and mentors his or her peers and motivates them toward IBM solutions and services. Champions can be found running user groups, managing websites, speaking at conferences, answering questions in online forums, and writing blogs, submitting wiki articles, sharing how-to videos, and writing technical books.
The IBM Champion program recognizes and thanks these innovative thought leaders, amplifying their voice and increasing their sphere of influence in the technical community.
Benefits for an IBM Champion In addition to merchandise customized with the IBM Champion logo, IBM Champions will receive special visibility, recognition and networking opportunities at IBM events and conferences. They will receive special access to product development teams, and invitations and discounts to events and conferences. IBM Champions will receive online recognition via their Tivoli Community profiles (on Service Management Connect and the Tivoli User Community), with a special designation of "IBM Champion" and a listing of notable achievements. IBM Champions retain their title for one year, after which they can apply for renewal. Nomination process and eligibility Self nominations and nominations by proxy will be accepted online through August 19th, 2011. A panel of IBMers will evaluate each nominee's contributions over the past 12 months, considering community impact, expertise, and overall community contributions, both in terms of quality and level of participation across a wide variety of activities. Nominees will be notified by IBM if they are selected. Although IBM employees are not eligible for the program, they are encouraged to nominate deserving partners and clients.
Today’s post is brought to you by Veronica Shelley, Product Marketing
Manager, IBM Security Solutions.
A typical user can have multiple log-in and password
combinations, often with different requirements and update intervals. With so
many log-ins to keep track of, users either forget or resort to unsafe
practices (i.e. writing them down) to help remember their passwords. Yet, there
are times when youruser community
simply can’t remember their log-in information. How many calls to the Help
Desk, how many hours of lost user productivity, can be attributed to workers
who can’t log into a particular application or database because they forgot
their password? Precious time is wasted finding, remembering, and resetting
passwords, so this can become a major productivity issue for organizations of
As the number of enterprise applications and access points
continue to increase IBM Tivoli Access Manager for Enterprise Singe Sign-On
(TAM ESSO) delivers a balance between easy access and strong security. This
industry leading access management solution supports a wide variety of
authentication factors (including smart cards, badges, tokens, and biometrics),
meeting the needs of different user groups and industries. TAM ESSO provides single sign-on capabilities,
meaning users have to remember just one password to automatically log into all
their applications and data sources. No more time consuming and expensive help
desk calls, no more frustrated users, no more lost hours of productivity. Users
benefit from fast access to all of their applications, while organizations benefit
from the increase in productivity, security and compliance with security
Rod Atkins (my General Manager back when I worked in pSeries and now Senior Vice President, IBM Systems and Technology Group) has been using the term "tune to task" in place of "fit for purpose."
In her guest blog post on the Mainframe Zone, Mary Shacklett does an excellent job in explaining why words do matter.
What I took away from this is that, either way, it speaks to the need for Visibility, Control and Automation™ (VCA).
The realities of the business today are based on heterogenous environments that continue to transform and evolve and becoming increasingly complex as you start to build private clouds and then as you start to pull public cloud resources into your organization to then create a "hybrid" cloud environment.
Much like what we discussed in the security video, the fundamentals are still the same. This becomes a conversation multiple platforms. "Tuned to task." Requiring the same levels of VCA as you use to maintain the levels of governance and reduce risk and for your business before you embarked on this journey.
"Have it to you by lunch, boss!" I'm sure is not the answer that you give. Right?
Here's the thing: it's not all doom and gloom. By any means.
Bowman Hall and Barbara Korte are back to talk about some of the challenges our customers are facing managing heterogeneous and hybrid environments in the Cloud, and what IBM can do to assist.
They discuss a broad range of questions you might be thinking about (like managing multiple hypervisors) but more importantly they discuss the approach that only IBM has for providing VCA as the cornerstone for your service management practice.
As a marketing guy, I can tell you that we planned it so that VCA was the central theme for all of our videos (YouTube playlist).
Take time to watch the video (and the others in our playlist) and contact your IBM sales rep or one of our Business Partners using the Business Partner Locator website to talk about VCA and what you're doing with cloud in your organization and get cloud ready!.
A few years ago, I worked on organizing an analyst summit for IBM where we announced the (then new) IBM Security Framework.*
Cut to today and the IBM Security Framework is still at the foundation of Smarter security solutions from IBM.
The IBM Security Framework. Visibility, Control and Automation.™
when we talk to customers about how to address their business pains, the fundamentals remain the same even though the technology continues to advance in new directions.
With Cloud and Virtualization in particular, the technology is certainly changing at a pretty fast clip.
Take a look at the fourth video in our series, "Cloud Enabling Your Data Center: Security and the Cloud" where Joe Anthony, IBM Director, Security, Risk & Compliance Product Management, talks about the IBM Security Framework and how it addresses the Cloud and business pains our customers are trying ot address.
The message and the focus of security and the Cloud is still very much rooted in the IBM Security Framework.
As a reminder, the entire video series can be seen using the YouTube Playlist (Get Cloud Ready).
* To be clear, I had nothing to do with building the IBM Security Framework. I was just the project manager for the event. Like Jarvis in the Avengers. (as a side note: one thing I learned about event planning - coffee, coffee, coffee!)
A few years ago, IBM began talking about Visibility, Control and Automation™ (VCA).
VCA is the cornerstone of Integrated Service Management. It's how we help clients achieve success.
VCA is not only critical for optimizing return on Virtualization and Cloud, it also applied to end-to-end business services.
To steal a phrase: it's about the service.
The third video in our series is "Cloud Enabling Your Data Center: The Importance of Integrated Service Management In The Cloud" and it is presented once again by Bowman Hall and Barbara Korte.
Bowman and Barbara do two things in this video: they give a great overview of Integrated Service Management and its concepts as well as talk to how that aligns with technologies such as Virtualization and Cloud.
Achieving world-class business services for your organization does not mean abandoning the tenants of your service management practice.
Visibility, Control and Automation™. In a cloud computing environment.
One of the advantages of virtualization is the ability to "grow" the data center without having to constnatly add new hardware. That said, those virtualized servers need to be managed efficiently, or the benefits are quickly lost.
Watch this video featuring IBM Senior Product Manager Robin Hernandez and learn how IBM tackles the complex problem of image management and how it impacts the business.
My bosses gave me a very simple task, "Solve the confusion surrounding some of the questions our customers have around cloud computing and service management."
I told them I'd have it done before lunch.
And if you believe that, you have way too much faith in my marketing abilities (hi, mom!).
In all seriousness, you have questions about cloud computing. Lots of questions.
Cloud is everywhere and there's a lot of information that our customers are having to sift and sort through.
Which is why back in May, I assembled a group of sales leads, marketing peers, development executives...literaly a "who's who" of cloud computing at IBM and asked them this:
What are the questions our customers have around cloud?
That started a series of conversations that led us to several core questions, and we got to work.
We enlisted some of our top people working on cloud and we asked them to get in front of a video camera and talk directly to you about these questions.
The result is a video series we call, "Cloud Enabling Your Data Center."
Today, we are releasing the first video: "Achieving Greater Efficiencies With Virtualization And Cloud Computing (Service Management Across The Entire Infrastructure)"
This video features two of our top sales executives; Bowman Hall and Barbara Korte. Barbara is a sales executive for Integrated Service Management and you might remember Bowman Hall from the Cloud demo during the Pulse General Session.
As I said, this is the first of the video series. Future videos will be released in the next few weeks.
We also have a short URL that goes to a landing page we've put togther with additional cloud materials and (most importantly) a full list of Pulse Comes To You and Impact Comes To You events that are happening in your area.
Even if you went to Pulse or Impact in Las Vegas this past year, these local events are great opportunities to deep-dive into a topic like cloud computing as well as meet your peers and local subject matter experts.
More to come and please feel free to comment below about your thoughts on Cloud.
PS also this week, we announced a new version of IBM Tivoli Service Automation Manager (Announcement Letter 211-256). The new release allows IT service providers to onboard multiple customers, deploy IT services very quickly across multiple platforms and hypervisors, maximize resource utilization and drive cloud operations effectiveness and efficiency by adding storage support and expanding on network integration. Learn more about the new features and the product on the product page.
Who do you reach out to when you want to make sure that you're keeping up with the latest trends and education opportunities? At Tivoli User Group meetings, members talk with each other about anything from the latest TSM release to where's the next happy hour...But what if those meetings aren't often enough? What if you haven't yet found that "work buddy" who will challenge you to stay current and not judge you for asking about something that's "so yesterday."
Here's a chance to communicate online with your peers and get some help answering those nagging questions - How do you stay up to date on the latest skill needs? What new product innovations are worth looking into?
User Community has a new 3Q theme focused on “Skills Optimization and
Innovative Products”. What products do you consider to be most innovative
today? How are you keeping your skills up to date on these new technologies and
in this rapidly evolving marketplace?Join
the discussion!We have an open forum
for your ideas, with insights from IBM, business partners and other thought
leaders. Join us - read, request information, and share your thoughts.
User Community’s initial Community Focus on Virtualization and Cloud Computing was
a great success in 2Q.Thousands of
members took advantage of this new community program to engage with others and
learn about these hot topics through webcasts, forums and other community
resources.The 2Q Community Focus is
still accessible and has some excellent resources.
to leverage community forums, polls, and peer networking capabilities to help
members engage with each other to share their thoughts and collaborate.Some highlights for the 3Q Community Focus
Live Webcasts with thought leaders– there are several webcasts planned to cover innovative products, including
a July 20th webcast on application performance management using Tivoli ITCAM for
transactions - Register here and a number of sessions skills optimization, including a July 27th webcast on finding the Tivoli Training and Certification you need on ibm.com - Register here.
Get Involved! We’ll be updating the content
throughout the quarter so keep checking back.Our drumbeat will continue through the end of the year with a 4Q
Community Focus on IT Governance and Risk Management.
The Tivoli User Community (TUC)
is the largest network of Tivoli professionals in the world.With more than 30,000 members in 138
countries and 160 local and special interest groups, the TUC links a global network of users,
developers, business partners, and IBM sales/technical staff.Members share a common interest in increasing
the knowledge of Tivoli software and solutions to solve
business problems. Membership is free and open to all Tivoli professionals, users, business partners and employees. Register here
We are increasingly living our lives in online spaces, and as a result, the monetary value of those spaces seems to be rising every day. Billions and billions of dollars are spent every single year on online advertising. One of the challenges is not only making sure that your money is well spent, but also that your spend won't have a negative impact on your brand. If you're wondering how that could happen, think about this: it's estimated that about 10% of all online ads wind up in places they shouldn't be.
I actually had the pleasure of having lunch with Ian Lightstone (CFO ArtsandTV) a few months back while we were originally filming this video. It was my first exposure to the project and I have to say, it's pretty fascinating what they're working on. As someone who spends all their time talking about vulnerabilities and attack types and all the other pieces of the security conversation, advertising wasn't something that came up a lot. SEO attacks are probably the closest I'd ever gotten to thinking about advertising in the context of security. So how does security intersect with advertising?
ArtsandTV is a relatively small company that needed a lot of data. Data is something that IBM has. Specifically, we have one of the largest URL filtering databases in the world (Security Content Analysis SDK). This product is something typically used to enhance existing security offerings, but it is being used a bit differently here. The Project Sunblock team wanted to improve the way advertisers spend their money.
As you can probably imagine, there are a lot of inappropriate websites on the internet, places where you wouldn't want your brand to appear. In addition to the obvious places you want to avoid, there are other places that are more subtle. Imagine you are a bank, and you advertise a lot on some popular news site. One day, that site runs a story about the financial crisis and is extremely critical of the banking system. Despite the fact that you might frequently advertise on this site, you likely do not want your brand associated with that story.
So, ArtsandTV had the algorithms and IBM had the data. The combination of the two became Project Sunblock, an ad spend optimization and brand protection tool. Project Sunblock can help to keep your brand from appearing on inappropriate pages through the use of content and image analysis combined with a real-time decision making engine. This applies to both generally inappropriate sites, as well as the instances of specific articles and stories that you don't want your brand associated with.
One last thing to remember is that 10% figure I cited at the beginning this post. Not only is this solution protecting the image of a brand, it is also a way to get a better return on your investments. That 10% can be better spent elsewhere.
I am just back from a week working in Tokyo. For someone who
writes as much as I do about the need to understand customer culture and how
that affects expectations, it is always a good lesson to visit Japan, where the
culture is about as different (from where I normally work) as you get within
the service management world. (Of course culture does get even more different in,
say, certain Amazonian tribes or a primary school playground, but with little
formal ITIL adoption there as yet, Tokyo
is my extreme of difference.)
Although the shadow of the tsunami and very
real loss to the community endures, the human spirit carries on and people
still laugh and enjoy life. One of the pleasant surprises is how universal
humour can be. It is also easy to forget how quickly people’s behaviour adapts
and copies from those around them. You really only notice the extent to which
you adapt when you get back home. For example it took me a while to stop bowing
to people and also to stop smiling at people in the street, restaurants etc –
or certainly to stop expecting them to smile back.
I also got used to things that I would
expect not to cope with easily. Specifically after the first day or so I was no
longer bothered by how much my room on the 16th floor shook when one
of the steady stream of aftershocks wobbled Tokyo. That reminded me of how worryingly
quickly I had got used to seeing young men with machine gums patrolling the
streets while working in Belfast
in 1992. Seems we absorb new technology just as quickly, and it takes very
little time for what seemed new and so different to become everyday life.
People as old as me can remember life without a mobile phone, but already I
find it hard to recall how it felt to be out of contact whenever out of the house or office, let alone that it didn’t bother me to be unreachable.
But coping without things you have got used
to does happen – and it is clear there are some very direct lessons for service
management in Tokyo
today. Obviously in the light of their unfortunate experience and need for disaster
recovery and business continuity they are well placed to be the source of most
of the case studies for the next few years. It may well be a long time before
even the immediate effects stop being so visible – there is an obligation for a
15% reduction in electricity consumption that looks set to last a long while.
That kind of thing has so many knock-on effects you quickly realise how
dependent we are on technology. Not only because it is a shock to go back to
old ways – and waving a fan may be an ancient Japanese tradition but it much less
effective than air conditioning; but because we depend on so much that cannot
function without the technological infrastructure. The power reduction of 15%
has to applied carefully, because so many things – like data centre power –
must be maintained. So the power for things that drive mere comfort is hit very
hard – very little cooling in offices and, for example, my hotel had turned off
That made me think of just how complex our
everyday infrastructures have become, with so much more than electricity on our
critical list. It perhaps should be acompulsory occasional exercise to think through just how many things we
presume will be available – not just the obvious (utilities, access, people etc).
I am sure we would all be surprised at some of the things we tacitly depend on –
and equally sure there are good stories to be told about some of them – any offers?.
New z114 designed to consolidate workloads from hundreds of x86 servers
Costs 25% less and offers up to 25% performance improvements over IBM z10 BC Servers
High-end mainframe features now available at entry level price of $75,000
Ability to manage workloads on select System x blades now available
Designed to deliver Smarter Computing capabilities
Many of the analysts have focused on the $75,000 entry price point. And that's cool.
There are customers who on Monday didn't think that they could afford a mainframe and are today putting it on their short list. What they will find is a platform that is highly reliable and will help them achieve the levels of innovation needed to drive their business.
Of course, I'm an Integrated Service Management guy and at the end of the day it's all about the service.
Which is why the good news is that we provide a Integrated Service Management capabilities and portfolio solutions for the mainframe.
Fill Bowen wrote up a good blog on the subject and we published a statement of direction* (Announcement Letter: 211-271) to support the announcement.
For more information contact your IBM sales rep or one of our Business Partners using the Business Partner Locator website and feel free to leave comments below about your positive experiences with the mainframe.
* Statement of direction is intended to provide insight into IBM plans and direction. Availability, prices, ordering information, and terms and conditions will be provided when the product is announced.
All statements regarding IBM's plans, directions, and intent are subject to change or withdrawal without notice
While preventing security breaches is paramount, security administrators are frequently bogged down with tedious, time-consuming, complex day-to-day tasks that divert their attention from security issues.These time-consuming tasks can be reduced by improving security administration processes and automating audit documentation, allowing administrators to focus on innovative extensions to their business applications in order to maximize investments.
Join us for this webcast on July 14th to learn about the new capabilities in Security zSecure suite, Security Key Lifecycle Manager, Tivoli Federated Identity Manager, Tivoli Security Information and Event Manager, and other security products that enhance cloud security on the mainframe.
In this session, you’ll learn how Tivoli Security Management for zEnterprise can help:
·Reduce the cost of administrating security on the mainframe by reducing complexity and using fewer staff resources
·Automate security policy enforcement to implement best practices and compliance requirements
·Analyze data to detect and respond rapidly to the large volume of security events and threats both internal and external
·Proactively handle events with automated closed-loop remediation that closes exposures
·Protect sensitive data and simplify the lifecycle management of encryption keys
·Consolidated cloud security management for zEnterprise
This new portal will replace the Service Management Resource Center (SMRC), and its main goal is to continue to provide a wide range of resources for IT and Operation Executives in our four different types of roles: -Communications Service Providers -Operations and Storage Management -Production, Delivery and Facilities Management
You can search for resources by role, including the most up to date analyst reports, case studies, demos, tools and white papers. Another great feature of the site is that it will attempt to make a range of content recommendations for you based on how you navigate the site to get you to the highest value resources for your needs.
Check it out, and let us know what you think!...and stay tuned for localized versions of this portal in Germany, Italy, France, UK, Brazil and Mexico.
After my last blog – asking what devops was
– the idea of collaboration across the whole life of service has been in the
forefront of my mind. From that wider perspective I was musing around one of my
frequent topics – how we fail to get the service right because we don't
understand how it is being used, or what the customer really cares about.
Actually the simple picture of supplier and
customer doesn’t really describe the world most of us have to live in. If we go
with the ITIL concept of a customer (someone who has financial influence or
authority) then we also need to worry about what our users think. In other
frameworks you might hear a more general concern about taking the whole range
of stakeholders into consideration. Doesn’t matter which recipe you follow –
does matter that you see the complexity.
Some of the problems come from being so
close to how things are done (rather than why they are being done), and by
being so close to what you think matters that you don't spot what matters to
those receiving the service. Sometime it is the silliest things that make the
customers and users unhappy and reject a service. Maybe that is an example of the
‘One Bad Apple’ syndrome – something firmly embedded in the human condition
seems to be our ability to allow one bad aspect to overbalance a dozen good
I had my own version this week, when I
found myself refusing to continue with an online application for a new bank
account because the software insisted on spelling my name incorrectly. (For
reasons I cannot fathom, it seems to have decided that any name starting with
‘Mac’ must have a capital afterwards – so it turns ‘Macfarlane’ to ‘MacFarlane’
without giving me the chance to turn it back.) I didn’t stay around to see what
else the service offered, I just closed the web page and got my new account
somewhere else that will let me spell my name properly.
But there is also the positive face of the
same coin – the power of ‘cool’. Imagine you have found the perfect shoes for
your child – scientifically designed to protect their feet while supporting
their bones and they are even waterproof. As a caring parent these are the only
pair of shoes you want your child to be running about in (see IKB later in this
blog). As it happens your dreams have come true because your child loves them.
Is it because they are good for them, and will help their feet develop properly
– no, they agree to wear them because the heels light up with each step. They
will wear them – and save their feet – but only because they are ‘cool’ –
according to rules you will never understand. By the way, don’t think the
illogical ‘cool’ factor only applies to children, it is there in just about
every service you deliver or use – at work or at home. If you look for it then
you will see it. I don’t want to make this posting too long or I could list
dozens – but just imagine trying to sell powerful and effective software
products against others with less relevant features at higher cost – but with a
fancy graphical interface – sound familiar to anyone?
If you think about these two situations –
where apparently less important elements disproportionately affect decisions -
I am sure you will find many examples of the two extremes; like the fast-food restaurant
that you still avoid because of one bad burger or one element of bad service,
hundreds of miles away and several years back.
Those issues tend to come from how the
service is delivered, yet the same problem can easily come from how it is built
(like my name issue). But one of the differences is getting the message back to where it might make a difference,
because at best the complaints go to the operations side of the house, and this
does not get fed back, maybe because it is dismissed as trivial – because it
doesn’t seem important to whoever received the message.
It isn’t just about hiding complaints
though, we also have the ability not to pass the cool factors back. Do we
always find out why people really like something? It seems to me that we don’t often
ask the right people the right questions. And it also seems there are simple
reasons why we do that:
We presume that what is important to us is what is important to
our customers, users or others that matter. Is this a common manifestation
of IKB (the ‘I know better’ syndrome)? Most of suffer this from our parents,
then grow up and do it other people.
We don’t know who to ask – and we don't know what to ask them.
Both of these situations are understandable
– after all, we are human so of course we see things first and best from our own perspective, and without being forced out into another’s environment then why
should we have the ability to understand people we have never met? The second
is also inevitable in the complicated amalgams of customers, users, services
and suppliers we exist within. Never mind the neat little service chain
pictures you get in the books – it doesn’t really look that simple, it looks
complicated, and mostly because it is complicated.
We can do something about these
difficulties – but they require addressing the way we – and our colleagues –
think, and that takes time and effort.
There are other causes and factors – and
maybe there is one we could do something about, and it is something that would
magnify the beneficial effects when you finally get around to addressing the two points I
listed above: when we do find things out we don’t tell the people who could do
something about it. And the very best way to get that wrong is to build silos
within your supplier organisation and stop people sharing ideas and
After that last blog on devops, I was
thinking about that particular kind of communication issue. There is something deep
rooted in the human psyche that needs to dismantle their immediate environment
into teams (or
groups, or departments or silos or tribes – call them what you will). IT
organisations are perfect examples – with high level internal teams always
emerging once they gets past a certain size. And if you separate into teams that feel the need to compete, then helpful messages will not be fed across between them. So what was built wrong and delivers the wrong thing stays there and will be wrong in the next version too. That is
the inertial element of behaviour that initiatives like devops and whole
service lifecycle approaches have to contend with. We shouldn’t think it can be
as easy as just telling people to collaborate and communicate. Like all
challenges we need to recognise what we are fighting – and to fight back.
So – what are good ways to start? Perhaps
as simply as recognising that while we might bond comfortably into (say) a
‘development’ team or an ‘operations’ team (or any one of a dozen more) – that
doesn’t make the other team the opposition – I think that would be a good first
step, if we can finally realise that – by and large – what benefits one team
also benefits the other.
 For once this isn’t just me making ideas up. I wrote a psychology
essay on this topic at University – way back towards the middle of the last
 This was discussed in the ITIL books for Small Organisations –
versions 1, 2 and 3.