IT (Information Technology) management systems come in a variety of flavors. As examples, some are designed to manage lifecycles of software applications. Some are used to manage and monitor business services such as application and system performance within an IT infrastructure. Others are used to manage IT services. In each case, an IT management system can be utilized to generate reports for assessing impacts of the assets being managed.
When interacting with an IT management system, different users function in different roles. Users in different roles are often interested in and affected by different aspects of assets managed by that IT management system. From a quality perspective, users of different roles may have different perceptions of an application managed by an application lifecycle management system. From a performance perspective, users of different roles may have different perceptions of an IT infrastructure managed by a business service management system.
As an example, users of different roles may utilize different workflows within an application. Thus, defects recorded in an application lifecycle management system can affect different users differently. Where a defect impacts a workflow associated with a given role but not another, a quality assessments for the application can differ between those two roles. With respect to an infrastructure performance management system, users in different roles may be interested in different aspects of the infrastructure. One role may be interested in storage performance while another in server response times. Where an incident impacts an infrastructure aspect associated with a given role but not another, a performance assessment for the IT infrastructure can differ between those two roles.
Various examples described below can be used to establish and maintain mappings between user roles within an IT management system and the various assets managed by that system. Those mappings can then be used to generate role based assessments for the IT management system. Different IT management systems manage different types of assets. For example an application lifecycle management system might manage, among other items, tests, user stories, and defects. A business service management system might manage incidents and correlations for mapping incidents to infrastructure failures or other issues. The mappings, as explained in more detail below, define a number of relationships and can extend between a user role and an asset, between a user trait and an asset, and between a user role and a user trait.
To aid in discussion,
As noted, users of an IT management system fall into different persona and can be divided into categories or types. Roles 14, include a number of defined persona 24. Each persona 24 represents data indicative of a type of user within the IT management system. Such a user may be a user of the IT management system itself or a user of an asset managed or otherwise affected by the IT management system. Users can also have shared characteristics. Traits 16 include a number of characteristics 26. Each characteristic 26 represents data indicative of a trait type that can be used to describe a user in a given role.
Mapping data 18 includes links 28. Each link 28 represents data indicative of a mapping or association between any of assets 12 and roles 14; assets 12 and traits 16; and roles 14 and traits 16. The mapping to an asset 12 is, in the example of
In the Example of
The mapping data 18 of
Components
Role engine 78 is configured to maintain a plurality of roles each defining a type or category of user within an IT management system. As discussed, such a user may be a user of the IT system itself or a user of an asset managed or otherwise affected by the IT management system. Each role, for example, may be identified in role data 88 and associated with one or more users identified in user data 90. Roles may be default roles or user defined roles. In maintaining roles, role engine 78 is responsible for adding to or modifying role data 88. Role data 88 represents data identifying a set of roles and a description of each. Examples of roles were discussed above with respect to
Trait engine 80 is configured to maintain a plurality of traits each defining a particular characteristic that can be used to define a user within an IT management system. Each trait, for example, may be identified in trait data 92. Traits may be default traits or user defined traits. In maintaining traits, trait engine 80 is responsible for adding to or modifying trait data 90. Trait data 90 represents data identifying a set of traits and a description of each. Examples of traits were discussed above with respect to
Map engine 82 is configured to establish mappings between assets of an IT management system and roles maintained by role engine 78, between those assets and traits maintained by trait engine 80, and between those roles and traits. Mappings established by map engine 82 are maintained as map data 94. The assets, in the example of
Assessment engine 84 is configured to perform a role based evaluation for an IT management system. In performing this task, assessment engine 84 may, for a selected role identified in role data 88, identify assets from asset data 96 that are directly and indirectly linked to that role. Evaluating the relative weights of those links and the contents of the linked assets, assessment engine 84 can generate an assessment for the IT management system from the perspective of the selected role. Using the example of the application lifecycle management system of
User data 90 is represented as a table containing a series of rows or entries 104 each representing a given user within the IT management system. User data 90 may be a company directory or be linked to such a directory. Each entry 104 includes data in an ID field 106 and a content field 108. Data in ID field 106 represents any identifier that can be used to define mappings between a user represented by a given entry 104 and a role defined in role data 88. Data in content field 108 for each entry 104 provides additional details about the user associated with that entry 104. These additional details can be analyzed to identify similarities between users mapped to a given role. Thus, when a new user is added to user data 90, data in content field 108 for that user can be examined, and the user can be automatically mapped to a role or a suggestion can be made to do so based on similarities with other users mapped to the same role.
Trait data 92 is represented as a table containing a series of rows or entries 110 each representing a given trait maintained by trait engine 80. Each entry 110 includes data in an ID field 112 and a content field 114. Data in ID field 112 represents any identifier that can be used to define mappings between a trait represented by a given entry 110 and other items such as assets and roles. Data in content field 114 provides a name and description of the trait and any other useful information associated with the trait.
Asset data 96 is represented as a table containing a series of rows or entries 116 each representing a given asset managed by the IT management system. Asset data 96 may include the content of all such assets or it may include links to other data sources containing those assets. For example, where a given asset is a test managed by an application lifecycle management system, asset data 96 may include all the information regarding that test, or it may include a link for accessing that data from another source. Each entry 116 includes data in an ID field 118 and a content field 120. Data in ID field 118 represents any identifier that can be used to define mappings between an asset represented by a given entry 116 and other items such as roles identified in role data 88 and traits identified in trait data 92. Data in content field 120 for each entry 104 provides additional details about the asset associated with that entry 116. These additional details may include information defining the asset being managed or a link for accessing such information from another source. The data in field 116 can then be used to identify similarities between assets mapped to a given role or trait. Thus, when a new asset is added to asset data 90, data in content field 120 for that asset can be examined, and the asset can be automatically mapped to a given role or trait or a suggestion can be made to do so based on similarities with other assets mapped to that given role or trait. The same can occur as mapping data 94 is populated over time. With additional mappings defined, it can become possible to identify common mappings between similar assets and roles or traits. Thus map engine 82 may continually evaluate map data 94 to identify such common mappings and examine asset data 106 to identify a similar asset not yet mapped. Upon finding matches, map engine 82 may suggest a mapping or automatically define one.
Map data 94 is represented as a table containing a series of rows or entries 122 each representing a mapping between two items such as a user and a role, an asset and a role, an asset and a trait, and a role and a trait identified in role, user, trait, and asset data 88-96. Each entry 122 includes data in ID fields 124 and 126 as well as data in weight field 128. Data in ID fields 124 and 126 of a given entry 122 represent the identifiers for the two items being mapped. For example, these can be the corresponding identifiers from ID fields 100, 106, 112, and 118 of role data 88, user data 90, trait data 92 and asset data 96. Data in weight field 128 of a given entry 122 represents a value associated with a corresponding mapping. This value, when compared to values assigned to other mappings, can be used to determine a relative strength of the mapping. For example, a given asset may be mapped to two roles. However, the mapping to one role may be stronger than the mapping to the other.
As discussed above, map engine 82 may be used to manually map items to one another. Here, via a user interface, a user would select two items such as a role and a trait, a role and an asset, or an asset and a trait and provide an instruction to map engine 84 to map the selected items. Map engine 82 would respond by adding a new entry 122 to map data 94 that includes the relevant identifiers for those items as well as a user specified weight value. Alternatively, map engine 82 may recognize a new asset added to asset data 96. Map engine 82 may then examine information that defines or is otherwise associated with that asset to identify other similar assets in asset data 96. For example, the new asset may be a defect associated with a particular control on a given screen of a user interface for a given application. Map engine 82 may then identify other defects related to the same application, the same screen, and the same control. If those defects share a common mapping to a role or a trait, map engine 82 may automatically map the new asset to such a role or trait, or it may cause a suggestion to be presented to a user to establish such a mapping.
In the foregoing discussion, engines 78-84 were described as combinations of hardware and programming. Engines 78-84 may be implemented in a number of fashions. Looking at
Memory resource 132 represents generally any number of memory components capable of storing instructions that can be executed by processing resource 134. Memory resource 132 is non-transitory in the sense that it does not encompass a transitory signal but instead is made up of more or more memory components configured to store the relevant instructions. Memory resource 132 may be implemented in a single device or distributed across devices. Likewise, processing resource 134 represents any number of processors capable of executing instructions stored by memory resource 132. Processing resource 134 may be integrated in a single device or distributed across devices. Further, memory resource 132 may be fully or partially integrated in the same device as processing resource 134, or it may be separate but accessible to that device and processing resource 134.
In one example, the program instructions can be part of an installation package that when installed can be executed by processing resource 134 to implement system 76. In this case, memory resource 132 may be a portable medium such as a CD, DVD, or flash drive or a memory maintained by a server from which the installation package can be downloaded and installed. In another example, the program instructions may be part of an application or applications already installed. Here, memory resource 132 can include integrated memory such as a hard drive, solid state drive, or the like.
In
Operation
A plurality of user roles are maintained (block 144). Each role is attributable to a user type within an IT management system. The user type may correspond to a user of the IT management system itself or a user of an asset managed or otherwise affected by the IT Management system. Referring to
Direct and indirect mappings are defined between assets of the IT management system and the roles maintained in block 144 (block 148). The direct mappings are direct links between selected assets and selected roles. Block 148 can include mapping roles to traits and assets to traits such that the assets are indirectly mapped to the roles via shared trait mappings. Defining a mapping can also include assigning a weight or value that can be used to discern a relative strength of the mapping when compared to other mappings. Referring to
Mappings may be defined in block 144 based on user input identifying the items to be mapped and a corresponding weight. Mappings may be defined in a semi-automatic fashion where, upon entry or modification of an asset, a mapping of the asset to a role or trait is suggested to a user based on a similarity of that asset to other mapped assets. A mapping can also be defined automatically, for example, where the new asset differs from the others by less than a specified threshold. For example, new defect asset may correspond to the same UI screen of the same application as another defect mapped to a given role or trait. Here the new defect may be automatically mapped to that same role or trait.
An assessment is then assembled for the IT management system from the perspective of a selected one of the roles maintained in block 144 (block 150). The assessment may be a report assembled by identifying direct and indirect mappings between the selected role and assets of the IT management system. Weights associated with those mappings may also be taken into account. The report can then be focused on metrics associated with the mapped assets and adjusted according to those associated weights. Continuing with the example of the application lifecycle management system, the, the quality of an application managed by the system can be assessed from the perspective of a user type for that application. The assessment may focus on tests, defects, and user stories mapped to that user type. Referring to
Embodiments can be realized in any memory resource for use by or in connection with processing resource. A “processing resource” is an instruction execution system such as a computer/processor based system or an ASIC (Application Specific Integrated Circuit) or other system that can fetch or obtain instructions and data from computer-readable media and execute the instructions contained therein. A “memory resource” is any non-transitory storage media that can contain, store, or maintain programs and data for use by or in connection with the instruction execution system. The term “non-transitory is used only to clarify that the term media, as used herein, does not encompass a signal. Thus, the memory resource can comprise any one of many physical media such as, for example, electronic, magnetic, optical, electromagnetic, or semiconductor media. More specific examples of suitable computer-readable media include, but are not limited to, hard drives, solid state drives, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory, flash drives, and portable compact discs.
Although the flow diagram of
The present invention has been shown and described with reference to the foregoing exemplary embodiments. It is to be understood, however, that other forms, details and embodiments may be made without departing from the spirit and scope of the invention that is defined in the following claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US14/17160 | 2/19/2014 | WO | 00 |