SlideShare a Scribd company logo
2
Most read
5
Most read
10
Most read
Introduction to Information Storage and Management 
Why Information Storage 
 “Digital universe – The Information Explosion” 
o 21st Century is information era 
o Information is being created at ever increasing rate 
o Information has become critical for success 
 We live in an on-command, on-demand world:- that means we need information when and where it is 
required. 
o Example: Social networking sites, e-mails, video and photo sharing website, online shopping, 
search engines etc 
 Information management is a big challenge Organization seek to Store, Protect, Optimize and 
Leverage the information optimally. 
What is Data : 
“Collection of raw facts from which conclusions may be drawn” 
Most data is being converted into a digital format 
 Driven by user demand 
 list of some of the factors that have contributed to the growth of digital data: 
o Increase in data processing capabilities 
o New and cheaper peripherals 
o Lower cost and increased speed of storage 
o Affordable and faster networks
Who creates data? 
Individuals 
Businesses 
Categories of Data 
Data can be categorized as either structured or unstructured data 
 Structured: 
o Data Bases 
o Spread Sheets 
 Unstructured 
o Forms 
o Images 
o Audio 
o Movies 
Over 80% of enterprise Information is unstructured 
Define Information 
 What do individuals/businesses do with the data they collect? 
o They turn it into “information” 
o “Information is the intelligence and knowledge derived from data” 
 Businesses analyze raw data in order to identify meaningful trends 
o For example: 
o Buying habits and patterns of customers 
o Health history of patients
 Virtuous cycle of information 
o Information begets information 
Value of Information to a Business 
Storage 
Data created by individuals/businesses must be stored for further processing
Type of storage used is based on the type of data and the rate at which it is created and used 
Examples: 
Individuals: Digital camera, Cell phone, DVD’s, Hard disk 
Businesses: Hard disk, external disk arrays, tape library 
Storage model: An evolution 
Centralized: mainframe computers 
Decentralized: Client – server model (Data spread across many servers) 
Centralized: Storage Networking (Hugh repositories) 
Storage Technology and Architecture Evolution 
 Historically, organizations had centralized computers (mainframe) and information storage 
devices (tape reels and disk packs) in their data center. 
 The proliferation (very fast growth) of departmental servers in an enterprise resulted in 
unprotected, unmanaged, fragmented islands of information and increased operating cost. 
 There were very limited policies and processes for managing these servers and the data 
created. 
 To overcome these challenges, storage technology evolved from non-intelligent internal storage 
to intelligent networked storage (see Figure 1-4).
Data Center Infrastructure 
 Organizations maintain data centers to provide centralized data processing capabilities across the 
enterprise. 
 Data centers store and manage large amounts of mission-critical data. 
 The data center infrastructure includes computers, storage systems, network devices, dedicated 
power backups, and environmental controls (such as air conditioning and fire suppression). 
Core Elements 
Five core elements are essential for the basic functionality of a data center: 
• Applications 
An application is a computer program that provides the logic for computing operations. Applications, 
such as an order processing system, can be layered on a database, which in turn uses operating 
system services to perform read/write operations to storage devices. 
• Databases – Database Management System (DBMS) and the physical and logical storage of data 
• Servers/Operating systems 
A computing platform that runs applications and databases. 
• Networks (LAN and SAN) 
A data path that facilitates communication between clients and servers or between servers and 
storage. 
• Storage arrays 
A device that stores data persistently for subsequent use.
Figure 1-5 shows an example of an order processing system 
A customer places an order through the AUI of the order processing application software located on the 
client computer. 
The client connects to the server over the LAN and accesses the DBMS located on the server to update 
the relevant information such as the customer name, address, payment method, products ordered, and 
quantity ordered. 
The DBMS uses the server operating system to read and write this data to the database located on 
physical disks in the storage array. 
The Storage Network provides the communication link between the server and the storage array and 
transports the read or write commands between them. 
The storage array, after receiving the read or write commands from the server, performs the necessary 
operations to store the data on physical disks. 
1 
2 
3 
4 
5 
Optimal Order Processing Example 
 The application should be optimized for fast interaction with the DBMS 
 The tables in the database should be constructed with care so the number of read/write operations 
can be minimized 
 The server should have sufficient CPU and memory resources to satisfy application and DBMS needs 
 The different networks should provide fast communication between client and server, as well as 
server and storage array 
 The storage array should service the read/write requests from the server for optimal performance 
When the DBMS receives a request from the application: 
 It first searches the server memory; if data is found there, the operation takes about a millisecond 
 If not, it uses the operating system to request the data from the storage array 
 Dedicated high speed networks transport this request to the storage array 
 Intelligent storage arrays can deliver the requested data within a few milliseconds, and are typically 
configured to protect data in the event of drive failures 
Key Requirements for Data Center Elements 
Uninterrupted operation of data centers is critical to the survival and success of a business. It is necessary to 
have a reliable infrastructure that ensures data is accessible at all times.
• Availability: All data center elements should be designed to ensure accessibility. The inability of 
users to access data can have a significant negative impact on a business. 
• Security: Polices, procedures, and proper integration of the data center core elements that will 
prevent unauthorized access to information must be established. In addition to the security measures 
for client access, specific mechanisms must enable servers to access only their allocated resources 
on storage arrays. 
• Scalability: Data center operations should be able to allocate additional processing capabilities or 
storage on demand, without interrupting business operations. Business growth often requires 
deploying more servers, new applications, and additional databases. The storage solution should be 
able to grow with the business. 
• Performance: All the core elements of the data center should be able to provide optimal 
performance and service all processing requests at high speed. 
• Data integrity: Data integrity refers to mechanisms such as error correction codes or parity bits which 
ensure that data is written to disk exactly as it was received. 
• Capacity: Data center operations require adequate resources to store and process large amounts of 
data efficiently. When capacity requirements increase, the data center must be able to provide 
additional capacity without interrupting availability, or, at the very least, with minimal disruption. 
• Manageability: A data center should perform all operations and activities in the most efficient 
manner. Manageability can be achieved through automation and the reduction of human (manual) 
intervention in common tasks. 
Managing Storage Infrastructure 
Managing a modern, complex data center involves many tasks. Key management activities include: 
• Monitoring is the continuous collection of information and the review of the entire data center 
infrastructure. The aspects of a data center that are monitored include security, performance, accessibility, 
and capacity. 
• Reporting is done periodically on resource performance, capacity, and utilization. Reporting tasks help to 
establish business justifications and chargeback of costs associated with data center operations. 
• Provisioning is the process of providing the hardware, software, and other resources needed to run a 
data center. 
o Provisioning activities include capacity and resource planning. 
 Capacity planning ensures that the user’s and the application’s future needs will be 
addressed in the most cost-effective and controlled manner.
 Resource planning is the process of evaluating and identifying required resources, 
such as personnel, the facility (site), and the technology. Resource planning ensures 
that adequate resources are available to meet user and application requirements. 
Challenges in Managing Information 
Some Constraints to Meeting the Requirements 
Constraints include: 
• Cost 
• Physical environment 
• Maintenance and support 
• Compliance – regulatory and legal 
• Hardware and software infrastructure 
• Interoperability and compatibility 
Information Lifecycle 
The information lifecycle is the “change in the value of information” over time. 
The value of the information is highest when a company receives a new sales order and processes it to 
deliver the product. After order fulfillment, the customer or order data need not be available for real-time 
access. The company can transfer this data to less expensive secondary storage with lower accessibility and 
availability requirements unless or until a warranty claim or another event triggers its need. After the warranty 
becomes void, the company can archive or dispose of data to create space for other high-value information.
Information Lifecycle Management 
ILM Implementation
ILM Benefits

More Related Content

PDF
Data Storage and Information Management
Christalin Nelson
 
PPTX
Data and functional modeling
Slideshare
 
PDF
System Design.pdf
JitendraYadav351971
 
PPTX
Maintenance & Re-Engineering of Software
Adeel Riaz
 
PDF
Mobile computing unit 5
Assistant Professor
 
PPTX
Characteristic of dabase approach
Luina Pani
 
PPT
STUDENT PROJECT ALLOCATION AND MANAGEMENT SYSTEM
AlamNur10
 
PPT
Database Systems Concepts, 5th Ed
Daniel Francisco Tamayo
 
Data Storage and Information Management
Christalin Nelson
 
Data and functional modeling
Slideshare
 
System Design.pdf
JitendraYadav351971
 
Maintenance & Re-Engineering of Software
Adeel Riaz
 
Mobile computing unit 5
Assistant Professor
 
Characteristic of dabase approach
Luina Pani
 
STUDENT PROJECT ALLOCATION AND MANAGEMENT SYSTEM
AlamNur10
 
Database Systems Concepts, 5th Ed
Daniel Francisco Tamayo
 

What's hot (20)

PDF
Overview of computing paradigm
Ripal Ranpara
 
PPTX
Data-Intensive Technologies for Cloud Computing
huda2018
 
PPT
Introduction to Data Warehouse
Shanthi Mukkavilli
 
PPTX
Chapter 6 synchronization
Alagappa Government Arts College, Karaikudi
 
PPT
Data warehouse
shachibattar
 
PPT
Data mining :Concepts and Techniques Chapter 2, data
Salah Amean
 
PPTX
Introduction to Big Data
Umair Shafique
 
PPTX
Server system architecture
Faiza Hafeez
 
PPTX
Distributed database system
M. Ahmad Mahmood
 
PPTX
Database security
MaryamAsghar9
 
PPTX
Distributed Systems Introduction and Importance
SHIKHA GAUTAM
 
PPTX
BD1.pptx
Karthik Rohan
 
PPTX
Introduction to Relational Databases
Research Support Team, IT Services, University of Oxford
 
PPTX
3.cloud service delivery models
DrRajapraveen
 
PPTX
Introduction to Data Mining and Data Warehousing
Kamal Acharya
 
PPT
Distributed data processing
Ayisha Kowsar
 
PPT
4.file service architecture
AbDul ThaYyal
 
DOCX
Storage Area Networks Unit 2 Notes
Sudarshan Dhondaley
 
PPTX
Data Mining: Applying data mining
DataminingTools Inc
 
PPT
Cloud Computing Security Challenges
Yateesh Yadav
 
Overview of computing paradigm
Ripal Ranpara
 
Data-Intensive Technologies for Cloud Computing
huda2018
 
Introduction to Data Warehouse
Shanthi Mukkavilli
 
Data warehouse
shachibattar
 
Data mining :Concepts and Techniques Chapter 2, data
Salah Amean
 
Introduction to Big Data
Umair Shafique
 
Server system architecture
Faiza Hafeez
 
Distributed database system
M. Ahmad Mahmood
 
Database security
MaryamAsghar9
 
Distributed Systems Introduction and Importance
SHIKHA GAUTAM
 
BD1.pptx
Karthik Rohan
 
Introduction to Relational Databases
Research Support Team, IT Services, University of Oxford
 
3.cloud service delivery models
DrRajapraveen
 
Introduction to Data Mining and Data Warehousing
Kamal Acharya
 
Distributed data processing
Ayisha Kowsar
 
4.file service architecture
AbDul ThaYyal
 
Storage Area Networks Unit 2 Notes
Sudarshan Dhondaley
 
Data Mining: Applying data mining
DataminingTools Inc
 
Cloud Computing Security Challenges
Yateesh Yadav
 
Ad

Viewers also liked (8)

PDF
Information Storage and Management
EMC
 
DOCX
Ism 80 lecture notes
j_shapiro
 
DOCX
Storage Area Networks Unit 1 Notes
Sudarshan Dhondaley
 
DOCX
Storage Area Networks Unit 4 Notes
Sudarshan Dhondaley
 
DOCX
Storage Area Networks Unit 3 Notes
Sudarshan Dhondaley
 
PDF
Storage as a service v4 eng
Dell EMC
 
PPT
Understanding nas (network attached storage)
sagaroceanic11
 
PDF
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Raid Data Recovery
 
Information Storage and Management
EMC
 
Ism 80 lecture notes
j_shapiro
 
Storage Area Networks Unit 1 Notes
Sudarshan Dhondaley
 
Storage Area Networks Unit 4 Notes
Sudarshan Dhondaley
 
Storage Area Networks Unit 3 Notes
Sudarshan Dhondaley
 
Storage as a service v4 eng
Dell EMC
 
Understanding nas (network attached storage)
sagaroceanic11
 
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Raid Data Recovery
 
Ad

Similar to Information Storage and Management notes ssmeena (20)

PDF
ISM Unit 1.pdf
PriyanshuPatra1
 
PDF
CCS367-Storage-Technologies-Lecture-Notes-1.pdf
Dss
 
PPTX
CCS367-STORAGE TECHNOLOGIES-UNIT -I.pptx
Dss
 
PPTX
Chapter 1
Ali Broumandnia
 
DOC
Unit Ii
Ram Dutt Shukla
 
PPTX
Storage_Technologdawdadsies_Detailed.pptx
2k22it54
 
PPTX
Database management system chap1 ppt.pptx
NandiniSR2
 
PPTX
lecture-1-1487765601.pptx
PriyadharshiniG41
 
DOC
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
Dss
 
PDF
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
PDF
Lecture1-IS322(Data&InfoMang-introduction)
Taibah University, College of Computer Science & Engineering
 
PDF
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
PDF
SAN module_1.pdf
NandishAC
 
PPTX
CISA Training - Chapter 4 - 2016
Hafiz Sheikh Adnan Ahmed
 
PDF
Data foundation for analytics excellence
Mudit Mangal
 
PPTX
DataBaseManagementSystems OVERVIEW and introduction
ramtech111
 
PPT
70a1bee5afaa499bff2de1419845-2545809091213.ppt
DeebikaKaliyaperumal
 
PPT
Behind The Scenes Databases And Information Systems 6
guest4a9cdb
 
PPTX
Information storage and management
Akash Badone
 
ISM Unit 1.pdf
PriyanshuPatra1
 
CCS367-Storage-Technologies-Lecture-Notes-1.pdf
Dss
 
CCS367-STORAGE TECHNOLOGIES-UNIT -I.pptx
Dss
 
Chapter 1
Ali Broumandnia
 
Storage_Technologdawdadsies_Detailed.pptx
2k22it54
 
Database management system chap1 ppt.pptx
NandiniSR2
 
lecture-1-1487765601.pptx
PriyadharshiniG41
 
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
Dss
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
Lecture1-IS322(Data&InfoMang-introduction)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
SAN module_1.pdf
NandishAC
 
CISA Training - Chapter 4 - 2016
Hafiz Sheikh Adnan Ahmed
 
Data foundation for analytics excellence
Mudit Mangal
 
DataBaseManagementSystems OVERVIEW and introduction
ramtech111
 
70a1bee5afaa499bff2de1419845-2545809091213.ppt
DeebikaKaliyaperumal
 
Behind The Scenes Databases And Information Systems 6
guest4a9cdb
 
Information storage and management
Akash Badone
 

Recently uploaded (20)

PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Inventory management chapter in automation and robotics.
atisht0104
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 

Information Storage and Management notes ssmeena

  • 1. Introduction to Information Storage and Management Why Information Storage  “Digital universe – The Information Explosion” o 21st Century is information era o Information is being created at ever increasing rate o Information has become critical for success  We live in an on-command, on-demand world:- that means we need information when and where it is required. o Example: Social networking sites, e-mails, video and photo sharing website, online shopping, search engines etc  Information management is a big challenge Organization seek to Store, Protect, Optimize and Leverage the information optimally. What is Data : “Collection of raw facts from which conclusions may be drawn” Most data is being converted into a digital format  Driven by user demand  list of some of the factors that have contributed to the growth of digital data: o Increase in data processing capabilities o New and cheaper peripherals o Lower cost and increased speed of storage o Affordable and faster networks
  • 2. Who creates data? Individuals Businesses Categories of Data Data can be categorized as either structured or unstructured data  Structured: o Data Bases o Spread Sheets  Unstructured o Forms o Images o Audio o Movies Over 80% of enterprise Information is unstructured Define Information  What do individuals/businesses do with the data they collect? o They turn it into “information” o “Information is the intelligence and knowledge derived from data”  Businesses analyze raw data in order to identify meaningful trends o For example: o Buying habits and patterns of customers o Health history of patients
  • 3.  Virtuous cycle of information o Information begets information Value of Information to a Business Storage Data created by individuals/businesses must be stored for further processing
  • 4. Type of storage used is based on the type of data and the rate at which it is created and used Examples: Individuals: Digital camera, Cell phone, DVD’s, Hard disk Businesses: Hard disk, external disk arrays, tape library Storage model: An evolution Centralized: mainframe computers Decentralized: Client – server model (Data spread across many servers) Centralized: Storage Networking (Hugh repositories) Storage Technology and Architecture Evolution  Historically, organizations had centralized computers (mainframe) and information storage devices (tape reels and disk packs) in their data center.  The proliferation (very fast growth) of departmental servers in an enterprise resulted in unprotected, unmanaged, fragmented islands of information and increased operating cost.  There were very limited policies and processes for managing these servers and the data created.  To overcome these challenges, storage technology evolved from non-intelligent internal storage to intelligent networked storage (see Figure 1-4).
  • 5. Data Center Infrastructure  Organizations maintain data centers to provide centralized data processing capabilities across the enterprise.  Data centers store and manage large amounts of mission-critical data.  The data center infrastructure includes computers, storage systems, network devices, dedicated power backups, and environmental controls (such as air conditioning and fire suppression). Core Elements Five core elements are essential for the basic functionality of a data center: • Applications An application is a computer program that provides the logic for computing operations. Applications, such as an order processing system, can be layered on a database, which in turn uses operating system services to perform read/write operations to storage devices. • Databases – Database Management System (DBMS) and the physical and logical storage of data • Servers/Operating systems A computing platform that runs applications and databases. • Networks (LAN and SAN) A data path that facilitates communication between clients and servers or between servers and storage. • Storage arrays A device that stores data persistently for subsequent use.
  • 6. Figure 1-5 shows an example of an order processing system A customer places an order through the AUI of the order processing application software located on the client computer. The client connects to the server over the LAN and accesses the DBMS located on the server to update the relevant information such as the customer name, address, payment method, products ordered, and quantity ordered. The DBMS uses the server operating system to read and write this data to the database located on physical disks in the storage array. The Storage Network provides the communication link between the server and the storage array and transports the read or write commands between them. The storage array, after receiving the read or write commands from the server, performs the necessary operations to store the data on physical disks. 1 2 3 4 5 Optimal Order Processing Example  The application should be optimized for fast interaction with the DBMS  The tables in the database should be constructed with care so the number of read/write operations can be minimized  The server should have sufficient CPU and memory resources to satisfy application and DBMS needs  The different networks should provide fast communication between client and server, as well as server and storage array  The storage array should service the read/write requests from the server for optimal performance When the DBMS receives a request from the application:  It first searches the server memory; if data is found there, the operation takes about a millisecond  If not, it uses the operating system to request the data from the storage array  Dedicated high speed networks transport this request to the storage array  Intelligent storage arrays can deliver the requested data within a few milliseconds, and are typically configured to protect data in the event of drive failures Key Requirements for Data Center Elements Uninterrupted operation of data centers is critical to the survival and success of a business. It is necessary to have a reliable infrastructure that ensures data is accessible at all times.
  • 7. • Availability: All data center elements should be designed to ensure accessibility. The inability of users to access data can have a significant negative impact on a business. • Security: Polices, procedures, and proper integration of the data center core elements that will prevent unauthorized access to information must be established. In addition to the security measures for client access, specific mechanisms must enable servers to access only their allocated resources on storage arrays. • Scalability: Data center operations should be able to allocate additional processing capabilities or storage on demand, without interrupting business operations. Business growth often requires deploying more servers, new applications, and additional databases. The storage solution should be able to grow with the business. • Performance: All the core elements of the data center should be able to provide optimal performance and service all processing requests at high speed. • Data integrity: Data integrity refers to mechanisms such as error correction codes or parity bits which ensure that data is written to disk exactly as it was received. • Capacity: Data center operations require adequate resources to store and process large amounts of data efficiently. When capacity requirements increase, the data center must be able to provide additional capacity without interrupting availability, or, at the very least, with minimal disruption. • Manageability: A data center should perform all operations and activities in the most efficient manner. Manageability can be achieved through automation and the reduction of human (manual) intervention in common tasks. Managing Storage Infrastructure Managing a modern, complex data center involves many tasks. Key management activities include: • Monitoring is the continuous collection of information and the review of the entire data center infrastructure. The aspects of a data center that are monitored include security, performance, accessibility, and capacity. • Reporting is done periodically on resource performance, capacity, and utilization. Reporting tasks help to establish business justifications and chargeback of costs associated with data center operations. • Provisioning is the process of providing the hardware, software, and other resources needed to run a data center. o Provisioning activities include capacity and resource planning.  Capacity planning ensures that the user’s and the application’s future needs will be addressed in the most cost-effective and controlled manner.
  • 8.  Resource planning is the process of evaluating and identifying required resources, such as personnel, the facility (site), and the technology. Resource planning ensures that adequate resources are available to meet user and application requirements. Challenges in Managing Information Some Constraints to Meeting the Requirements Constraints include: • Cost • Physical environment • Maintenance and support • Compliance – regulatory and legal • Hardware and software infrastructure • Interoperability and compatibility Information Lifecycle The information lifecycle is the “change in the value of information” over time. The value of the information is highest when a company receives a new sales order and processes it to deliver the product. After order fulfillment, the customer or order data need not be available for real-time access. The company can transfer this data to less expensive secondary storage with lower accessibility and availability requirements unless or until a warranty claim or another event triggers its need. After the warranty becomes void, the company can archive or dispose of data to create space for other high-value information.
  • 9. Information Lifecycle Management ILM Implementation