ICT Service Management: Data Storage, IT Functions, and Best Practices
VerifiedAdded on 2023/03/31
|9
|1874
|134
Report
AI Summary
This report delves into ICT Service Management, focusing on best practices for data storage and database administration within data centers. It emphasizes the need for secure cloud-supported environments, incorporating security measures and modular components for data protection. The report highlights the importance of balancing security with availability and scalability, enforcing policies for flexibility and reducing application complexity. It also covers choosing appropriate security technologies, monitoring activities, and aligning with industry needs. Furthermore, the report examines the functions of IT Service Management, emphasizing the role of service operation staff in balancing service operations, managing technology, and delivering services at prescribed levels. It defines the responsibilities of IT service operation staff, addressing internal views, and the complexities of IT systems. The report underscores the significance of meeting industry needs and ensuring the stability and availability of IT infrastructure.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: ICT SERVICE MANAGEMENT
ICT Service Management
Name of the Student
Name of the University
Author note
ICT Service Management
Name of the Student
Name of the University
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1ICT SERVICE MANAGEMENT
Table of Contents
1. Best Practices for Data Storage and Database Administration in Data Center...........................2
2. Functions performed by IT Service Management.......................................................................4
References........................................................................................................................................7
Table of Contents
1. Best Practices for Data Storage and Database Administration in Data Center...........................2
2. Functions performed by IT Service Management.......................................................................4
References........................................................................................................................................7

2ICT SERVICE MANAGEMENT
1. Best Practices for Data Storage and Database Administration in Data Center
The best kind of practices based on storing of data and performing an administration over
the data procedures within a data centre environment could be discussed as follows:
1. There is a wide need for the storing of important data in a cloud supported
environment. In order to increase the levels of security within the data center, there would be a
high need for including different forms of factors based on compliance and inclusion of security
measures. The design of the data center would be made in such a way that would help in
impacting the security of the data stored within the data center (Chen & Zhang, 2014). This
would also help in ensuring that the data would be securely kept. The controls based on security
should be developed with the help of a modular kind of component. This kind of modular
component would be helpful for securing the important data contained within the data center.
This would also include the securing of various kind of physical resources such as storage, data,
network and servers.
2. The data center should ensure that the approach taken for the implementation of
security would not limit the factors based on availability and scalability within the used resources
(Corti et al., 2014). These can be defined as the primary reasons based on investing within the
next generation of data center.
3. The data center should be able to develop and thus enforce different kind of policies
based on identifying the different factors based on enforcing of security. These policies should
be able to calculate the different factors based on scalability, flexibility and reducing the
complexity of the application (Anshari, Alas & Guan, 2016). The data center should also ensure
that the best kind of practices based on improvising the factors based of scalability of resources.
1. Best Practices for Data Storage and Database Administration in Data Center
The best kind of practices based on storing of data and performing an administration over
the data procedures within a data centre environment could be discussed as follows:
1. There is a wide need for the storing of important data in a cloud supported
environment. In order to increase the levels of security within the data center, there would be a
high need for including different forms of factors based on compliance and inclusion of security
measures. The design of the data center would be made in such a way that would help in
impacting the security of the data stored within the data center (Chen & Zhang, 2014). This
would also help in ensuring that the data would be securely kept. The controls based on security
should be developed with the help of a modular kind of component. This kind of modular
component would be helpful for securing the important data contained within the data center.
This would also include the securing of various kind of physical resources such as storage, data,
network and servers.
2. The data center should ensure that the approach taken for the implementation of
security would not limit the factors based on availability and scalability within the used resources
(Corti et al., 2014). These can be defined as the primary reasons based on investing within the
next generation of data center.
3. The data center should be able to develop and thus enforce different kind of policies
based on identifying the different factors based on enforcing of security. These policies should
be able to calculate the different factors based on scalability, flexibility and reducing the
complexity of the application (Anshari, Alas & Guan, 2016). The data center should also ensure
that the best kind of practices based on improvising the factors based of scalability of resources.

3ICT SERVICE MANAGEMENT
The data centre should ensure that the different kind of useful policies could applied in a
consistent manner across the cloud, virtual and physical environment. Thus, with the
replacement of physical form of trust zones, they would be able to seamless content to all the
users. This form of cloud environment would secure the user based on the different kind of
applications. At every times, it should be ensured that the connection of the resources within the
data center would be highly secure and protected.
4. The security technologies should be chosen in a proper manner. These technologies
should be highly impacted with the help of virtualization based techniques (Johnson et al., 2016).
The factor based on the security of the networks should be highly integrated at the end of
hypervisor. This would be highly necessary for the purpose of existing and implementing new
kind of virtual machines. These devices would be moved or scaled with such form of policy that
would be properly enforced and could be applied in a dynamic manner.
5. The employees within the data center should be highly active based on monitoring
each and every forms of activity that would be based on the securing the data assets of the
public. Each of the virtual and physical resources should be highly protected and kept securely in
order to make greater forms of impacts to the society. The LAN connection should be
continuously checked and thus the system of firewalls should be implemented within them. This
kind of monitoring of the end systems should be performed in a continuous process (Halamka,
2014). They should also be able to monitor the dynamic form of network fabrics. The monitoring
for the missing patches within the software would also be need to be done in such a manner that
should enable the applying of security patches within the software. Thus with the impact of
monitoring of the services in an efficient manner, it would be highly helpful for making several
forms of tremendous impacts over the exploitation of vulnerabilities within the network.
The data centre should ensure that the different kind of useful policies could applied in a
consistent manner across the cloud, virtual and physical environment. Thus, with the
replacement of physical form of trust zones, they would be able to seamless content to all the
users. This form of cloud environment would secure the user based on the different kind of
applications. At every times, it should be ensured that the connection of the resources within the
data center would be highly secure and protected.
4. The security technologies should be chosen in a proper manner. These technologies
should be highly impacted with the help of virtualization based techniques (Johnson et al., 2016).
The factor based on the security of the networks should be highly integrated at the end of
hypervisor. This would be highly necessary for the purpose of existing and implementing new
kind of virtual machines. These devices would be moved or scaled with such form of policy that
would be properly enforced and could be applied in a dynamic manner.
5. The employees within the data center should be highly active based on monitoring
each and every forms of activity that would be based on the securing the data assets of the
public. Each of the virtual and physical resources should be highly protected and kept securely in
order to make greater forms of impacts to the society. The LAN connection should be
continuously checked and thus the system of firewalls should be implemented within them. This
kind of monitoring of the end systems should be performed in a continuous process (Halamka,
2014). They should also be able to monitor the dynamic form of network fabrics. The monitoring
for the missing patches within the software would also be need to be done in such a manner that
should enable the applying of security patches within the software. Thus with the impact of
monitoring of the services in an efficient manner, it would be highly helpful for making several
forms of tremendous impacts over the exploitation of vulnerabilities within the network.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4ICT SERVICE MANAGEMENT
6. The future and the present needs within the industry should be taken care of during the
stage of design of the software. The current objectives of the company should be taken into
consideration. The data center should be able to bring positive changes within the industry based
on implementing different kind of security measures. The public clod environment should be
chosen wisely and thus the impacts based on security would be able to secure the different
devices.
7. The data center should define various kind of policies in order to bring in better kind of
changes within the aspects of security within the industry. The polices should also be segmented
in a proper manner (Wang, Kung & Byrd, 2018). Based on considering the security within the
technologies. The security technologies would also be considered in a proper manner based on
securing the aspects of public cloud resources.
2. Functions performed by IT Service Management
The service operation staff plays a major role for balancing the different kind of service
operations. The service operation plays a major role within the lifecycle operations. The primary
responsibility of the service operation staff would be to focus on the management of different
kind of activities based on technology. It would be highly important for understanding the factors
based on service operation that would have a greater form of role.
It can be defined that in the process of service lifecycle, the staff would be highly
responsible for performing the factors based on execution and performing of different kind of
processes (Clayman et al., 2014). These different kind of processes would be necessary for
maintaining the perspectives base on maintaining the factors of costa and quality factors for
meeting the services based on quality. Effective management of different kind of components
6. The future and the present needs within the industry should be taken care of during the
stage of design of the software. The current objectives of the company should be taken into
consideration. The data center should be able to bring positive changes within the industry based
on implementing different kind of security measures. The public clod environment should be
chosen wisely and thus the impacts based on security would be able to secure the different
devices.
7. The data center should define various kind of policies in order to bring in better kind of
changes within the aspects of security within the industry. The polices should also be segmented
in a proper manner (Wang, Kung & Byrd, 2018). Based on considering the security within the
technologies. The security technologies would also be considered in a proper manner based on
securing the aspects of public cloud resources.
2. Functions performed by IT Service Management
The service operation staff plays a major role for balancing the different kind of service
operations. The service operation plays a major role within the lifecycle operations. The primary
responsibility of the service operation staff would be to focus on the management of different
kind of activities based on technology. It would be highly important for understanding the factors
based on service operation that would have a greater form of role.
It can be defined that in the process of service lifecycle, the staff would be highly
responsible for performing the factors based on execution and performing of different kind of
processes (Clayman et al., 2014). These different kind of processes would be necessary for
maintaining the perspectives base on maintaining the factors of costa and quality factors for
meeting the services based on quality. Effective management of different kind of components

5ICT SERVICE MANAGEMENT
would be able to support the services and execute different kind of control activities. As part of
the overall structure and performance of the business, the primary form of responsibilities that
would be needed to be performed by the service staff is based on delivering the proper kind of
services (Mijumbi et al., 2016). The delivery of different kind of services would be maintained
within the prescribed levels of service. Maintaining of satisfaction of users would be discussed as
the most important factor within the operations performed by the service operation staff.
Each of the functions performed by the service level operation staff would be clearly
defined based on the processes, the processes, functions and different kind of activities would be
designed in a proper form of manner that would be highly specific (Ross, 2016). These kind of
different kind of services, processes and activities would be highly delivered based within a
changing form of environment. This kind of situation would lead to different factors of conflict
that would help in maintaining the status of different kind of services (Soares et al., 2015). The
most fundamental form of conflict would be discovered within each of the phases based within
the ITSM level of operations. The view based on the IT services could be seen as a view that
would comprise of the different set of IT services.
The primary responsibility of the IT service operation staff is that they would highly be
concerned about the different kind of services that would be delivered as in a required and agreed
manner. The internal view could be defined as a form of IT in which the different kind of
services and components would be highly need to be managed in order to deliver the services in
a better kind of manner (Laudon & Laudon, 2016). The IT systems are highly complex in nature
and diverse within the management of various kind of services. Since the different kind of IT
systems are highly complex in nature, it would mean that the technology would be highly
managed with the various kind of department that are present within the industry. The
would be able to support the services and execute different kind of control activities. As part of
the overall structure and performance of the business, the primary form of responsibilities that
would be needed to be performed by the service staff is based on delivering the proper kind of
services (Mijumbi et al., 2016). The delivery of different kind of services would be maintained
within the prescribed levels of service. Maintaining of satisfaction of users would be discussed as
the most important factor within the operations performed by the service operation staff.
Each of the functions performed by the service level operation staff would be clearly
defined based on the processes, the processes, functions and different kind of activities would be
designed in a proper form of manner that would be highly specific (Ross, 2016). These kind of
different kind of services, processes and activities would be highly delivered based within a
changing form of environment. This kind of situation would lead to different factors of conflict
that would help in maintaining the status of different kind of services (Soares et al., 2015). The
most fundamental form of conflict would be discovered within each of the phases based within
the ITSM level of operations. The view based on the IT services could be seen as a view that
would comprise of the different set of IT services.
The primary responsibility of the IT service operation staff is that they would highly be
concerned about the different kind of services that would be delivered as in a required and agreed
manner. The internal view could be defined as a form of IT in which the different kind of
services and components would be highly need to be managed in order to deliver the services in
a better kind of manner (Laudon & Laudon, 2016). The IT systems are highly complex in nature
and diverse within the management of various kind of services. Since the different kind of IT
systems are highly complex in nature, it would mean that the technology would be highly
managed with the various kind of department that are present within the industry. The

6ICT SERVICE MANAGEMENT
organisation should be able to highly think of the various kind of requirements that would be
made within the service levels. They should also take care of the internal systems within the
industry. These system should be able to make use of the various kind of services that would be
helpful for delivering high quality of value within the services.
The staff within the service operation should also need to ensure that the IT infrastructure
would need to be stable and thus should be highly available in nature (Grönroos & Gummerus,
2014). The service operation staff present within the industry should be able to recognize each of
the growing needs of the industry and thus they should be able to maintain the various kind of
measures taken for the benefit of the industry. Each of the IT organisations should be able to
bring in several kind of measures based on bringing in better forms of impacts for bringing in
stability within the sector. The IT organisations should be thus responsible for securing each of
the IT aspects based on securing the software, hardware and other important aspects within the
industry.
organisation should be able to highly think of the various kind of requirements that would be
made within the service levels. They should also take care of the internal systems within the
industry. These system should be able to make use of the various kind of services that would be
helpful for delivering high quality of value within the services.
The staff within the service operation should also need to ensure that the IT infrastructure
would need to be stable and thus should be highly available in nature (Grönroos & Gummerus,
2014). The service operation staff present within the industry should be able to recognize each of
the growing needs of the industry and thus they should be able to maintain the various kind of
measures taken for the benefit of the industry. Each of the IT organisations should be able to
bring in several kind of measures based on bringing in better forms of impacts for bringing in
stability within the sector. The IT organisations should be thus responsible for securing each of
the IT aspects based on securing the software, hardware and other important aspects within the
industry.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7ICT SERVICE MANAGEMENT
References
Anshari, M., Alas, Y., & Guan, L. S. (2016). Developing online learning resources: Big data,
social networks, and cloud computing to support pervasive knowledge. Education and
Information Technologies, 21(6), 1663-1677.
Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and
technologies: A survey on Big Data. Information sciences, 275, 314-347.
Clayman, S., Maini, E., Galis, A., Manzalini, A., & Mazzocca, N. (2014, May). The dynamic
placement of virtual network functions. In 2014 IEEE network operations and
management symposium (NOMS) (pp. 1-9). IEEE.
Corti, L., Van den Eynden, V., Bishop, L., & Woollard, M. (2014). Managing and sharing
research data: a guide to good practice. Sage.
Grönroos, C., & Gummerus, J. (2014). The service revolution and its marketing implications:
service logic vs service-dominant logic. Managing service quality, 24(3), 206-229.
Halamka, J. D. (2014). Early experiences with big data at an academic medical center. Health
Affairs, 33(7), 1132-1138.
Johnson, A. E., Pollard, T. J., Shen, L., Li-wei, H. L., Feng, M., Ghassemi, M., ... & Mark, R. G.
(2016). MIMIC-III, a freely accessible critical care database. Scientific data, 3, 160035.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education
India.
References
Anshari, M., Alas, Y., & Guan, L. S. (2016). Developing online learning resources: Big data,
social networks, and cloud computing to support pervasive knowledge. Education and
Information Technologies, 21(6), 1663-1677.
Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and
technologies: A survey on Big Data. Information sciences, 275, 314-347.
Clayman, S., Maini, E., Galis, A., Manzalini, A., & Mazzocca, N. (2014, May). The dynamic
placement of virtual network functions. In 2014 IEEE network operations and
management symposium (NOMS) (pp. 1-9). IEEE.
Corti, L., Van den Eynden, V., Bishop, L., & Woollard, M. (2014). Managing and sharing
research data: a guide to good practice. Sage.
Grönroos, C., & Gummerus, J. (2014). The service revolution and its marketing implications:
service logic vs service-dominant logic. Managing service quality, 24(3), 206-229.
Halamka, J. D. (2014). Early experiences with big data at an academic medical center. Health
Affairs, 33(7), 1132-1138.
Johnson, A. E., Pollard, T. J., Shen, L., Li-wei, H. L., Feng, M., Ghassemi, M., ... & Mark, R. G.
(2016). MIMIC-III, a freely accessible critical care database. Scientific data, 3, 160035.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education
India.

8ICT SERVICE MANAGEMENT
Mijumbi, R., Serrat, J., Gorricho, J. L., Latré, S., Charalambides, M., & Lopez, D. (2016).
Management and orchestration challenges in network functions virtualization. IEEE
Communications Magazine, 54(1), 98-105.
Ross, D. F. (2016). Introduction to e-supply chain management: engaging technology to build
market-winning business partnerships. CRC Press.
Soares, J., Gonçalves, C., Parreira, B., Tavares, P., Carapinha, J., Barraca, J. P., ... & Sargento, S.
(2015). Toward a telco cloud environment for service functions. IEEE Communications
Magazine, 53(2), 98-106.
Wang, Y., Kung, L., & Byrd, T. A. (2018). Big data analytics: Understanding its capabilities and
potential benefits for healthcare organizations. Technological Forecasting and Social
Change, 126, 3-13.
Mijumbi, R., Serrat, J., Gorricho, J. L., Latré, S., Charalambides, M., & Lopez, D. (2016).
Management and orchestration challenges in network functions virtualization. IEEE
Communications Magazine, 54(1), 98-105.
Ross, D. F. (2016). Introduction to e-supply chain management: engaging technology to build
market-winning business partnerships. CRC Press.
Soares, J., Gonçalves, C., Parreira, B., Tavares, P., Carapinha, J., Barraca, J. P., ... & Sargento, S.
(2015). Toward a telco cloud environment for service functions. IEEE Communications
Magazine, 53(2), 98-106.
Wang, Y., Kung, L., & Byrd, T. A. (2018). Big data analytics: Understanding its capabilities and
potential benefits for healthcare organizations. Technological Forecasting and Social
Change, 126, 3-13.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.