What is ITIL (IT Infrastructure Library)?

While the ability to distribute technology afforded organizations more flexibility, the side effect was inconsistent application of processes for technology delivery and support. The UKs Office of Government Commerce recognized that utilizing consistent practices for all aspects of a service lifecycle could assist in driving organizational effectiveness and efficiency as well as predictable service levels and thus, ITIL was
born. ITIL guidance has since been a successful mechanism to drive consistency, efficiency and excellence into the business of managing IT services.

Since ITIL is an approach to IT “service” management”, the concept of a service must be discussed. A service is something that provides value to customers. Services that customers can directly utilize or consume are known as “business” services. An example of a business service that has common applicability across industries would be Payroll. Payroll is an IT service that is used to consolidate information, calculate compensation and
generate paychecks on a regular periodic basis. Payroll may rely on other “business” services such as “Time Tracking” or “Benefits Administration” for information necessary to calculate the correct compensation for an employee during a given time period. In order for Payroll to run, it is supported by a number of technology or “infrastructure” services. An infrastructure service does its work in the background, such that the business
does not directly interact with it, but technology services are necessary as part of the overall value chain of the business service. “Server Administration”, “Database Administration”, “Storage Administration” are all examples of technology services required for the successful delivery of the Payroll business service.

See Figure 1.
IT has traditionally been focused on the “infrastructure” services and managing the technology silos. IT Service  Management guidance in ITIL suggests a more holistic approach to managing services from end-to-end. Managing the entire business service along with its underlying components cohesively assures that
we are considering every aspect of a service (and not just the individual technology silos) – to assure that we are delivering the required functionality (or utility – accurate paychecks for all employees) and service levels (or warranty – delivered within a certain timeframe, properly secured, available when necessary) to the business customer.

end to end service

ITIL is typically used in conjunction with one or more other

good practices to manage information technology such as:
• COBIT (a framework for IT G • overnance and Controls)
• Six Sigma ( a quality methodology)
• TOGAF (a framework for IT architecture)
• ISO 27000 (a standard for IT security)

The Service Lifecycle
ITIL is organized around a Service Lifecycle: which includes: Service Strategy, Service Design, Service Transition, Service Operation and Continual Service Improvement. The lifecycle starts with Service Strategy – understanding who the IT customers are, the service offerings that are required to meet the customers’ needs, the IT capabilities and resource that are required to develop these offerings and the requirements
for executing successfully. Driven through strategy and throughout the course of delivery and support of the service, IT must always try to assure that cost of delivery is consistent with the value delivered to the customer.
Service Design assures that new and changes services are designed effectively to meet customer expectations. The technology and architecture required to meet customer needs cost effectively is an integral part of Service Design. Additionally, processes required to manage services are also part of the design phase.
Service management systems and tools that are necessary to adequately monitor and support new or modified services must be considered as well as mechanisms for measuring service levels, technology and process efficiency and effectiveness. Through the Service Transition phase of the lifecycle the design is built, tested and moved into production to assure that the business customer can achieve the desired value. This phase
addresses managing changes, controlling the assets and configuration items (underlying components – hardware, software, etc) associated with new and changed systems,

service validation and testing and transition planning to assure that users, support personnel and the production environment has been prepared for the release to production.

Once transitioned, Service Operation then delivers the service on an ongoing basis, overseeing the daily overall health of the service. This includes managing disruptions to service through rapid restoration of incidents, determining the root cause of problems and detecting trends associated with recurring issues, handling
daily routine end user requests and managing service access. Enveloping the Service Lifecycle is Continual Service Improvement (CSI). CSI offers a mechanism for IT to measure and improve the service levels, the technology and the efficiency and effectiveness or processes used in the overall management of services.

Why would an organization be interested in ITIL?

Although today’s technologies allow us to be able to provide robust capabilities and afford significant flexibility, they are very complex. The global reach available to companies via the internet provides tremendous business opportunity while presenting additional challenges regarding the confidentiality, integrity and availability or our services and our data. Additionally, IT organizations need to continue to be able to meet or exceed
service expectations while working as efficiently as possible. Consistent repeatable processes are the key to efficiency, effectiveness and the ability to improve services. These consistent, repeatable processes are outlined in the ITIL framework.

What are the benefits of ITIL?

The main benefits of ITIL include:
Alignment with business needs.

I • TIL becomes an asset to the business when IT can proactively recommend solutions as a
response to one or more business needs. The IT Strategy Group recommended in Service Strategy and the
implementation of Service Portfolio Management gives IT the opportunity to understand the business’ current and future needs and develop service offerings that can address them.

• Negotiated achievable service levels. Business and IT become true partners when they can agree upon realistic service levels that deliver the necessary value at an acceptable cost.

• Predictable, consistent processes. Customer expectations can be set and are easier to meet with through the use of predictable processes that are consistently used. As well, good practice processes are foundational and can assist in laying the groundwork to meet regulatory compliance requirements.

• Efficiency in service delivery. Well-defined processes with clearly documented accountability for each activity as recommended through the use of a RACI matrix can significantly increase the efficiency of processes. Inconjunction with the evaluation of efficiency metrics that indicate the time required to perform each activity, service delivery tasks can be optimized.

• Measurable, improvable services and processes. The adage that you can’t manage what you cannot measure rings true here. Consistent, repeatable processes can be measured and therefore can be better tuned for accurate delivery and overall effectiveness. For example, presume that a critical success factor for incident management is to reduce the time to restore service. When predictable, consistent processes are
used key performance indicators such as Mean Time To Restore Service can be captured to determine whether this KPI is trending in a positive or negative direction so that the appropriate adjustments can be made. Additionally, under ITIL guidelines, services are designed to be measurable. With the proper metrics and monitoring in place, IT organizations can monitor SLAs and make improvements as necessary.

• A common language – terms are defined.

Which companies use ITIL?
Literally thousands of companies world-wide and of all industries and sizes have adopted ITIL. These include:
• Large technology companies such as Microsoft, HP, Fujitsu, IBM;
• Retailers such as Target, Walmart and Staples
• Financial services organizations such as Citi, Bank of America, Barclay’s Bank;
• Entertainment entities such as Sony, Disney
• Manufacturers such as Boeing, Toyota, Bombardier
• Life Sciences compa

Reference : http://www.itil-officialsite.com/WhatisITIL.aspx

How to decode MTSMS Origination number in Oracle PL/SQL?

CDR is generally known as data file for storing Traffic in Telecom Company.
With ASN.1 format decoder, It could not convert all value of each field in CDR.

Incoming SMS is an example.

How to decode it to be readable with the following hexa number?

Origination field value:
–D035D6162747C4F616E6
–915875209740F7
–8188F8

****************************CDR 9958****************************
Start_addr:0x30e391
cdr_type: MTSMSRecord
recordType:07
serviceCentre:(91)85510200800
servedIMSI:456061092699145
servedIMEI:354574053945320
servedMSISDN:(91)85593279735
msClassmark:301882
recordingEntity:(91)85593010000
location:(LAC: 03 F3 CELLID: 76 C3)
deliveryTime:2013-04-01 09:45:35 + 0700
systemType:02(Decimal)
basicService:( 21)
additionalChgInfo:( 02)
chargedParty:01(Decimal)
chargeAreaCode:000000
orgRNCorBSCId:007008
orgMSCId:006708
globalAreaID:54F66003F376C3
subscriberCategory:0A
firstmccmnc:54F660
smsUserDataType:FF
origination:915895482179F4
callReference:38077F9879
typeOfSubscribers:00(Decimal)
recordNumber:1950135172(Decimal)

*****************************************************************************

********************************* Oralce Function *********************************

create or replace function fx_GetSMSOriginationNumber(origin VARCHAR2)

return varchar2 is
v_str VARCHAR2(1000);
v_str2 varchar2(1000);
v_rev_str varchar2(1000);
v_firstChar VARCHAR2(10);
n_loop_n number := 0;
begin

FOR i IN 1..length(origin)/2 LOOP

v_rev_str := ”;
v_rev_str := substr(origin,(n_loop_n + 1),2);

SELECT REVERSE(v_rev_str) INTO v_rev_str from dual;

v_str2 := v_str2 || v_rev_str;

n_loop_n := n_loop_n + 2;

END LOOP;

v_firstChar := substr(v_str2,1,1);

–if LENGTH(TRIM(TRANSLATE(v_firstChar, ‘ +-.0123456789′, ‘ ‘))) = ” then
if to_number(v_firstChar) < 1 then
v_str2 := utl_raw.cast_to_varchar2(hextoraw(v_str2)) ;
else
v_str2 := substr(v_str2,1,LENGTH(v_str2) – 1);
end if;

return v_str2;
end;

 

**********