Plugging The Gaps In Your Message Management Strategy
My bedroom ceiling leaks water when it rains.
It’s my own fault. I bought a house with a flat roof (despite the warnings from everyone who had experienced the same pitfalls that I am now enduring). I bought it, and did nothing about the roof, because I knew better. Or at least I thought I did.
You see, I really like the house. The rooms are welcoming, it’s easy to heat and keep warm and it provides me with a nice environment in which to spend time with my family and when the sun is shining everything runs perfectly.
Had I listened and taken the initiative of course, I would have swapped out the flat roof for a pitched one ages ago and saved myself a lot of time and money. But being human, and ignoring all evidence and advice to the contrary, I decided that it would never spring a leak and all would be well. But now I’ve been found out.
I’m telling you all this because it is very similar to a scenario that my colleagues frequently come across when talking to clients about their IBM i monitoring needs. Now we all know that the IBM i is a fantastic, versatile and heavy duty piece of kit and the IBM “i” operating system reliably robust. But unless you are capable of determining the critically important from the thousands of unimportant messages that are generated on a daily basis from the system, you too are in danger of being found out.
If you think about all the things you are running on this platform that are vital to your organisation, including jobs, processes, services and core applications- the task to catch everything and keep your head above water can seem daunting.
You could deploy a large team of highly-trained and expensive personnel to keep a 24/7/365 watch on every message. I had various ‘roofing experts’ tell me (after charging a hefty callout charge) that the felt and boarding was fine but come the first downpour and it still couldn’t cope. The leak continued.
Or you could decide to periodically check for messages in the hope that have you caught all of the potential showstoppers. Which is a bit like me, watching the weather forecast, constantly hoping for sunshine and failing that, that if the monsoon does arrive; it isn’t at night while I’m asleep.
The most dangerous thing you can possibly do is nothing. Once the leak has started it is not going to stop until it has been attended to and repaired, by which time the damage has been done.
Or, of course, you can prevent any leaks from happening in the first place. It is very simple to put an intelligent, automated, monitoring solution in place that filters the critical from informational messages, alerting you or one of your team in real-time and wherever you may happen to be, protecting you from a potentially disastrous situation.
Don’t wait until the next downpour of messages to react and find you’ve got a leak that you can’t fix and an impact on the business that could end in disaster.
Have a chat over a cup of coffee with one of the technical experts at Halcyon and they’ll show you how you can stem the information overflow, concentrate on what is important and ultimately, keep your head above water.
Now please excuse me. I have to go and fetch a bucket and my ladder…
To book a chat with one of our IBM i technical experts on how to improve your message management strategy or any other operational challenges you currently would like to solve, click the link below:
To learn more about our message management, monitoring and automation solutions for the IBM i, visit: http://www.halcyonsoftware.com/products/ibm-i-suites.html