{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:04Z","timestamp":1750307404667,"version":"3.41.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,3,27]],"date-time":"2010-03-27T00:00:00Z","timestamp":1269648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2010,3,27]]},"abstract":"<jats:p>Efforts to reduce the cost of ownership for enterprise IT environments are spurring the development and deployment of data-driven management tools. Yet, IT data is imperfect and these imperfections can lead to inappropriate decisions that have significant technical and business consequences. In this paper, we begin by raising awareness of this problem through examples of the imperfections that occur, and a discussion of their causes and implications on IT management tasks. We then introduce a systematic approach for addressing such imperfections. Our approach allows best practices to be readily shared, simplifies the construction of IT data assurance solutions, and allows context-specific corrections to be applied until the root cause(s) of the imperfections can be fixed. To demonstrate the value of our solution, we describe a capacity planning use case. Application of our solution to an ongoing capacity planning effort reduced the (human) planner's time requirements by \u22483x to \u22486 hours, while enabling him to evaluate the data quality of \u22485x more applications and for 9 imperfection types rather than 1.<\/jats:p>","DOI":"10.1145\/1773394.1773401","type":"journal-article","created":{"date-parts":[[2010,5,6]],"date-time":"2010-05-06T17:41:18Z","timestamp":1273167678000},"page":"42-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Systematically improving the quality of IT utilization data"],"prefix":"10.1145","volume":"37","author":[{"given":"Martin","family":"Arlitt","sequence":"first","affiliation":[{"name":"HP Labs, Palo Alto, CA"}]},{"given":"Keith","family":"Farkas","sequence":"additional","affiliation":[{"name":"HP Labs, Palo Alto, CA"}]},{"given":"Subu","family":"Iyer","sequence":"additional","affiliation":[{"name":"HP Labs, Palo Alto, CA"}]},{"given":"Preethi","family":"Kumaresan","sequence":"additional","affiliation":[{"name":"HP Labs, Palo Alto, CA"}]},{"given":"Sandro","family":"Rafaeli","sequence":"additional","affiliation":[{"name":"HP Labs, Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[2010,3,27]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Missing Data","author":"Allison P.","year":"2001","unstructured":"P. Allison . Missing Data . Sage Publications , Thousand Oaks, CA , 2001 . P. Allison. Missing Data. Sage Publications, Thousand Oaks, CA, 2001."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(86)90063-1"},{"key":"e_1_2_1_4_1","unstructured":"G. Box and G. Jenkins . Time Series Analysis: Forecasting and Control . Holden-Day San Francisco CA 1970 . G. Box and G. Jenkins. Time Series Analysis: Forecasting and Control. Holden-Day San Francisco CA 1970."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2307\/2531637"},{"key":"e_1_2_1_6_1","volume-title":"The Analysis of Time Series: An Introduction","author":"Chatfield C.","year":"2004","unstructured":"C. Chatfield . The Analysis of Time Series: An Introduction . Chapman and Hall , sixth edition, 2004 . C. Chatfield. The Analysis of Time Series: An Introduction. Chapman and Hall, sixth edition, 2004."},{"key":"e_1_2_1_7_1","volume-title":"The End of Software: Transforming Your Business for the On Demand Future","author":"Chou T.","year":"2004","unstructured":"T. Chou . The End of Software: Transforming Your Business for the On Demand Future . Sam's Publishing , Indianapolis, IN , 2004 . T. Chou. The End of Software: Transforming Your Business for the On Demand Future. Sam's Publishing, Indianapolis, IN, 2004."},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198524847.001.0001","volume-title":"Analysis of Longitudinal Data","author":"Diggle P.","year":"2002","unstructured":"P. Diggle , P. Heagerty , K.-Y. Liang , and S. Zeger . Analysis of Longitudinal Data . Oxford University Press , Oxford, UK , 2002 . P. Diggle, P. Heagerty, K.-Y. Liang, and S. Zeger. Analysis of Longitudinal Data. Oxford University Press, Oxford, UK, 2002."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.115"},{"key":"e_1_2_1_10_1","first-page":"2616","article-title":"Hypertext transfer protocol -- HTTP\/1.1","author":"Fielding R.","year":"1999","unstructured":"R. Fielding , J. Gettys , J. Mogul , H. Frystyk , L. Masinter , P. Leach , and T. Berners-Lee . Hypertext transfer protocol -- HTTP\/1.1 , RFC 2616 , 1999 . R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext transfer protocol -- HTTP\/1.1, RFC 2616, 1999.","journal-title":"RFC"},{"issue":"3","key":"e_1_2_1_11_1","first-page":"207","article-title":"Distinguishing missing at random and missing completely at random","volume":"50","author":"Heitjan D.","year":"1996","unstructured":"D. Heitjan and S. Basu . Distinguishing missing at random and missing completely at random . The American Statistician , 50 ( 3 ): 207 -- 213 , August 1996 . D. Heitjan and S. Basu. Distinguishing missing at random and missing completely at random. The American Statistician, 50(3):207--213, August 1996.","journal-title":"The American Statistician"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1710115.1710121"},{"key":"e_1_2_1_13_1","volume-title":"Handling Missing Data","author":"Latini G.","year":"2004","unstructured":"G. Latini and G. Passerini . Handling Missing Data . WIT Press , Southampton, UK , 2004 . G. Latini and G. Passerini. Handling Missing Data. WIT Press, Southampton, UK, 2004."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478722"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1002\/9781119013563","volume-title":"Statistical Analysis with Missing Data","author":"Little R.","year":"2002","unstructured":"R. Little and D. Rubin . Statistical Analysis with Missing Data . John Wiley and Sons, Ltd , New York, NY , 2002 . R. Little and D. Rubin. Statistical Analysis with Missing Data. John Wiley and Sons, Ltd, New York, NY, 2002."},{"issue":"2","key":"e_1_2_1_16_1","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1080\/07350015.1990.10509795","article-title":"Influential observations in time series","volume":"8","author":"Pena D.","year":"1990","unstructured":"D. Pena . Influential observations in time series . Journal of Business and Economic Statistics , 8 ( 2 ): 235 -- 241 , April 1990 . D. Pena. Influential observations in time series. Journal of Business and Economic Statistics, 8(2):235--241, April 1990.","journal-title":"Journal of Business and Economic Statistics"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.506010"},{"key":"e_1_2_1_18_1","volume-title":"HP-UX 11i tuning and performance","author":"Sauers R.","year":"2004","unstructured":"R. Sauers , C. Ruemmler , and P. Weygant . HP-UX 11i tuning and performance . Prentice Hall , Upper Saddle River, NJ, 2004 . R. Sauers, C. Ruemmler, and P. Weygant. HP-UX 11i tuning and performance. Prentice Hall, Upper Saddle River, NJ, 2004."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/09332480.1994.11882492"},{"key":"e_1_2_1_20_1","volume-title":"SysML","author":"Xu W.","year":"2008","unstructured":"W. Xu , L. Huang , A. Fox , D. Patterson , and M. Jordan . Mining console logs for large-scale system problem detection . In SysML , 2008 . W. Xu, L. Huang, A. Fox, D. Patterson, and M. Jordan. Mining console logs for large-scale system problem detection. In SysML, 2008."}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1773394.1773401","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1773394.1773401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:27Z","timestamp":1750246767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1773394.1773401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,27]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,3,27]]}},"alternative-id":["10.1145\/1773394.1773401"],"URL":"https:\/\/doi.org\/10.1145\/1773394.1773401","relation":{},"ISSN":["0163-5999"],"issn-type":[{"type":"print","value":"0163-5999"}],"subject":[],"published":{"date-parts":[[2010,3,27]]},"assertion":[{"value":"2010-03-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}