Skip to main content

Posts

Monitoring Types

I often get asked when discussing operational activities or event management about how we should monitor our environment.   There are several methods to accomplish this depending on what you’re monitoring, what resources you have available and the criticality of what you’re monitoring.   Defining these elements will then help you choose one or more of the following methods. Active monitoring: Ongoing device interrogation to determine its status. Resource intensive. Usually used proactively for critical devices or systems Passive monitoring: Transmits event to a listening device. Most commonly used method Requires good definition of events and instrumentation of systems being monitored. Reactive Monitoring: Requests or triggers action following an event or failure Used for exceptions and normal operations Can be used to diagnose which device is causing the failure and under what conditions. Proactive Monitoring: Used to detect event patterns that can indicate

Customer Portfolio (CP): A starter tool for BRM

The purpose of Business Relationship Management (BRM) is to establish and maintain a business relationship between the IT service provider (SP) and the customer.   This relationship needs to be based on an understanding of the customer and their business needs (what services the customer needs now and in the future).   BRM must also help to establish an understanding of the requirements (utility & warranty) a customer is going to expect and to insure the service providers ability to meet those expectations. The customer portfolio is a database used to record all customers of the IT service provider.   It is used by many processes but is defined and maintained in the business relation management process.   It provides insight into the customer and is developed from the point of view of the business relationship manger.   It allows the service provider to understand who the customers are and make the distinction between customers and users.   This enables the BRM to be able to

Monitor Control Loops

One of the lesser utilized yet powerful ideas in ITIL is the concept of systems or feedback loops. ITIL defines a system as A group of interacting, interrelated or interdependent components that form a unified whole, operating together for a common purpose. There are two types of systems: ·          Open-loop systems – value of outcome has no influence on input; performs a specific activity regardless of environmental conditions ·          Closed-loop systems – value of outcome influences input; responds to changes in the environment Using these concepts we can establish a powerful approach for managing and improving the ITIL processes we have implemented. One technique is called the Monitor-Control Loop. The loop consists of a set of steps that produces feedback to help improve individual process steps, the process as a whole, the stages of the lifecycle and the lifecycle as a whole. ·          Begin the loop by conducting an individual process step by taking inputs and

Service Design Package (SDP) and the Service Catalog

Both the Service Design Package (SDP) and the Service Catalog are produced in the service design stage of the service lifecycle and to some extent both drive the activities that happen in all subsequent stages of the service lifecycle.   The SDP will detail all aspects of a service and its requirements throughout the entire lifecycle.   A service design package is produced for all new services, major changes to an existing service or the removal of a retired service.    From a high level the service design package will contain the following: ·     Business requirements ·     Service applicability requirements (how/where used) ·     Service contracts ·     Service functional requirements ·     Service and operational management requirements ·     Service design and topology (including service definition and model ·     Organizational readiness assessment ·     Service Program (timescales and phasing of transition, operation and improvement of the new s

The Value of Business Relationship Management

One of the key processes in the ISO/IEC 20000 standard is Business Relationship Management. This process “establishes and maintains a good relationship between the service provider and the customer based on understanding the customer and their business drivers.” Business Relationship Management (BRM) within ISO/IEC 20000 is one of the Relationship Processes (along with Supplier Management). These processes help to establish the links in what Harvard Professor Michael Porter described as the “value chain”. BRM creates the link between the service provider (including IT, but full delivery may involve other organizational functions) and the customers and users, both internal (“the business”) or external (“the end customer”). Business Relationship Management is now a formalized process in newest (2011) edition of ITIL. With the newest edition, the authors recognized the importance of having BRM as an extent process, rather than as guidance embedded in other ITIL processes (such as Ser

Drivers for the Various CSI Orders or Levels

In a previous blog we discussed the revised 7 step improvement process.  Step 6 of that process is to present and use the information.  There are various levels of management in an organization. When presenting this information and implementing improvements it is important to understand which level to focus on and have a good understanding of the perspectives of each level and what their drivers are. This will enable us to derive the maximum value and benefit out of the information delivered. First order drivers:   At the highest level of the organization are the strategic thinkers.  The reports delivered at this level need to be short, quick to read and deliver precise data about risk avoidance, protecting the image or brand of the organization, profitability and cost savings.  These are the drivers that will support your reasons for improvement efforts. Second order drivers: The second level of management is occupied by vice presidents and directors.  Here, reports can be more

Knowledge Management - the "why"

When I teach, I like to talk about knowledge and wisdom and the value that they bring to the organizational table.   A lot of the time people give me a quizzical look, Knowledge? Wisdom?   Where is this conversation going?   I ask people how they capture the knowledge or do they even capture the knowledge that is gained when they develop a new service, application or when some new technology is introduced into their live environment. Although what we deliver can sometimes be intangible (availability, capacity, security) it is very complex and can take years to build up the know-how on how to deliver these elements and continually meet the changing needs of our customers.    However you need knowledge, born from experience, to solve problems, to always improve, to use your wisdom to answer the question of why should we make one choice over another? Like any other organization we must brand the product we deliver.   This brand will then garner a reputation; the reputation will be b

Knowledge Management - the "what"

George Santayana, the Spanish American philosopher, wrote the famous saying, “Those who cannot remember the past are condemned to repeat it.”   This really is the underlying basis for the process of knowledge management.   It plays a key role in CSI but data must be captured in each of the service lifecycle stages.   This D ata capture must then be processed into I nformation, synthesize the information into K nowledge and applied to the context of the environment we are supporting to create W isdom.   This is known as the Data-to-information-to-Knowledge-to-Wisdom structure. DIKW.   Wisdom (not repeating the past) will allow us to make more informed & better decisions around improvements in our processes, functions and services. The purpose of knowledge management process is to quantify all of this D-I-K-W and then to share perspectives, ideas, experiences and information at the right time in the right place with the right people to enable informed decisions efficiently by no

Should Service Requests be Included in First Call Resolution metrics?

I recently had a question regarding the inclusion of Service Requests into metrics for First Call Resolution. As always, the answer is “it depends”! ITIL now treats Service Requests and Incidents as two different processes – Service Request Fulfillment and Incident Management. Both are generally logged into the same tool and owned by the Service Desk. They are also measured by their own key performance indicators and metrics. ITIL does not consider first call resolution as a process metric - it is more of a service desk performance measurement. First call resolution historically helps measure the handling of incidents by the Service Desk. The definition of an incident is usually pretty clear. However, since the definition of a service request can vary greatly from organization to organization, the value of including requests in incident metrics may also vary. If your definition of a service request includes pre-authorization and funding, then the Service Desk’s ability t

Financial Management and SACM KPIs

A learner who is working towards developing a Cost Management department recently asked about key performance indicators (KPIs) for the Financial Management and Service Asset and Configuration Management (SACM) processes.      ITIL 2011 actually maps Critical Success Factors (CSFs) to KPIs for each process.   Key performance indicators for Financial Management can be found in section 4.3.8 of the Service Strategy book while those for SACM can be found in section 4.3.8 of the Service Transition book. While I cannot list all of the KPIs for both processes, here is a good sample: Financial Management The financial management for IT services framework specifies how services will be accounted for, and regular reports are submitted and used as a basis for measuring the service provider’s performance. All strategies have a comprehensive analysis of investment and returns, conducted with information from financial management for IT services. Internal service providers receive the fu

What are IT Services So Hard to Define? (Part 2)

In my last blog, I provided some suggestions for overcoming challenges in obtaining agreement on the scope and definition of IT Services.  As I mentioned, the Service Catalog is one of the first and most important assets in any service management program. Today we are going to take a high level look at mapping IT Services to business processes.   The first step is to understand what your business or customer does and how it does it. In truth, every business only has five primary focus areas - regardless of whether it is public, private, governmental, non-profit, small or large.  Consider this: Every business designs, develops or acquires products and/or services Every business communicates, markets and sells those products or services Every business delivers those products or services Every business supports its products or services Every business has to have a corporate infrastructure (HR, IT, Finance, etc.) Can you identify where these activities are performed within your

Why are IT Services So Hard to Define? (Part 1)

A Service Catalog is one of the first assets that an organization should build when initiating their Service Management program.  After all, how can you manage services if you do not have a clear understanding what services your IT organization provides? Unfortunately, many organizations struggle with obtaining agreement on the scope and definition of end-to-end, business enabling services.  If left unchecked, these struggles can turn political and widen the divide between IT and the business as well as cause conflict between internal IT units.  To avoid some of the potential challenges in service definition exercises, here are some helpful suggestions: Set the stage by providing IT staff with a chart of business processes and begin integrating business vocabulary into service parameters ("Order Processing" not "Ecommerce").   Have business stakeholders conduct "lunch and learn" presentations that educate IT on how each unit uses IT Services.  Start

Leadership Lessons from Fusion 2011

Having recently attended the Fusion 11 conference in Washington DC, I came away with some key insights that I thought I would pass along. The event brought together the worlds of IT Service Management and Help Desk in a great mix of information sharing and learning through breakout sessions and emotion and motivation in the form of five fantastic keynotes. One of the sessions I attended talked about being a leader in an ever globalizing world. The presenter shared her knowledge and wisdom of how to build a framework of leadership by embracing diversity and different cultures. A couple key take-aways: “I’m different, like you” : Understand that we all have different cultures, backgrounds, knowledge and experience that make us important and unique individuals. Embrace the differences and use them to your advantage. It is our differences that make us similar as people trying to be successful in a complex and technology filled world. “Help me understand” : Keep an open mind and s

Dr. Deming's Cycle

Many of you have probably heard of Dr. William Edwards Deming. But how many of you really know who he was and why he is so important to IT Service Management and ITIL? I mean going beyond the contribution of the Plan-Do-Check-Act cycle to Continual Service Improvement? What was the most important contribution of Dr Deming and why should we care so much about his other efforts? According to Wikipedia, Dr. Deming (1900-1993) was a statistician, professor and consultant by trade, hailing originally from Iowa. He went on to earn degrees from the Universities of Wyoming and Colorado, and a Ph.D. from Yale University. One interesting fact of which most people are not aware was his relationship to Walter Shewhart, the originator of the ideas of statistical process control. In fact the Plan-Do-Check-Act cycle was originally an idea generated by Shewhart (and is sometimes referred to as the Shewhart Cycle, rather than the Deming Cycle). We must remember though, Dr. Deming’s contributions go m

The Beginning of Good Process Implementation

Many organizations that I meet with often are struggling to implement best practice processes into their environments.   They sound completely overwhelmed and often I hear “Where do we begin?”   I smile and usually respond with “At the beginning of course”.   The beginning of good process implementation of course is “defining and analyzing your customer’s requirements”.   I once read that to provide good services a service provider must have good customers.   I think this statement also holds true for processes as well.   Good customers / employees must: Understand the process Understand the expected results of the process Know where they fit into the process Understand how they and others contribute to produce the expected results When your employees understand the processes within your environment they can easily identify new customer requirements and positively respond to rapidly changing customer needs.   This is the basis for making it part of the service culture within you

Resources for Business Relationship Management

A student recently asked for resource references for about Business Relationship Management (BRM). BRM is emerging as a critical process in several prominent service management frameworks and standards.   Recently, BRM was formalized in the 2011 edition of Service Strategy as part of the core ITIL library.    This is a significant addition since many believed that BRM and Service Level Management (SLM) were the same process.     While similar, BRM strategically focuses on the relationship between a service provider and it’s customer (more like an Account Executive) where SLM operationally focuses on the negotiation and achievement of service performance. The ISO/IEC 20000 standard has mandatory requirements and suggested guidance for Business Relationship Management.   Even if your organization is not considering ISO certification, the standard does define the minimum essential activities for each process, including BRM.     Put together with ITIL 2011, it’s a powerful com

The Purpose and Value of Business Impact Analysis

When discussing Service Design I am often asked the purpose and value of a Business Impact Assessment (BIA).   The purpose of a BIA is to quantify the impact to the business that the loss of a service would have.   It is a valuable source of input when trying to ascertain the business needs, impacts and risks that the organization may face in the delivery of services.   The Business Impact Assessment is an essential element of the overall business continuity process.   It identifies the most important services to the organization and therefore will help to define the overall strategy for risk reduction and disaster recovery.   At a more granular level these assessments enable the mapping of critical service applications and technology components to critical business processes.   It is an invaluable input for Continuity Strategy, Availability Design, and Capacity Management.   The BIA’s strategic purpose is to show which parts of the business will be most affected by a major incident

ITIL 2011: Strategy Management

The publication of ITIL 2011 has brought several new or revamped processes to light. One of those is the Strategy Management for IT Services process. This Strategy process is not actually new. It represents the formalization of best practice guidance for managing strategies contained in earlier editions of the ITIL publications. The purpose of this newly minted process is to use a company’s perspective, position, plans and patterns to ensure better management, governance and control of the IT services an organization provides to support the business outcomes. The basic principles of the Strategy Management process include helping to identify the overall business strategy and then tie an underpinning IT strategy (including an IT service strategy) or manufacturing strategy to the business outcomes through integration and alignment activities. Once an IT strategy emerges in relation to the business strategy, the organization can then decompose the IT strategy into IT tactics and

Major Incidents and Problem Records

The other day someone asked me if a Problem Record should be opened for all Major Incidents. Not necessarily – the goal of a Major Incident is still to restore service when a major event occurs that has significant impact on the business. Incident Management is not necessarily looking for a permanent solution but for some level of regained productivity. If viable and necessary, raising a Problem Record will engage the necessary resources to find the root cause (if not already known) and find a permanent solution to remove the error (if one is available). However, sometimes the root cause of a Major Incident is immediately known and a permanent solution not viable at the time. Here is a practical example – we have hurricanes in Florida that can cause massive power outages. We know the root cause and the permanent solution is to repair the power lines. This will likely take some time. Do we need a Problem Record to capture that information? Maybe, if there is a need to document th

Reasoning for Problem Management

When it comes to Problem Management two things should come to mind: Root Cause Analysis (RCA) and finding a permanent resolution. How often have you thought about what it takes to conduct these aspects of Problem Management? An important underlying aspect of conducting a Root Cause Analysis and finding the permanent resolution are the reasoning approaches used. Three types of basic reasoning approaches are: Inductive: Reasoning from specific examples to general rules Deductive: Reasoning from general rules to specific examples Abductive: Reasoning to the most likely answer Each has its own uses and can be applied to problem solving and Problem Management at different times and for different reasons. However, when performing the Problem Management process we should be open to using all three reasoning approaches. They all complement each other with Inductive and Deductive reasoning forming two ends of a spectrum while Abductive thought looks for the balance between the other two a