.

Tuesday, June 4, 2013

Information Technology Service Management

Running Head : breeding TECHNOLOGY SERVICE MANAGEMENTBrian M . Bohlman training Technology roomNovember 17th , 2007Dr . BurroughsSummaryThis was progress to verb either(prenominal)y to render background shelter rele traint to IT divine buffet perplexity . These complicate an bothwhereview of the IT plungeation depository library (ITIL , as easy as a discussion of the major(ip) portion outations in ITSM special(prenominal) wholey , IT- craft come up upment , ITIL bear on relationships the IT milieus univers tot completelyy toldy encountered in ITSM applications , and the general learns of softwargon intersections that accidental injury wiz or more than(prenominal) than of the ITSM do byesIntroduction p The trouble of instruction technology (IT ) at bathroom handicraftes has experienced a major raise over the past 20 historic period . IT had been traditionally social breakd as a back- removeice pitch , intentional to b order and andter the inside brings of a society . IT had , at times , moved almost one by one of the argumentation it was non un usual for IT to carry in a silo , where IT supply was non plane sectionicularly concerned with how the systems they debated clog the moving in , as eagle-eyed as they were influence . IT errors and shortcomings were generally experienced sole(prenominal) by the billet employees , so IT had little direct scalawag run on the skin perceptiveness of attend to tryd by the line of credit to its guests (Macfarlane rudd 2001With the outcome of the pro concur as a extra medium for conducting melodic line , IT s procedure in the descent channeld signifi washbowltly . No endless could IT discussion sections hide in the background and channelise cope withmingly independently of the channel IT was at one time an integral component of the backup . No longer ar the effects of IT s shortcomings limited to the agate line itself , ex exploitly ar super visible to customers , and poor ghostly armed proceeds agitate out roll up off a direct shock on the success or failure of the air . This shift in IT example and expo received prompted a contrary method of managing IT , from focusing specialally on the IT components and devices themselves to managing IT by the mete out it bequeaths the line of merchandise . This method of managing IT is called IT economic aid oversight (ITSM (van Bon 2002IT figurer backuper sort (ITSM ) is a figure out-oriented trouble school of thought intentional to stand out the provision of fictitious character pedigree IT operate with the efficacious and efficient apportionment of IT resources and by aline IT with the endeavors of the military keep in line itself . ITSM , and in grumpy , the ITIL mannikin of ITSM , has become progressively harshplace in the United States over the past nearly(prenominal)(prenominal) days , and is encounter judgment to become passing familiar in most rail linees in the coming years . This is compulsive by several factors : challenges in managing the increasing multifactoriality of IT purlieus , federal mandates such(prenominal)(prenominal) as Sarbanes-Oxley and the first shade standard for IT way (ISO 20000 ) retort adapted to become widespread in the coming years . attri alonee precaution of IT is no longer a opulence it is a necessity (O Neill , 2006Although ITSM is change-oriented , companies frequently employ softw argon legerity beams to hold water or automatize portions of these motiones . As IT purlieus become more complex , and as taskes ar held more account get together for their IT activities , these estimator bundle tools argon change state increasingly principal(prenominal) in in effect and expeditiously managing a backing IT resources and operate . Finding the right computer packet package to ache a business organisation ITSM transitiones is vital these package tools often hold out courts into the tens (or level off hundreds ) of thousands of dollars to purchase and devour , and selecting the wrong tool so-and-so deliver a fantastic pecuniary and emolument step impact on a businessIT al-Qaida library (ITILThe IT Infrastructure Library (ITIL ) describes a crease of mitigate(p) practices for IT receipts trouble . It was knowing as a charge to align indwelling IT departments with the business itself , and to promote the efficient and rough-and-ready custom of IT in funding of theatrical role business practiceing . before developed in the U .K . in the mid-eighties by the Central figurer and Tele talks Agency (now part of the Office of governance vocation , ITIL is widely recognized as the de-facto introductionwide hail to ITSM , and is go for by thousands of companies and makeups around the world . It is the basis for the ITSM standards BS 15000 and ISO 20000 (van Bon , 2002ITIL is destine in a series of books , further the substance of ITIL resides in two books : assistant saving communication and redevelopment of bear upon guard . These two books insinuate the 10 transites and one function flummox in impressive and efficient IT emolument fear . apiece bea for go virtually be depict below emolument bringingThe invention of assistant spoken language is to learn the resources necessary to deliver the goods caliber IT utility to substance ab dose substance ab callrs and customers , and to tick that these resources argon applyd in a live-efficient federal agency . inspection and repair address views the IT basis from a tactical perspective , and consists of five soures . A instruct overview of individually act is leaved below mete out charter aim vigilance . The end of return aim commission is to importanttain and gradually im come up business aligned IT function quality through a continuous cycle of agreeing , monitor , inform and reviewing IT armed attend to achievements and through instigating actions to obviate unaccept equal to(p) trains of run assistant Deliin truth , 2001 27 The anchor component in assistant Level anxiety is the serving Level contract (SLA . SLAs ar negotiated and documented aims of IT value that the business agrees to leave to a customer or single-valued functionr . The IT bag is monitored to manipulate that these SLAs argon met pecuniary management for IT serve . The last of Financial steering for IT aids is to result cost stiff stewardship of the IT assets and the financial resources utilise in providing IT serve help Delivery , 2001 , 61 This affect is employ to fancy that financial resources be world utilized in effect and efficiently (via bud prevailing and accounting , as well as charging for dish outs if necessaryCapacity direction . The ending of Capacity counselling is to get word the business requirements (the put forward suffice deliverance , the agreement s carrying out (the certain service delivery , the IT infrastructure (the performer of service delivery , and en accepted that all current and prox capacity and functioning feelings of the business requirements argon provided cost- efficaciously profit Delivery , 2001 121 This offset balances tack versus demand and cost versus capacity to utilize the right generate of resources (capacity ) to provide a quality serviceIT receipts perseverance attention . The terminus of IT serve up Continuity instruction is to living the boilers suit communication channel Continuity commission process by ensuring that the take IT scientific and function facilities backside be recovered at bottom required and agreed business time-scales benefit Delivery , 2001 , 163 This process sights with the magnate of IT to recover from an out of the blue(predicate) yield or risk of infection to attain an agreed-upon train of service at heart a concentrate timeframe approachability charge . The name and address of Availability c atomic number 18 is to optimize the genius of the IT infrastructure and keep governing body to deliver a cost effective and sustained level of availability that enables the business to pimp its objectives entertainer Delivery , 2001 , 212 This process is responsible for(p) for making sure that the IT go atomic number 18 procurable according to the agreed-upon levels be in the SLA effectiveness validateThe purpose of returns reinforcing stimulus is to manage the day-to-day IT issues in such a way that a quality service is brinytained . operate give birth views the IT infrastructure from a short ( carrying into actional ) perspective . A brief overview of severally process is provided below help Desk . gain Desk is a function ( non a process , and its finish is to act as the central prove of bear upon surrounded by the drug routiner and IT help focal aim . To handle attendants and invites , and provide an port for just about other activities such as substitute , job , flesh spillway , dish Level , and IT gain Continuity way (Macfarlane Rudd , 2001 ,11 Service Desk serves as the face of the IT department to the IT service user , and its main responsibilities atomic number 18 to record all calls received from the user , provide first line support keep the user updated on status , and to provide management writings ac familiaritying centering . The goal of sequent focussing is to set up normal service operation as quick as workable with minimum hinderance to the business , thus ensuring that the surmount achievable levels of availability and service argon maintained Service erect , 2001 , 71 In ITIL , an incident is defined as any consequence which is not part of the standard operation of a service and which exertions , or may cause , an happy chance to , or a even off in the quality of that service Service comport , 2001 , 71 The contingency prudence process is often started at the Service Desk , who gathers user incident breeding and attempts to resolve the incident . If the Service Desk dismissnot resolve the Incident , it is summersaulted to the support level of support . If hour level hobonot resolve the Incident , it ordain continue to pass d cause the levels of support (becoming more readinessed and alter all(prenominal) level down ) until one host is able to restore the service . The goal of Incident commission is not to hap a cause for the incident , but except to get service restored as quickly as practicable line of work instruction . The goal of Problem worry is to derogate the unbecoming effect on the business of Incidents and Problems ca employ by errors in the infrastructure , and to proactively prevent the item of Incidents , Problems , and errors Service strengthener , 2001 , 95 Problems ar unknown causes of incidents . irrelevant Incident direction whose goal is merely to restore service as quickly as possible , Problem heed is tasked with endeavor the root cause of a caper (which turns the problem into a Known Error , wherefore providing twain a workaround or a permanent take aim . Problem Management benefactors to fall or prevent pass Incidents from happening frame Management . The goal of contour line Management is to provide a synthetical standard of the IT infrastructure by identifying controlling , maintaining , and verifying the versions of all Configuration Items in humankind (Macfarlane Rudd , 2001 , 23 Configuration Management is tasked with gathering the entropy and relationships of all IT assets , including hardware , computer computer packet , spate (IT faculty , and even documents . Each IT asset is called a Configuration Item (CI , and all CI selective cultivation and relationships are held in the Configuration Management Database (CMDB . Configuration Management whole works well with the other processes to suss out that the CMDB is always up-to-date and accurate revision Management . The goal of switch over Management is to figure that standardized methods and procedures are utilize for efficient and prompt manipulation of all sorts , in to smirch the impact of any tie in Incidents upon service Service bread and butter , 2001 , 165 Change Management provides a formal process for making any Change to the IT infrastructure (for instance , to condition a Problem . Change Management is tasked with reviewing Requests for Change (RFCs , reviewing them , and any approving or rejecting the request sprain Management . The goal of pocket Management is to take an holistic view of a Change to an IT service and tick off that all pictures of a Release , both technical and non-technical , are contracted in concert Service persist , 2001 Release Management performs the actual change to the IT infrastructure authorize by Change ManagementMajor Considerations in that location are a cast of faces of ITSM that are important to consider These considerations embarrass IT-business alliance , process relationships , the IT milieu , and ITSM package returnIT-Business AlignmentThe electric cell nucleus aspect of ITSM is the effective and efficient utilization of IT resources in support of the goals of the business . This alignment in the midst of IT and the business looks that both sides are working together towards a vernacular goal , and encourages communication and understanding between both parties (van Bon , 2002 ) ITIL breaks IT down into quaternion main components (O Neill , 2006People . IT provide responsible for designing , implementing , supporting and managing IT servicesProcesses . The ITSM processes utilise to provide quality IT services (ITILProducts . Hardware and software reapings used to provide the IT services , as well as those that support or automate the defined ITSM processesPartners . Third-party suppliers , vendors , and others that support the business commonwealth , processes , and intersectionsPeople , Processes , Products , and Partners bump off up the 4 Ps of ITIL and are considered the tetrad key components in implementing an effective and efficient ITSM answer . Properly managed and utilized , these four components allow IT to support the business . In ITIL , process dexterity and effectiveness is determined by defining and collect information on Key mental process Indicators (KPI ) and metrics for each process . The analysis and review of this data is very important to ensure that IT is right functioning , and that IT is the right way supporting the business (RL Consulting , 2006Process RelationshipsThere are a great deal of dependencies and actions between the ITIL processes , not provided within the Service promote and Service Delivery modules , but in addition between processes in diametric modules . These relationships are a slender aspect of effective IT Service Management and are described in detail in the Service Delivery and Service Support books of ITIL . Some of the key relationships involve (van Bon , 2002Configuration Management . Configuration Management stores all of the signifier items within the IT milieu in the CMDB . so all of the other processes interact with Configuration Management in to gather information astir(predicate) the IT presidency and update the CMDB when necessaryService Desk . Service Desk serves as the main localize of receive for Users , or spate who use the services provided by IT on a day-by-day basis (can be internal or impertinent to the business . It relies on Incident Management for the ready colonisation of Incidents , Problem Management to descry the root cause of fall out Incidents and to provide a workaround or radical , Change Management to approve Changes to the IT environment that testament solve these Problems , and Release Management to build and deploy the solution to the IT environmentService Level Management . Service Level Management serves as the main pose of contact for Customers , or those who pay for and own the IT services provided by the business (like Users , can be internal or external to the businessIn to create SLAs that the business can stay on , Service Level Management essential(prenominal) work with all of the processes (except Release Management ) to understand the capabilities of IT . It must(prenominal) in addition be make awake(predicate) of the major challenges or issues within IT , so that the Service Level Manager can discuss this with the Customer in the event that a SLA is breached . callable to the high level of interaction between the processes in ITSM , the the great unwashed and crossroads that support these processes must similarly be very synergetic . ITSM promotes cross- useable teamwork and communication in to provide quality IT services (Higday-Kalmanowitz and Simpson , 2005IT EnvironmentAlthough every IT environment that employs ITSM is distinguishable , some common characteristics of a typical IT environment interested in implementing ITSM are shown below (van Bon , 2002Large environments . Although ITSM processes are applicable to any IT environment , they are typically found in cosmic organizations (Fortune yard . The IT cater for these organizations is often tasked with managing a walloping-scale subprogram of IT crops and systems , and supporting and delivering a large subprogram of IT services . The anatomy of servers , intercommunicate equipment , software reapingions , etc .
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
that must be managed and supported can sum into the thousands (or tens of thousands , depending on the size of the company and their emphasis on IT in providing servicesHighly complicated . also be large , most IT organizations that breed ITSM work in highly heterogeneous environments . That is , the environment is made up of a enumerate of different technologies , intersection points and systems . These different technologies , products , and systems must often be able to communicate and work with one another(prenominal) in to be useful , and integration challenges are commonLarge number of Customers and Users . Most large IT environments serve a large number of Customers and Users that rely on the provided IT services to function effectively . These Customers and Users can be either internal or external to the business . Properly managing issues requests , and inquiries for a large number of Customers and Users can be very hard to do , and is a big point of emphasis with many companies todayMultiple IT staff groups . For most medium and large environments , IT staff is often furrowed into a number of change groups that focus on specific aspects of the IT environment . In to effectively implement ITSM , these staff groups must be able to doorway relevant information about the IT environment and issues within the environment and must be powerful managed to ensure their time and readiness sets are utilized in the best way possibleThese IT environments are generally very complex , and are very laborious to manage well without an effective process framework . withal the right processes , the right people , products , and fellows are also required for success in ITSM . at once the right processes are use , and the right people are mightily trained , conclusion the right software product (provided by the right colleague ) to support the people and processes is the adjacent critical step (Higday-Kalmanowitz and Simpson , 2005ITSM computer software ProductWithin ITSM , there are many areas that can benefit from mechanisation or support provided by a software product . Some of the common uses of software within ITSM accept (Turner , 2004 : build and maintaining a CMDB kinetic service modeling and dependency role Seamless service desk integration Policy-based workflow automation capabilities Service catalog /financial modeling and reporting observe changes within the IT infrastructure monitor IT s compliance of SLAsITIL recognizes the fact that software tools are often engaged in the support of ITSM processes . tour ITIL does not specify a specific process for evaluating an ITSM product , it does bring up some evaluation criteria . These criteria , outlined in Service Delivery (2001 ) include confluence 80 of functional and technical requirements Meeting all mandatory requirements Supporting IT Service Management best practices Ensuring product is business-driven , not technology-driven Addressing security and integrity considerations Ensuring training and consulting services are open Adequate report generation capabilitiesDue to the different requirements and functions for each of the ITSM processes , the varying ways in which these processes are enforced in each company , and the unevenness within different IT environments , it is unsurmountable to come up with a strict set of requirements that every ITSM software product must adhere to (Wiegers , 1999 ) There are however , some canonic considerations that will credibly return to many of these products . Some of these considerations are discussed below (Higday-Kalmanowitz and Simpson , 2005Should be highly configurable . A critical aspect of selecting an appropriate ITSM software product is making sure it properly supports the ITSM processes already defined and implemented within the business In to support the realized ITSM processes , the software product should provide a high level of configurability to fit within a particular environment . unwashed areas of configuration include user user interface , data aggregation , event monitoring and notification , and reportingShould provide strong integration capabilities . seldom (if ever ) do ITSM products operate independently . In for an ITSM software product to properly support the ITSM processes and the heterogeneous IT environment the processes manage , it must be able to integrate and interface with a number of different products and technologies . customary communication methods between IT components , such as Simple profit Management communications communications protocol (SNMP , Extensible Markup Language (XML , and foreign Procedure Call (RPC ) help in the integration of products and systems . The use of agent software is also commonly usedShould be well reachable . Due to the highly relational disposition of the ITSM processes and the distributed nature of IT staffing , ITSM software products should be genial by multiple IT staff groups in multiple locations . network technology and the use of customer software is a common way of making products available across the IT organization . some other related aspect of accessibility is security . The product should provide access control capabilities that allow personnel to see information that they need to do their jobs , but nothing elseShould be light-colored to use . ITSM products , firearm often complex to implement and get by , should be lightheaded for IT staff members to use . The IT environment (on the Service Support side in particular ) can be very hectic at times in for IT staff to properly support this environment , these products need to be able to quickly provide staff members the information they need to do their jobs . whence , the product interface should be intuitive and easy to read , certain functionality within the product should be machine-driven whenever possible and relevant information should be readily available (Puka et al 2000ConclusionIn this , a framework of IT Service Management was examined . The considerations discussed above , as well as all others pertaining to selecting an appropriate ITSM software product , all stem from an vestigial requirement that the product be a good fit for the environment (business and IT ) in which it will operate . The software product does not have to work well in a number of different environments , but for one specific environment only . Therefore , a good understanding of the specific business and IT environment is a critical step in choosing the right software productAs businesses commence to understand the value that IT can provide to their organization and as these businesses continue to embrace IT Service Management , software products that support ITSM will become critical to a business ability to provide quality IT and business services . With the education and emergence of a specific evaluation framework for these products , businesses will have a way to better identify products that properly support their ITSM initiativesReferencesHigday-Kalmanowitz , C , Simpson S .E (Editor (2005 . Implementing Service and Support Management Processes . van Haren PublishingMacfarlane , I . and Rudd , C (2001 . IT Service Management . practice itSMF LtdOffice of governance Commerce (2001 . Service Delivery . UK : The stationary OfficeOffice of Government Commerce (2001 . Service Support . UK : The Stationary OfficeO Neill ,(2006 . Overview : IT Service Management . Forrester inquiry http /www .forrester .com /Research / account /Excerpt /0 ,7211 ,40558 ,00 .html Accessed November , 2007Puka D , Penna , M , Prodocimo V (2000 . Service Level Management in ATM Networks . The outside(a) host on Information Technology Coding and reason , pp . 324-9RL Consulting (2006 . ITSM and ITIL : An trick vs . A wisdom ? White http /www .itsm .info /ITIL ruse and Science .pdf Accessed November , 2007Turner , M .J . 2004 . tone at Service Management Software ? Here s An valuation Criteria For You . IT Utility Pipeline . 26 July http /www .itutilitvpipeline .com /news . Accessed November , 2007van Bon , J (Editor (2002 . The guide to IT service management . Addison WesleyWiegers , K .E . 1999 . outgrowth Things First : Prioritizing Requirements Software development 7 (9 . Pp . 48-53 http /www .processimpact .com /articles /prioritizing .html . Accessed November , 2007PAGEPAGE 14 ...If you want to get a safe essay, order it on our website: Ordercustompaper.com

If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment