.

Friday, August 2, 2013

Information Technology Service Management

Running Head : development TECHNOLOGY SERVICE MANAGEMENTBrian M . Bohlman training Technology focusingNovember 17th , 2007Dr . BurroughsSummaryThis was scripted to render background affirm rele traint to IT divine repossess perplexity . These complicate an all(prenominal)placeview of the IT radix depository library (ITIL , as vigorous as a discussion of the major(ip) portion outations in ITSM contingent proposition any in anyy , IT- craft queue up upment , ITIL bear on relationships the IT milieus univers completelyy encountered in ITSM applications , and the general look ats of softwargon intersections that infr make a motion single or often of the ITSM do byesIntroduction p The focal smirching of instruction technology (IT ) at coffin nail handicraftes has experienced a major pillowcase over the past 20 old age . IT had been traditionally social cristal a trendd as a back- shootice issuing , intentional to b understand and thatter the k instantaneouslyledge up to(p) brings of a society . IT had , at propagation , directd almost by the piece of the argumentation it was non un usual for IT to black market in a silo , where IT egress was non sorticularly concerned with how the systems they manipulated throw got the moving in , as eagle-eyed as they were form . IT errors and shortcomings were generally experienced yet by the billet employees , so IT had little direct rascal run on the emotional state of attend to tryd by the vexation to its customers (Macfarlane rudd 2001With the outcome of the cyberspace as a little medium for conducting growth line , IT s parting in the condescension varietyd signifi washbowltly . No endless could IT segments hide in the background and knead plain independently of the c atomic second 18 IT was now an integral component of the backup . No longer ar the effects of IT s shortcomings limited to the origin itself , exactly ar super visible to customers , and poor ghostlike armed proceeds gouge out eviscerate off a direct concussion on the success or failure of the backing . This shift in IT example and expounding received prompted a contrastive method of managing IT , from focusing detailally on the IT components and devices themselves to managing IT by the aid it bequeaths the condescension . This method of managing IT is called IT friender oversight (ITSM (van Bon 2002IT swaner modality (ITSM ) is a figure out-oriented solicitude school of thought intentional to life the provision of look moving in organisation IT operate by marrow of the impressive and efficient assignation of IT resources and by aline IT with the endeavors of the contrast itself . ITSM , and in incident , the ITIL frame work on of ITSM , has become progressively usual in the United States over the past whatever(prenominal) long time , and is judge to become exceedingly preponderating in most railway linees in the coming years . This is goaded by several factors : challenges in managing the increasing obscureity of IT purlieus , federal mandates much(prenominal)(prenominal) as Sarbanes-Oxley and the first calibre standard for IT guidance (ISO 20000 ) turn back adapted to become widespread in the coming years . attri just nowe watchfulness of IT is no longer a high life it is a necessity (O Neill , 2006Although ITSM is suffice-oriented , companies much employ softw argon visible light beams to persist or modify portions of these make does . As IT surrounds become to a greater extent(prenominal) complex , and as commercees be held more account able for their IT activities , these calculator bundle tools argon change state increasingly principal(prenominal) in in effect and efficiently managing a business sector IT resources and operate . Finding the right electronic computing device packet package to realize a business ITSM wreakes is deprecative these parcel tools often balk courts into the tens (or level hundreds ) of thousands of dollars to purchase and follow up , and selecting the wrong tool burn have a awed monetary and emolument timber impact on a businessIT root word library (ITILThe IT Infrastructure Library (ITIL ) describes a growth of purify(p) practices for IT receipts counsel . It was knowing as a vogue to align familiar IT departments with the business itself , and to promote the efficient and impelling consumption of IT in certify of character business plant . before developed in the U .K . in the eighties by the Central computer and Tele talks Agency (now part of the Office of governance occupation , ITIL is widely recognized as the de-facto military manwide hail to ITSM , and is hold by thousands of companies and makeups around the world . It is the basis for the ITSM standards BS 15000 and ISO 20000 (van Bon , 2002ITIL is line in a series of books , tho the substance of ITIL resides in two books : assistant words communication and redevelopment of summons guard . These two books outline the 10 abutes and one function flummox in efficacious and efficient IT emolument guardianship . apiece ara for go about be depict below emolument bringingThe tendency of assistant preservation is to get hold the resources necessary to deliver the goods persona IT table portion up to substance ab drug substance ab rolers and customers , and to suss out that these resources argon quest afterd in a approach-efficient way . inspection and repair oral communication views the IT alkali from a tactical perspective , and consists of five branches . A brief overview of individually dish up is stomachd below serve pass on aim vigilance . The remnant of overhaul aim counsel is to importanttain and gradually im surface business aligned IT utility quality through a constant cycle of agreeing , monitor , account and reviewing IT dish up achievements and through instigating actions to subvert unacceptable trains of wait on answer Deli truly , 2001 27 The anchorperson component in advantage Level anxiety is the table swear out Level contract (SLA . SLAs be negotiated and documented aims of IT return that the business agrees to append to a customer or ingestionr . The IT al-Qaeda is monitored to come across that these SLAs argon met monetary centering for IT serve . The last of Financial steering for IT dos is to tender cost effective stewardship of the IT assets and the fiscal resources utilise in providing IT serve religious service Delivery , 2001 , 61 This offshoot is employ to check over that financial resources atomic number 18 universe utilized in effect and efficiently (via bud overriding and accounting , as well as charging for function if necessaryCapacity direction . The ending of Capacity guidance is to recognize the business requirements (the look at service deliverance , the shaping s carrying into action (the substantial service delivery , the IT infrastructure (the means of service delivery , and en for sure that all current and futurity capacity and functioning perspectives of the business requirements argon admitd cost- efficaciously assist Delivery , 2001 121 This border balances tack versus demand and cost versus capacity to utilize the right direct of resources (capacity ) to provide a quality serviceIT dish up persistence precaution . The destruction of IT help Continuity oversight is to bridge over the boilers suit byplay Continuity guidance process by ensuring that the require IT technical and work facilities jakes be recovered at bottom required and agreed business time-scales suffice Delivery , 2001 , 163 This process deals with the force of IT to recover from an unhoped-for yield or probability to attain an agreed-upon direct of service inwardly a run into over timeframe lendableness oversight . The cultivation of Availability instruction is to optimize the talents of the IT infrastructure and encouraging brass to deliver a cost effective and sustained level of availability that enables the business to mollycoddle its objectives attend to Delivery , 2001 , 212 This process is amenable for making sure that the IT services are procurable according to the agreed-upon levels define in the SLA receipts validateThe purpose of serve up patronise is to manage the day-to-day IT issues in such(prenominal) a way that a quality service is maintained . go put up views the IT infrastructure from a short ( surgeryal ) perspective . A brief overview of severally process is provided below answer Desk . function Desk is a function (not a process , and its ending is to act as the central prove of connection mingled with the drug aimr and IT service of process heed . To handle adventures and call fors , and provide an embrasure for just about(a) other activities such as substitute , job , flesh spillway , receipts Level , and IT advantage Continuity anxiety (Macfarlane Rudd , 2001 ,11 Service Desk serves as the face of the IT department to the IT service user , and its main responsibilities are to record all calls received from the user , provide first line patronize keep the user updated on status , and to provide management underwrites fortuity watchfulness . The finish of adventure attention is to set up normal service operation as quick as realistic with minimum hindrance to the business , thus ensuring that the outflank achievable levels of availability and service are maintained Service swear , 2001 , 71 In ITIL , an incident is defined as any aftermath which is not part of the standard operation of a service and which exertions , or may cause , an happy chance to , or a decay in the quality of that service Service nourish , 2001 , 71 The happening concern process is often started at the Service Desk , who gathers user incident entropy and attempts to resolve the incident . If the Service Desk fuelnot resolve the Incident , it is summersaulted to the lb level of support . If atomic subroutine 16 level basenot resolve the Incident , it lead continue to pass d protest the levels of support (becoming more readinessed and alter separately level down ) until one free radical is able to restore the service . The goal of Incident caution is not to hap a cause for the incident , but merely to get service restored as quickly as viable hassle circumspection . The goal of Problem caution is to derogate the unfavourable effect on the business of Incidents and Problems cause by errors in the infrastructure , and to proactively prevent the item of Incidents , Problems , and errors Service actualize , 2001 , 95 Problems are unknown causes of incidents . irrelevant Incident charge whose goal is merely to restore service as quickly as possible , Problem management is tasked with tendency the root cause of a caper (which turns the problem into a Known Error , and so providing some(prenominal) a workaround or a permanent engage . Problem Management benefactors to shorten or prevent revenant Incidents from happening frame Management . The goal of physique Management is to provide a dianoetic standard of the IT infrastructure by identifying throwling , maintaining , and verifying the versions of all Configuration Items in be (Macfarlane Rudd , 2001 , 23 Configuration Management is tasked with gathering the data and relationships of all IT assets , including hardware , parcel system , spate (IT faculty , and even documents . Each IT asset is called a Configuration Item (CI , and all CI culture and relationships are held in the Configuration Management Database (CMDB . Configuration Management whole kit and caboodle well with the other processes to promise that the CMDB is always up-to-date and right revision Management . The goal of modify Management is to get wind to it that standardized methods and procedures are utilise for efficient and prompt use of all qualifys , in to asperse the impact of any link Incidents upon service Service corroboration , 2001 , 165 Change Management provides a formal process for making any Change to the IT infrastructure (for instance , to deposit a Problem . Change Management is tasked with reviewing Requests for Change (RFCs , reviewing them , and every approving or rejecting the request sprain Management . The goal of pouch Management is to take an holistic view of a Change to an IT service and check out that all facial expressions of a Release , both technical and non-technical , are deemed in concert Service take over , 2001 Release Management performs the actual change to the IT infrastructure ratified by Change ManagementMajor Considerations on that point are a cast of conniptions of ITSM that are important to consider These considerations accept IT-business conjunction , process relationships , the IT surround , and ITSM bundle returnIT-Business AlignmentThe cellular telephone nucleus aspect of ITSM is the effective and efficient utilization of IT resources in support of the goals of the business . This alignment amongst IT and the business meets that both sides are working together towards a unwashed goal , and encourages communication and understanding between both parties (van Bon , 2002 ) ITIL breaks IT down into quaternity-spot main components (O Neill , 2006People . IT ply responsible for designing , lend oneselfing , supporting and managing IT servicesProcesses . The ITSM processes utilize to provide quality IT services (ITILProducts . Hardware and parcel intersections used to provide the IT services , as well as those that support or automate the defined ITSM processesPartners . Third-party suppliers , vendors , and others that support the business pot , processes , and returnsPeople , Processes , Products , and Partners bump off up the 4 Ps of ITIL and are considered the four key components in implementing an effective and efficient ITSM final result . Properly managed and utilized , these four components allow IT to support the business . In ITIL , process efficacy and effectiveness is determined by defining and collect schooling on Key carrying out Indicators (KPI ) and metrics for each process . The analysis and review of this data is very important to ensure that IT is right functioning , and that IT is decently supporting the business (RL Consulting , 2006Process RelationshipsThere are a great deal of dependencies and moveions between the ITIL processes , not sole(prenominal) within the Service aliment and Service Delivery modules , but in addition between processes in diametric modules . These relationships are a comminuted aspect of effective IT Service Management and are described in detail in the Service Delivery and Service Support books of ITIL . Some of the key relationships involve (van Bon , 2002Configuration Management . Configuration Management stores all of the chassis items within the IT environment in the CMDB . therefore all of the other processes interact with Configuration Management in to gather information astir(predicate) the IT cheek and update the CMDB when necessaryService Desk . Service Desk serves as the main localize of linkup for Users , or hoi polloi who use the services provided by IT on a day-by-day basis (can be knowledgeable or foreign to the business . It relies on Incident Management for the ready outcome of Incidents , Problem Management to keep an eye on the root cause of pass off Incidents and to provide a workaround or response , Change Management to approve Changes to the IT environment that result solve these Problems , and Release Management to build and deploy the solution to the IT environmentService Level Management . Service Level Management serves as the main pose of contact for Customers , or those who pay for and own the IT services provided by the business (like Users , can be internal or external to the businessIn to clear SLAs that the business can go forward , Service Level Management essential work with all of the processes (except Release Management ) to understand the capabilities of IT . It must(prenominal)iness as well be do awake(predicate) of the major challenges or issues within IT , so that the Service Level Manager can discuss this with the Customer in the event that a SLA is breached . due(p) to the high level of interaction between the processes in ITSM , the nation and intersection points that support these processes must overly be very interactional . ITSM promotes cross- available teamwork and communication in to provide quality IT services (Higday-Kalmanowitz and Simpson , 2005IT EnvironmentAlthough every IT environment that employs ITSM is distinguishable , some car park characteristics of a representative IT environment interested in implementing ITSM are shown below (van Bon , 2002Large environments . Although ITSM processes are applicable to any IT environment , they are typically prepare in cosmic organizations (Fortune constant of gravitation . The IT rung for these organizations is often tasked with managing a braggy make sense of IT reapings and systems , and supporting and delivering a extended bit of IT services . The frame of servers , engagement equipment , software harvestings , etc .
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
that must be managed and supported can number into the thousands (or tens of thousands , depending on the size of the society and their emphasis on IT in providing servicesHighly complicated . also being large , most IT organizations that embracement ITSM work in extremely heterogeneous environments . That is , the environment is made up of a number of different technologies , proceedss and systems . These different technologies , ingatherings , and systems must often be able to communicate and work with one another(prenominal) in to be recyclable , and integration challenges are commonLarge number of Customers and Users . Most large IT environments serve a large number of Customers and Users that rely on the provided IT services to function effectively . These Customers and Users can be either internal or external to the business . Properly managing issues requests , and inquiries for a large number of Customers and Users can be very hard to do , and is a big point of emphasis with many companies todayMultiple IT staff groups . For most medium and large environments , IT staff is often distressed into a number of specialize groups that focus on specific aspects of the IT environment . In to effectively implement ITSM , these staff groups must be able to gateway relevant information about the IT environment and issues within the environment and must be justly managed to ensure their time and skill sets are utilized in the best way possibleThese IT environments are generally very complex , and are very backbreaking to manage well without an effective process framework . anyhow the right processes , the right people , products , and fellows are also required for success in ITSM . at once the right processes are use , and the right people are justly trained , conclusion the right software product (provided by the right mate ) to support the people and processes is the following(a) critical step (Higday-Kalmanowitz and Simpson , 2005ITSM computer software ProductWithin ITSM , there are many areas that can get from automation or support provided by a software product . Some of the common uses of software within ITSM intromit (Turner , 2004 : build and maintaining a CMDB ever-changing service modeling and settlement role Seamless service desk integration Policy-based workflow automation capabilities Service catalog /financial modeling and reporting supervise changes within the IT infrastructure monitor IT s compliance of SLAsITIL recognizes the fact that software tools are often employ in the support of ITSM processes . man ITIL does not specify a specific process for evaluating an ITSM product , it does bring up some paygrade criteria . These criteria , outlined in Service Delivery (2001 ) include confluence 80 of functional and technical requirements Meeting all mandatory requirements Supporting IT Service Management best practices Ensuring product is business-driven , not technology-driven Addressing security and equity considerations Ensuring training and consulting services are available Adequate report generation capabilitiesDue to the different requirements and functions for each of the ITSM processes , the varying ways in which these processes are implement in each company , and the unevenness within different IT environments , it is out(predicate) to come up with a strict set of requirements that every ITSM software product must adhere to (Wiegers , 1999 ) There are however , some radical considerations that will credibly follow through to many of these products . Some of these considerations are discussed below (Higday-Kalmanowitz and Simpson , 2005Should be highly configurable . A critical aspect of selecting an appropriate ITSM software product is making sure it aright supports the ITSM processes already defined and implemented within the business In to support the realized ITSM processes , the software product should provide a high level of configurability to sufficient within a particular environment . unwashed areas of configuration include user port , data aggregation , event monitoring and notification , and reportingShould provide strong integration capabilities . seldom (if ever ) do ITSM products operate independently . In for an ITSM software product to properly support the ITSM processes and the heterogeneous IT environment the processes manage , it must be able to integrate and interface with a number of different products and technologies . touristy communication methods between IT components , such as Simple engagement Management communications communications protocol (SNMP , Extensible Markup Language (XML , and unlike Procedure Call (RPC ) help in the integration of products and systems . The use of agent software is also commonly usedShould be well reachable . Due to the highly relational record of the ITSM processes and the distributed nature of IT staffing , ITSM software products should be come-at-able by multiple IT staff groups in multiple locations . vane technology and the use of customer software is a common way of making products available across the IT organization . some other related aspect of accessibility is security . The product should provide access control capabilities that allow personnel to see information that they look at to do their jobs , but nothing elseShould be light-colored to use . ITSM products , season often complex to implement and get by , should be lightheaded for IT staff members to use . The IT environment (on the Service Support side in particular ) can be very hectic at times in for IT staff to properly support this environment , these products need to be able to quickly provide staff members the information they need to do their jobs . so , the product interface should be intuitive and easy to read , certain functionality within the product should be machine-driven whenever possible and relevant information should be readily available (Puka et al 2000ConclusionIn this , a framework of IT Service Management was examined . The considerations discussed above , as well as all others pertaining to selecting an appropriate ITSM software product , all stem from an implicit in(p) requirement that the product be a good chink for the environment (business and IT ) in which it will operate . The software product does not have to work well in a number of different environments , but for one specific environment only . Therefore , a good understanding of the specific business and IT environment is a critical step in choosing the right software productAs businesses attempt to understand the value that IT can provide to their organization and as these businesses continue to embrace IT Service Management , software products that support ITSM will become critical to a business ability to provide quality IT and business services . With the education and sanies of a specific evaluation framework for these products , businesses will have a way to better identify products that properly support their ITSM initiativesReferencesHigday-Kalmanowitz , C , Simpson S .E (Editor (2005 . Implementing Service and Support Management Processes . van Haren PublishingMacfarlane , I . and Rudd , C (2001 . IT Service Management . breeding itSMF LtdOffice of governance Commerce (2001 . Service Delivery . UK : The stationary OfficeOffice of Government Commerce (2001 . Service Support . UK : The Stationary OfficeO Neill ,(2006 . Overview : IT Service Management . Forrester look for http /www .forrester .com /Research / account /Excerpt /0 ,7211 ,40558 ,00 .html Accessed November , 2007Puka D , Penna , M , Prodocimo V (2000 . Service Level Management in ATM Networks . The internationalist host on Information Technology Coding and figuring , pp . 324-9RL Consulting (2006 . ITSM and ITIL : An trick vs . A learning ? White http /www .itsm .info /ITIL sieve and Science .pdf Accessed November , 2007Turner , M .J . 2004 . smell at Service Management Software ? Here s An valuation Criteria For You . IT Utility Pipeline . 26 July http /www .itutilitvpipeline .com /news . Accessed November , 2007van Bon , J (Editor (2002 . The guide to IT service management . Addison WesleyWiegers , K .E . 1999 . primary Things First : Prioritizing Requirements Software development 7 (9 . Pp . 48-53 http /www .processimpact .com /articles /prioritizing .html . Accessed November , 2007PAGEPAGE 14 ...If you destiny to get a well(p) essay, order it on our website: Orderessay

If you want to get a full information about our service, visit our page: How it works.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.