1 Activity-based Management of IT Service Delivery John Bailey, Eser Kandogan, Eben Haber, Paul P. Maglio, IBM Almaden Research Center 650 Harry Rd. San Jose, CA ABSTRACT Growth, adaptability, innovation, and cost control are leading concerns of businesses, especially with respect to use of information technology (IT). Though standards such as the Information Technology Infrastructure Library (ITIL) offer the potential for cost savings through the use of formal processes and best practices, such top-down approaches tend to be either highlevel often far removed from the actual work or low-level often inflexible given the rapid pace of technology and market change. We conducted field studies to examine work practices in IT service delivery. Our results suggest that unstructured work activities comprise a significant and vital portion of the overall work done by people in IT service delivery. These activities include negotiating work items and schedules, seeking and providing information and expertise, and using and sharing custom tools and practices. Unstructured activities are conducted in parallel to formal, structured IT service processes, but are not well supported by existing integrated tooling. Thus, they are not easily accounted for and rarely result in reusable assets or feedback to improve the formal IT processes. Based on these findings, we propose an administrator workspace aimed specifically at blending structured and unstructured work activities to support effective, reusable, and quantifiable IT service delivery. Categories and Subject Descriptors H.5.2 [User Interfaces]; K.6.4 [Systems Management ] General Terms Management, Human Factors, Services. Keywords Activity Management, IT Service Delivery, Workspaces. 1. INTRODUCTION Today, IT services are delivered through a mix of structured and unstructured work activities. Structured activities rely primarily Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CHIMIT 07, March 30 31, 2007, Cambridge, MA, U.S.A. Copyright 2007 ACM /07/0003 $5.00. on standardized processes, procedures, and tools. In IT service support and delivery, an increasingly popular standardization effort is embodied by Information Technology Infrastructure Libraries (ITIL) [2, 3], which prescribe processes for capacity management, availability management, service-level management, and financial management to achieve high quality IT services. Unstructured activities involve local work practices, customdeveloped tools, ad hoc collaborations with colleagues, and informal procedures. These activities include seeking information from colleagues or external sources, writing custom scripts, troubleshooting, renegotiating policies, seeking approvals, discovering change impacts, and sharing information on demand. Results from our studies of IT service delivery suggest that considerable time is spent on unstructured work activities [4, 6], which is not surprising as knowledge work is typically collaborative, informal, and situated . As concerns over compliance, quality, and cost grow, IT companies often seek to standardize processes. Improving quality and efficiency of structured activities through standardization and automation has received much attention recently, simply because availability of workflow-tracking information has provided an opportunity to improve services. Yet, the complexity of information technology and the speed of change often outpace our ability to standardize optimal processes, making IT service delivery a highly customized activity. Simply put, top-down designed processes, implemented in workflow systems, cannot standardize all work activities . As unstructured work activities are often not well understood, they are not accounted for in service delivery cost structures. Yet, without an accounting of unstructured activities, true cost of delivering service cannot be known. Focusing only on standardization without considering support for and integration with unstructured activities misses the opportunity for vast improvements in efficiency and quality of IT service delivery. Current approaches in IT service delivery have many limitations, including: Top-down process design limits discovery and dissemination of local best practices. Rigid processes fail to provide sufficient flexibility to describe ad hoc steps and actions that are necessary in a complex, custom environment. It is difficult for practitioners to capture ad hoc or custom extensions to workflows. Reuse is limited, as only well-known, high-level processes are encoded, leaving out low-level practices, where real expertise is applied.
2 Capturing practices requires planning and deliberate efforts by the administrator and often occurs after the fact. Collaboration occurs outside current management environments; thus, ad hoc discussions are not preserved along with associated artifacts. Finding expertise on a particular problem is difficult, as tools do not capture and facilitate finding previous interactions with systems. Most system management tools are not integrated; thus, it is not possible to mix and match and organize low-level tasks by current activity. Integrated environments fail to preserve the business application context tools run in; thus each user initializes each tool over and over with context-related configuration information. There is no easy and accurate way to account for time and effort spent on unstructured activities. In what follows, we first present two case studies drawn from our field studies of large IT service delivery organizations. Next, we introduce and describe in detail a concept design for Activitybased Management of IT Services (AMITS), which is an integrated workspace for IT service delivery personnel designed to address the above mentioned limitations. We conclude with a short discussion of the value prospects for the current and future AMITS designs. 2. CASE STUDIES 2.1 Introduction Over the past several years, we have conducted field studies of system administrators in large IT service organizations in the US (see also ). Our method has been ethnographic, observing the minute-by-minute work of system administrators and interviewing system administrators in their normal work settings. Our analyses of these ethnographic data reveal how system administrators really work, including how they spend their time, who they interact with, and what tools and artifacts they use. Here, we provide two use cases that illustrate how personnel in IT service delivery organizations work with each other, using both specialized and common tools to complete structured and unstructured activities. 2.2 IT Outsourcing Case Study We conducted a study of a team responsible for transition from initial IT service outsourcing engagement to a steady-state, operational system. We made two visits during the spring of 2005 to an enterprise IT outsourcing team located in a United States Midwest city. The first of these visits was as part of a larger investigation team that was conducting interviews of IT outsourcing personnel. The second visit was specifically for conducting observational research. In this second visit, we combined video-taped observations with interviews over a threeday period, resulting in over eight hours of video footage and several pages of typed notes Overview The enterprise IT service outsourcing business we studied comprised teams responsible for different phases of the lifecycle of an outsourcing agreement. The phases include sales, engagement, transition, and production. The sales phase involves selling IT service to a client. The engagement phase involves working with the client to define details of a contract for services, including technical solutions, terms, conditions, and costs. The transition phase involves provisioning an IT solution, as defined in a solution architecture document. The production phase involves bringing the solution online to steady-state operation. Our study focused on personnel working in the transition and production phases. We observed and interviewed employees of the outsourcing provider in several different roles: transition manager, operations transition lead, operations analyst, operations team lead, and operations support analyst. The transition manager was the bridge between the engagement phase and the production phase. During the transition phase, she worked with the solution provisioning personnel to make sure the servers were built and configured to specification, and she engaged early with the operations team to ensure a smooth transition to production. The operations transition lead, operations analyst, operations team lead, and operations support analyst were all part of the production phase. Their primary responsibilities were ensuring that new servers go live successfully and continue to function properly once in production. As we will show, each interacted with one or more of their colleagues in context of a combination of structured and unstructured work activities Transition Manager Xiang was a transition manager. We observed her on what she described as a typical day, as she was managing a large project that was partitioned into ten discrete phases. In the phase we observed, the teams were setting up or provisioning more than forty servers. Xiang used a large multi-tab spreadsheet to track all information about each server that was going to be provisioned. She created new versions of the spreadsheet manually and saved them in a central database. She received many updates throughout the day, and would save them until there were enough to justify a batch update, which resulted in a new version of the spreadsheet. The spreadsheet was large and complex, making it difficult for unfamiliar users to find information in it. Thus, Xiang responded to many phone calls, instant messages, and messages inquiring about information contained in the spreadsheet. Using instant messages, phone, and , Xiang stayed in frequent contact with the lead architect and other team leads working on the solution specification, to request and receive updates for the spreadsheet, and to ultimately determine when it was complete. When Xiang had determined that the spreadsheet was complete, she opened a change ticket and assigned it to herself with a 35-day target. She cut and pasted the server configuration information from the spreadsheet into the change ticket. She then scheduled a kick-off meeting for those who would actually be provisioning the servers during transition and supporting the servers when they went into production. People who attended this meeting were from provisioning teams, operations, network support, and other functional areas. During the meeting, Xiang presented all information about the servers to these teams and answered questions. After the provisioning work began, i.e. building out the servers, Xiang tracked progress on individual work items that were assigned to the different teams. There were teams to install the OS, create partitions, install middleware, and to handle networking. Because many of these are interdependent, such as configuration settings and order of tasks, Xiang helped to
3 coordinate the work among the provisioning team members using the phone, , and instant messages. Once the servers were built and the applications were loaded, Xiang worked with the operations transition lead to prepare operations for production. This included having a test period to make sure all the servers were working and that the operations team had access Operations Transition Lead Arnold was an operations transition lead, responsible for preparing the operations team for the production go-live day for every new account. He worked closely with Xiang, beginning after the kick-off meeting, and accelerating the pace after the application management team finished installing applications. He also worked with the operations analysts on his team and with the operations support analyst. If there were special requirements for an account for hardware or software not already available in the operations center, then Arnold had to get that request in early to the operations support analyst. Arnold was responsible for initial entry of account information, including names and contact information, server names, IP addresses, and physical location, monitoring policies, and service level agreement targets. The information needed to be entered into the correct databases, and the relevant operations team needed to be notified when it was available. The operations analysts were given their login and password information for the queues that they will support Operations Analyst Rafey was an operations analyst. We observed him as he monitored production servers using two different tools, one for proactive monitoring of trends and another for alerts. He also read and monitored his assigned problem ticket queues. Sometimes, problem tickets were opened by help desk analysts on the wrong problem ticket queue, and Rafey would have to transfer the ticket to the correct problem queue. If the queues were in the same version of the problem management system, it could be done electronically; otherwise, Rafey had to do it manually by cutting and pasting information into an message, and sending to an analyst for the correct queue. The operations team had a standard goal of 90% problem resolution. The first thing that Rafey did with a problem ticket was to verify that the problem was still there. If it was, and if Rafey could not resolve the problem, then he escalated it to the appropriate level-two support person, such as an OS systems administrator, a database administrator, a network administrator. If a service level agreement target was missed for a high severity problem, then at the end of his shift, Rafey manually copied information from the problem management tool to a special executive reporting tool to be included in a daily report. The project executives wanted to know about all missed targets as any one might become a critical customer situation Operations Team Lead Theresa was an operations team lead, the first point of contact for her operations team. She was responsible for maintaining customer account documentation, such as contact information, updates to server information, and monitoring and response policies. She also maintained team operations data, such as shared monitoring IDs and schedules. She was developing a training program for on-boarding new operations analysts Operations Support Analyst Gilad was an operations support analyst. He provided technical support for operations, including procurement of hardware, software, network, and telecom services, and installation of software and hardware. If there were special software requirements for account monitoring, then Gilad would procure and install it in operations. He coordinated his activities with the transition manager and operations transition lead. 2.3 Storage Management Case Study In 2005, we made two visits to study storage administrators at a large government facility that maintained several petabytes of data, with storage growing by several terabytes per day. The sheer volume of data means that most files are stored on tape most of the time, and are moved onto disk only when needed. For frequently accessed data, this process is automated (for the most part) by several Hierarchical Storage Managers (HSMs), which include huge robotic tape silos and large disk arrays, with automated controls to move data between the two as needed. In the best case, it appears to the user that data is always available on (a sometimes slow) disk, though tape robot jams and other system failures occurred almost daily, requiring systems administrator intervention. We primarily interviewed and observed storage system administrators that managed HSMs. permitted to videotape their work. We were not Storage Systems Administrators We observed Mandy and Arthur, two storage system administrators. They worked very closely together as part of a four-person team managing one of the HSMs, and were often in the same office discussing and diagnosing problems. Mandy s work day involved handling requests that came in via the online trouble ticket system (e.g., I can t access file ZZZ ), ensuring that new machines have access to the appropriate data, moving data between HSMs when necessary, and cleaning up files when staff members leave the organization (either moving the data to long term storage, or making it available to a successor staff member). Mandy also collected and analyzed performance data to make sure her HSM was working as expected. Configuring new machines, data movement, and clean-up were fairly structured tasks. Trouble tickets were idiosyncratic, however, requiring considerable investigation and judgment to determine the cause and appropriate solution. Problems might be caused by users pulling in too much data (overflowing the disk cache), software configuration errors, hardware failures, or even dirty or peeling labels on magnetic tapes (found by a trip inside the robotic tape silo). In the case of failures caused by vendorsupplied hardware and software, Mandy was responsible for contacting and working with vendor Service Engineers (SEs), including filling out the necessary paperwork to give the SE access to the appropriate buildings and rooms. Problems might require minutes, hours, or even days to resolve. We observed one particularly intense troubleshooting session in which Mandy and Arthur tried to determine why an entire tape silo was crashing. This involved collecting log and configuration data from the silo and other interacting systems, writing test programs to simulate various read/write loads, speaking with the silo vendor s customer support, paging and getting building access for the SE, and experimenting with different configuration values. The problem
4 Figure 1. AMITS integrates process, people, time, and systems management in Activity Explorer, Activity Association, and Workspace views, respectively. had many causes, including a defective robot hand, an incorrect configuration parameter, and an end-user application error. Arthur s responsibilities were similar to Mandy s, but he had somewhat more experience and spent more time building tools for monitoring and performance analysis. To make their work more proactive, Arthur created an entire infrastructure of automatically running tools that continually checked for failures or performance problems, ing or paging him when something went wrong. Some failures could be handled automatically by his tools, others required human intervention. Arthur had a test system on which he could introduce failures to see how his tools reacted. Arthur s tools worked well, though there were no procedures in place to share them with other groups so they could be used more widely. 2.4 Analysis The first case is quite broad, involving a large number of people working in different capacities. The second case is rather narrow, involving two people working in a small, specialized team. However, they are alike in that both describe settings in which people create and share information, and coordinate joint work. In both cases, structured work depends on standardized tools and processes, such as those for creating and managing change tickets. And in both cases, people coordinate joint action through communication that goes around these standard processes, such as through instant messages and to check on server settings. Sometimes, people rely on tool-supported processes to structure and create auditable records of their work, and sometimes, they use the phone, , and instant messaging to collaborate. But often, information created during collaboration or even the record of the event itself is lost. For example, one of the steps that Xiang took during transition was to create a change ticket and assign it to herself. The change ticket contained descriptions of all the servers being provisioned, but because this description was created outside of a formal audit trail for a block of work, it was of limited use. Xiang was responsible for negotiating completion dates from each team, tracking progress, assisting in coordination, and finding and resolving problems that were impeding overall progress. She did this by proactively using phone, , and instant messages. If a problem occurred, Xiang might not have found out about it for
5 several hours or days. She had very little visibility into what was happening and what had happened. Other provisioning teams also had very little visibility onto what each team had done, any problems encountered, and what their next step would be. 3. DESIGN The AMITS approach to integrating structured and unstructured work activities is based on the Unified Activity Management (UAM) project . Because most work, whether individual or collaborative, cuts across many independent tools, UAM proposes an explicit representation of work to support users to setup, perform, coordinate, and plan work activities effectively. In UAM, activities are abstract computational constructs with properties and operations. AMITS relies on key ideas from UAM, applying and extending them for the IT service delivery domain. Central to our approach is a workspace that features activities as first class objects, seamlessly integrating processes, people, schedules, and resources (Figure 1). In the context of IT service delivery, processes refer to the structured activities supported in formal workflow systems, such as problem management and change management. In AMITS, they are represented in default activity instance structures, as generated from process templates. People are defined by roles and individuals that participate in the structured and unstructured aspects of an activity, with effective collaboration seeking information from a colleague or customer, finding expertise, establishing common ground via shared context, and coordinating tasks being a primary focus. Schedules, represented in AMITS via calendar views and activity status, are particularly critical in IT service delivery because the effective use of time and resources determine whether contractual obligations and cost targets are achieved. Resources, generically describing anything used by or for an activity, are presented in AMITS as tools and resources, with resources more narrowly defined as documents, links, or any other type of information artifact. 3.1 Activity Representation and Instantiation New activity instances can be created from structured templates, or they can be created as ad hoc activities. For example, on receiving a call from a customer about a problem, a service desk operator can create an instance of a standard ITIL User Contact Management process. The formal ITIL process steps, along with all the associated resources, roles, and tools are imported into the workspace. In another example, a capacity planner might research the impact of new disk systems by jotting down a few tasks and then expanding the list with more detailed steps over time. Activities can be instantiated manually or automatically in response to system events and scheduled work. For example, a troubleshooting activity can be automatically instantiated on a server-down event and a backup activity can be instantiated regularly each week. When a new activity is created, the user s workspace shows the activity in the Activity Explorer view (Figure 1). Though there are many possible representations of an activity, including graphical and tabular representations, the preferred representation is a simple hierarchical listing of activities (Figure 2). In this representation, activities are rendered as a tree, with each node of the tree containing the name of the activity. Users can browse the activities by expanding and collapsing nodes. Each node in the tree, except leaf nodes, is expandable and collapsible to show and hide subactivities of the selected node. When a node is selected, it can be set as the current activity. In this case, a triangular shape mark is put next to the expand/collapse box. As a result, the Activity Association views and tools panel are updated to show the people, resources, tools, and calendar items of the current activity. The content of the views are updated as users select different activities in the hierarchy, thereby creating a work context. In the default case, only items that are directly associated with the current activity (e.g. people, resources) are shown. Alternatively, users can choose to show recursively all associated items of the selected current activity and its subactivities. In the People view, selectable by clicking on the People tab in the Activity Association views, users can see people associated with the activity, along with their roles. In the default view, associated people are shown in a hierarchical organization of roles. Alternative renderings are possible, such as iconic representation of people with detail attribute notations, such as instant message status, participant project responsibility, expertise, and online availability. Various actions can also be connected to entries in the People view, such as open instant messaging with selected participant, view participant activity information, and assign tasks to participants. Figure 3. Associated people of an activity are shown hierarchically by their role. Figure 2. Upon receiving a customer call a new activity is instantiated from the ITIL User Contact Management. The Resources view likewise shows all the resources associated with the current activity. The default representation of the resources is a table with various columns of resource properties, such as resource name, creation-modification time, length, and size. Alternative representations, such as a hierarchical view by resource type and activity type can also be useful. Various actions can be connected to resource entries, such as view/edit resource, (un)lock resource, and view edit history.
6 Note that current activities are automatically saved to the repository both when users work on the activity and when it is completed, facilitating synchronization with activity participants. Saved activities can also be searched for and reused in new activities by anybody who shares the repository. Figure 4. Resources associated with an activity. The Calendar view serves two purposes: to view past actions associated with an activity, and to view and schedule future scheduled events, to-dos, and deadlines. The basic representation is a tabular representation of actions along with start date and time and duration of the actions. Alternative representations, such as daily, weekly, and monthly calendar-like representations and time-line representations could facilitate easier scheduling and planning. Scheduling can be as simple as reminders and as complex as monitors that can trigger activity instantiations. For example, a change management activity that is not complete by the due date can be automatically escalated, notifying both the activity owner and the change manager. In another example, a recurring calendar to check a system health could automatically instantiate an instance of an activity. These kinds of functions would have been very helpful to Xiang, the transition manager in the earlier case study, in tracking progress of provisioning activities and allowing her to manage on an exception basis. Moreover, the operations transitions lead could be a participant in these activities, monitoring progress and getting an early start in preparing for the go live date. In the Tools view, tools associated with the current activity are shown. Various representations of tools are possible, including iconic and tabular listings, and perhaps tool usage attributes such as frequency by task and last use. Tools launched from the Tools view are displayed in the tools workspace. Each activity can be set with various status indicators that describe the urgency, priority, severity, and completeness. Though some of these status indicators can be set manually, it is also possible to automatically update activity status. One way to do this is to automatically escalate an activity based on a scheduled event. For example, a scheduled backup activity can increase the priority of a system configuration activity that is required to precede the backup work. Once users have finished their participation in an activity, they can mark it complete. Consequently, the status of the activity is recorded and synchronized to all other participants of the activity. Figure 5. Users can create a new subactivity at any point by inserting a new node into the tree with activity title. 3.2 Activity Capture and Extension Once an activity is instantiated or created, users often see the need to extend the activity by adding new subactivities to detail specific tasks, add or modify associated people based on the current project team, update documents and schedules, and add their own favorite tools. This can be done manually by selecting specific subactivities, people, resources, or tools, automatically through various algorithms to match tasks, skills, prior experience, or tools, or organically through interaction with the tools, people, and resources within the context of the activity. Manual extension of an activity is potentially useful when an activity is initially instantiated from a template activity in the repository. In this initial planning phase users can put in schedules for known activities, team members, links to artifacts, and required tools. Often users provide known team members by filling in specific roles in the template activity. Also at this stage, people may find it necessary to extend the activity for the current task by adding further tasks to do, customizing existing activities, and providing a schedule for various activities. Each activity can be associated with people, tools, resources, and schedules. After the initial phase, it is expected that most of the extensions will take place as the activity organically grows through interaction within the context of the current activity, as users use tools, chat with people, create artifacts, or otherwise engage in work. All these tools, people, and resources will be associated with the current activity. Once an activity has a sufficient amount of content, automatic extensions to activities are possible through various matching algorithms that can be executed on demand by the user to find and import activities with similar tasks, people who might provide expertise, and tools that were used effectively in similar activities. The above AMITS capabilities could considerably enhance the effectiveness of Mandy, the storage systems administrator introduced in the second case study. For example, as part of Mandy s troubleshooting activities, some types of problems required contacting vendor service engineers. Based on matching algorithms of prior problems, these instances could be quickly isolated and related vendor documents containing contact information, support codes, and availability could be imported into the current activity. Adding a new subactivity to an activity is accomplished by selecting an existing activity and inserting it (Figure 5). Users would then provide a name for the subactivity, and potentially associate people, resources, and tools. Likewise, subactivities can be deleted and modified at any point in the activity tree. To add a person manually, one can either search for a known person or browse the specialist repository within an organization (by name, project, role and/or expertise) and associate to an activity or subactivity (Figure 6). There are also various ways to automatically add a person to an activity. When an activity is instantiated from the template activity repository, people and roles associated with the activity are automatically associated with the new activity as well. Potentially, a role that is associated with a
7 subactivity that is imported could also be matched during instantiation. For example, when a service desk operator, instantiates a new activity from the User Contact Activity template, automatically a Service Desk Manager is associated with the activity and matched to the user s manager. Collaboration and communication actions in the context of an activity can also automatically associate the parties involved to the current activity. For example, when a specialist consults an expert during the course of an activity, the expert is automatically associated with the activity. In other cases, the expert might not be known at the time but searched through the skills and activity matching utility. In this case, the expert is found based on experience with similar activities by crawling the activity repository and performing a similarity matching. In a similar fashion, resources are created, either organically through the use of the tools, automatically from the repository (from templates or by activity type), or manually created from resource template repository. Once created, they are added to the Resources view with the appropriate time stamp. New resources can be added from the resource repository through either search or browser interface. The resource template repository can also be browsed by resource name, type, and by resources organized by activity type. The search interface allows users to find resources conveniently from the resource template repository. Likewise, tools can be associated with an activity either manually by launching the tool in the workspace from the tool repository, or automatically from activity templates or by activity type (Figure 7). Figure 6. During interaction resources and tools used are captured and associated with the current activity. As users interact in the workspace, instantiating a new activity from templates, providing detailed steps to perform a system management task, adding (assigning) people to activities, looking up resources, and interacting with system management tools, each action is captured and saved along with the activity in the Calendar view (Figure 8). As a result an activity spawned from a Figure 7. New people can also be manually associated to an activity. template-structured process and extended by user actions taken in context of the structured process are captured and available for reuse when searched in the activity repository, which contains all activities performed in an IT service delivery center. Figure 8. All actions are recorded in the Calendar view to provide an accurate picture of activity history. New activities created from scratch, and used over time in different circumstances, can selectively evolve into standards, becoming part of the activity templates used by the larger community in an organization. As users interact in the workspace performing the detailed steps of IT service work, assigning and collaborating with people (e.g. through IM, , or IP phone), creating and working with resources (e.g. documents, spreadsheets, web pages), and interacting with system management tools (e.g. through user actions) each person, resource, and action is captured and associated with the current activity, providing a complete picture of the work conducted. Each of these actions are captured into the repository and also recorded on the calendar with respective times of start and completion. As a result all current and past activities in an IT service delivery center are stored in repositories, which can be searched to facilitate reuse by incorporating matching activities into new work. The Activity Repository contains all current and past activities within an organization (Figure 9). There can be multiple activity repositories based on location, customer, delivery center, competency, and they can be federated, or brought into a specialized service offering. The main purpose of the repository is to have a single location to capture organizational knowledge within a group, so that practices can be shared and reused. By default the activities in the repository are organized by activity type, in a hierarchical fashion but other representations are certainly feasible, such as organized by activity name, date, project, or person/role. A person s past activities can be found in the activity history. The Activity History view is a convenient way to browse and search past activities for one s own activities. It can be browsed and searched by keyword, name, persons involved, dates of the past activities, and other useful attributes. Using the activities found in the Activity History, specialists can refer to prior actions, examine past solutions, and contact prior collaborators. If desired subactivities from the History View can be imported or inserted into the current activity.
8 management activity, when the call is received from the customer, an activity context resource is created automatically, containing the customer phone number. When tools are launched in the context of this activity with UI elements addressed to customer phone number they can read in this value (i.e. customer phone number) from the activity context resource and automatically fill in corresponding element. Tool developers (as well as specialists) can associate UI elements in the tool to refer to any data path in the activity context resource. Thus, if the activity context contains data referred by a path of the UI element in a tool, its value is automatically read from/written to the activity context resource. If the value is lacking and the user manually enters the value in a UI element, the user entered value is synchronized back to the activity context resource. Figure 9. Activity Repository is a store for all standard and ad hoc processes captured. 3.3 Tools Workspace and Contextualization When users launch tools from a Tools view, the launched tool is displayed in the tools workspace. Tools workspace is like a set of tool windows. Tool windows can be arranged, minimized, and resized, much as in all window managers. One notable difference is that only those tool windows associated with the current activity are displayed. It is more like a multi-desktop window manager, with each desktop corresponding to an activity. Though by default, only tools that are associated with the current activity are displayed on the tool panel, users can set it in such a way that tools belonging to subactivities of the current activity are also displayed at the same time. Each tool in the tools workspace is launched in the context of the current activity. This means that tools can automatically set data in certain UI elements from the activity context resource. An activity context resource is essentially an XML document associated with every subactivity with the purpose of storing contextual information (Figure 10). Tools can read and write to the context resource by interaction transparent to the users. Users can also manually edit the context resource just like editing any other document resource. For example, in the user contact 3.4 Activity Search and Reuse The Activity Repository can also be searched in a number of ways. Keyword-based search is available for finding activities based on matching a keyword with content on the activity structure, resources, people, and tools. Alternatively, repository search can use a similarity-based algorithm. In this case, given a current activity, the repository search will return matches based on similarity of activity structure, content, people involved, resources and tools used. This could come handy as specifying a search query can be difficult at times, particularly in complex IT tasks. Given these alternative ways to browse and search the repository, users can find a relevant past activity and perhaps refer to prior actions performed within the activity, examine solutions, and find collaborators. If desired, a past activity found in the repository can be used as a template for instantiating a new activity or parts of it can be imported into a current activity at any point in the activity structure. Along with the activity structure, all associated people, tools, and resources can be imported if desired. This could help the specialists a great deal when working on a new project, as specific past experience can be brought to bear using tools known to have worked in the past, using resources that helped colleagues, and providing access to colleagues who had actually done similar work (Figure 11). In addition, activities can also be received by or found in web documents. In these cases, activities in these documents are in the form of activity descriptors, which define activity structure and associated elements. Simply copying and pasting them into the current activity in the workplace automatically copies the copied activity structure. Figure 10. Workspace tools can inherit context from current activity. For example, user contact manager tool automatically sets the phone number to the customer phone number associated with the user contact management activity.
9 3.5 Activity Monitors and Triggers Activities can also be automatically instantiated in response to system events (e.g. User Contact Management activity in response to support phone call). Basically, users can create custom system event monitors and associate a default activity from the activity template repository. Once event monitors are active and the pattern is detected, the default activity associated with the event is automatically instantiated for the registered user. Another way to instantiate an activity is to schedule events in the Calendar View. Basically, an event is created for a future date and time and registered with a default activity from the activity template repository. Similar to system event monitors, when the time comes, the associated activity is automatically instantiated. Users can also create monitors over the activity repository to track activities by type, urgency, priority, status, person name, and custom pattern. A monitor tracks updates to the repository and dynamically triggers an alert when monitor condition is satisfied. For example, a manager could build a monitor that tracks all change management activities and be notified when they are completed. While an alert can be as simple as an or pager notification it could also automatically instantiate a new activity. 3.6 Activity Filters and Reorganization Often activities are shared by multiple people. Based on the roles of the participants in an activity, different users may want to view the activity from different perspectives. For example, a database administrator may want focus just on the data management parts of a larger activity to setup an ecommerce site for a large bank. A delivery manager might be interested in all activities within the project but only higher level tasks within the larger activity. Depending on their roles, some users might want to focus on a number of activities but from a particular angle. For example, a change manager might be interested in all ecommerce site development activities but only as far as change requests are concerned. To support users to create their own perspectives on activities, users can transform current ongoing activities. Basic transformation operations include select, create, copy, and aggregate. To create an activity that is a transformation, users begin by creating a new activity normally. At any point in the new activity structure users can create a new subactivity that is in fact an activity path expression (similar to XPATH) to the current activity repository. The path expression is built by demonstration where users would click on one or more reference activities in the repository and a path is built. For example, if the user has clicked Figure 11. When an activity is imported from the repository, associated task steps, people, resources, and tools are inserted into the current activity workspace. This way users can substantially benefit from past practices easily.
10 on a number of user contact activities occurring at various points of the current activities, the activity path expression created would be something like /*/user_contact. Users might want to get only those user contact activities belonging to a particular project (defined in the activity context document), then the path expression would be like /*/user_contact[project= abc ]. If the user is interested in all subactivities of the user contact as well, the path expression would be /*/user_contact/*. Attributes of an activity can be set similarly through path expressions that also perform computation. For example, to count the user contact activities belonging to a project abc, one would write count(/*/user_contact[project= abc ]) in the activity context document for a particular variable. 3.7 Activity Analysis As users interact within the context of the current activity, tool actions, people interactions, and resources created and modified are also recorded in the backend for activity analysis, such as efficiency, quality, and cost analyses. Having the complete list of all actions carried out in an activity rather than actions related to structured activities only one can analyze most aspects of service delivery with much greater accuracy. Such analysis can be performed to build models of work, which can be used in cost analysis and planning, examine where time is spent, how much time particular type of activity takes and what is involved in carrying it out, and where things can be improved in general. An enhanced monitor type is a report that creates a document with content and charts, driven by data from the activity repository. Reports are dynamically updated in response to monitor triggers. Reports can utilize statistical packages for analyzing cost, efficiency, and quality. In this case, data from the repository is processed by these statistical packages to arrive at aggregate metrics which are then rendered in the report documents. 4. CONCLUSIONS The primary advantage of our activity-based service delivery approach is the coupling of structured and unstructured work, including workflow in ITIL with related informal activities and artifacts, which can collectively create a shared awareness of priorities, urgencies, and team performance in relation to common objectives. Availability of precise data about delivery activities could potentially lead to improved efficiency and quality of service delivery by providing better accountability for the actual cost of delivery. While we believe that the AMITS concept designs hold sufficient promise to warrant further investment, we do not want to leave the impression that everything is solved. For example, potential users may resist using a workspace that records practically all of their interactions, while storing them into a shared repository. Also, while extending standard templates to include new steps that have been included frequently as unstructured extensions is technically simple, developing an acceptable governance model for this approach may not be so straight forward. Finally, some of the advanced analysis and matching algorithms that we ve proposed pose significant challenges. AMITS remains to be validated in practice, and has challenges to address, but integrating structured and unstructured activities offers substantial promise, leveraging basic human creativity, facilitating effective collaborative work and reuse, and offering more accurate planning and delivery of high quality, effective services. Future extensions to AMITS could include the integration of human activities with automated activities, with the activity-based approach serving as a framework for progressive authorization and delegation of work to automation systems. 5. ACKNOWLEDGMENTS We thank Chris Campbell for help with the IT outsourcing study and Cheryl Kieliszewski for help with the storage management study. 6. REFERENCES  Moran, T. P., Cozzi, A., and Farrell, S. P Unified activity management: supporting people in e-business. Communications of the ACM 48, 12 (Dec. 2005),  Office of Government Commerce, UK. (2001) Best Practice for Service Delivery ITIL The Key to Managing IT Services, Stationary Office Books.  Hochstein, A., Zarnekow, R., Brenner, W., ITIL as Common Practice Reference Model for IT Service Management: Formal Assessment and Implications for Practice. IEEE International Conference on e-technology, e-commerce, and e-service (EEE '05), 2005, pp  Barrett, R., Kandogan, E., Maglio, P. P., Haber, E. M., Takayama, L. A., and Prabaker, M Field studies of computer system administrators: analysis of system management tools and practices. In Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (Chicago, Illinois, USA, November 06-10, 2004). CSCW '04. ACM Press, New York, NY,  Abbott, K., and Sarin, S. Experiences with workflow management: Issues for the next generation. In Proceedings of CSCW 94, ACM Press,1994,  Maglio, P.P., Kandogan, E., Bailey, J., Case Studies in IT Management: On Formal Processes and Informal Activities in Service Delivery. 15th Annual AMA Frontiers in Service Conference  Suchman, L. Office procedures as practical action: Models of work and system design. ACM Transactions on Information Systems 1 (1983),
Service Desk Edition isupport - Overview isupport helps you to perform functions such as creating and managing incidents, entering and searching for knowledge entries and FAQs, tracking assets, customers,
PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES
iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
Test report: Integration Big Data Edition Data processing goes big Dr. Götz Güttich Integration is a powerful set of tools to access, transform, move and synchronize data. With more than 450 connectors,
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December
A Guide To Evaluating a Bug Tracking System White Paper By Stephen Blair, MetaQuest Software Published: October, 2004 Abstract Evaluating a bug tracking system requires that you understand how specific
For more information about UC4 products please visit www.uc4.com Automation Within, Around, and Beyond Oracle E-Business Suite Content Executive Summary...3 Opportunities for Enhancement: Automation Within,
Citrix EdgeSight User s Guide Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
BMC Remedyforce Frequently Asked Questions Table of Contents BMC Remedyforce 2 Overview 2 Frequently Asked Questions 2 Definitions 2 1. What is Configuration Management? 2 2. What is IT? 2 3. What is a
Robot/SCHEDULE Enterprise Enterprise Job Scheduling Experience Complete Job Scheduling For Your Enterprise Robot/SCHEDULE Overview With more than 15,000 users worldwide, Robot/ SCHEDULE is the most popular
Oracle Team Productivity Center Overview An Oracle White Paper September 2011 Oracle Team Productivity Center Overview Oracle Team Productivity Center Overview Introduction... 1 Installation... 2 Architecture...
Taking the Service Desk to the Next Level BEST PRACTICES WHITE PAPER Table of Contents Executive Summary...1 The Service Desk Evolves...2 What s Next?...2 Enabling Innovations...3 > Configuration Management
Microsoft Project Server 2010 Project Manager s Guide for Project Web App Copyright This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web
Chapter 14 Working with SQL Server Agent Jobs Microsoft SQL Server features a powerful and flexible job-scheduling engine called SQL Server Agent. This chapter explains how you can use SQL Server Agent
Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
PeopleSoft HelpDesk An organization s corporate help desk is the lifeline of the company, ensuring the systems and facilities that employees need to do their jobs are running smoothly at all times. The
An Oracle White Paper June, 2014 Strategies for Scalable, Smarter Monitoring using Oracle Enterprise Manager Cloud Control 12c Product Overview... 1 Introduction... 1 Laying the Groundwork for Monitoring...
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
Participating in a Business Process in Oracle BPM 11g: Narration Script Participating in a Business Process in Oracle BPM 11g Hello, and welcome to this online, self-paced course entitled Participating
DIIMS Records Classifier Guide Featuring Content Server 10 Second Edition, November 2012 Table of Contents Contents 1. DIIMS Overview... 3 1.1 An Overview of DIIMS within the GNWT... 3 1.1.1 Purpose of
Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
HP Service Manager Service Request Catalog (SRC) Tips & Tricks Document (note: in process of updating to support v 9.32) 1 The HP Service Request Catalog (SRC) is a more robust and user- friendly version
vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which
CA Clarity PPM Demand Management User Guide v13.0.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session
A Guide to SupportDesk ITSM 1 Introduction Terminology: All SupportDesk systems are built around the same default terminology. In SupportDesk ITSM, the Customer and Inventory fields have been renamed as
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
AWS Service Catalog User Guide AWS Service Catalog: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in
IBM Service Management solutions and the service desk White paper Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. December
SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Business 360 Online - Product concepts and features Version November 2014 Business 360 Online from Software Innovation is a cloud-based tool for information management. It helps you to work smarter with
TECHNOLOGY BRIEF: SERVICE CATALOG MANAGEMENT Catalog : A CA Process Map JULY 2009 Enrico Boverino SR PRINCIPAL CONSULTANT, TECHNICAL SALES ITIL SERVICE MANAGER ITAC CERTIFIED Table of Contents Executive
SupportDesk ITSM: Quick Guide Introduction If as part of your SupportDesk system you have purchased the ITIL-Pack you will have the functionality to handle IT Service Management as prescribed by the IT
What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related
Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level
Pharos Uniprint 8.4 Maintenance Guide Document Version: UP84-Maintenance-1.0 Distribution Date: July 2013 Pharos Systems International Suite 310, 80 Linden Oaks Rochester, New York 14625 Phone: 1-585-939-7000
Qualify versus Quality Center A Comparison Between the HP & AQM Solutions An Original Insight Introduction Today s business applications are increasingly complex and can provide a strategic competitive
JIRA Administration Best Practices Darren Bowles, Clearvison Assumptions Working knowledge of JIRA Understanding of JIRA administration tasks Working to JIRA v6 or later. 1. Workflows 2. Scaling 3. Searching/Reporting
CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 Happy Birthday Spectrum! On this day, exactly 20 years ago (4/15/1991) Spectrum was officially considered meant - 2 CA Virtual Assurance
ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
ALM 271 From End-User Experience Monitoring to Management Dashboards and Reporting Stefan Lahr, SAP Active Global Support September, 2011 Disclaimer This presentation outlines our general product direction
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
ch01.fm Page 1 Thursday, November 4, 1999 12:19 PM Chapter 1 Lights Out Exposed Planning and executing a successful automation project begins by developing realistic expectations for the purpose and scope
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
CA Nimsoft Service Desk Rapid Workflow Implementation Guide 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)
Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
PRODUCT BRIEF: CA SERVICE DESK ON DEMAND -Demand Demand is a versatile, ready-to-use IT support solution delivered On Demand to help you build a superior Request, Incident, Change and Problem solving system.
Kaseya 2 Kaseya Service Desk User Guide Version 1.0 April 19, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Paper 064-2014 Log entries, Events, Performance Measures, and SLAs: Understanding and Managing your SAS Deployment by Leveraging the SAS Environment Manager Data Mart ABSTRACT Robert Bonham, Gregory A.
Getting Started with SharePoint Online for Small Business By Robert Crane Computer Information Agency http://www.ciaops.com Terms This Guide from the Computer Information Agency is provided as is. Every
A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop
Case Management Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: June 30, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum July 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
, div. of Citrix Systems Inc. GoToAssist TM Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005 Product Abstract GoToAssist enables businesses to securely interact in real time with
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
Introduction K2 [blackpearl] and SharePoint EXTENDING SHAREPOINT 2007 WORKFLOW CAPABILITIES January 7 INTRODUCTION K2 blackpearl extends built-in SharePoint workflow features by providing a rich, graphical
What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3