How To Consolidate A Service Desk
|
|
- Bernard Dickerson
- 3 years ago
- Views:
Transcription
1 June 2005 Service Desk: Consolidation, Relocation, Status Quo
2 Page 2 Contents Foreword So, you are going to consolidate or relocate your Service Desks 2 Foreword 3 Introduction 4 Select the transition date based on business cycles 5 Identify affected resources of all types 6 Plan for timely communications to all stakeholders 7 Measure success through the eyes of the customers 8 Identify any risks for tools, people, process, and data 8 Plan backup as if prepping for major disaster 9 Detail the project task plan and test it frequently 10 Satisfy the sponsor s objective for the project 10 Protect project schedule integrity by securing staffing resources that are dedicated to the project 11 Make mistakes early using tabletop drills 11 Summary how do you propose to perform such a feat without adversely impacting the current level of service? With all the demands on service quality and more effective use of resources, how do you reconfigure your airship while in flight? As issues begin to heat up surrounding Service Desk capabilities, on the list somewhere will be the issue of deciding if consolidation or relocation will provide a return on investment that provides improved customer satisfaction with IT services. It is not uncommon in mergers and acquisitions to meld together existing service desks to ensure there is appropriate balance of service support resources to primary business functions. Oftentimes, there can be heard inside IT the same directive that has affected the entire enterprise, to do more with less, or to improve customer satisfaction without adding to the cost. These mandates are not frivolous but are meant to ensure expenditures are validated for processes, people, tools, and information.
3 Page 3 Top decision criteria include: payback period and benefit cost ratio, agent skills distribution, and quality of service to the customer. Introduction As companies grow and acquisitions and mergers occur, it is common for an organization to take stock of their current expense profile for IT support and determine where it would be appropriate to implement cost reduction initiatives. When considering service desk consolidation or even just relocation, the enterprise must calculate the costs, benefits, and risks that accompany this type of activity. While there are other decision criteria that may also be addressed, clearly a few rise to the top: payback period and benefit cost ratio, agent skills distribution, and quality of service to the customer. As each of these is kept in focus, a project plan must be developed encompassing the six primitives of virtually any project: what needs to be done, how will it get done, where and when will the work be accomplished, who will do the project tasks, and, according to the sponsor, why is this project being initiated. Each of these has within it the need to address those processes, tools, data, and organizational implications that facilitate providing quality service to the customers of IT. 10 Tips for Service Desk Consolidation Select transition date based on the business Identify affected resources of all types Plan for timely stakeholder communications Measure success through the customers Identify risks for tools, people, process, data Plan backup as if prepping for major disaster Detail the task plan and test it frequently Satisfy each of the sponsor s objectives Protect schedule with dedicated resources Make mistakes early using tabletop drills
4 Page 4 there is no replacement for timing. Select the transition date based on business cycles Early in the cycle of events, there must be some options visited when selecting the timing of the actual consolidation. Much the same as would be done for a major release (Release Management) in terms of addressing business and personnel cycles. Dependent on your business, there are times when a major effort of this sort should not be scheduled if at all possible. There are, however, merger and acquisition implications that sometimes dictate the date irrespective of what is going on in the business at the time. When faced with the requirement to engage in this type of activity and the date has been dictated by a higher level issue, there is greater burden on the project manager (PM) to verify that multiple measurable checkpoints exist that will alert the team when anything is awry. In all cases, the PM should verify that the stakeholders are made aware of identified risks and the proposed steps necessary to mitigate them. Also, that they have specific resources assigned to them as part of the project plan. So remember, when deciding on the date for the activity, the old adage well known by corporate leaders, there is no replacement for timing.
5 Page 5 Peregrine Systems and IBM provide significant contribution to the overall project. Identify affected resources of all types Virtually every element of the IT infrastructure can be impacted when a service desk operation is interrupted for whatever reason. Clearly as part of the early planning stages, a decision must be made as to what the agent s workstation and workspace will look like when the effort is complete. Will there be new hardware, will the agent images be the same (how many images are there really), how will physical access be addressed, and are there any special ergonomic requirements? Are there specific agent security or authorization implications associated with the physical relocation of personnel that could have an adverse impact on their ability to provide quality customer service? Once these physical location and organization elements have been planned for, attention can be turned to the tools, process, and data requirements of the consolidation activity. Each of these, as stated earlier, must have the six primitives dealt with as part of the plan. Verify that decisions regarding MAC (move, add, change hardware / software) of agent workstations is reflected in the existing Change Management System and the CMDB (Configuration Management Data Base). In the case of mergers and acquisitions, there may also be a training component for personnel new to the infrastructure elements and IT s management processes. Clearly there is significant work that must be accomplished by resources not attached to the day-to-day provision of service to the customer. In this space, Peregrine Systems and IBM provide significant contribution to the overall project through methods and experience to help ensure that the infrastructure meets all the various requirements of the consolidation work plan.
6 Page 6 Timely and detailed communication is key. The entire team must be unified. Plan for timely communications to all stakeholders It is extremely important to verify that all stakeholders are kept apprised of project/milestone status as the project progresses. When planning a consolidation activity within an existing company, and few if any personnel are relocated, it may be possible to have an open communications style to help eliminate surprises. In the case of multiple business entities coming together, whether through merger and acquisition or simply restructuring activities, an orchestrated approach to helping ensure that communications are timely and contain sufficient detail to be viable is key. There are regulatory implications that often gate corporate news if it can in any way effect stock value. Given that, the PM must, with the stakeholders, plan well in advance the distribution of what details will be made available to which resource groups. The entire team must be unified in its direction. However, when businesses merge, the resulting head count is sometimes less than the sum of the originating organizations. Looking again at the primitives, a determination must be made as to who will remain as a service desk agent, where will their workstation be located, and when are they expected to be ready to engage once again as a fullfunctioning Level-X service desk agent.
7 Page 7 One of the best indicators of success is when, the business unit manager asks, Didn t IT make that service desk consolidation this weekend? Measure success through the eyes of the customers As the criteria by which success will be measured are defined, it is imperative that at least some perspective is kept on keeping the trains running. If, for instance, your service desk may be a link in the chain of restoring service to an operating room attempting to retrieve drug interaction data from a corporate database, and normal service is constrained due to a consolidation/relocation activity, well let s just say that business must still operate and agreed to levels of service must be provided as best as possible. All the standard PM metrics still apply, but it is the business that must continue to operate. This then should be the focus of the stakeholders in any consolidation project. Once again, that disaster recovery plan may need to be brought out and dusted off to help ensure no time is lost in delivering service it s okay, it needed to be updated anyway. Throughout the course of the project, as risks are identified, anything that can have an adverse effect on Service Level Agreements (SLAs) must be noted and a decision made as to what will be acceptable for the time period when there may be a negative impact. If, during the actual physical consolidation activity, business were to experience a constraint of service condition, it may be in the best interest of IT and the business units to discuss mitigation steps prior to the event. One of the best indicators of success is when, following your physical consolidation/relocation, the business unit manager asks, Didn t IT make that service desk consolidation this weekend we didn t experience any change at all?
8 Page 8 It is critical to identify risks for each of the processes, tools, resource groups, and data exchanges. Some risk situations will, most likely, show a strong resemblance to disaster-like conditions. Identify any risks for tools, people, process, and data Each element of the plan has an inherent risk associated with it as the day-today flow of service is exposed to interruption. Therefore, it is critical that the PM and the Subject Matter Experts (SMEs) leading their respective areas of focus identify risks for each of the processes, tools, resource (people) groups, and data exchanges that is to be impacted by the project. As process owners are brought together and they walk through tabletop exercises using their respective process flows, each must validate that sub-process interfaces and data exchanges stay intact throughout the project. This is best accomplished using existing process flows and documentation. Should there be gaps in the flows or documentation, they can be addressed as a parallel or follow-on activity to the consolidation project. Any tool consolidation, upgrade, or replacement must then take the validated flows/documentation and verify that the refreshed tools do not create conflicts or voids in the service flow. Also, this is a good time to note any enhancements or updates that should be made to the disaster recovery (business continuity) plan. Caution sometimes it is the little things that can cause the greatest difficulty. For instance, it is not enough just to verify that the new phone numbers are posted on the Web site, there must also be sufficient effort applied to this activity to verify the numbers rollover from the old to the new location. Also, verification must be made that lines will take the call load of a combined service desk. Plan backup as if prepping for major disaster When the risks have been identified and decisions have been made as to how service support interruptions will be addressed, some risk situations will, most likely, show a strong resemblance to disaster-like conditions. That is to say, the same task sequence used to mitigate a disaster affecting IT services and service support, may be employed for service support recovery during the project. These risk conditions can be identified throughout the project and start as early as defining the scope and as part of task verification during work breakdown structure (WBS) activities. Do not lose sight of the SLAs that are to be supported throughout the project or the sponsor s objectives of the overall effort. Should achievement of SLAs be compromised as a result of project activities, be prepared to engage in recovery actions for the current tasks and somewhat closer scrutiny for the remainder of the project.
9 Page 9 The Risk/Frequency matrix that dictates the amount of focus a specific task or project should receive. Make sure the tasks connect and that outputs support inputs. Detail the project task plan and test it frequently In many service provider environments where things can sometimes go wrong, there is the Risk/Frequency matrix (as shown below) that dictates the amount of focus a specific task or project should receive. For instance category C activities that are Low Risk and Low Frequency are those activities we perform regularly that have limited impact associated with them. Activities such as volume name changes, calendar updates, address changes, server upgrades, etc. Category D activities are those that are low risk and high frequency, in other words, tasks that are not risky and are done all the time. At the service desk, that may be the regular barrage of password resets that sometimes plague an organization. Category B activities are high risk and high frequency. These are the tasks we perform regularly but know to watch very closely. Security authorizations, for example, to access new repositories require significant scrutiny as they should. And category A activities are those that are high risk and low frequency. This is where significant attention must be focused. It is here that we must plan well and test the plan often. When we consolidate multiple service desks, an activity we don t do very often, it can have a major adverse impact. Hence, the need to connect the dots. As the WBS is created, and tasks are prioritized, make sure the tasks connect and that outputs support inputs. High A B Risk Degree of impact if activities do not complete as planned C D Low Frequency Number of times this activity has been performed High
10 Page 10 Doing things right is good, but we must also do the right things. Satisfy the sponsor s objectives for the project A key role the PM plays is to ensure the team is made aware of the sponsor s and the stakeholder s project objectives. Knowledge of these targets is what makes for effective decisions, by all team members, throughout the course of the project. As has been proven repeatedly in IT projects, doing things right is good, but we must also do the right things. It is appropriate when documenting the project objectives, to assign an individual the responsibility of validating that the objective can be realized given the defined project tasks. Additionally, as the assigned resource, they ll maintain a perspective of ultimate achievement, throughout the project. This will allow the PM to minimize surprises. Also, there is a much better chance of course correction being of value if executed early enough in the process. At project closure time these defined objectives become major communication points in articulating the value of both planning and project management. Reassigning resources to other tasks is distracting and harmful to a project. Protect project schedule integrity by securing staffing resources that are dedicated to the project Those individuals with architect and technical skills who have well established business unit relationships are always in high demand. What is distracting and harmful to a project is to have assigned resources reassigned to other tasks. Reassignment of resources should also be part of the risk and the associated mitigation plans. It may be more appropriate to engage contracted resources to join the project team to complete specific tasks and have high demand resources engage in a role that is consistent with the amount of time they can dedicate to the project. The potential that they can be pulled from the project, either temporarily or for the duration is real and necessary in any organization. Their wealth of expertise is often best used in an oversight role where they can see multiple tasks and the associated interactions and exposures.
11 Page 11 There really is no replacement for testing or practice. Make mistakes early using table-top drills Practice, practice, practice. It is true for entertainment performance as well as service support. The elements of performance and the theater in which it takes place is not relegated to entertainment alone. We sometimes use the analogy of the orchestra to articulate the intricacies associated with task relationships. Well, just like a good orchestra, it takes practice. That means with each other and with the score (for us that would be the task plan). Dependent on the magnitude of the effort it may start out with sections practicing together before the whole orchestra ever comes together to run through the music. For a service desk consolidation effort, this means that it is imperative for the PM and SMEleads, at a minimum, to go through table-top exercises and execute all the steps to help ensure, as best as possible, that nothing is left out and that the sequence is correct. There really is no replacement for testing or practice. Summary All the tools, examples and analogies in the world will not take the place of effective planning when it comes to completing a series of tasks. However, tools allow us to work smarter instead of harder. A service desk consolidation or relocation is not without exposure, but the potential of providing better customer service is worth the effort. For more information To learn more about IBM Global Services and our service desk, please contact your IBM sales representative or visit: ibm.com/service
12 Copyright IBM Corporation 2005 IBM Global Services Route 100 Somers, NY U.S.A. Produced in the United States of America All Rights Reserved IBM, the IBM logo and the On Demand Business logo are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. G
IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
More informationEND TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
More informationA proven 5-step framework for managing supplier performance
IBM Software Industry Solutions Industry/Product Identifier A proven 5-step framework for managing supplier performance Achieving proven 5-step spend framework visibility: benefits, for managing barriers,
More informationInformation Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives
Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services
More informationPRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT
The Define/Align/Approve Reference Series PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT Value added IT depends on accurate information regarding the use, location and configuration of every asset, from
More informationNEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
More informationIBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview
IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act
More informationPROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name
More informationAN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION
AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION Five key success factors IT organizations today are under constant business pressure to transform their infrastructure to reduce costs, increase
More informationThe hidden costs of data migration.
IBM Global Technology Services December 2007 The hidden costs of data migration. Strategies for reducing costs and quickly achieving return on investment Page 2 Contents 2 Executive summary 3 Introduction
More informationDatacenter Migration Think, Plan, Execute
Datacenter Migration Think, Plan, Execute Datacenter migration is often regarded as a purely technical, almost trivial side-project, to be delivered by existing IT staff alongside their day jobs. With
More informationPurpose: Content: Definition: Benefits: outputs outcomes benefits Business Case dis-benefit Key Responsibilities: Approach: Executive Developed
Key Learning Points The Swirl Logo is a trade mark of the AXELOS Limited. Is used by the Project Board throughout the project to verify its continued viability:- Is the investment in this project still
More informationBuilding a Disaster Recovery Program By: Stieven Weidner, Senior Manager
Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that
More informationAN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION
AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION Five key success factors Whether the decision to relocate or consolidate a data center is driven by cost pressure or the need for greater IT efficiency,
More informationIBM Tivoli Storage Manager for Virtual Environments
IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines
More informationBSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
More informationModernizing enterprise application development with integrated change, build and release management.
Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.
More informationRFP Attachment C Classifications
RFP 1. Applications IT Architect Analyzes and designs the architecture for software applications and enhancements, including the appropriate application of frameworks and design patterns and the interrelationships
More informationSuccessfully managing geographically distributed development
IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents
More informationDISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
More informationHow To Restore From A Backup In Sharepoint
Recovering Microsoft Office SharePoint Server Data Granular search and recovery means time and cost savings. An Altegrity Company 2 Introduction 3 Recovering from Data Loss 5 Introducing Ontrack PowerControls
More informationThe case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
More informationHow Technology Supports Project, Program and Portfolio Management
WHITE PAPER: HOW TECHNOLOGY SUPPORTS PROJECT, PROGRAM AND PORTFOLIO MANAGEMENT SERIES 4 OF 4 How Technology Supports Project, Program and Portfolio Management SEPTEMBER 2007 Enrico Boverino CA CLARITY
More informationStrategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
More informationIBM Global Services September 2008. Disaster recovery strategies for internal recovery
IBM Global Services September 2008 Disaster recovery strategies for internal recovery Page No.2 Contents 2 Introduction 3 The Y2K effect 4 Fall of distributed systems 4 New challenges 5 New suite of enablers
More informationImprove business agility with WebSphere Message Broker
Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching
More informationHarness the value of information throughout the enterprise. IBM InfoSphere Master Data Management Server. Overview
IBM InfoSphere Master Data Management Server Overview Master data management (MDM) allows organizations to generate business value from their most important information. Managing master data, or key business
More informationData Center Consolidation
Data Center Consolidation With computers spread across the enterprise, and the number of networked databases and applications growing at an exponential rate, the challenges of efficient networking, data
More informationCisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
More informationSAP Managed Services SAP MANAGED SERVICES. Maximizing Performance and Value, Minimizing Risk and Cost
SAP Managed Services SAP MANAGED SERVICES Maximizing Performance and Value, Minimizing Risk and Cost WE RE FOCUSED ON YOUR GOALS Increase productivity with fewer resources. Optimize IT systems while cutting
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationMaster data management vision and value: Part 2
IBM Software Master data management vision and value: Part 2 Determine the business value of MDM 1 23 45 Introduction Speak the stakeholder Do the math Remember the soft Conclusion and Introduction Why
More informationPlanning a Backup Strategy
Planning a Backup Strategy White Paper Backups, restores, and data recovery operations are some of the most important tasks that an IT organization performs. Businesses cannot risk losing access to data
More informationWhite Paper. IT Service Management Process Maps. Select Your Route to ITIL Best Practice
White Paper IT Service Process Maps Select Your Route to ITIL Best Practice Brian Johnson VP and WW ITIL Practice Manager, CA Inc. Nancy Hinich Solution Manager, Technical Services, CA Inc. Pete Waterhouse
More informationCDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
More informationProgram Title: Advanced Project Management Knowledge, Skills & Software Program ID: #1039168 Program Cost: $4,690 Duration: 52.
Program Title: Advanced Project Management Knowledge, Skills & Software Program ID: #1039168 Program Cost: $4,690 Duration: 52.5 hours Program Description The Advance Project Management Knowledge, Skills
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationProject Knowledge Areas
From Houston S: The Project Manager s Guide to Health Information Technology Implementation. Chicago: HIMSS; 2011; pp 27 39. This book is available on the HIMSS online bookstore at www. himss.org/store.
More informationLeveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
More informationITSM Process Description
ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management
More informationPROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History
More informationBest Practices Statement Project Management. Best Practices for Managing State Information Technology Projects
State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement
More informationTHE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS
THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS The CXO s Guide to Managing Expansion While Controlling Costs & Compliance Considerations 2 45% OF IT PROFESSIONALS
More informationShare the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation)
Data Center Migration Primer Mark Smith Wednesday, June 27, 2012 General Information Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today
More informationRecovering Microsoft Office SharePoint Server Data. Granular search and recovery means time and cost savings.
Recovering Microsoft Office SharePoint Server Data Granular search and recovery means time and cost savings. 2 Introduction 5 Recovering from Data Loss 6 7 Introducing Ontrack PowerControls for SharePoint
More informationBlend Approach of IT Service Management and PMBOK for Application Support Project
Blend Approach of IT Service and PMBOK for Application Support Project Introduction: This paper addresses the process area, phases and documentation to be done for Support Project using Project and ITSM
More informationWhite paper September 2009. Realizing business value with mainframe security management
White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment
More informationThe IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
More informationHow To Protect Your Active Directory (Ad) From A Security Breach
Securing Active Directory: An Ounce of Prevention or a Pound of Cure? Abstract This technical brief reviews three tasks that should be a part of your proactive Active Directory (AD) security routine: Establishing
More informationProgram Management April 2006. Program Management
April 2006 Program Management Page 2 Contents 1 Background and Definitions 5 Enterprise Business Strategy A Typical Originator of Programs What is EGL? 6 Program Characteristics 10 Enabling Mechanisms
More informationWHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.
WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure
More informationIT Services Management Service Brief
IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction
More informationIBM Software. IBM TRIRIGA: The power of true integration in workplace management solutions
IBM Software IBM TRIRIGA: The power of true integration in workplace management solutions 2 IBM TRIRIGA: The power of true integration in workplace management solutions Introduction In today s increasingly
More informationpm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS
pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage
More informationMain Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications
Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.
More informationDepartment of Administration Portfolio Management System 1.3 June 30, 2010
E 06/ 30/ 2010 EX AM PL 1. 3 06/ 28/ 2010 06/ 24/ 2010 06/ 23/ 2010 06/ 15/ 2010 06/ 18/ 2010 Portfolio System 1.3 June 30, 2010 Contents Section 1. Project Overview... 1 1.1 Project Description... 1 1.2
More informationWhite Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management
White Paper An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management Managing Data as an Enterprise Asset By setting up a structure of
More informationRealizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
More informationITIL Roles Descriptions
ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test
More informationSystem Security and Auditing for IBM i
IBM Systems Lab Services and Training Power Services System Security and Auditing for IBM i Security breach prevention and protection 2 System Security and Auditing for IBM i Highlights Reduce the risk
More informationHIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
More informationYour Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
More informationSoftware Asset Management on System z
Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager mzelle@us.ibm.com Agenda Why Software Asset Management (SAM) The Discipline of Software
More informationIBM Tivoli Netcool network management solutions for SMB
IBM Netcool network management solutions for SMB An integrated approach enhances IT as it supports business needs for the SMB environment Highlights Automate management tasks to reduce IT workload and
More informationThe 9 Things in the PMBOK
The 9 Things in the PMBOK 9/15/2011 The PMBOK Project Body of Knowledge sum of knowledge within the profession of project management used dto document and standardize di generally accepted project management
More informationLowering business costs: Mitigating risk in the software delivery lifecycle
August 2009 Lowering business costs: Mitigating risk in the software delivery Roberto Argento IBM Rational Business Development Executive Valerie Hamilton IBM Rational Solution Marketing Manager and Certified
More informationProject Management Office (PMO)
Contents I. Overview of Project Management...4 1. Project Management Guide (PMG)...4 1.1 Introduction...4 1.2 Scope...6 1.3 Project Types...6 2. Document Overview, Tailoring, and Guidance...7 3. The Project
More informationA discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.
A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering
More informationThe business value of improved backup and recovery
IBM Software Thought Leadership White Paper January 2013 The business value of improved backup and recovery The IBM Butterfly Analysis Engine uses empirical data to support better business results 2 The
More informationIT Project Management Methodology. Project Scope Management Support Guide
NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA IT Project Management Methodology Project Scope Management Support Guide Version 0.3 Version Date Author Change Description 0.1 23 rd Mar, 2013 Gerald
More informationAutomated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................
More informationIBM Tivoli Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related
More informationPHASE 5: DESIGN PHASE
PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed
More informationChange Management Process Guide
XXXXX (XX) IT Operational Process Change Management Process Guide XXXXX Information Technology Preface The purpose of this document is to outline the procedures that govern the Change Management process
More informationSupporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
More informationTransforming Field Service Operations w ith Microsoft Dynamics NAV
Transforming Field Service Operations w ith Microsoft Dynamics NAV Open Door Technology Inc. Date: May 2010 www.opendoor.ca 8 77.777.776 Contents Introduction... 3 Mobile Technology Needs for Field Services
More informationExpert Reference Series of White Papers. Importance of Schedule and Cost Control
Expert Reference Series of White Papers Importance of Schedule and Cost Control 1-800-COURSES www.globalknowledge.com Importance of Schedule and Cost Control Bill Scott, PE, PMP, PgMP Outline I. Project
More informationMGMT 4135 Project Management. Chapter-16. Project Oversight
MGMT 4135 Project Management Chapter-16 Project Oversight Project Oversight: defined as a set of principles and processes to guide and improve the management of projects. Ensures projects meet the needs
More informationWHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS
WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS Nonprofits are experiencing increased pressure, oversight, and demand for transparency from all sides. Whether the focus is government compliance, competition
More informationCan You Recover Active Directory from a Disaster?
Can You Recover Active Directory from a Disaster? Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2012 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the
More informationBusiness Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
More informationBuilding an Excellent Relationship with your Cloud-Based Contact Center Infrastructure Vendor. April 2014
Building an Excellent Relationship with your Cloud-Based Contact Center Infrastructure Vendor April 2014 Sponsored by: - 1 - DMG Consulting LLC Table of Contents Introduction... 1 Cloud-Based Contact Center
More informationDisaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
More informationAppendix V Risk Management Plan Template
Appendix V Risk Management Plan Template Version 2 March 7, 2005 This page is intentionally left blank. Version 2 March 7, 2005 Title Page Document Control Panel Table of Contents List of Acronyms Definitions
More informationIBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications
IBM Software Information Management Scaling strategies for mission-critical discovery and navigation applications Scaling strategies for mission-critical discovery and navigation applications Contents
More informationIBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.
IBM asset management solutions White paper Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. September 2007 2 Contents 2 Executive summary 3 Introduction
More informationPHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
More informationInformation Technology Project Oversight Framework
i This Page Intentionally Left Blank i Table of Contents SECTION 1: INTRODUCTION AND OVERVIEW...1 SECTION 2: PROJECT CLASSIFICATION FOR OVERSIGHT...7 SECTION 3: DEPARTMENT PROJECT MANAGEMENT REQUIREMENTS...11
More informationThe Software-defined Data Center in the Enterprise
The Software-defined Data Center in the Enterprise A Cloud Report by Ben Kepes This report underwitten by: NIMBOXX The Software-defined Data Center in the Enterprise 02/12/2015 Table of Contents 1. Executive
More informationTechnology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
More informationCA Service Desk Manager
DATA SHEET CA Service Desk Manager CA Service Desk Manager (CA SDM), on-premise or on-demand, is designed to help you prevent service disruptions, better manage change risks, and provides a 360-degree
More informationPROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized
More informationA Guide To The Project Management Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition
A Guide To The Project Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition Major Changes The adoption of the verb-noun format for process names Amplification as to Enterprise
More informationInput, Output and Tools of all Processes
1 CIS12-3 IT Project Management Input, Output and Tools of all Processes Marc Conrad D104 (Park Square Building) Marc.Conrad@luton.ac.uk 26/02/2013 18:22:06 Marc Conrad - University of Luton 1 2 Mgmt /
More informationServices for the CFO Financial Management Consulting
IBM Global Business Services Services for the CFO Financial Management Consulting Financial Management Chief financial officers (CFOs) are currently in a highly visible, highly influential position. They
More informationExplanation of a Project and the Value of a Project Manager
Comprehensive Consulting Solutions, Inc. Bu siness Savvy. IT Smart. What is a Project and when is a Project Manager needed? White Paper Published: March 2001 (with revisions) Explanation of a Project and
More informationProject Management Plan for
Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...
More informationAutomated Disaster Recovery With BMC Atrium Orchestrator
BEST PRACTICES WHITE PAPER Automated Disaster Recovery With BMC Atrium Orchestrator Applying the capabilities of IT Process Automation to help meet the daily challenges faced by Disaster Recovery / IT
More informationMemory-to-memory session replication
Memory-to-memory session replication IBM WebSphere Application Server V7 This presentation will cover memory-to-memory session replication in WebSphere Application Server V7. WASv7_MemorytoMemoryReplication.ppt
More information