Professional Documents
Culture Documents
• How many problems are identified and removed from our IT environment.
• Problems which have a status of resolved and closed.
First an incident occurs. An incident is any unplanned outcome from the operation
of an information system. Incidents interrupt the IT service which the customer
receives. Incidents are normally reported to the service desk, and an incident
record is created.
Next, the incident is assessed. If the cause of the incident isn’t know, then the
incident is escalated to a problem. A problem is an incident whose cause is not
known.
As the problem is reviewed, the cause of the problem and a workaround maybe
determined. As soon as these two aspects occur, the problem is changed to a
known error.
Finally the known error is assessed to determine if the symptoms of the incident
match an already existing problem record. If so, the new incident is cross-
referenced to that problem
However if the known error doesn’t match any existing symptoms, a net new
problem record is created.
The terminology incident, problem, and known error portray the effect and root
causes of unexpected events in an information system. Identifying the cause of
these events and minimizing their impact is the primary purpose of the problem
management process.
When the problem management process is used to identify the root causes of
problems, it's far more likely that they will be diagnosed correctly and fixed
properly. As a result, problems are permanently eliminated.
• Error control activities- Now the problem becomes a known error in the
IT infrastructure, and error control activities begin. Error control activities
include:
The problem manager's duties should never be combined with the duties of the
service desk supervisor. The priorities of the service desk and problem
management are often incompatible.
The success of problem management also relies on critical factors before, during,
and after the main activities in the problem management process. The critical
factors for success are:
Problem management will succeed when an effective problem manager fills the
required roles, and critical factors for the success of the process are included in
everyday operating procedures.
Implementing problem management brings many benefits to a company and its IT
department. However, there are also some problems and costs that arise during
the implementation of problem management.
Companies should expect to incur some costs with the implementation of problem
management. However, it isn't necessary to create a vast problem management
process that's capable of handling every single problem that arises. As a result,
the incremental costs of problem management are negligible. The hardware and
software tools needed are shared with other IT service management processes,
and the additional personnel costs are small.
Oh the disaster, the sudden unexpected disaster. Some of us have been through
the major ones – Hurricanes, Tornados, and Ice Storms. Others of us have been
through the smaller ones – Boiler Exploding in a building, a building falling into the
Normanskil, and lightening hitting the building. IT service continuity management
(ITSCM) is to proactively assure IT services can be recovered and provisioned
based upon the established business continuity management timeframes.
Basically once you rate your critical applications, assuring the critical fabulous
four are up first within the agreed upon timeframe. This helps to have a pre-
defined process in place to help the organization recover to normal operating
procedures after a disaster. On the reactive side of the equation, once the disaster
has occurred. IT service continuity management is the process responsible for
assessing the impact of the disruption on IT services.
• Initiation - The initiation stage is starting point for the life cycle. The goal
of initiation is to define the ITSCM policy and charter the endeavor.
Chartering is the project charter which defines the high-level scope, team
needed, and critical success factors for the project. The ITSCM policy is the
bought into and formalized plan to influence and determine decisions,
actions, and other matters regarding IT continuity. The initiation stage
outcome will be the charter, project scope, project timeline, and main
ITSCM policy all documents will be referred to in subsequent stages.
• Requirements and Strategy - During the requirements and strategy
stage, a business impact analysis (BIA) and risk assessment are
conducted. The business impact analysis evaluates the what-if scenarios to
consider what might happen after a disaster. BIA points out the critical
business processes ad the potential damage which can result from a
service disruption. BIA is the requirements part. A business continuity
strategy is produced from the results determining which risk reduction
measures are necessary and which recovery option supports the
organization’s needs. This stage typically involves identifying services
critical to the business that require additional preventive measures.
• Implementation - During the implementation stage, previous stages
outputs are reviewed so that recovery plans can be developed which
contain all the details an organization needs to survive a disaster and
restore normal services. This stage also defines the actions necessary to
prevent, detect, and mitigate the effects of potential disasters. One of the
activities conducted in this stage is developing implementation plans,
including the emergency response plan, the damage assessment plan, and
the salvage plan.
o Implementing standby arrangements - includes defining,
creating, and solidifying the underpinning contracts (UCs) with
standby providers. A UC is a contract with an external supplier that
supports the IT organization in its delivery of services. This contract
could be a support or maintenance agreement, and it should be
capable of supporting targets agreed to in service level agreements
(SLAs). Once completed, the UCs should be listed in the
configuration management database and linked to the recovery
plan and the associated SLAs. Necessary equipment also needs to
be purchased.
o Developing procedures – Developing procedures which detail
exactly what each member of the disaster recovery (DR) team must
do if the plan is invoked. One staff aid may explain the exact steps
for immediately transferring data to the backup site if the DR plan
is implemented.
o Undertaking initial tests - Undertaking initial tests typically
involves performing some initial testing of procedures before they
are finalized. Actual, final testing occurs in the fourth stage:
operational management.
By performing each of these activities, organizations can be sure that they have
successfully completed the third stage of the business continuity life cycle. After
implementation has been completed, the process needs to be maintained as part
of business as usual.
From the business continuity life cycle, one output is the recovery plan. The
recovery plan should detail the instructions and procedures to recover or continue
the operation of systems, infrastructure, services, or facilities. The ultimate goal
of the recovery plan is to maintain service continuity.
Recovery options need to be considered for IT systems and networks, and critical
services such as telecommunications and power. The various recovery options are
as follows:
One way to warrant that the IT service continuity management (ITSCM) process is
both efficient and effective is to assign an IT service continuity (ITSC) manager.
We all know establishing accountability in a role is necessary for a successful
process.
Through her primary responsibilities, the ITSC manager will ensure that the ITSCM
process is implemented and maintained in accordance with the organization's
requirements and business continuity management process. One way ITSC
managers can make sure that ITSCM is effective is through continued
communication with the other IT service management (ITSM) processes.
Like any quality business process, IT service continuity management (ITSCM) has
expenses and common problems.
Common problems associated with ITSCM are any issues that prevent an
organization from committing to continuity management—in terms of both
implementing the process and maintaining it. One example is when firms seem
unable to move out of the planning stage and into actual implementation.
Other examples are being unable to find facilities or resources, having someone
unfamiliar with the business implement the process, not understanding ITSCM's
role in disaster recovery, or thinking IT has already handled continuity planning.
Common costs associated with ITSCM are the expenses incurred from risk
management and recovery arrangements. An example of a common cost is the
investment required by the introduction of risk management.
Additional examples of common costs are returning operational costs and the
hardware needed to support the ITSCM process, and fees for the recovery facility.
There will always be problems and costs associated with implementing ITSCM. But
the resulting benefits, especially when a disaster is prevented or quickly
controlled, outweigh the associated difficulties and costs.
Defects Per Unit, DPU, evaluates the average number of defective units which
occur the total sample size. A unit is the item being processed, such as a incident
ticket, or the product being coded, or the service being rendered. DPU counts
each unit as either defective or not defective. If a unit which is defective has one
or several defects, it is counted as a single defective unit.
Calculating DPU
Calculating a process's DPU involves three steps:
Defect per Opportunity depicts the average number of defects which occur in the
total number of opportunities in a sample group. An opportunity is the chance for
a defect to occur within a unit. DPO counts each defective opportunity within a
unit as one defect. So in examining a service desk response, some opportunity for
defects are:
Within our service desk example, each of these opportunity. So if the incident
response is mis categorized to the wrong response team and the customer is not
responded to within 4 hours. We have two defects within one unit.
Calculating DPO
Calculating a process's DPO involves five steps:
So when should you use DPU or DPO as a technique? This depends on how many
performance standards exist within a process. A performance standard is an
expectation from someone inside or outside the organization has for the process,
product, or service.
We have all been there from one time to another in a large meeting room, hearing
a problem from everyone’s perspective. Needless to say, when you are in the mix,
it is good to start analyzing. To gain an understanding of what is going on with the
process, lets start with the basics: who, what, when and where. Answering these
questions in detail is the data stratification model, and it clarifies the collected
information to reveal the root cause of the problem.
Six sigma teams use the data stratification model whenever data is collected.
Because it quickly clarifies who is associated with the problem, what type of
problem is occurring, when the problem is happening, and where the problem is
occurring. The purpose of the model is to help the team clarify the problem and its
impact. The information is also very useful when analyzing the problem to find the
root cause.
The process of data stratification is to break it down into layers (AKA strata). The
questions who, what, when, and where represent the layers.
• The who layer – The question who is intended to define who is associated
with the process problem. This information could be further subdivided by:
o Vendor
o Department
o Individual
o Customer Type
• The what layer – The question what defines the type of problem which is
occurring. This information can be further categorized by:
o defect category
o type of complaint
o reason for a complaint.
• The when layer – The question when is pretty much self explanatory it
clarifies when. This information can be further clarified by:
o time of day
o day of week
o month of year
o fiscal quarter.
o Shift
• The where layer – The where question clarifies where a problem occurs.
This can be clarified by:
o facility
o region
o location on product
o location in service.
By asking the key questions from the data stratification model, the who, what,
when, and where of a process problem are further brought into focus.
While process data may not be available to answer all the model's questions, the
team should nevertheless consider using the model whenever it collects data.
Answering only some of the questions can still greatly benefit an investigation.
Here is an example, for quantifying the problem surrounding OR charges.
• Rate Book
• Rebilling
In measuring it is all about the quality of the data, good data is a result of a good
measuring technique. So before you measure, let’s validate the method of
measurement.
Six Sigma divides all organizational processes into three discrete parts, each of
which should be measured individually:
• The process inputs - For example, the process inputs of change
management is the Request for Change and the information gathered upon
it.
• The transforming processes – For change management, there are
several transforming processes, the assessment, planning, approval and
scheduling,
• The delivery of the outputs - The delivery of the outputs is the closure
of the RFC based upon permission from the customer, an updated RFC for
release management, some reports, and the decisions made by the
change manager.
First, let’s clearly distinguish the difference between change request and service
requests. A change requests typically affect many individuals. (If you don’t have a
change process these may be unplanned and significant changes of your
environment’s configuration.) Service requests are routine procedures that affect
a small number of users. This type of request is normally a minor change to a
system. For example, helping a new employee gain access to the systems
needed.
1. Logging and filtering - The first major activity is logging and filtering
change requests. Obviously change requests will come from anywhere
within a company that has an idea and a computer. Some changes result
from an incident in which IT services are interrupted or configuration items
fail to work properly. Other requests may simply ask for improved or
additional service. Some requests maybe capital changes or departmental
system modifications. However all proposed changes should be submitted
to change management in a standardized request for change (RFC)
document. When an RFC is received, change management logs the request
and allocates a unique identification number for the document. An RFC
document provides definitive information about the change that's being
requested.
2. Assessing and classifying - The process for assigning priorities to
changes is similar to the process for prioritizing problems. If a problem
receives a high priority, the change that corrects the problem will have a
high priority. However, not all changes address problems. For example all
enhancement requests, so changes need to be classified based upon
priority. Commonly ratings such as emergency, high, medium or low are
used.
3. Approving - The authority to approve or reject proposed changes is what
gives change management the ability to make the change process more
effective. The final decision and authority to act is with the manager in
charge of change management. Obviously with something this significant
the change manager doesn’t act in a silo, the change manager consults
with his trusted advisors the change advisory board. The CAB examines
each proposed change from three perspectives: financial, technical, and
business. The board evaluates changes from a financial perspective to
determine whether the benefits of each change justify the costs of
completing it. Evaluation from a technical perspective assures that each
change is feasible and will not have a negative effect on the infrastructure.
Business evaluation ensures that changes support the company's business
objectives.
4. Planning and coordination - Change management doesn't actually
implement the requested changes. However, change management team
members help plan the implementation and then monitor the progress of
changes to be sure the plans are being carried out. In an ideal world,
change management could allow only one change at a time. Because
configuration items in an infrastructure affect one another, that's not
possible. A hardware change may require an accompanying software
change, and both of those may require changes in documentation and
procedures. Change management and the change advisory board examine
how changes will affect the IT infrastructure. Changes are scheduled to
accommodate the dependencies among changes to different configuration
items. After a change has been scheduled, change management forwards
the approved RFC to the support team that will build and test the change.
The team chosen to actually build and test a change depends on the type
of change. The team must include people with the skills needed for specific
building and testing tasks.
5. Reviewing and closing - Completed changes may be reviewed in CAB
meetings. The examination of a completed change is called a post-
implementation review (PIR). The purpose of a post-implementation review
is to study recently completed changes and apply the experience gained to
subsequent changes. Post-implementation reviews allow change
management to learn from the past and continually improve the change
management process.
The one person who is most responsible and accountable for change management
is the change manager. The change manager is more of a role, depending on the
size, complexity and structure of your IT organization, there may be more than
one person playing the role of change manager for assisting with several
activities. The change manager plays a leading role in many of the major
activities of change management as follows:
Having an effective change manager is one requirement for the success of change
management. There are several other critical factors that need to be present for
the implementation of change management to be successful.
Change management isn't an isolated process. Its success depends on how well it
meshes with the rest of the IT department and the company. Three factors that
are critical to the success of change management are:
Some of the lessons learned that can be shared from other having gone there
before are:
The value of change management are well worth the original investment in
capital, resources and headaches.
• How many problems are identified and removed from our IT environment.
• Problems which have a status of resolved and closed.
First an incident occurs. An incident is any unplanned outcome from the operation
of an information system. Incidents interrupt the IT service which the customer
receives. Incidents are normally reported to the service desk, and an incident
record is created.
Next, the incident is assessed. If the cause of the incident isn’t know, then the
incident is escalated to a problem. A problem is an incident whose cause is not
known.
As the problem is reviewed, the cause of the problem and a workaround maybe
determined. As soon as these two aspects occur, the problem is changed to a
known error.
Finally the known error is assessed to determine if the symptoms of the incident
match an already existing problem record. If so, the new incident is cross-
referenced to that problem
However if the known error doesn’t match any existing symptoms, a net new
problem record is created.
The terminology incident, problem, and known error portray the effect and root
causes of unexpected events in an information system. Identifying the cause of
these events and minimizing their impact is the primary purpose of the problem
management process.
The primary measure of the success of the problem management process is how
many problems are identified and removed from an IT infrastructure. Therefore,
the primary output from this IT service management process renders problems
that are resolved and closed.
When the problem management process is used to identify the root causes of
problems, it's far more likely that they will be diagnosed correctly and fixed
properly. As a result, problems are permanently eliminated.
Investigation and diagnosis - Problem management teams look for the root
cause of problems. If the cause is determined, problem management
recommends a workaround or a temporary fix for the problem.
The groups of problem management activities; (problem control, error control, and
proactive problem management) identify and resolve problems which have the
greatest potential impact on a company's business.
The problem manager's duties should never be combined with the duties of the
service desk supervisor. The priorities of the service desk and problem
management are often incompatible.
The success of problem management also relies on critical factors before, during,
and after the main activities in the problem management process. The critical
factors for success are:
Problem management will succeed when an effective problem manager fills the
required roles, and critical factors for the success of the process are included in
everyday operating procedures.
Companies should expect to incur some costs with the implementation of problem
management. However, it isn't necessary to create a vast problem management
process that's capable of handling every single problem that arises. As a result,
the incremental costs of problem management are negligible. The hardware and
software tools needed are shared with other IT service management processes,
and the additional personnel costs are small.
You know that nifty new tool, just around the corner. Maybe it is Surface, a 30-inch
tabletop display which is used through a touch or gesture. The tabletop display
can recognize more than one touch at a time, enabling multiple users to
collaborate and interact. It also has the cool feature to recognize physical objects
marked with a special ID tag. So now the mouse and keyboard aren’t apart of the
computer interaction experience.
This is revolutionary. Imagine a bed board application right on the table top. User
access is determined by their barcode on the badge. Triggers for services are
automatic paging to housekeeping. Which in this model is staffed to have a bed
cleared within 15 minutes.
Now obviously this is a little to new in the hype cycle to be implemented, but let’s
go through the exercise of assessing how this potential technology will be useful
to our healthcare facility.
Impact on Cycle time Accelerates the cycle time by improving the location
of each patient based on movement.
The goal of this exercise is to cut through the hype and understand the purpose,
business intent, and goals of the emerging technology. Obviously more detail is
needed, and a larger pool of individuals ascertaining impact. However, the point is
to relate and describe the process.
June 7, 2007
• Qualified Sellers List – The Qualified Sellers List contains the list of
sellers who were approved to participate in the bidding process.
• Project Management Plan – The Project Management plan has the risk
register and risk-related contractual agreements. These documents will be
used within the selection process.
These inputs will allow the project team to make a reasonable, informed decision.
The next step is going about making the decision for the best candidate.
Thankfully once again we have some best practice guidelines to follow. The
recommended tools and techniques for the select sellers process are:
• Weighting Systems – The Weighting systems are employed to quantify
personal perspectives. To use a weighting system, assign a ranked weight
to each of the evaluation crieteria. Next, rate the vendor on each criteria,
multiply by the weight, and total the result for the overall score.
• Seller Rating Systems – Seller Rating systems rates sellers upon past
performance commonly reviewing quality, delivery performance, and
contractual compliance.
After using the above tools and techniques, you should be able to generate the
outputs of the select sellers process. Those outputs are:
• Selected Sellers – The selected sellers are vendors who have chosen.
• Contract – The contract is the agreement between the buyer and the
seller documenting the master service agreement, breakage terms,
addendums, statement of work, specifications and price.