Applicability of the itil lifecycle

Assignment Help Basic Computer Science
Reference no: EM13935936

Applicability of the ITIL Lifecycle

Let us look at the five phases of a service lifecycle - service strategy, service design, service transition, service operation and continuous service improvement, as shown below - and assess how IT specific each individual process is. We can differentiate between the ITIL methodologies on one hand (for example process management, roles, RACI matrix) and the objects used by ITIL on the other hand (for example KPI, asset type, resources, skills). The objects are by nature more or less ITIL specific. As ITIL itself does not try to standardise these objects, but remains a framework of Good Practices, the applicability of the ITIL methodology remains wide. However, when the processes strongly depend on the objects upon which they act, the processes can be regarded as "more IT specific". Some obvious examples are capacity management or access management.

Looking at the ITIL process template, split between process control, the actual process and process enablers, one can conclude that the field of enablers are mostly generic and industry specific (in particular resources and skills = capabilities).
The use of ITIL has facilitated the development of a common understanding and common definition of the operations processes and procedures, as well as the set-up of an SLA- and OLA-Management and service desk.

Improvements with ITIL Version 3

The goals of ITIL V3 are to better align IT with the business processes that it supports, and more generally to strengthen the link between IT and the corporate objectives. As a result, the areas of Service Strategy, Continuous Service Improvement - both life-cycle elements are completely new - as well as Service Operation, are the most noticeable additions in ITIL Version 3. Service Strategy and Continuous Service Improvement are described in the ITIL books in a way that makes their generalization for other categories of services possible. In our view, the novelty of ITIL V3 has been to articulate the relationship between IT and the company´s core business, and reinforce the role of IT as business enabler. This approach can also be adopted for other type of (non-IT) services.
The ITIL book on Service Operation does not address Request Fulfilment in much detail. Since the Request Fulfilment process includes standard changes, it may be of significantly greater importance in other industries. This is particularly true in telecoms when you look at the Level 2 and 3 definitions of the eTOM fulfilment process. In the ITIL terminology, almost all of the sub-processes that extend into logistics and field provisioning (think of the provisioning of a DSL connection), fall under Request Fulfilment. That ITIL does not put more emphasis on Request Fulfilment comes from the fact that ITIL still sees the service desk as the central point of the command for the execution of service requests.

The service desk, though not a process but a function, is included in the picture above. As single point of contact for customer, a service desk is in principle always needed. However, its representation in ITIL cannot be easily generalised. A special role is also assigned to the Common Service Operation Activities, sometimes called "Daily Operations". As an unstructured collection of tasks, they seem to be neglected by ITIL. A possible explanation is that these activities (such as making regular backups) are not driven by explicit service requests but are usually provided from a single source in the IT department, without additional process or provider interface. In any case, the Common Service Operation Activities, as described in ITIL, cannot be easily generalized. For example, think of complex processes such as preventive maintenance in telecoms, which fall under this category.

Concerning Continuous Service Improvement, in particular the area of governance, it is important to note that a number of partially competing standards already exist and can be used to evaluate current processes in terms of compliance and maturity. In addition to the ITIL Process Maturity Model (PMM), which is based on Capability Maturity Model CMM, these include COBIT, and the still very new, "CMMI for Services". Furthermore, there are separate standards for IT Security Management (ISO 27001) and for Business Continuity Management (BS 25999).

Reference no: EM13935936

Questions Cloud

What is the rationale for the existence of the ife : What is the rationale for the existence of the IFE? What are the implications of the IFE for firms with excess cash that consistently invest in foreign Treasury bills?
How management of firemaster could manipulate earnings : Explain how management of Firemaster could manipulate earnings in 2012 by producing more units than are actually needed to meet demand. Could this approach to earnings management be repeated year after year?
Analyze and solve problems utilizing independent judgment : Ability to analyze and solve problems utilizing independent judgment, including the ability to modify standard practices and adapt computer systems to solve a variety of software problems and meet specialized requirements
Should foreign investors invest in uk securities : Should UK investors invest in foreign securities if they believe in the IFE? Should foreign investors invest in UK securities if they believe in the IFE?
Applicability of the itil lifecycle : Let us look at the five phases of a service lifecycle - service strategy, service design, service transition, service operation and continuous service improvement, as shown below - and assess how IT specific each individual process is.
What is the discharge over the weir : A broad-crested weir is formed by cutting a rectangular notch in a 1.0-foot- thick concrete wall. The notch is 2.0 feet deep and 14.0 feet long. If an im- poundment rises up to the top of the wall, what is the discharge over the weir?
Select a program-quality improvement initiative : In this assignment, you will select a program, quality improvement initiative, or other project from your place of employment. Assume you are presenting this program to the board for approval of funding.
Estimate the time required to empty the tank halfway : What is the discharge - estimate the time required to empty the tank halfway.
What does interest rate imply expectations of uk inflation : What does this imply about expectations of UK inflation and Canadian inflation? What do these inflationary expectations suggest about future exchange rates?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Directaccess and remote access benefits

DirectAccess and Remote Access Benefits

  Lists the five different it systems identified

Create a diagram using Visio that lists the five different IT systems you identified

  Determine the number of students having scores

Write a program that reads a file ("scores.txt") consisting of students' test scores in the range of 0-200. These scores should be loaded into a one-dimensional array. Then the program should determine the number of students having scores in each ..

  Identify a software category that offers both a free product

Identify a software category that offers both a free product and a product you pay for, such as OpenOffice and Microsoft Office.

  Describe human successes and failure in technologies

Describe human successes in five technologies and human failures in five different technologies.

  Examine the goals of coupling and cohesion

Examine the goals of coupling and cohesion and the approaches to design you use to achieve those goals for your design.

  Physical transmission options, such as fiber optic

Physical transmission options, such as fiber optic, to provide connectivity for the stores. Wireless connectivity options, standards, and infrastructure to provide laptop connectivity. Satellite or point-to-point options should be explored.

  Recommendations for the next steps the merged company

Create a minimum 12 PowerPoint slides to summarize the policy review conducted and your recommendations for the next steps the merged company should take to protect its data and information assets. The cover, summary/conclusion and reference slides a..

  Will everything eventually be ethernet / csma/cd

Is Ethernet that good that it's the predominant form of LAN? Will everything eventually be Ethernet / CSMA/CD?

  Access point connectivity statistics collected

Minimum two paragraphs that summarizes your learning and concludes your accomplishments in the lab.

  The context of a database system

1. Discuss what a user view represents in the context of a database system.

  The woofwoof store specializes in food products

The WoofWoof Store specializes in food products for dogs and other household pets. In developing a new puppy food, company nutritionists have specified that the mixture must contain at least 16% protein, 13% fat, 12% vitamin, and no more than 15% fib..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd