SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Welcome!
                 W l    !
                 Using M d l f Incidents, P bl
                 U i Models for I id      Problems, Changes
                                                    Ch
                 and Requests

                 Jayne Groll, ITSM Academy




© ITSM Academy                      1
About ITSM Academy

        Accredited Education                    Ft. Lauderdale, Dallas, Wash DC
                                                  & Phoenix - Public
          ITIL Foundation
                                                 Corporate on-site Classes
          ITIL Foundation and Managers Bridge
                                                 Virtual Classes
          ITIL Lifecycle, Capability and MALC
          Certified Process Design Engineer
                                                 Courseware Licensing
            (CPDE)                               Alumni Program
          ISO/IEC 20000 Foundation              PMI Global Education Provider
          Microsoft Operations Framework (MOF)  Federal Government (GSA)
                                                            Go ernment
            Foundation                            Contractor
        Practical, Value-Add Workshops          Certified Woman-Owned
          Apollo 13 - an ITSM Case Experience™  T
                                                  Tens of thousands of learners
                                                         f th     d fl
                                                  trained since 2003
          Visible Ops: The Class
                                                 ITSM Professional Diplomas
              ITIL, MOF, ISO 20K Awareness
              And More!                              Welcome!
© BayCare Health System
  ITSM Academy
   ITSM Academy                               2
Agenda

      What is a model?
      U i models f common processes
       Using d l for
        Incident
        P bl
        Problem
        Request
        Change
      Getting started with models



Thanks for joining us today.
Please use the chat feature to send in your questions.
© ITSM Academy                          3
What is a Model?

       A pre-defined set of procedures                   Model Elements
        for handling recurring incidents
                                incidents,
        problems, changes, requests                 Steps to be taken
                                                    Sequence of actions
       Ensures the process follows a
        prescribed path or timeline                 Responsibilities

       Predicts categorization and                 Timescales and thresholds
        priority (impact/urgency)                   Escalation procedures
       Can be automated                            St
                                                     Steps to preserve evidence
                                                           t             id

       Avoids “reinventing the wheel”
        for each situation

                 Models ensure consistent handling to meet SLA targets.



© ITSM Academy                             4
Models Can Be Very Simple


   Basic models
     Expedite low risk,
      high volume situations
     Become part of
      “standard operating
      procedures
      procedures”


                                   Request f software model
                                   R       for f        d l




© ITSM Academy                 5
Or Very Complex…

   Complex models
        Predict procedures,
         resources and timelines
        Avoid surprises and
         bottlenecks
        Define the “rules of
         engagement” in unique,
         high impact situations




© ITSM Academy                     6
                                       Major Incident Model
Using M d l f C
                 U i Models for Common Processes
                                       P




© ITSM Academy                7
Incident Models

            Many incidents involve dealing with something that has happened
                           before and may well happen again.

                          Incident models can be useful for handling
                            Operational incidents from events
                            Security incidents
                            Capacity incidents
                            Common desktop incidents
                            Incidents requiring a site visit
                            Major incidents



© ITSM Academy                             8
Problem Models

           Many problems will be unique and require individual handling.


          Problem models can be useful for handling
                 Dormant problems
                           p
                 Underlying problems
                 Repetitive problems (across domains, regions, etc.)
                    p        p        (              , g ,          )
                 Supplier-dependent problems
                 Major Problems

          Problem models will also help define the skills required to identify
                   root cause and permanently remove the error
                                                             error.


© ITSM Academy                               9
Request Models

                     A service request is a user request for a proven, repeatable,
                              preapproved and proceduralized service.


          Request Models can be useful for handling
                  New hires
                  Moves
                  Desktop software installation
                 RRequests f access to a service
                            for                 i
                  Requests for information or help (questions)
                  Standard procurements and services

                         Request models should include thresholds for
                                scope, budget and authorities.


© ITSM Academy                                 10
Change Models (1)

      Change models will define the entry into and rigor of Change Management.

                        Change models will
                            Communicate what people should expect for
                             each type of change
                            Define the steps for a specific type of change
                                                      p
                            Be based on risk and impact
                            Define authorities and approval
                            Describe the level of impact assessment
                            D f timelines and possibly scheduling
                             Define      l       d      bl    h d l
                            Describe documentation requirements
                 Change models can reduce the level of bureaucracy
                      associated with Change Management.

© ITSM Academy                           11
Change Models (2)

          Change Models can be useful in handling
                 Standard h
                 S d d changes
                 Major technology or application changes
                 Local changes
                 Emergency changes
                 Changes to the Service Portfolio
                       g
                 RFCs to a specific service
                 Project scope change proposal
                 Operational activities such as tuning, no-impact reboots
                  and planned maintenance

            There should be a separate model for each approved standard change.

© ITSM Academy                             12
Change Model for Outsourcing (ST Figure 5.3)




                                  © Crown copyright 2007. Reproduced under license from OGC.


© ITSM Academy               13
Getting Started with Models (1)

                    Review incident, change, problem and
                     request records for the most common
                             t      d f th       t
                     or frequent types of situations
                    Build initial models from previously
                     successful and timely procedures
                    Build new models as situations arise
                     and lessons learned
                    Make the models readily available
                     and easy to understand –
                     communication is key to success!


© ITSM Academy                14
Getting Started with Models (2)

            Adapt the models as necessary
            Put every model under Change Control
            Whenever possible, automate the models
            Report on the use and success of each model
            Keep it simple!




© ITSM Academy                     15
Questions?
                 Q ti ?




© ITSM Academy                16
ITSM Academy Affiliates




© ITSM Academy               17

Contenu connexe

Tendances

Cloud Certification Program Overview
Cloud Certification Program OverviewCloud Certification Program Overview
Cloud Certification Program Overview
ITpreneurs
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
Compuware APM
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated Systems
IBMGovernmentCA
 
Cstd presentation final
Cstd presentation finalCstd presentation final
Cstd presentation final
Mary Kyer
 
New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!
Tri Tuns
 
New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!
Khazret Sapenov
 
Unikomm Presentation 2012
Unikomm Presentation 2012Unikomm Presentation 2012
Unikomm Presentation 2012
usmanrosh
 
Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...
IBM Rational software
 
Wind River For Medical
Wind River For MedicalWind River For Medical
Wind River For Medical
sheilamia
 

Tendances (20)

Eight deadly defects in systems engineering and how to fix them
Eight deadly defects in systems engineering and how to fix themEight deadly defects in systems engineering and how to fix them
Eight deadly defects in systems engineering and how to fix them
 
Cloud Certification Program Overview
Cloud Certification Program OverviewCloud Certification Program Overview
Cloud Certification Program Overview
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
 
CIM_E_24.2.12
CIM_E_24.2.12CIM_E_24.2.12
CIM_E_24.2.12
 
IEM_E_13.2.12
IEM_E_13.2.12IEM_E_13.2.12
IEM_E_13.2.12
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated Systems
 
Presentación Corporativa The Vision IT Group
Presentación Corporativa The Vision IT GroupPresentación Corporativa The Vision IT Group
Presentación Corporativa The Vision IT Group
 
CMS_01.03.12
CMS_01.03.12CMS_01.03.12
CMS_01.03.12
 
Cstd presentation final
Cstd presentation finalCstd presentation final
Cstd presentation final
 
Russia - Application Management
Russia - Application ManagementRussia - Application Management
Russia - Application Management
 
SOA Mainframe Decision Management
SOA Mainframe Decision ManagementSOA Mainframe Decision Management
SOA Mainframe Decision Management
 
UPMC
UPMCUPMC
UPMC
 
IRM_E_13.03.2012
IRM_E_13.03.2012IRM_E_13.03.2012
IRM_E_13.03.2012
 
IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud
IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the CloudIBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud
IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud
 
New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!
 
New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!
 
Unikomm Presentation 2012
Unikomm Presentation 2012Unikomm Presentation 2012
Unikomm Presentation 2012
 
Using Six Sigma to Drive Tangible Service Desk Improvement and Savings
Using Six Sigma to Drive Tangible Service Desk Improvement and SavingsUsing Six Sigma to Drive Tangible Service Desk Improvement and Savings
Using Six Sigma to Drive Tangible Service Desk Improvement and Savings
 
Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...
 
Wind River For Medical
Wind River For MedicalWind River For Medical
Wind River For Medical
 

En vedette

Known Error Database (KEDB)
Known Error Database (KEDB)Known Error Database (KEDB)
Known Error Database (KEDB)
Vimal Patel
 
Root Cause Analysis template
Root Cause Analysis templateRoot Cause Analysis template
Root Cause Analysis template
CPEDInitiative
 

En vedette (13)

Incident Management
Incident ManagementIncident Management
Incident Management
 
CSPO Certification
CSPO CertificationCSPO Certification
CSPO Certification
 
Known Error Database (KEDB)
Known Error Database (KEDB)Known Error Database (KEDB)
Known Error Database (KEDB)
 
Change Management - UC Berkeley Extension
Change Management  - UC Berkeley ExtensionChange Management  - UC Berkeley Extension
Change Management - UC Berkeley Extension
 
Root Cause Analysis template
Root Cause Analysis templateRoot Cause Analysis template
Root Cause Analysis template
 
Internal communications with SnapComms
Internal communications with SnapCommsInternal communications with SnapComms
Internal communications with SnapComms
 
Unity in diversity in india
Unity in diversity in indiaUnity in diversity in india
Unity in diversity in india
 
Snapshot of Digital India - October 2016
Snapshot of Digital India - October 2016Snapshot of Digital India - October 2016
Snapshot of Digital India - October 2016
 
India PPT
India PPTIndia PPT
India PPT
 
Snapshot of Digital India- March 2016
Snapshot of Digital India- March 2016Snapshot of Digital India- March 2016
Snapshot of Digital India- March 2016
 
CULTURES OF INDIA
CULTURES OF INDIACULTURES OF INDIA
CULTURES OF INDIA
 
Internal Communication Ideas - 10 Simple Secrets to Totally Rock Your Interna...
Internal Communication Ideas - 10 Simple Secrets to Totally Rock Your Interna...Internal Communication Ideas - 10 Simple Secrets to Totally Rock Your Interna...
Internal Communication Ideas - 10 Simple Secrets to Totally Rock Your Interna...
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similaire à Using Models for Incident, Change, Problem and Request Fulfillment Management - ITSM Academy Webinar

Lessons from the ITSM Trenches
Lessons from the ITSM TrenchesLessons from the ITSM Trenches
Lessons from the ITSM Trenches
ITSM Academy, Inc.
 

Similaire à Using Models for Incident, Change, Problem and Request Fulfillment Management - ITSM Academy Webinar (20)

Problem Management
Problem ManagementProblem Management
Problem Management
 
ITSM Academy Webinar - Incident Management
ITSM Academy Webinar - Incident ManagementITSM Academy Webinar - Incident Management
ITSM Academy Webinar - Incident Management
 
ITSM Academy Webinar - Process Maturity, It's Not About the Numbers
ITSM Academy Webinar -  Process Maturity, It's Not About the NumbersITSM Academy Webinar -  Process Maturity, It's Not About the Numbers
ITSM Academy Webinar - Process Maturity, It's Not About the Numbers
 
IT and Business Service Catalogs
IT and Business Service CatalogsIT and Business Service Catalogs
IT and Business Service Catalogs
 
Lessons from the ITSM Trenches
Lessons from the ITSM TrenchesLessons from the ITSM Trenches
Lessons from the ITSM Trenches
 
Using Six Sigma to Drive Service Desk Improvements
Using Six Sigma to Drive Service Desk ImprovementsUsing Six Sigma to Drive Service Desk Improvements
Using Six Sigma to Drive Service Desk Improvements
 
Five Proven Strategies for Reducing Costs with IT Service Management - ITSM A...
Five Proven Strategies for Reducing Costs with IT Service Management - ITSM A...Five Proven Strategies for Reducing Costs with IT Service Management - ITSM A...
Five Proven Strategies for Reducing Costs with IT Service Management - ITSM A...
 
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarIntegrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy Webinar
 
Higher education IAM-seminar Turku 10.12.2009
Higher education IAM-seminar Turku 10.12.2009Higher education IAM-seminar Turku 10.12.2009
Higher education IAM-seminar Turku 10.12.2009
 
Application resilience: challenges and good practice
Application resilience: challenges and good practiceApplication resilience: challenges and good practice
Application resilience: challenges and good practice
 
Putting the PRO in PROcess Design - ITSM Academy Webinar
Putting the PRO in PROcess Design - ITSM Academy WebinarPutting the PRO in PROcess Design - ITSM Academy Webinar
Putting the PRO in PROcess Design - ITSM Academy Webinar
 
Rsc 2009 Process Management Yesterday Today Tomorrow
Rsc 2009   Process Management Yesterday Today TomorrowRsc 2009   Process Management Yesterday Today Tomorrow
Rsc 2009 Process Management Yesterday Today Tomorrow
 
Service Management Definitions
Service Management DefinitionsService Management Definitions
Service Management Definitions
 
ITIL 2011 Explained
ITIL 2011 ExplainedITIL 2011 Explained
ITIL 2011 Explained
 
We Don't Like our Service Management Tool
We Don't Like our Service Management ToolWe Don't Like our Service Management Tool
We Don't Like our Service Management Tool
 
A perspective on cloud computing and enterprise saa s applications
A perspective on cloud computing and enterprise saa s applicationsA perspective on cloud computing and enterprise saa s applications
A perspective on cloud computing and enterprise saa s applications
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
 
Dom introduction-website-v1.0
Dom introduction-website-v1.0Dom introduction-website-v1.0
Dom introduction-website-v1.0
 
ITSM Governance Overview
ITSM Governance OverviewITSM Governance Overview
ITSM Governance Overview
 
Knowledge is Power
Knowledge is PowerKnowledge is Power
Knowledge is Power
 

Plus de ITSM Academy, Inc.

Plus de ITSM Academy, Inc. (20)

SRE Roundtable with 4 DevOps Ambassadors
SRE Roundtable with 4 DevOps AmbassadorsSRE Roundtable with 4 DevOps Ambassadors
SRE Roundtable with 4 DevOps Ambassadors
 
How to improve Customer and Employee Experience with IT Service Management
How to improve Customer and Employee Experience with IT Service ManagementHow to improve Customer and Employee Experience with IT Service Management
How to improve Customer and Employee Experience with IT Service Management
 
ITIL® 4 DSV - Drive Stakeholder Value
ITIL® 4 DSV - Drive Stakeholder ValueITIL® 4 DSV - Drive Stakeholder Value
ITIL® 4 DSV - Drive Stakeholder Value
 
ITIL® 4 HVIT - High Velocity IT
ITIL® 4 HVIT - High Velocity ITITIL® 4 HVIT - High Velocity IT
ITIL® 4 HVIT - High Velocity IT
 
ITIL4 and ServiceNow
ITIL4 and ServiceNowITIL4 and ServiceNow
ITIL4 and ServiceNow
 
Adding Value with Change Management
Adding Value with Change ManagementAdding Value with Change Management
Adding Value with Change Management
 
Is this the End of ITIL? NO, it is the end-to-end of ITIL!
Is this the End of ITIL? NO, it is the end-to-end of ITIL!Is this the End of ITIL? NO, it is the end-to-end of ITIL!
Is this the End of ITIL? NO, it is the end-to-end of ITIL!
 
Artificial Intelligence (AI) & The Future of Employee Service
Artificial Intelligence (AI) & The Future of Employee ServiceArtificial Intelligence (AI) & The Future of Employee Service
Artificial Intelligence (AI) & The Future of Employee Service
 
Change Control in ITIL4: So Much More Than a New Name
Change Control in ITIL4: So Much More Than a New NameChange Control in ITIL4: So Much More Than a New Name
Change Control in ITIL4: So Much More Than a New Name
 
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
 
The Anatomy of XLA: eXperience Level Agreements
The Anatomy of XLA: eXperience Level AgreementsThe Anatomy of XLA: eXperience Level Agreements
The Anatomy of XLA: eXperience Level Agreements
 
DevSecOps - Blue is the new Green
DevSecOps - Blue is the new GreenDevSecOps - Blue is the new Green
DevSecOps - Blue is the new Green
 
Mapping Your Journey to ITIL Island
Mapping Your Journey to ITIL IslandMapping Your Journey to ITIL Island
Mapping Your Journey to ITIL Island
 
More on ITIL 4. The Conversation Continues
More on ITIL 4. The Conversation ContinuesMore on ITIL 4. The Conversation Continues
More on ITIL 4. The Conversation Continues
 
ITIL 4. The Next Evolution
ITIL 4. The Next EvolutionITIL 4. The Next Evolution
ITIL 4. The Next Evolution
 
Ask Me Anything - Lean Edition
Ask Me Anything - Lean EditionAsk Me Anything - Lean Edition
Ask Me Anything - Lean Edition
 
Innovate ITIL with DevOps
Innovate ITIL with DevOpsInnovate ITIL with DevOps
Innovate ITIL with DevOps
 
Modernizing Service Management Processes with Self-Service Access
Modernizing Service Management Processes with Self-Service AccessModernizing Service Management Processes with Self-Service Access
Modernizing Service Management Processes with Self-Service Access
 
Service Portfolio - Preparing for the Future of your Organization
Service Portfolio - Preparing for the Future of your OrganizationService Portfolio - Preparing for the Future of your Organization
Service Portfolio - Preparing for the Future of your Organization
 
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy WebinarStatus Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Using Models for Incident, Change, Problem and Request Fulfillment Management - ITSM Academy Webinar

  • 1. Welcome! W l ! Using M d l f Incidents, P bl U i Models for I id Problems, Changes Ch and Requests Jayne Groll, ITSM Academy © ITSM Academy 1
  • 2. About ITSM Academy  Accredited Education  Ft. Lauderdale, Dallas, Wash DC & Phoenix - Public  ITIL Foundation  Corporate on-site Classes  ITIL Foundation and Managers Bridge  Virtual Classes  ITIL Lifecycle, Capability and MALC  Certified Process Design Engineer  Courseware Licensing (CPDE)  Alumni Program  ISO/IEC 20000 Foundation  PMI Global Education Provider  Microsoft Operations Framework (MOF)  Federal Government (GSA) Go ernment Foundation Contractor  Practical, Value-Add Workshops  Certified Woman-Owned  Apollo 13 - an ITSM Case Experience™  T Tens of thousands of learners f th d fl trained since 2003  Visible Ops: The Class  ITSM Professional Diplomas  ITIL, MOF, ISO 20K Awareness  And More! Welcome! © BayCare Health System ITSM Academy ITSM Academy 2
  • 3. Agenda  What is a model?  U i models f common processes Using d l for Incident P bl Problem Request Change  Getting started with models Thanks for joining us today. Please use the chat feature to send in your questions. © ITSM Academy 3
  • 4. What is a Model?  A pre-defined set of procedures Model Elements for handling recurring incidents incidents, problems, changes, requests  Steps to be taken  Sequence of actions  Ensures the process follows a prescribed path or timeline  Responsibilities  Predicts categorization and  Timescales and thresholds priority (impact/urgency)  Escalation procedures  Can be automated  St Steps to preserve evidence t id  Avoids “reinventing the wheel” for each situation Models ensure consistent handling to meet SLA targets. © ITSM Academy 4
  • 5. Models Can Be Very Simple  Basic models  Expedite low risk, high volume situations  Become part of “standard operating procedures procedures” Request f software model R for f d l © ITSM Academy 5
  • 6. Or Very Complex…  Complex models  Predict procedures, resources and timelines  Avoid surprises and bottlenecks  Define the “rules of engagement” in unique, high impact situations © ITSM Academy 6 Major Incident Model
  • 7. Using M d l f C U i Models for Common Processes P © ITSM Academy 7
  • 8. Incident Models Many incidents involve dealing with something that has happened before and may well happen again.  Incident models can be useful for handling Operational incidents from events Security incidents Capacity incidents Common desktop incidents Incidents requiring a site visit Major incidents © ITSM Academy 8
  • 9. Problem Models Many problems will be unique and require individual handling.  Problem models can be useful for handling Dormant problems p Underlying problems Repetitive problems (across domains, regions, etc.) p p ( , g , ) Supplier-dependent problems Major Problems Problem models will also help define the skills required to identify root cause and permanently remove the error error. © ITSM Academy 9
  • 10. Request Models A service request is a user request for a proven, repeatable, preapproved and proceduralized service.  Request Models can be useful for handling  New hires  Moves  Desktop software installation RRequests f access to a service for i  Requests for information or help (questions)  Standard procurements and services Request models should include thresholds for scope, budget and authorities. © ITSM Academy 10
  • 11. Change Models (1) Change models will define the entry into and rigor of Change Management.  Change models will  Communicate what people should expect for each type of change  Define the steps for a specific type of change p  Be based on risk and impact  Define authorities and approval  Describe the level of impact assessment  D f timelines and possibly scheduling Define l d bl h d l  Describe documentation requirements Change models can reduce the level of bureaucracy associated with Change Management. © ITSM Academy 11
  • 12. Change Models (2)  Change Models can be useful in handling Standard h S d d changes Major technology or application changes Local changes Emergency changes Changes to the Service Portfolio g RFCs to a specific service Project scope change proposal Operational activities such as tuning, no-impact reboots and planned maintenance There should be a separate model for each approved standard change. © ITSM Academy 12
  • 13. Change Model for Outsourcing (ST Figure 5.3) © Crown copyright 2007. Reproduced under license from OGC. © ITSM Academy 13
  • 14. Getting Started with Models (1)  Review incident, change, problem and request records for the most common t d f th t or frequent types of situations  Build initial models from previously successful and timely procedures  Build new models as situations arise and lessons learned  Make the models readily available and easy to understand – communication is key to success! © ITSM Academy 14
  • 15. Getting Started with Models (2)  Adapt the models as necessary  Put every model under Change Control  Whenever possible, automate the models  Report on the use and success of each model  Keep it simple! © ITSM Academy 15
  • 16. Questions? Q ti ? © ITSM Academy 16
  • 17. ITSM Academy Affiliates © ITSM Academy 17