SlideShare a Scribd company logo
“When we build, let us
think that we build for
ever.” – John Ruskin
Processes
   Service Level Management
   Availability Management
   Capacity Management
   IT Services Continuity Management
   Information Security Management
   Supplier Management
   Service Catalogue Management
   Design Coordination



Concepts
   4 P’s
   RACI Model
   SFIA (Skills Framework for Information Age)
Objectives

   Set specific and measurable - Targets

   Define, document, agree, monitor,
    measure, report and review the level of IT
    Services provided.

   Improve relationship & communication.

   Monitor and improve - Customer satisfaction

   Clear ambiguity

   Reporting SLAM, Service Reviews
Designing SLA Framework – Available Options
   Service-Based SLA:

   Customer-Based SLA:

   Multi-Level SLA:
     Corporate Level:
     Customer Level:
     Service Level:
Purpose

“To optimize the capability of the IT infrastructure and to
  support the organization by delivering a cost effective and
  sustained level of availability that enables the business to
  satisfy its objectives”
 Objectives
    Availability Plan

    Design Availability & validation

    Monitoring Av
        Provide advise and guidance, CAB member


    Addressing Av. Incidents / Diagnosis / Resolution

    Improvement

    Proactive measures
Purpose


To ensure the current and future capacity and performance
  demands of the customer regarding IT service provision are
  delivered against justifiable cost
 Objectives
    Capacity Plan

    Design capacity, monitor and influence
     demand

    Advise and guidance, CAB member

    Addressing Cp. Incidents / Diagnosing /
     Resolution

    Tuning / Sizing activities

    Proactive measures
Sub processes include…
 Business Capacity Management




   Service Capacity management



   Component Capacity Management
Objectives
 Aligning IT Security with Business
  Security.

   Protect information from harm due to
    failures of availability, integrity &
    confidentiality.
The Information Security Management process framework
  consists of:

   Information Security Policies

   Designing Security Controls
Purpose


Is to support the overall BCM process by ensuring that the risks
   that could seriously effect IT services are managed and the
   IT service provider can always provide minimum agreed
   business continuity related service levels
PLANS

   Service Continuity Plan




   IT Recovery Plan
Objectives

   Obtain value for money

   Ensure Underpinning Contracts are aligned to SLA, SLR’s

   Manage relationships with vendors

   Manage Suppliers performance, risk assessment

   Negotiate and agree contracts with them

   Maintain a SCMIS, CAB member
 Wholesale  Customer view AND
 Retail Customer view


 Supporting   Services view
 Purpose
    Ensure the goals and objectives of this stage are
     met by providing a ‘spoc’ for coordination and
     control for all activities and processes within this
     stage


 Responsible
            to produce Service Design
 Package (SDP) and hand over to Service
 Transition
   Define roles and responsibilities.




                                         23
 SFIA   (Skills Framework for Information Age)
    Common reference model for the identification of
     the skills needed to develop effective IT services,
     information systems and technology

More Related Content

What's hot

4sl Demand Management
4sl  Demand Management4sl  Demand Management
4sl Demand Management
tarransp
 
Anatomy Of Amou 16 20
Anatomy Of Amou 16 20Anatomy Of Amou 16 20
Anatomy Of Amou 16 20
RBCG1
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
Raminder Pal Singh
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
Info-Tech Research Group
 
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processesITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
Richard Grieman
 
Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili...
 Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili... Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili...
Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili...
ITC Infotech
 
Multi Vendor Sourcing Final For Hcl Global Conference April 2010
Multi Vendor Sourcing Final For Hcl Global Conference April 2010Multi Vendor Sourcing Final For Hcl Global Conference April 2010
Multi Vendor Sourcing Final For Hcl Global Conference April 2010
markhrobinson
 
ITIL Demand Management: why August is a bad time for a presentation
ITIL Demand Management: why August is a bad time for a presentationITIL Demand Management: why August is a bad time for a presentation
ITIL Demand Management: why August is a bad time for a presentation
HigherEdITMgt
 
Rajashekar narayana resume.doc new
Rajashekar narayana resume.doc newRajashekar narayana resume.doc new
Rajashekar narayana resume.doc new
Rajashekar Narayana
 
Shared Service Management - ITsmf Sweden 2015
Shared Service Management - ITsmf Sweden 2015Shared Service Management - ITsmf Sweden 2015
Shared Service Management - ITsmf Sweden 2015
TOPdesk
 
ITIL Service Transition 2011
ITIL Service Transition 2011ITIL Service Transition 2011
ITIL Service Transition 2011
Marvin Sirait
 
Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
EDR
 
ITIL Service Design 2011
ITIL Service Design 2011ITIL Service Design 2011
ITIL Service Design 2011
Marvin Sirait
 
Restaurant Facilities Management
Restaurant Facilities ManagementRestaurant Facilities Management
Restaurant Facilities Management
Jorge Rodriguez
 
Vendor Management: How Well Are You Managing Your Consultants and Appraisers?
Vendor Management: How Well Are You Managing Your Consultants and Appraisers?Vendor Management: How Well Are You Managing Your Consultants and Appraisers?
Vendor Management: How Well Are You Managing Your Consultants and Appraisers?
EDR
 
Chapter Vii Crm
Chapter Vii CrmChapter Vii Crm
Chapter Vii Crm
shail31873187
 
Itil v3 foundation study guide continual service improvement
Itil v3 foundation study guide   continual service improvementItil v3 foundation study guide   continual service improvement
Itil v3 foundation study guide continual service improvement
Muhammad Zamzani
 
ITIL Service Strategy 2011
ITIL Service Strategy 2011ITIL Service Strategy 2011
ITIL Service Strategy 2011
Marvin Sirait
 
resume_jignesh_
resume_jignesh_resume_jignesh_
resume_jignesh_
Jignesh Suratwala
 
Pro's and Con's of Project Management as a Service
Pro's and Con's of Project Management as a ServicePro's and Con's of Project Management as a Service
Pro's and Con's of Project Management as a Service
aap3itservices
 

What's hot (20)

4sl Demand Management
4sl  Demand Management4sl  Demand Management
4sl Demand Management
 
Anatomy Of Amou 16 20
Anatomy Of Amou 16 20Anatomy Of Amou 16 20
Anatomy Of Amou 16 20
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
 
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processesITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
 
Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili...
 Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili... Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili...
Well-defined BI Strategy & Roadmap, Improved Cost Visibility, BI Asset Utili...
 
Multi Vendor Sourcing Final For Hcl Global Conference April 2010
Multi Vendor Sourcing Final For Hcl Global Conference April 2010Multi Vendor Sourcing Final For Hcl Global Conference April 2010
Multi Vendor Sourcing Final For Hcl Global Conference April 2010
 
ITIL Demand Management: why August is a bad time for a presentation
ITIL Demand Management: why August is a bad time for a presentationITIL Demand Management: why August is a bad time for a presentation
ITIL Demand Management: why August is a bad time for a presentation
 
Rajashekar narayana resume.doc new
Rajashekar narayana resume.doc newRajashekar narayana resume.doc new
Rajashekar narayana resume.doc new
 
Shared Service Management - ITsmf Sweden 2015
Shared Service Management - ITsmf Sweden 2015Shared Service Management - ITsmf Sweden 2015
Shared Service Management - ITsmf Sweden 2015
 
ITIL Service Transition 2011
ITIL Service Transition 2011ITIL Service Transition 2011
ITIL Service Transition 2011
 
Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
 
ITIL Service Design 2011
ITIL Service Design 2011ITIL Service Design 2011
ITIL Service Design 2011
 
Restaurant Facilities Management
Restaurant Facilities ManagementRestaurant Facilities Management
Restaurant Facilities Management
 
Vendor Management: How Well Are You Managing Your Consultants and Appraisers?
Vendor Management: How Well Are You Managing Your Consultants and Appraisers?Vendor Management: How Well Are You Managing Your Consultants and Appraisers?
Vendor Management: How Well Are You Managing Your Consultants and Appraisers?
 
Chapter Vii Crm
Chapter Vii CrmChapter Vii Crm
Chapter Vii Crm
 
Itil v3 foundation study guide continual service improvement
Itil v3 foundation study guide   continual service improvementItil v3 foundation study guide   continual service improvement
Itil v3 foundation study guide continual service improvement
 
ITIL Service Strategy 2011
ITIL Service Strategy 2011ITIL Service Strategy 2011
ITIL Service Strategy 2011
 
resume_jignesh_
resume_jignesh_resume_jignesh_
resume_jignesh_
 
Pro's and Con's of Project Management as a Service
Pro's and Con's of Project Management as a ServicePro's and Con's of Project Management as a Service
Pro's and Con's of Project Management as a Service
 

Similar to Service design

Sd hdi 042008
Sd hdi 042008Sd hdi 042008
Sd hdi 042008
mhormech
 
ITIL presentation
ITIL presentationITIL presentation
ITIL presentation
mhormech
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)
Axios Systems
 
Sashi Manohar
Sashi ManoharSashi Manohar
Sashi Manohar
Sashi Manohar
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
Ravi Kiran
 
BPM Presentation - Mindcom
BPM Presentation - MindcomBPM Presentation - Mindcom
BPM Presentation - Mindcom
bdm_mindcomgroup
 
Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...
Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...
Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...
Lohfeld Consulting Group
 
Proposal Management: Best Industry Practices
Proposal Management: Best Industry PracticesProposal Management: Best Industry Practices
Proposal Management: Best Industry Practices
Lohfeld Consulting Group
 
Deepak Mysore Nagaraj (1)
Deepak Mysore Nagaraj (1)Deepak Mysore Nagaraj (1)
Deepak Mysore Nagaraj (1)
.Deepak Gowda
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
Alan McSweeney
 
About itil v3
About itil v3About itil v3
About itil v3
Abdulfattah Awajah
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
ITIL Indonesia
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
tlknecht
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
RamPrasad Kurakula
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
Kadimil
 
2 itil v3 concepts v1.8
2 itil v3 concepts   v1.82 itil v3 concepts   v1.8
2 itil v3 concepts v1.8
Karthik Arumugham
 
Sourcing Lecture 5 Directing Sourcing And Services
Sourcing Lecture 5 Directing Sourcing And ServicesSourcing Lecture 5 Directing Sourcing And Services
Sourcing Lecture 5 Directing Sourcing And Services
Frank Willems
 
V3 Service Design
V3 Service DesignV3 Service Design
V3 Service Design
Matthew Schwartz
 
Itil V3
Itil V3Itil V3
Itil V3
prakashjjaya
 
7 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.87 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.8
Karthik Arumugham
 

Similar to Service design (20)

Sd hdi 042008
Sd hdi 042008Sd hdi 042008
Sd hdi 042008
 
ITIL presentation
ITIL presentationITIL presentation
ITIL presentation
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)
 
Sashi Manohar
Sashi ManoharSashi Manohar
Sashi Manohar
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
 
BPM Presentation - Mindcom
BPM Presentation - MindcomBPM Presentation - Mindcom
BPM Presentation - Mindcom
 
Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...
Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...
Using cmmi, itil, and pm bo k to improve proposal operations - brenda crist 6...
 
Proposal Management: Best Industry Practices
Proposal Management: Best Industry PracticesProposal Management: Best Industry Practices
Proposal Management: Best Industry Practices
 
Deepak Mysore Nagaraj (1)
Deepak Mysore Nagaraj (1)Deepak Mysore Nagaraj (1)
Deepak Mysore Nagaraj (1)
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
 
About itil v3
About itil v3About itil v3
About itil v3
 
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
(ONLINE) ITIL Indonesia Community - IT Operation Practical Approach
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
2 itil v3 concepts v1.8
2 itil v3 concepts   v1.82 itil v3 concepts   v1.8
2 itil v3 concepts v1.8
 
Sourcing Lecture 5 Directing Sourcing And Services
Sourcing Lecture 5 Directing Sourcing And ServicesSourcing Lecture 5 Directing Sourcing And Services
Sourcing Lecture 5 Directing Sourcing And Services
 
V3 Service Design
V3 Service DesignV3 Service Design
V3 Service Design
 
Itil V3
Itil V3Itil V3
Itil V3
 
7 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.87 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.8
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Service design

  • 1. “When we build, let us think that we build for ever.” – John Ruskin
  • 2. Processes  Service Level Management  Availability Management  Capacity Management  IT Services Continuity Management  Information Security Management  Supplier Management  Service Catalogue Management  Design Coordination Concepts  4 P’s  RACI Model  SFIA (Skills Framework for Information Age)
  • 3.
  • 4. Objectives  Set specific and measurable - Targets  Define, document, agree, monitor, measure, report and review the level of IT Services provided.  Improve relationship & communication.  Monitor and improve - Customer satisfaction  Clear ambiguity  Reporting SLAM, Service Reviews
  • 5. Designing SLA Framework – Available Options  Service-Based SLA:  Customer-Based SLA:  Multi-Level SLA:  Corporate Level:  Customer Level:  Service Level:
  • 6. Purpose “To optimize the capability of the IT infrastructure and to support the organization by delivering a cost effective and sustained level of availability that enables the business to satisfy its objectives”
  • 7.  Objectives  Availability Plan  Design Availability & validation  Monitoring Av  Provide advise and guidance, CAB member  Addressing Av. Incidents / Diagnosis / Resolution  Improvement  Proactive measures
  • 8. Purpose To ensure the current and future capacity and performance demands of the customer regarding IT service provision are delivered against justifiable cost
  • 9.  Objectives  Capacity Plan  Design capacity, monitor and influence demand  Advise and guidance, CAB member  Addressing Cp. Incidents / Diagnosing / Resolution  Tuning / Sizing activities  Proactive measures
  • 10. Sub processes include…  Business Capacity Management  Service Capacity management  Component Capacity Management
  • 11. Objectives  Aligning IT Security with Business Security.  Protect information from harm due to failures of availability, integrity & confidentiality.
  • 12.
  • 13. The Information Security Management process framework consists of:  Information Security Policies  Designing Security Controls
  • 14.
  • 15.
  • 16. Purpose Is to support the overall BCM process by ensuring that the risks that could seriously effect IT services are managed and the IT service provider can always provide minimum agreed business continuity related service levels
  • 17. PLANS  Service Continuity Plan  IT Recovery Plan
  • 18. Objectives  Obtain value for money  Ensure Underpinning Contracts are aligned to SLA, SLR’s  Manage relationships with vendors  Manage Suppliers performance, risk assessment  Negotiate and agree contracts with them  Maintain a SCMIS, CAB member
  • 19.
  • 20.
  • 21.  Wholesale Customer view AND  Retail Customer view  Supporting Services view
  • 22.  Purpose  Ensure the goals and objectives of this stage are met by providing a ‘spoc’ for coordination and control for all activities and processes within this stage  Responsible to produce Service Design Package (SDP) and hand over to Service Transition
  • 23. Define roles and responsibilities. 23
  • 24.  SFIA (Skills Framework for Information Age)  Common reference model for the identification of the skills needed to develop effective IT services, information systems and technology

Editor's Notes

  1. “ Plausible Deniability”. Plausible – believable, credible