SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Secrets to Successful Service Level Management

The workable, practical guide to Do IT Yourself

Page 1 of 4

Vol. 5.13 • April 1, 2009

Secrets to Successful Service Level Management
By Hank Marquis
Hank is EVP of Knowledge Management at Universal Solutions Group, and Founder and Director of NABSM.ORG. Contact Hank by email at
hank.marquis@usgct.com. View Hank’s blog at www.hankmarquis.info.

M anually

creating after-the-fact monthly reports is not performing Service Level
Management (SLM). SLM must show both current and past status as well as predict future
problems, and this requires automation and daily or even real-time analysis of data.

Most of us know Service Level Management (SLM) is a process described in the IT Infrastructure Library®
(ITIL®). Most of us know SLM encompasses more than writing Service Level Agreements (SLA) and Service Catalogs.
The ITIL defines Service Level Management as “Ensuring that agreed IT services are delivered when and where they are
supposed to be delivered.”
IT services are collections of Configuration Items (CIs) considered as an end-to-end system that delivers utility to a user of
the system. Some example services include: SAP, CRM, Email, Stock trading, etc.
Many think SLM is simply reporting on how IT did during the last month. But SLM is much more than that. SLM can
and should drive the entire IT organization, and performing SLM correctly can also result in significant operational
improvements and cost reductions.
Here are just 7 ways effective SLM can improve IT service quality, achieve business/IT alignment, increase IT efficiency,
and reduce the costs of IT:
1. Obtain refunds, rebates, credits through vendor management
2. Gain higher discounts through consolidation identified by vendor management
3. Reduce costs through idle capacity re-allocation and proactive performance and capacity forecasting
4. Avoid redundant and/or unneeded infrastructure investments
5. Save money on maintenance renewals with improved asset management
6. Improve organizational responsiveness
7. Increase end-user productivity
Obtaining these benefits requires work, and some tricks of the trade. Following I share 7 secrets to SLM success.

Secret #1: Service level reporting is not service level management
Many IT organizations misunderstand the role of Service Level Agreements (SLA) and focus them on technical
parameters of a single technology instead of an end-to-end business description. They monitor SLAs independently of one
another and usually manually integrate the results.
Today, most organizations implement service level reporting, not SLM. The problems with service level reporting include:
It is old news
It is a manual process, involving 10s to 100s of people
It generates reams of paper, error-prone and subjective
Service level reporting is a manual process that typically describes what happened during the last period. This is an
important distinction – SLM seeks to ensure uninterrupted quality of service. Service level reporting simply reports what
happened.

http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm

4/1/2009
Secrets to Successful Service Level Management

Page 2 of 4

For example, service level reporting might say “we went down for 8 hours on Thursday the 20th.” This adds little value to
the business – don't you think that they already know they could not operate for 8 hours that day?
Effective SLM would seek to proactively observe SLA compliance, strive to predict an outage coming, and take action to
prevent the issue before the outage occurred. ITIL refers to this as a Service Improvement Program (SIP.)

Secret #2: Effective SLM requires clear, service-oriented SLAs
Service Level Agreements are agreements with customers about services for users. SLAs encompass the agreed-upon
service levels, modeled after business, customer, and user requirements.
A SLA represents the negotiated requirements of the customer, or Service Level Requirements (SLR.) SLAs should be
visible to both customers and IT and it is important to keep SLAs in easy to understand business terms.
Instead of describing the service as follows:
“the server shall maintain 1000MB free disk space at all time, never have less than 40% CPU cycles available for
more than 2 seconds, have at least 256MB memory free for caching at all times, and will not swap to disk more
than 10 times per second.”
Consider instead:
“the email service shall always allow the user to store messages with attachments of any size up to 10MB. All
emails and attachments combined shall not exceed 1000MB. Any new emails and attachments that when
combined with existing stored emails and attachments are larger than 1000MB will not be stored until other
emails and attachments are deleted by the user. An authorized user shall be able to open a stored email in an
average of 5 seconds, and no email shall take longer than 30 seconds to open. By special arrangement customer
can request additional storage by contacting the service desk and referencing attachment A.”
Note the difference. What exactly does the first paragraph say? Someone in IT might be able to understand what it
means, but it certainly does not describe things in business terms.
The second paragraph is very clear, describes what the user will be able to do with the service, and also provides a “way
out” should one be required.

Secret #3: Effective SLM requires definition of multiple Requirements and Targets
Service Level Requirements (SLR) express the needs of the customer. Service Level Targets (SLT) reflect the objective of
the IT service provider organization. SLRs and SLTs do not always equate.
For example, the requirement from the business (SLR) might be for sub-second response time, but the best possible
solution available might be 2 seconds (SLT). The business may also need at least 95% uptime and IT might be able to
provide 99% uptime. Thus, SLR and SLT are not the same, and they may not align.
SLRs get negotiated into SLTs, and the SLTs go into the SLA. SLTs should be expressed in terms of a Critical Success
Factor (CSF) and measured by means of a Key Performance Indicator (KPI.)
If possible you should include multiple such statements, each equally easy to understand. For example:
“Monday through Friday, from 8am EST to 5pm EST an authorized user of the system can contact a support
agent via phone, fax, email, or instant message. A support agent will acknowledge the request for support within
5 minutes of receipt, collect relevant information from the user (including workstation ID, employee ID,
application name, incident details) within 15 minutes of receipt, and escalate or resolve the incident with 30
minutes of receipt.”
“Average mean time to repair (MTTR) where MTTR means the elapsed time from acknowledgement of receipt to
restoration of normal activities shall be no longer than 4 hours. Any incident with MTTR of more than 4 hours
will be reviewed by a specialist to determine why, and those reasons shall be shared with the customer at the
customers’ discretion and convenience.”

http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm

4/1/2009
Secrets to Successful Service Level Management

Page 3 of 4

Note how the SLA shapes up to be very readable, clear, and concise. Each SLT is its own statement. Each SLT is selfcontained, measurable and thus reportable.
Other elements to include in the SLA include signatures, reporting intervals, costs (if any) and other related data. Keep
the non-service legal stuff in a contract, not the SLA.

Secret #4: Effective SLRs & SLTs require LOB alignment
Lines of Business (LOB) are tiers of customers or users. They often include locations, specific applications, unique
requirements and hours of operation.
One SLA often cannot meet the needs of all lines of business. The only way to understand the unique service level
requirements of each line of business is to meet with them and discuss their unique needs.
Only this way can you establish the breadth and depth of the service level requirements that you will publish in the SLA.

Secret #5: Effective SLA’s require breadth and depth
An SLA requires multiple dimensions including: Capacity, latency, availability, performance, continuity, security, etc.
Consider the following statement from an SLA:
“Monday through Friday, from 8am EST to 5pmEST, when operating under normal conditions (where normal
means not in dial-backup) an authorized user of the system can retrieve a customer record in less than 5 seconds.
No more than 10 times during the month when operating under normal conditions will any record take more
than 30 seconds to retrieve.”
Note the inclusion in business terms of:
Availability “Monday through Friday, from 8am EST to 5pmEST”
Continuity “when operating under normal conditions (where normal means not in dial-backup)”
Capacity “can retrieve a customer record in less than 5 seconds)”
Security “an authorized user of the system”
Note how the statement also includes the ability to “miss” the main target no more than 10 times per month.

Secret #6: Effective SLA’s require multiple data sources
With multiple clauses and targets a SLA requires multiple information sources. These include availability, capacity,
continuity, and security. SLM requires data from many CIs. The best place to get this data is from the operational tools
that manage those CIs, making data mining a key. This data will come from a number of sources:
Mainframe, mid-range
Network, applications
Web, HR
The best place for acquiring this raw data is existing systems and network management platforms already in place. The
golden rule is to agree only to targets for which you have monitors.

Secret #7: Effective SLM requires automation
Several studies have shown that most SLAs are incorrectly reported. The sheer volume of data and the calculations
required to produce the report generates errors in the report.
Put another way, it is virtually impossible to aggregate all the target metrics and data, add them up, do the math, and
then transcribe them correctly. Invariably, errors get introduced, making the SLA report useless. As the number of SLAs
and targets increase the errors multiply.
To resolve this issue more than one company has an entire group responsible for preparing the “monthly report” – and
this is the trap. Monthly reports done manually are almost always after-the-fact and thus service level reporting, not
SLM.

http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm

4/1/2009
Secrets to Successful Service Level Management

Page 4 of 4

Make every effort to use automated systems. Define and agree targets with customers for which you have or will obtain a
monitoring tool. Then, integrate using programs or calculations that require no human interaction. The more human
touch the more chance for the introduction of “human error” into the report.

Summary
Service Level Management must align with user needs. SLAs must include targets for capacity, availability, security,
continuity, etc. Target attainment data will come from many sources, and you need to track the target at its source, as
well as the entire SLA (end-to-end). SLM solutions must show both current and past status as well as predict future
problems, and this requires automation and daily or even real-time analysis of data.
The benefits are many:
By monitoring vendor performance that underpins your SLAs you can manage vendors.
Often you can obtain savings by obtaining refunds, rebates, and credits due to poor performance.
Vendor management can lead to higher discounts through consolidation.
Monitoring utilization of service CIs lets your spot idle and/or underutilized capacity.
You can reduce costs through idle capacity re-allocation.
Proactive performance and capacity forecasting driven from SLA and SLR monitoring helps plan purchases.
Improved asset management produces savings by avoiding redundant infrastructure investments and saving money
on unnecessary maintenance renewals.
Sound SLM increases end-user productivity.
All in all a real positive payback awaits those who move from service level reporting to Service Level Management!

Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved.
ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002).

http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm

4/1/2009

Weitere ähnliche Inhalte

Was ist angesagt?

An overview on kovair it service management saa s solution
An overview on kovair it service management saa s solutionAn overview on kovair it service management saa s solution
An overview on kovair it service management saa s solutionKovair
 
Cloud Cheap Assignment Help
Cloud Cheap Assignment HelpCloud Cheap Assignment Help
Cloud Cheap Assignment HelpNicole Valerio
 
1. Automated Business Process
1. Automated Business Process1. Automated Business Process
1. Automated Business ProcessAshish Desai
 
Enabling The Service-Oriented Enterprise
Enabling The Service-Oriented EnterpriseEnabling The Service-Oriented Enterprise
Enabling The Service-Oriented EnterpriseNathaniel Palmer
 
The SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and CredibilityThe SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and Credibilityuptime software
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDBManageEngine
 
Top 10 accounting (1)
Top 10 accounting (1)Top 10 accounting (1)
Top 10 accounting (1)fccccccsa
 

Was ist angesagt? (7)

An overview on kovair it service management saa s solution
An overview on kovair it service management saa s solutionAn overview on kovair it service management saa s solution
An overview on kovair it service management saa s solution
 
Cloud Cheap Assignment Help
Cloud Cheap Assignment HelpCloud Cheap Assignment Help
Cloud Cheap Assignment Help
 
1. Automated Business Process
1. Automated Business Process1. Automated Business Process
1. Automated Business Process
 
Enabling The Service-Oriented Enterprise
Enabling The Service-Oriented EnterpriseEnabling The Service-Oriented Enterprise
Enabling The Service-Oriented Enterprise
 
The SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and CredibilityThe SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and Credibility
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDB
 
Top 10 accounting (1)
Top 10 accounting (1)Top 10 accounting (1)
Top 10 accounting (1)
 

Andere mochten auch

Andere mochten auch (10)

Dit yvol3iss17
Dit yvol3iss17Dit yvol3iss17
Dit yvol3iss17
 
Dit yvol2iss21
Dit yvol2iss21Dit yvol2iss21
Dit yvol2iss21
 
Dit yvol2iss42
Dit yvol2iss42Dit yvol2iss42
Dit yvol2iss42
 
Dit yvol3iss31
Dit yvol3iss31Dit yvol3iss31
Dit yvol3iss31
 
Dit yvol2iss23
Dit yvol2iss23Dit yvol2iss23
Dit yvol2iss23
 
Dit yvol4iss28
Dit yvol4iss28Dit yvol4iss28
Dit yvol4iss28
 
Dit yvol3iss3
Dit yvol3iss3Dit yvol3iss3
Dit yvol3iss3
 
Dit yvol2iss32
Dit yvol2iss32Dit yvol2iss32
Dit yvol2iss32
 
Dit yvol5iss19
Dit yvol5iss19Dit yvol5iss19
Dit yvol5iss19
 
Dit yvol5iss9
Dit yvol5iss9Dit yvol5iss9
Dit yvol5iss9
 

Ähnlich wie Dit yvol5iss13

A Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAsA Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAsTechExcel
 
4 Tips for Better SLAs.
4 Tips for Better SLAs.4 Tips for Better SLAs.
4 Tips for Better SLAs.Tanya Marshall
 
CIHS Top Tip - 4 Tips for better SLA's V2.0
CIHS Top Tip - 4 Tips for better SLA's V2.0CIHS Top Tip - 4 Tips for better SLA's V2.0
CIHS Top Tip - 4 Tips for better SLA's V2.0Tanya Marshall
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentationsubtitle
 
Integrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAsIntegrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAsAxios Systems
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessSafar Safarov
 
ITIL service design
ITIL service designITIL service design
ITIL service designRasha Ragab
 
Topic The top 5 details that should be included in your cloud SLA..docx
Topic The top 5 details that should be included in your cloud SLA..docxTopic The top 5 details that should be included in your cloud SLA..docx
Topic The top 5 details that should be included in your cloud SLA..docxjuliennehar
 
Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay Rae
 
The IT Service Definition Journey
The IT Service Definition JourneyThe IT Service Definition Journey
The IT Service Definition JourneyPete Hidalgo
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITIONBhavanthSoni
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...31West Global Services
 
Multi-supplier governance
Multi-supplier governance Multi-supplier governance
Multi-supplier governance WGroup
 
CMG White Paper
CMG White PaperCMG White Paper
CMG White PaperLen Jejer
 

Ähnlich wie Dit yvol5iss13 (20)

A Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAsA Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAs
 
4 Tips for Better SLAs.
4 Tips for Better SLAs.4 Tips for Better SLAs.
4 Tips for Better SLAs.
 
CIHS Top Tip - 4 Tips for better SLA's V2.0
CIHS Top Tip - 4 Tips for better SLA's V2.0CIHS Top Tip - 4 Tips for better SLA's V2.0
CIHS Top Tip - 4 Tips for better SLA's V2.0
 
A guide to sl as
A guide to sl asA guide to sl as
A guide to sl as
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentation
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
 
Integrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAsIntegrating Service Catalog with the Business - Rapid and Relevant SLAs
Integrating Service Catalog with the Business - Rapid and Relevant SLAs
 
Soa To The Rescue
Soa To The RescueSoa To The Rescue
Soa To The Rescue
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP Business
 
Dit yvol4iss45
Dit yvol4iss45Dit yvol4iss45
Dit yvol4iss45
 
ITIL service design
ITIL service designITIL service design
ITIL service design
 
Topic The top 5 details that should be included in your cloud SLA..docx
Topic The top 5 details that should be included in your cloud SLA..docxTopic The top 5 details that should be included in your cloud SLA..docx
Topic The top 5 details that should be included in your cloud SLA..docx
 
Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012
 
The IT Service Definition Journey
The IT Service Definition JourneyThe IT Service Definition Journey
The IT Service Definition Journey
 
2 itil v3 concepts v1.8
2 itil v3 concepts   v1.82 itil v3 concepts   v1.8
2 itil v3 concepts v1.8
 
Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
 
Multi-supplier governance
Multi-supplier governance Multi-supplier governance
Multi-supplier governance
 
CMG White Paper
CMG White PaperCMG White Paper
CMG White Paper
 

Mehr von Rick Lemieux

Mehr von Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 

Kürzlich hochgeladen

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Dit yvol5iss13

  • 1. Secrets to Successful Service Level Management The workable, practical guide to Do IT Yourself Page 1 of 4 Vol. 5.13 • April 1, 2009 Secrets to Successful Service Level Management By Hank Marquis Hank is EVP of Knowledge Management at Universal Solutions Group, and Founder and Director of NABSM.ORG. Contact Hank by email at hank.marquis@usgct.com. View Hank’s blog at www.hankmarquis.info. M anually creating after-the-fact monthly reports is not performing Service Level Management (SLM). SLM must show both current and past status as well as predict future problems, and this requires automation and daily or even real-time analysis of data. Most of us know Service Level Management (SLM) is a process described in the IT Infrastructure Library® (ITIL®). Most of us know SLM encompasses more than writing Service Level Agreements (SLA) and Service Catalogs. The ITIL defines Service Level Management as “Ensuring that agreed IT services are delivered when and where they are supposed to be delivered.” IT services are collections of Configuration Items (CIs) considered as an end-to-end system that delivers utility to a user of the system. Some example services include: SAP, CRM, Email, Stock trading, etc. Many think SLM is simply reporting on how IT did during the last month. But SLM is much more than that. SLM can and should drive the entire IT organization, and performing SLM correctly can also result in significant operational improvements and cost reductions. Here are just 7 ways effective SLM can improve IT service quality, achieve business/IT alignment, increase IT efficiency, and reduce the costs of IT: 1. Obtain refunds, rebates, credits through vendor management 2. Gain higher discounts through consolidation identified by vendor management 3. Reduce costs through idle capacity re-allocation and proactive performance and capacity forecasting 4. Avoid redundant and/or unneeded infrastructure investments 5. Save money on maintenance renewals with improved asset management 6. Improve organizational responsiveness 7. Increase end-user productivity Obtaining these benefits requires work, and some tricks of the trade. Following I share 7 secrets to SLM success. Secret #1: Service level reporting is not service level management Many IT organizations misunderstand the role of Service Level Agreements (SLA) and focus them on technical parameters of a single technology instead of an end-to-end business description. They monitor SLAs independently of one another and usually manually integrate the results. Today, most organizations implement service level reporting, not SLM. The problems with service level reporting include: It is old news It is a manual process, involving 10s to 100s of people It generates reams of paper, error-prone and subjective Service level reporting is a manual process that typically describes what happened during the last period. This is an important distinction – SLM seeks to ensure uninterrupted quality of service. Service level reporting simply reports what happened. http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm 4/1/2009
  • 2. Secrets to Successful Service Level Management Page 2 of 4 For example, service level reporting might say “we went down for 8 hours on Thursday the 20th.” This adds little value to the business – don't you think that they already know they could not operate for 8 hours that day? Effective SLM would seek to proactively observe SLA compliance, strive to predict an outage coming, and take action to prevent the issue before the outage occurred. ITIL refers to this as a Service Improvement Program (SIP.) Secret #2: Effective SLM requires clear, service-oriented SLAs Service Level Agreements are agreements with customers about services for users. SLAs encompass the agreed-upon service levels, modeled after business, customer, and user requirements. A SLA represents the negotiated requirements of the customer, or Service Level Requirements (SLR.) SLAs should be visible to both customers and IT and it is important to keep SLAs in easy to understand business terms. Instead of describing the service as follows: “the server shall maintain 1000MB free disk space at all time, never have less than 40% CPU cycles available for more than 2 seconds, have at least 256MB memory free for caching at all times, and will not swap to disk more than 10 times per second.” Consider instead: “the email service shall always allow the user to store messages with attachments of any size up to 10MB. All emails and attachments combined shall not exceed 1000MB. Any new emails and attachments that when combined with existing stored emails and attachments are larger than 1000MB will not be stored until other emails and attachments are deleted by the user. An authorized user shall be able to open a stored email in an average of 5 seconds, and no email shall take longer than 30 seconds to open. By special arrangement customer can request additional storage by contacting the service desk and referencing attachment A.” Note the difference. What exactly does the first paragraph say? Someone in IT might be able to understand what it means, but it certainly does not describe things in business terms. The second paragraph is very clear, describes what the user will be able to do with the service, and also provides a “way out” should one be required. Secret #3: Effective SLM requires definition of multiple Requirements and Targets Service Level Requirements (SLR) express the needs of the customer. Service Level Targets (SLT) reflect the objective of the IT service provider organization. SLRs and SLTs do not always equate. For example, the requirement from the business (SLR) might be for sub-second response time, but the best possible solution available might be 2 seconds (SLT). The business may also need at least 95% uptime and IT might be able to provide 99% uptime. Thus, SLR and SLT are not the same, and they may not align. SLRs get negotiated into SLTs, and the SLTs go into the SLA. SLTs should be expressed in terms of a Critical Success Factor (CSF) and measured by means of a Key Performance Indicator (KPI.) If possible you should include multiple such statements, each equally easy to understand. For example: “Monday through Friday, from 8am EST to 5pm EST an authorized user of the system can contact a support agent via phone, fax, email, or instant message. A support agent will acknowledge the request for support within 5 minutes of receipt, collect relevant information from the user (including workstation ID, employee ID, application name, incident details) within 15 minutes of receipt, and escalate or resolve the incident with 30 minutes of receipt.” “Average mean time to repair (MTTR) where MTTR means the elapsed time from acknowledgement of receipt to restoration of normal activities shall be no longer than 4 hours. Any incident with MTTR of more than 4 hours will be reviewed by a specialist to determine why, and those reasons shall be shared with the customer at the customers’ discretion and convenience.” http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm 4/1/2009
  • 3. Secrets to Successful Service Level Management Page 3 of 4 Note how the SLA shapes up to be very readable, clear, and concise. Each SLT is its own statement. Each SLT is selfcontained, measurable and thus reportable. Other elements to include in the SLA include signatures, reporting intervals, costs (if any) and other related data. Keep the non-service legal stuff in a contract, not the SLA. Secret #4: Effective SLRs & SLTs require LOB alignment Lines of Business (LOB) are tiers of customers or users. They often include locations, specific applications, unique requirements and hours of operation. One SLA often cannot meet the needs of all lines of business. The only way to understand the unique service level requirements of each line of business is to meet with them and discuss their unique needs. Only this way can you establish the breadth and depth of the service level requirements that you will publish in the SLA. Secret #5: Effective SLA’s require breadth and depth An SLA requires multiple dimensions including: Capacity, latency, availability, performance, continuity, security, etc. Consider the following statement from an SLA: “Monday through Friday, from 8am EST to 5pmEST, when operating under normal conditions (where normal means not in dial-backup) an authorized user of the system can retrieve a customer record in less than 5 seconds. No more than 10 times during the month when operating under normal conditions will any record take more than 30 seconds to retrieve.” Note the inclusion in business terms of: Availability “Monday through Friday, from 8am EST to 5pmEST” Continuity “when operating under normal conditions (where normal means not in dial-backup)” Capacity “can retrieve a customer record in less than 5 seconds)” Security “an authorized user of the system” Note how the statement also includes the ability to “miss” the main target no more than 10 times per month. Secret #6: Effective SLA’s require multiple data sources With multiple clauses and targets a SLA requires multiple information sources. These include availability, capacity, continuity, and security. SLM requires data from many CIs. The best place to get this data is from the operational tools that manage those CIs, making data mining a key. This data will come from a number of sources: Mainframe, mid-range Network, applications Web, HR The best place for acquiring this raw data is existing systems and network management platforms already in place. The golden rule is to agree only to targets for which you have monitors. Secret #7: Effective SLM requires automation Several studies have shown that most SLAs are incorrectly reported. The sheer volume of data and the calculations required to produce the report generates errors in the report. Put another way, it is virtually impossible to aggregate all the target metrics and data, add them up, do the math, and then transcribe them correctly. Invariably, errors get introduced, making the SLA report useless. As the number of SLAs and targets increase the errors multiply. To resolve this issue more than one company has an entire group responsible for preparing the “monthly report” – and this is the trap. Monthly reports done manually are almost always after-the-fact and thus service level reporting, not SLM. http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm 4/1/2009
  • 4. Secrets to Successful Service Level Management Page 4 of 4 Make every effort to use automated systems. Define and agree targets with customers for which you have or will obtain a monitoring tool. Then, integrate using programs or calculations that require no human interaction. The more human touch the more chance for the introduction of “human error” into the report. Summary Service Level Management must align with user needs. SLAs must include targets for capacity, availability, security, continuity, etc. Target attainment data will come from many sources, and you need to track the target at its source, as well as the entire SLA (end-to-end). SLM solutions must show both current and past status as well as predict future problems, and this requires automation and daily or even real-time analysis of data. The benefits are many: By monitoring vendor performance that underpins your SLAs you can manage vendors. Often you can obtain savings by obtaining refunds, rebates, and credits due to poor performance. Vendor management can lead to higher discounts through consolidation. Monitoring utilization of service CIs lets your spot idle and/or underutilized capacity. You can reduce costs through idle capacity re-allocation. Proactive performance and capacity forecasting driven from SLA and SLR monitoring helps plan purchases. Improved asset management produces savings by avoiding redundant infrastructure investments and saving money on unnecessary maintenance renewals. Sound SLM increases end-user productivity. All in all a real positive payback awaits those who move from service level reporting to Service Level Management! Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved. ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). http://www.itsmsolutions.com/newsletters/DITYvol5iss13.htm 4/1/2009