Information Technology
Information Technology (commonly referred to as IT) is a broad term used to describe the applied field of computer science as it relates to the day-to-day operations of organizations (of all types, including public, private, for-profit and non-profit, etc...).
Contents
ITIM
Information Technology Information Management (ITIM or IT management) is the set of overall policies, processes and practices of information dissemination (access), storage, backup, update/changes, deletion/archival, etc.
IT Service
Information Technology Service Management (ITSM or IT services) is a discipline for managing information technology (IT) systems, philosophically centered on the customer's perspective of IT's contribution to the business.
- wikipedia: IT service management
- IT Service Management (ITSM): http://www.itsm.info/ITSM.htm
ITSM
Within the broad spectrum of IT Service Management is another more precise/specialized discipline, focused on how Incidents, Problems and Service Requests should be handled. This practice of Incident & Technology Service Management (ITSM) is perhaps even more commonly known in the IT industry as ITSM, although somewhat confusingly the acronym could refer to either level depending on the organization (and sometimes even the context of the team/department within that organization). This more focused concept of ITSM defines IT work in terms of:
- Incidents - an isolated event that had some impact to a particular feature/page/application/system, for a particular subset of Users (or possibly all Internal Users, all External Users, or all Users in general) for a particular (known or estimated) timeframe
- Problems - a series of events (typically unexplained or insufficiently understood) which have impacted a feature/page/application/system over several (known or reliably estimated/evidenced) timeframes, or a series of Incidents likely to be related or with common unknown root causes
- Requests - requests for service or actions desired to be carried out by one group (typically within IT) for another group (typically within Business units, but sometimes within/amongst separate departments of IT) or on behalf of End-Users
VOID
Verica Open Incident Database (VOID).
- Verica Open Incident Database (VOID): https://www.thevoid.community/ | REPORT
ITIL
The Information Technology Infrastructure Library (ITIL or IT library), is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITILv3 and ITIL 2011 edition), ITIL is published in a series of five core publications, each of which covers an ITSM lifecycle stage.
ITIL best practices include:
- Change Advisory Board (CAB)
- Risk assessment
- Auditing & Compliance
- Post Implementation Review (PIR)
- Process definition
- Knowledge Base
- wikipedia: Information Technology Infrastructure Library (ITIL)
- wikipedia: Change-advisory board
- wikipedia: Change management
[7] [8] [9] [10] [11] [12] [13] [14] [15]
Business Service
Business Service Management (BSM) is an approach used to manage business IT services. BSM promotes a customer-centric and business-focused approach to service management, aligning business objectives with IT from strategy through to operations. In some organizations it could also refer to a platform through which IT reaches out to or makes requests for service from respective Business Owners, stakeholders or reviewers, as in a corollary to ITSM, but for managing business activities or expertise as they relate to (or depend on) specific IT features/functions/applications/systems.
Shadow IT
Shadow IT is a term that refers to Information Technology (IT) applications and infrastructure that are sourced, procured, managed and utilized without the knowledge and/or approval of the organization's IT department. Shadow IT can include hardware, devices, software, web services, APIs, cloud applications, mobile apps, downloadable/installable tools, or libraries (whether free/open-source or commercial/closed-source) that employees turn to without IT authorization to accomplish work tasks and complete projects.
- wikipedia: Shadow IT
- Shadow IT demands visibility, not control - Work Life by Atlassian: https://www.atlassian.com/blog/technology/modern-shadow-it-visibility
- Gartner Magic Quadrant -- Cloud Access Security Broker (CASB): https://www.gartner.com/doc/reprints?id=1-1XFYTPKZ&ct=191018&st=sb (like a Proxy service specialized in identifying and qualifying access to Cloud services originating from within the organization)
[16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28]
KTLO
Keep The Lights On (KTLO) is an acronym used to describe work/activities that support the day-to-day operation of the business and its corresponding platforms, systems, networks, products and/or services. It supports revenue generation in that it ensures customers can access and transact with the business (i.e. think retail storefront being open for business, PoS system up, online shop returning accurate items/information and making correct inventory changes, website availability, mobile app responsiveness, etc... indicative of a business being available and ready to serve customers).
- The state of IT. Zero innovation. Keep The Lights On (KTLO) zero: https://docplayer.net/64248078-The-state-of-it-zero-innovation-keep-the-lights-on-ktlo-zero.html
Common Stage Gates
For better or worse, in IT, "Gatekeeper groups" are sometimes put together that must be dealt with prior to performing certain actions (such as approving a project, verifying a product/service launch, releasing funding/budget, choosing a vendor, paying a vendor, deploying a software release, patching a system, changing a configuration, etc).
Decision Control Board
Decision Control Board (DCB) is primarily made up of Executives, Director/VP-level, or even Board of Directors (BoD), investors and/or other business stakeholders.
If they exist in an organization, typically should make decisions about use of funds within the company (project/initiative funding) and acceptable or unacceptable levels of risk, but sometimes expand their scope.
Steering Committee
Steering Committee (SC) is primarily made up of Product Owners in Agile (i.e. "voice of the customer"), or, the more traditional Product Manager role (i.e. "voice of the business"), along with possibly some Project Managers (PMs) and/or Business Analysts or QA (Test Leads).
If they exist in an organization, typically should make decisions about Project Management strategy/direction, but sometimes expand their scope.
Architecture Review Board
Architecture Review Board (ARB) is primarily made up of technically-minded folks coming from Software/Hardware/System/Infrastructure/Network/Security Architects, as well as possibly but not necessarily having some representation from Development (such as Senior Developers), Operations (Senior Operations Technicians), QA (Test Leads), and/or the Business (Technical Leads).
If they exist in an organization, typically should make decisions about use of technology within the company (acceptable tech stacks, licenses, use of open source .vs. commercial, vendor strategy) and acceptable or unacceptable levels of dependencies, coupling or inter-connections between systems, but sometimes expand their scope.
Change Advisory Board
Change Advisory Board (CAB) is primarily made up of practitioner/contributor level Operations (Change Manager), QA (Test Lead), Security (Security Lead), Development (Dev Team Lead) and Business (Product Owner and/or Lead Business Analyst) representatives. They often require sign-offs from one individual in each of its representative groups, and often an Environment Coordinator and/or Release Manager for final approval.
If they exist in an organization, typically should make decisions about releases and environment changes within the company (particular those in Production) and acceptable or unacceptable levels of quality controls (testing level), consistency (documentation and/or deviation from release process) or vendor change risk, but sometimes expand their scope.
- Do you really need that "Change Advisory Board" (CAB)?: https://www.split.io/blog/change-advisory-board-really-needed/
Tools
- Opening doors to learning and working in Europe: http://europass.cedefop.europa.eu/europass/home/hornav/Introduction.csp?loc=en_GB
Resources
- Gartner - IT Glossary: http://www.gartner.com/it-glossary/
- Software Architecture Patterns: https://orkhanscience.medium.com/software-architecture-patterns-5-mins-read-e9e3c8eb47d2
External Links
- wikipedia: Information Technology
- wikipedia: List of largest Internet companies
- wikipedia: List of Indian IT companies
- wikipedia: List of largest biotechnology companies
- wikipedia: List of IT consulting firms
- wikipedia: Information technology consulting
- Sanity check - State of the IT profession 2009: http://blogs.techrepublic.com.com/hiner/?p=1007&tag=nl.e101
- Workplace Health - Work addiction: http://health.lifestyle.yahoo.ca/channel_section_details.asp?text_id=2122&channel_id=1030&relation_id=34757
- IT and communication: http://www.cs.tut.fi/~jkorpela/
- Layoff secrets you need to know: http://ca.finance.yahoo.com/personal-finance/article/yfinance/1619/layoff-secrets-you-need-to-know
- How are promotion decisions made: http://www.crisp360.com/hosted-infographic/promotion-secrets-how-corner-office-was-won-full
- What to Do When Your IT Vendor Gets Acquired: http://h30565.www3.hp.com/t5/Feature-Articles/What-to-Do-When-Your-IT-Vendor-Gets-Acquired/ba-p/2018
- Inside the Large Hadron Collider - How IT powers the greatest experiment in history: http://www.zdnet.com/article/inside-the-large-hadron-collider-how-it-powers-the-greatest-experiment-in-history/
- Is it IT's last chance to lead digital transformation?: http://www.zdnet.com/article/is-it-its-last-chance-to-lead-digital-transformation/
- Defining The Corporate Hierarchy: http://www.daedtech.com/defining-the-corporate-hierarchy/
- The Journeyman Idealist - Architect of Programmer Paycuts: http://www.daedtech.com/journeyman-idealist-architect-programmer-paycuts/
- DIY-IT -- Top 10 how-to articles of 2016: http://www.zdnet.com/article/diy-it-top-10-how-to-articles-of-2016/
- 20 IT Ops stats that matter: https://techbeacon.com/20-it-ops-stats-matter
- Job Burnout of Information Technology Workers: http://www.ijbhtnet.com/journals/Vol_5_No_3_June_2015/1.pdf
- When everything blows up in Prod: https://medium.com/@jstanier/when-everything-blows-up-27aaf3f8f0e2
- Some Techies Are Shunning Silicon Valley for the Japanese Dream: https://www.bloomberg.com/amp/news/articles/2018-08-20/why-some-techies-are-shunning-silicon-valley-for-japanese-dream
- Japan eyes legislation to regulate global IT giants: https://japantoday.com/category/tech/japan-eyes-legislation-to-regulate-global-it-giants?
- Subtle signs that you just got hired in the wrong IT company: http://blog.codepipes.com/people/wrong-company.html
- The IT Leader’s (new) place in the Business: https://itrevolution.com/it-leaders-place-in-the-business/
- OLAs vs. SLAs vs. UCs -- What They Mean and How They're Different: https://dzone.com/articles/olas-vs-slas-vs-ucs
References
- ↑ ITSM (IT Service Management) definition: http://searchcio.techtarget.com/definition/ITSM
- ↑ Magic Quadrant for IT Service Management Tools (2018): https://www.gartner.com/doc/reprints?id=1-49PZFES&ct=170811&st=sb
- ↑ The Forrester Wave™: Enterprise Service Management, Q3 2018: https://reprints.forrester.com/#/assets/2/590/RES141112/reports
- ↑ 4 ways to marry ITSM and DevOps: https://techbeacon.com/4-ways-marry-itsm-devops
- ↑ ITSM tool Business Value calculator: https://itsm-business-value-calculator.com/Assessment/Questions
- ↑ Announcing the VOID: https://www.verica.io/blog/announcing-the-void/
- ↑ Stanford University -- ServiceNow - Change Management Guide: https://uit.stanford.edu/sites/default/files/2017/11/22/Change%20Management%20Fulfiller%20guide%20-%20Final%20-%20Version%201%20(1).pdf
- ↑ IT Change Management Process Training: http://itsm.ucsf.edu/sites/itsm.ucsf.edu/files/Chg Mgmt Training 2016.10.19 WITH test questions.pdf
- ↑ What is Post-Implementation Review in Project Management?: https://www.projectmanager.com/blog/post-implementation-review
- ↑ ITIL glossary: https://wiki.en.it-processmaps.com/index.php/ITIL_Glossary/_ITIL_Terms_P#Post_Implementation_Review_.28PIR.29
- ↑ ITIL & ISO 20000 Blog: https://advisera.com/20000academy/blog/2015/02/03/post-implementation-review-buzzword-or-mighty-tool/
- ↑ What is ISO 20000? Learn why ISO 20000 can benefit your organization: https://advisera.com/20000academy/what-is-iso-20000/
- ↑ The Essential Guide to ITIL Change Management: https://www.cherwell.com/library/essential-guides/essential-guide-to-itil-change-management/
- ↑ How to Adopt a Light Version of ITIL’s Change Advisory Board: https://itsm.tools/2018/04/10/how-to-adopt-a-light-version-of-itils-change-advisory-board/
- ↑ What’s an ITIL CAB? A Simple Explanation: http://itsmtransition.com/2013/06/whats-an-itil-cab-a-simple-explanation/
- ↑ Shadow IT security checklist: https://cloudsecurity.mcafee.com/cloud/en-us/forms/cheat-sheets/ch-shadow-it-security-checklist-banner-cloud-mfe.html
- ↑ McAfee -- What is Shadow IT?: https://www.skyhighnetworks.com/cloud-security-university/what-is-shadow-it/
- ↑ Cisco -- What is Shadow IT?: https://www.cisco.com/c/en/us/products/security/what-is-shadow-it.html
- ↑ Shadow IT: https://www.forbes.com/sites/forbesproductgroup/2017/02/22/shadow-it/#484a7e3279fd
- ↑ 2012 RSA study on reasons for Shadow IT: https://web.archive.org/web/20120211105302/http:/www.rsa.com/company/news/releases/pdfs/RSA-insider-confessions.pdf (35% of employees feel they need to "work around/outside IT security policies to get their job done", 63% of employees send work files around between file-sharing/storage/outside-of-work email services, 1/3 successful attacks on enterprises are through ShadowIT phish/spam/spoof/trojans/viruses/leaks)
- ↑ Employees Are Accessing More and More Business Apps, Study Finds: https://www.wsj.com/articles/employees-are-accessing-more-and-more-business-apps-study-finds-11549580017
- ↑ The Upside of Shadow IT: https://www.computerworld.com/article/2503507/the-upside-of-shadow-it.html
- ↑ The upside of "Shadow IT" revealed: https://www.entrustdatacard.com/pages/shadow-it
- ↑ Shadow IT -- What Are the Risks and How Can You Mitigate Them?: https://www.ekransystem.com/en/blog/shadow-it-risks
- ↑ Managing shadow IT: https://www.computerweekly.com/opinion/Managing-shadow-IT
- ↑ Shadow IT -- 8 Ways To Cope: https://www.informationweek.com/strategic-cio/it-strategy/shadow-it-8-ways-to-cope/d/d-id/1319535
- ↑ Strong data protection process can prevent (some of the biggest) Shadow IT risks: https://searchdatabackup.techtarget.com/tip/Combat-shadow-IT-with-an-enhanced-data-protection-process
- ↑ What is a Cloud Access Security Broker (CASB)?: https://www.skyhighnetworks.com/cloud-security-university/what-is-cloud-access-security-broker/
- ↑ How to balance maintenance and IT innovation: https://www.computerworld.com/article/2486278/how-to-balance-maintenance-and-it-innovation.html
- ↑ Why Keep the Lights On (KTLO) is a waste: https://www.computerweekly.com/blog/CW-Developer-Network/Why-Keep-the-Lights-On-KTLO-is-a-waste
- ↑ What it means to be Keeping The Lights On (KTLO): https://www.bmc.com/blogs/keeping-the-lights-on-ktlo/
- ↑ Breaking the Change Management Barrier -- overcoming the shortcomings of Change Advisory Boards (CAB) with DevOps: https://itrevolution.com/breaking-the-change-management-barrier/
See Also
Defect Management | Tech | GreenIT | Auth | Security | Privacy | DevOps