Feeds

Service Design - ITIL v3

Integrating IT with the business

SANS - Survey on application security programs

Book review We recently reviewed Service Strategy, the first book in the latest refresh of ITILthe IT Infrastructure Library.

This time, we are looking at Service Design, the next book, which starts to look at the practicalities of integrating IT into the business. Note: not "aligning IT with the business" any more. The world has moved on.

Sharon Taylor Sharon Taylor, ITIL Chief Architect, ITIL's chief architect, summarises the aims of Service Design rather well in the foreword to this volume: "In the past, the IT world has been viewed in two parts – the development world and the operational world. A lack of synergy between these worlds often produces a serious side effect – the business objectives are not met."

According to Sharon, "a main objective of Service Design is to eliminate this old-world view and bring IT service into a single consolidated view" of live business operations.

So, how do the authors of this book go about this and how well do they succeed? Well, coverage is pretty good. It starts with fundamental definitions and then looks at the processes and principles of service design. We particularly liked one set of key messages (ITIL is definitely operating in the process maturity improvement space):

  • If you don't measure it, you can't manage it
  • If you don't measure it, you can't improve it
  • If you don't measure it, you probably don't care
  • If you can't influence or control it, then don't measure it

The book then moves onto technology-related activities (requirements engineering; data/information management and application management). It next covers some of the practicalities: functional roles analysis; activity analysis; roles/responsibilities; and even service design and management tools. However, the coverage of some of this is pretty brief, which is OK if it isn't entirely new to you.

More space is, usefully, allocated to the implementation of your service designs: business impact analysis; service levels, risk management and service design metrics (Kaplan and Norton's Balanced Scorecard is mentioned). There are even three pages on challenges, critical success factors, and risks.

Finally, there are practical examples of design deliverables in the 11 appendices, including example process documentation templates; an example service catalogue (surely, this is central to any service delivery approach and, as this book points out, should be under configuration management); and even an example invitation to tender. Oh, and typical capacity and recovery plans aren't overlooked.

One slight concern is that this book covers a lot of ground in some 300 pages. All good stuff, and if you are an experienced IT architect or manager it collects "good practice" into one place as part of an IT service management lifecycle.

However, if you are new to service design a lot of it may fall into the "easy to say, less easy to do" category. This isn't the sort of book you can just give to a new graduate and tell them to get on with it. You'll either need a lot of experience or good mentoring and classrooom-based training to execute it successfully. And, supplementary material should grow up around ITIL with time.

There's not much point in going on about the cost of the ITIL manuals again – although if this worries you, you might consider the cost of not using its recommended "good practices". An electronic version is available more cheaply, although this must be mainly useful for quick reference after training. However, TSO does offer a decent quantity discount for buying all the volumes at once.

Service Design

itil service designVerdict: This book isn't about producing a high level and possibly impracticable design - that is simply tossed over the wall to the unhappy developers and operations staff who have to make it all work. It is full of practical insights such as that over 80 per cent of errors are introduced in requirements - "developers are developing things right, but frequently not developing the right things" - and that "capacity management should not be a last-minute 'tick in the box' just prior to customer acceptance". Of course, we all know all that, but showing your harassed (or harassing) boss that a successful service delivery framework supports your insights into the service delivery process may just help him/her to take you seriously.

Authors: Vernon Lloyd and Colin Rudd

Publisher: TSO

ISBN: 978-0-11-331047-0

Media: Book

List Price: £85.00

Current Reg price: £76.50 inc. VAT (discount 10%) Buy this book at Register Books at Reg Developer's special discounted price (subject to change).

A discounted collection of all 5 ITIL V3 manuals is available here, for £269.10 (subject to change).

3 Big data security analytics techniques

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.