Imagine how much margin for error or misinterpreted expectations there would be if the ITSP did not understand what your business services are and how critical they are for business operation.
In ITSM, Service Catalog will follow on from an IT strategy to further define how IT services will be provided to the business. Service catalog is a term used within the ITIL best practices and the ITSM industry to depict a listing of services that an IT service provider offers to a customer. It is written in business terms and contains some standard information. It is embedded within the service portfolio and is the portion of the portfolio reflecting live services the business can actively use.
Consider this. This simple list of business services forms the basis of everything else that follows, including
Although this seems straightforward and you think you’ve got it covered, let’s take a closer look at how interpretation can change things. A service provider might look at the list of business services and form a basic understanding of needs, but will likely require further clarifications.
This is a great example of what often happens between the suppliers and the customer. The customer thinks they have been explicit, but they haven’t understood how literal an interpretation the stated requirements will go through. This teaches us that we need to develop requirements, and then have a dialogue to see how they are interpreted before they are agreed upon. You can surmise what could result if no further dialogue occurred in the given examples.
The ability to articulate your business services to your IT service providers is the single most important first step in creating the basis for successful ITSM. It can make or break the success of how your business services are managed and how your customers perceive the quality of them. Articulating business services and how they are used becomes the essential foundation of how the IT service provider forms the IT strategy.
With RFID, Think Process and Not Just Technology
As always, the very real danger is that managers themselves will become seduced by the new technologies and then appreciate them only superficially and misunderstand their true purpose and potential.How are Firewall Systems Incorporated in Remote Monitoring?
Firewall implementations are available today from a wide array of vendors. With the ever-increasing awareness of network security and the costs of lost information, many new firewall implementations continue to emerge.What is ITSP Sourcing?
An entire library could be written on this topic. In the ITSM world, sourcing is considered part of the service design model and something every business customer plans well before the service requirements are finalized.