• Skip to main content
  • Skip to primary sidebar

This view of service management...

On the origin and the descent of managing services. We put meat on the bones.

  • Kanban Software
  • Services
    • Kanban Software Solutions
    • Consulting & Coaching
    • Training and Seminars
  • Posts
  • Events
    • Events – Agenda View
    • Events – Calendar View
  • Publications
    • Our Publications
    • Notable Publications
    • Quotes
  • About us

Risk management

The diversity of risk management

18 December 2014 by Robert Falkowitz Leave a Comment

Auf dem Hochseil

In another article, I spoke of vision management and risk management as the two pillars upon which organizations reside. As I have already spoken about vision, let’s take a minute to examine risk in the context of service management in a little more detail.

Filed Under: Risk management, Service Management Tagged With: risk, risk control, risk management framework, risk mitigation

Types of Tool Automation

13 October 2013 by Robert Falkowitz Leave a Comment

Types of tool automation The fundamental difference between a software tool and most types of tools is that software can be programmed to automate one or more tasks. Most other tools do not automate work at all, only extending the capabilities of the wielder of the tool. Certain mechanical tools can automate a task, but, […]

Filed Under: Availability mgmt, Change management, Incident Management, Risk management, Service level management, Service Management Automation, Service Management Tools, Tools Tagged With: automation, change management, Incident Management, incident management tools, service management tools

The Automation of Risk Assessment

10 January 2013 by Robert Falkowitz 2 Comments

Risk Assessment Tool Architecture

Pre-industrial risk assessment Risk assessment remains a highly manual activity in all organizations I have ever seen. Some organizations have a structured approach to assessing, and then managing, risk. Others work largely with a seat of the pants approach. But in both cases, the activity of identifying risks and their magnitude and the creation and […]

Filed Under: Risk management Tagged With: automation, big data, risk, risk assessment, risk management, risk management tools

Primary Sidebar

Kanban eLearning

Kanban training online

Recent Posts

  • Verbs, nouns and kanban board structure
  • The role of the problem manager
  • The Three Indicators

Tag Cloud

manifesto histogram ITIL resource liquidity Cost of Delay kanban training lean management ITSM impact kanban board tools manifesto for software development Incident Management value stream cause rigidity risk bias flow efficiency flow lean context switching leadership incident service management tools service request change management incident management tools process metrics problem service manager agile process priority knowledge work kanban process definition knowledge management waste automation
  • Kanban Software
  • Services
  • Posts
  • Events
  • Publications
  • Subscribe
  • Rights & Duties
  • Personal Data

© 2014–2023 Concentric Circle Consulting · All Rights Reserved.
Concentric Circle Consulting Address
Log in

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}