• Skip to main content
  • Skip to primary sidebar

This view of service management...

On the origin and the descent of managing services. We put meat on the bones.

  • Kanban Software
  • Services
    • Kanban Software Solutions
    • Consulting & Coaching
    • Training and Seminars
  • Posts
  • Events
    • Events – Agenda View
    • Events – Calendar View
  • Publications
    • Our Publications
    • Notable Publications
    • Quotes
  • About us

ITSM

The scope of change control

18 November 2012 by Robert Falkowitz Leave a Comment

With the publication of ITIL® ver. 3 in 2007, a clear stance was taken regarding the scope of change management. The authors of the Service Transition volume pointed out the rather obvious fact that changes at almost any place in the value network of service delivery could impact the quality of the services. Therefore, it […]

Filed Under: Change management Tagged With: agile, automation, change control, change management, Continuous Delivery, customer changes, Devops, infrastructure as code, ITIL, ITSM, operational changes, service life-cycle, strategic changes, supplier changes, tactical changes

On the architecture of IT service management tools

17 November 2012 by Robert Falkowitz 3 Comments

New IT service management tool architecture

A common issue when implementing ITSM tools Often, while working on projects to implement a new IT service management tool, I have encountered the following remarks from one or more IT engineers. “Why are we implementing that new tool? Our team already has tools to do that.” To do what? Well, to manage the investigation, […]

Filed Under: Service Management Tools Tagged With: application architecture, incident, Incident Management, incident management tools, ITIL, ITSM, service management architecture, service management tools

What is meant by severity?

8 November 2012 by Robert Falkowitz 3 Comments

Robert S. Falkowitz

Some practitioners appear to use the term severity interchangeably with other attributes of events and incidents, such as impact or priority. I propose here a simple way of distinguishing severity from impact, one that is loosely derived from ITIL®

Filed Under: Incident Management, Problem Management Tagged With: benchmark, impact, ITIL, ITSM, severity

Primary Sidebar

Kanban eLearning

Kanban training online

Recent Posts

  • Verbs, nouns and kanban board structure
  • The role of the problem manager
  • The Three Indicators

Tag Cloud

rigidity Incident Management waste statistical control chart service management tools problem kanban board service manager kanban tools lean management cause kanban training lead time manifesto knowledge management bias ITSM manifesto for software development incident management tools impact service request automation process change management urgency lean agile flow efficiency value stream value change control adaptive case management leadership Cost of Delay flow incident risk knowledge work ITIL
  • Kanban Software
  • Services
  • Posts
  • Events
  • Publications
  • Subscribe
  • Rights & Duties
  • Personal Data

© 2014–2023 Concentric Circle Consulting · All Rights Reserved.
Concentric Circle Consulting Address
Log in

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}