SysAid Blog

Blog Home
Welcome to the SysAid Blog - the place to go to find out where the IT industry is going, and what is SysAid’s role in it.

Practical Tips for Self-Service Success

Posted by on July 20, 2015 in Service Desk
self-service-webinar-blog.jpg Many IT organizations see employee self-service as a ‘knight in shining armor’, ready to solve all their service desk issues in one quick project. However, for many organizations, their investment in self-service often results in a white elephant rather than a white knight, i.e. it’s a possession that is useless or troublesome and which soaks up money and other resources without delivering much return on the investment. A self-service white elephant typically has low rates of adoption and utilization – often due to an overemphasis on the technology.

There’s a Webinar for That

Sadly, these suboptimal self-service projects are a common issue, and consequently my good friend Stephen Mann and I are running a free webinar this Wednesday, July 22 that will offer practical tips for self-service management success, based on what some organizations have done to get self-service right. UPDATE: This webinar is now avaiable on-demand here. We’ll show you how these organizations have succeeded, by:
  • Understanding the common challenges and potential pitfalls with self-service.
  • Offering practical advice on how to design, launch, manage, and encourage the use of an employee self-service facility for IT (or any other corporate service provider).
  • Providing sensible actions that will help you to either get started with, or to improve upon, self-service within your organization.
Here’s a quick overview of what we’ll be covering.

The Benefits of Self-Service

The main beneficiary of self-service is the business people who need to engage with, and rely on, IT but there are also benefits for the service desk and for the whole of IT. We will outline how the customers and end users will benefit from employee self-service through:
  • Faster access to help for users
  • Improved user communication
  • Increased service hours
  • Support for more languages and time zones
  • Faster incident resolution
  • Faster request fulfilment
  • A better user experience
Whereas the IT organization will not only benefit from happier customers, they will also benefit from employee self-service through:
  • Improved efficiency and/or reduced cost
  • The ability to leverage automation for even greater efficiency and cost savings
  • A better ability to handle high volumes of incidents when problems occur
So that’s some of the upside we’ll cover, but self-service is a game of white knights versus white elephants. The benefits are there to be won – but IT organizations need to ensure they don’t end up as the owner of a white elephant, a self-service capability that nobody wants and nobody uses.

How to Avoid Common Self-Service Mistakes

In the webinar, we’ll go into the detail of where organizations commonly fall down with their self-service initiatives, and the best practice that should be adopted to dramatically increase the chances of self-service success. For example:
  • Involving customers and end users in the design, and then keeping them involved
  • Defining the scope or purpose of the project very carefully
  • Making as much use of automation as you can
  • Focusing on user experience rather than cost saving
  • Making sure all stakeholders, including the end users, understand “What’s in it for me”
  • Providing high quality knowledge (articles, videos, etc.) and making sure it’s accessible and comprehensible to the people it’s aimed at
  • Providing encouragement and incentives for end users to adopt self-service
  • Giving end users a choice
This blog is just a tease for the webinar. It’s a mere 600+ words compared to the free 5000+ word “Self-Service to the Rescue” white paper that can be downloaded while you listen. So please listen in to hear us talking about all this, in far greater detail, as well as:
  • What to include in a self-service capability – there’s more than you think when you start to list things
  • How to run a self-service project
  • The stakeholders to involve in self-service design through to delivery
  • How to avoid confusion over self-service, service catalog, and service request catalog
  • Whether you actually need self-service at all
Please join us for our webinar on Wednesday, July 22 – we don’t think you’ll regret it, that is unless you’re a fan of white elephants. It’s about time that IT organizations viewed self-service as a capability not a technology – come hear how to do it.
Continue reading

ITSM Basics: A Simple Introduction to Problem Management

Posted by on July 14, 2015 in ITIL
ITSM-Basics-red.gif If you regularly read my blog you’ll know that I’ve already written a fair bit on the tough nut to crack that is problem management. It’s often something that’s started as part of the latest IT service management (ITSM) tool implementation project, but it’s not unusual for this initial investment in problem management (processes) to fail in execution due to one or more reasons. From a problem management uptake perspective, if you believe what the annual industry surveys report, roughlytwo-thirds of IT organizations are already “doing” problem management. But it’s not always what it should be, i.e. the investment of time and resources to proactively investigate and address recurring IT and business issues, and their root causes. It’s this type of investigation that helps to identify the issues that cause (or may ultimately cause) repetitive and potentially serious IT and business issues or failures. Instead, IT organizations are often just doing major incident reviews, using problem management techniques, as and when needed. It’s problem management of sorts but not truly effective problem management. In reality, problem management is often somewhat of the “poor relative” to service desk and incident management activities. Whereas service desk and incident management are commonly receiving adequate investment in terms of staff, definition, training, and ongoing operation, problem management, on the other hand, is often “something to be done later” and therefore often not done at all.
In my opinion, the low levels of proactive problem management adoption is quite ironic. The pressure to cut IT operational costs is why many IT organizations don’t do problem management, but it should be the reason why they need to be doing problem management. Ofall the major ITIL processes, the investment of time and resources in truly effective problem management activity can provide some of the highest returns to an organization. So to give you a simple introduction to problem management, I’ll quickly cover:
  • What problem management is
  • The objectives of problem management
  • The “problem lifecycle”
  • The benefits of problem management
I refer to ITIL a fair bit, you might think too much, but you can quite easily use your own self-created problem management process and activities or look to alternative sources of ITSM and IT management advice such as ISO/IEC 20000, ISACA’s COBIT, USMBOK, or Microsoft’s MOF.

Where Problem Management Fits In

Problems (definition below) can be identified throughout the IT ecosystem. For example: acceptance into production, changes, updates/patches, vendor products, user errors, production execution, and failures. However, the main source for problem identification with an organization is probably the analysis of incidents as part of what is often called the “proactive problem management process.” However, not only isproblem management often solely associated with major incidents, another barrier to effective problem management is that problems are often confused with incidents (with the terminology interchanged wrongly). Or they are seen as an incident state rather than a separate entity requiring a different type of ITSM response. If it helps, an easy way to remember the difference between the two is that:
  • Incident management is “put the fire out ASAP!” (so it’s firefighting), whereas
  • Problem management is “how did this happen?” and “how do we stop this happening again?” (so it’s arson investigation/fire prevention).
To succeed at problem management, IT senior management needs to appreciate that far too much costly, and possibly scarce, IT resources are currently spent fighting repetitive fires and that these resources would be better utilized supporting problem management activity to tackle the root causes, rather than the symptoms, of IT failures.

Problem Management Definition

ITIL, the ITSM best-practice framework formally known as the IT Infrastructure Library, uses the term problem to describe: “The unknown cause of one or more incidents.” With problem management: “The process of minimizing the adverse effect on the business of incidents and problems caused by errors in IT infrastructure and systems, and to proactively prevent the occurrence of incidents, problems, and errors.” A problem will become a “known error” when the root cause is known and a temporary “workaround” or a permanent alternative solution has been identified. For completeness, although I state my own benefits below, ITIL states that the value of problem management includes:
  • “Higher availability of IT services by reducing the number and duration of incidents that those services may incur. Problem management works together with incident management and change management to ensure that IT service availability and quality are increased. When incidents are resolved, information about the resolution is recorded. Over time, this information is used to speed up the resolution time and identify permanent solutions, reducing the number and resolution time of incidents.
  • Higher productivity of IT staff by reducing unplanned labour caused by incidents and creating the ability to resolve incidents more quickly through recorded known errors and workarounds.
  • Reduced expenditure on workarounds or fixes that do not work.
  • Reduction in cost of effort in fire-fighting or resolving repeat incidents.”

Problem Management Objectives

ITIL defines the objectives of the problem management process as:
  • “Preventing problems and resulting incidents from happening.
  • Eliminating recurring incidents.
  • Minimizing the impact of incidents that cannot be prevented.”
Importantly, it can’t operate in a vacuum. Problem management should have strong relationships with other key IT service management processes. In addition to the more-obvious linkages with incident and change management, it also needs to use configuration management data to help determine the impact of problems and resolutions. Let’s also not forget that availability management has a dependency on problem management information and activity, and some problems will require investigation by capacity management teams and techniques. Problem management can also be an entry point into IT service continuity activity and major incident management, where a significant problem needs to be resolved before it starts to have a major adverse impact on the business. Finally, from a service level management perspective, problem management contributes to improvements in service levels, and its management information should be used as the basis for service review activity.

The “Problem Lifecycle”

While not a linear lifecycle like incident management, you can view a problem going on a journey from identification through to “resolution.” Where resolution might come from error control or the creation of a workaround. Thus it’s worth understanding that there are two common problem management “sub-processes”:
  • Problem control – which focuses on transforming problems into known errors (and workarounds)
  • Error control – which focuses on resolving known errors via the corporate change management process
The result might be one of three outcomes:
  1. That a change is required to correct a problem – the organization should use an “error control” process to correct the problem via the corporate change management process.
  2. A problem cannot be fixed but a workaround is identified; the problem is classified as a known error with a workaround (a temporary way of resolving the incident); it’s logged in a known error database and made available to all support teams for ongoing incident resolution activity.
  3. No fix or workaround is identified. When a problem is investigated but no solution or workaround is identified, it is recorded as a “known problem” — with the information again made available for the benefit of all support teams.
It’s important to recognize that these three problem states are not mutually exclusive and that a problem may move between them over time. For instance, when possible, a workaround should still be made available while a problem is awaiting the implementation of a required change. My simple diagram hopefully provides a snapshot of what can happen with problem management. ITIL's problem lifecycle: the flowchart

Problem Management Benefits

In my opinion the key benefits of problem management include, but are not restricted to:
  • Decreasing downtime and thus potentially maximizing business productivity
  • Preventing incidents before they adversely impact business operations
  • Making better use of potentially scarce IT resources
  • Better collaboration between different IT teams in preventing recurring issues; defined roles and responsibilities and a single, consistent process not only speed things up but also reduce duplication of effort and wastage
  • The ability to leverage existing known error and “workaround” knowledge to prevent the proverbial “reinvention of the wheel” and to speed up resolution
  • Reducing the costs associated with both IT service delivery and IT support – best practice processes and automation can both save time and effort, and therefore cost
  • Reducing the adverse effect of business-impacting incidents through prevention or workarounds; this might potentially include lost revenue, lost reputation, or even lost customers
  • Improving customer service and the business’s perceptions of the IT organization as a whole
Well there you have it, a quick guide and a simple introduction to problem management. Hopefully you found it helpful. If you want to read more from me, and few of my friends, on problem management, then please look at:
Continue reading

Keep It Running or Fix It Quick?

Posted by on July 9, 2015 in ITIL
Improve availability of an IT service I was recently involved in a discussion about IT services and how to deliver acceptable levels of availability. This discussion was triggered by a failure of the London air traffic control (ATC) system on 12 December 2014, but the ideas apply to any system, not just safety critical services like air traffic control. Although the ATC failure did not last long, the impact was enormous, as many flights were diverted, resulting in lots of aircraft being in the wrong place. Airline schedules took a full day to get back to normal, many passengers were stranded, and there was a lot of disruption to travel plans. There are two ways to improve the availability of an IT service.  One is to reduce the frequency of failure.  The other is to reduce the time needed to recover from it. The ATC system is a safety critical service.  Failure is unacceptable, since it will result in deaths and injuries, and this is why planes had to be grounded. Some of my colleagues argued that since failure of the ATC system is unacceptable, it should have been designed to prevent any possible failure; fast recovery would not have helped as planes would still have been grounded. I, however, argued that in the real world we can never prevent every possible failure, so reduced recovery time will always be essential.
I found support for my view in an article published by The Register, which said that ATC can continue to operate for up to 8 minutes when they lose access to flight plans (which is what happened on 12 December), but that after 8 minutes they must start to divert planes. So a failure that recovers within 8 minutes has negligible impact, and one that lasts even a few minutes longer has a major impact.

It’s Not Just About Air Traffic Control Systems

I have come across similar issues in many other IT services. In one case we designed a service that could fully fail over to a backup location within 300 milliseconds of any hardware or software failure (yes that really is less than 1/3 of a second). Clearly this kind of solution is not going to be needed for the sort of IT services that most of us work with, but it certainly was a viable solution for this particular customer, albeit one that was difficult to design and expensive to provide. About 20 years ago I was involved in a project to provide laptops to mobile engineers. This service enabled the engineers to collect their calls, and update them, remotely, providing a significant competitive advantage over the previous telephone based system. Management suggested that we needed to make sure the laptops were locked down, to prevent the engineers from making changes that could impact the key business application, but I know something about the way engineers behave, and I didn’t think this would be possible. The solution we designed involved giving every engineer a CD that took about 20 minutes to completely recover the laptop back to the initial working configuration – and, crucially, without erasing any of the data that they had already stored on the laptop. This meant that nothing they did to the laptop could result in extended downtime, unless they actually managed to physically break it. I often see service level agreements that specify availability in the form of percentage uptime, with figures like 99.95% availability during business hours. The problem with this is that it is almost impossible to design a solution to meet this target. We can predict the likely frequency of predictable hardware failures, but most real IT failures aren’t due to predictable hardware failures, they are caused by complex interactions of people, processes, software and networks. In these circumstances the best we can do is have a good plan to restore service to our users when it does go wrong, and this means getting the designers to focus on recovery time. How many of your IT services have been designed with recovery time as a key design constraint? How confident are you that you could recover each of your IT services within a time that is acceptable to your customers? How well tested are your recovery plans? If you can’t confidently provide a positive answer to all of these questions, then maybe it’s time to review how you plan to meet your customers’ availability needs. Image credit

Like this article? You may also like: We Don’t Do People!

Please share your thoughts in the comments or on Twitter, Google+, or Facebook where we are always listening.
Continue reading

Service Desk Challenges and Joys at Georgetown University Law Center

Posted by on June 29, 2015 in Service Desk
Service desks in academic institutions Georgetown University Law Center is home to high-profile professors who have served for the U.S. Supreme Court as well as graduate students streaming in from 67 countries. Situated just a few blocks from DC's Capitol Hill, Georgetown Law is a bustling hub for law-making and academia. Recently, I had the opportunity to ask the university’s Tier 3 Senior Technician, Dustin Nigro, about his insights into managing the service desk for a prominent educational institution.

What do you believe are the biggest service desk challenges and considerations for a university or any educational institution?

BYOD is one of our biggest challenges. Students, by nature, tend to be early adopters of technology and often use multiple devices and email addresses, so it can be challenging to track an individual, their assets, and their email history. Students also tend to use the latest devices and apps on the market, and they need all of these to function within their academic environment. We’ve been dealing with BYOD for much longer than most organizations – it’s magnified like crazy in the education sector. Another challenge is creating the right service desk culture. Academic institutions often have a deep-rooted organizational hierarchy. At Georgetown Law, we’re providing services for a diverse group of people comprising of many VIP guests (members of the Supreme Court for example), internal university faculty, staff and graduate students.  The VIPs in our community prefer to interact with people that they are familiar with and prefer to receive a more personal service. They want to be treated as people, not handled as numbers – via predefined emails, phone trees, or self-service. These high-profile VIPs are often transient or adjunct professors, so we can’t rely on them being familiar with our in-house software. We’ve had to find ways to manage the service desk using technology that people are already used to (e.g. email). This also allows our service desk team to categorize incidents accurately and enter useful data into the system. It’s a win-win. Then there is the challenge of security. Academic institutions are often the targets of large phishing attacks, so password security has become a huge priority. With this, comes the need to change passwords on a regular basis. SysAid helps us to isolate and resolve such issues.

How has your team managed to provide appropriate support for the diverse needs of students, staff, and high-profile guests?

The university distinguishes its members according to tier levels that include a ‘high-profile faculty’, the Dean’s level, internal staff, and graduate students. Many of the high-profile faculty members come from the U.S. federal courts, government, prestigious law firms, and the Supreme Court. As a result, our service desk priority tier levels reflect this distinction. It has been crucial for us to establish Service Level Agreements (SLAs) that incorporate priorities according to these tier levels, particularly regarding our response times. When it comes to ‘VIPs’ (such as members of the U.S. federal courts and government), the sky is the limit in terms of the extent to which we’re prepared to support them. SysAid has allowed us to set up priority levels that distinguish between users as well as incident types, all of which correspond back to our SLAs. For any given incident, the respective SLA triggers a timer according to the priority of the given user, and our response times range from five minutes to two hours. Our support role, when it comes to our students, is to simply maintain the systems they’re using for studies (such as email, learning systems, and apps) rather than provide hands-on support.

What were your university’s key priorities when selecting a service desk?

We were looking for a reliable solution to ensure that staff and students could simply get on with learning and practicing law in an efficient manner without technological hitches. We needed a solution to centralize and manage all facets of IT – from network operations and web operations to AV operations and the service desk. Our service desk at the university is responsible for managing requests from 1,700 faculty staff plus 15,000 students and active alumni outside of the campus. We receive approximately 800-1000 incoming service requests a month and are required to track over 3,000 assets. In addition, our CIO George Petasis, has always been passionate about the ITIL service delivery framework, and being that service desk management is one of its key components, it was crucial for us to find an ITIL-compliant service desk solution that would enable us to introduce and manage processes, such as change management, with relative ease.

How challenging was it to implement your service desk and what were the cultural implications for the university and staff?

We pretty much had to set up the service desk from scratch and we only had four weeks to get it up and running before the start of semester. Within this tight deadline, we had to establish certain ITIL processes and ensure that we were set up to track tickets, as the beginning of term is always a busy time for requests. Luckily, SysAid was easy and incredibly quick to implement and we received excellent support from the Professional Services team, which made it possible for us to rapidly integrate the LDAP and import all the data we needed into the system (such as SLAs and categories), as well as establish the definitions for the status and prioritization of requests. In parallel, we centralized all incoming requests into a single point of contact: the service desk. We rolled out the service desk in stages in order to gradually integrate it into the university’s day-to-day culture. Naturally, there were initial fears and apprehension among staff – that the new system would pose a burden on them and take up their precious time. To help with these concerns, we explained the new processes through presentation and an email campaign, also conveying that the new service desk would provide help, rather than require additional work from staff. For our team of admins, training has always been key to ensuring that the service desk is performing effectively. Initially, we conducted several face-to-face group Q&A’s for admins and we distributed a manual and several of SysAid’s videos (including some hosted by Joe The IT Guy). In our academic environment, it is common for lectures and forums to be recorded on camera, so we made use of these classroom resources in order to re-use recorded training sessions for admins at a later stage. We conveyed to our admins what essential data we were looking to receive in tickets, and we defined some crucial terminology such as “notes”, “pending”, and “resolution”, as well as clarifying contexts such as in what circumstances it’s necessary to add data to a knowledge base. We’ve continued to provide training sessions post-implementation so that admins can provide us with feedback on live processes including any flaws.

How do you feel the service desk responds to the needs of your university?

It’s our backbone for day-to-day operations – it allows us to manage all aspects of IT for the university. SysAid gives our department accountability as a business unit because we can track our performance and contribution to the organization. It allows us to see what’s going on day-to-day, monthly, and yearly. This is crucial for an educational institution. We are also using the service desk’s escalation rules with priorities and categories. This gives us control over all processes and the ability to configure the system to our ongoing needs. For us, SysAid is a very robust system that incorporates everything we’ve ever needed and wanted for the university. In particular, it has significantly more value in terms of its ITIL capabilities, its flexibility, the fact that it’s easy to configure the templates and the interface, and the ease of use for non-IT end users.

Which processes have you rolled out so far and what are your future plans?

Everything we do is based on best practices. The benefit of SysAid for us is that we don’t have to put in a lot of effort when it comes to ITIL – the system takes care of much of the ITIL framework. We are running incident management and all of our SLAs are set up in SysAid. We’ve set up escalation alerts and we use multiple escalation rules to define how and what the alerts trigger, and who gets notified. We’re currently using SysAid’s Remote Discovery Service with LDAP, which we find to be a very convenient way to connect with the external server without the need to open ports. In addition, we are now in the process of rolling out the service desk for our finance department, to manage their HR and payroll requests. They will be able to track all of their data and resolution times. SysAid enables us to manage processes across multiple departments by distinguishing between the “user permission groups” of various departments. It also allows us to set up automatic routing per department for requests to specific pre-determined groups. Our future plans include rolling out asset management. This will enable us to identify the assets associated with each user from within their ticket and provide us with data about the specific software on each user’s machine, thereby assisting us to diagnose users’ issues. Other plans also include setting up change management with SysAid and implementing the self-service portal internally (as the culture of submitting tickets is becoming more familiar to our permanent staff).

How valuable is a service desk for non-IT departments?

Most university departments are in essence ‘service-based’ in the sense of needing to respond to the requests of internal clients. Non-IT departments are often keen to convert their paper documents into electronic records. SysAid allows any department to centralize and track its internal requests and data flow. This, in turn, means that the IT department can manage multiple organizational processes from a single platform.

Finally, what would be your advice to universities or schools wishing to set up or replace a service desk?

Do your homework, plan, and set realistic goals. Roll the system out in phases over time and make sure that you train those who will be using the system. Without training for your admin staff, your implementation will suffer. It is also imperative to ensure that you set up your definitions, SLAs, and categories according to your specific KPIs, otherwise the processes and technology will not serve your institution’s needs.

Like this article? You may also like: Hospital IT Heroes

Please share your thoughts in the comments or on Twitter, Google+, or Facebook where we are always listening.
Continue reading

Significantly Enhance Your Service Desk Operations with Our New Barcode Add-On

Posted by on June 18, 2015 in SysAid
Service desk operations with barcode add-on I’m delighted to announce that we’ve added a new mobile asset management add-on and application (on iOS), which provides barcode scanning, audit, and reporting capabilities to the SysAid Service Desk. This is available as an add-on to our Configuration Management Database (CMDB). The add-on (which has been driven by SysAid customers), will help those facing challenges such as:
  • Loss of assets
  • The inability to track inventory, including checking out and in scenarios
  • Limited auditing and reporting capabilities

So What Does It Do?

The add-on allows you to create a new asset by scanning its barcode; it is then synced with your SysAid account. Subsequently, you will be able to track the asset in the CMDB for the rest of the asset’s lifecycle.. In addition, you will be able to add the cost and asset type, as well as the condition and depreciation formula to be used. Once an asset is scanned into the CMDB, you can immediately check out that asset to a person or location. At regular intervals, with the use of a barcode reader or using the SysAid barcode app on your mobile device, you can scan assets and access them in real time from the CMDB record. You can also update the record to include things such as: asset condition, ownership, and location. This data will then sync with your CMDB. Using the app you can process inventory intake and audit different people and different locations (rooms, floors, buildings) that have been assigned ownership of the assets. You can also create reports for different departments that may require this data for financial and purchasing forecasting, as well as to reduce loss of assets. Asset management with barcode app

How Does This Enhance Your Service Desk?

The SysAid barcode add-on will assist additional departments within the organization, not just IT, by providing a robust asset management solution, which includes:
  • Financial forecasting
  • Operational inventory control through audits
  • Dynamic maintenance control through real-time updating and reporting
  • The option to incorporate change management and control for all organizational assets
The add-on allows all departments within the organization to track and control the receipt, issue, use, maintenance, and removal of assets. It also allows for snapshot reporting on asset condition, cost, and depreciation – to help improve financial forecasting and purchasing decisions. Here’s a few example scenarios that briefly show how the SysAid barcode add-on could be used in your organization:
  • Your Chief Financial Officer (CFO) can see the cost of assets over time. By understanding the cost and depreciation of assets, your CFO can better forecast for the future.
  • Facilities can use the add-on to better understand and track where assets have been placed and who last used a specific asset.  The add-on also allows them to quickly update and report on items requiring repair or replacement (maintenance). All-in-all it helps the team to be more responsive and to resolve issues more quickly.
  • HR can initiate a new employee number and automatically open a service request for IT and other departments to supply the equipment they require. The service providers can then associate all the new equipment (“assets”) to the employee within the CMDB. When the employee leaves the company, HR, IT, and other departments can collectively ensure all company property is returned.

Where Can You Learn More?

If you’re interested in seeing the barcode add-on and application in action, then you can watch the brief demonstration video below. Or for further information you can contact barcode@sysaid.com.
Continue reading

Using Theory of Constraints to Help Continual Service Improvement

Posted by on June 16, 2015 in ITIL
Using Theory of Constraints in ITSM I’ve written about continual service improvement (CSI) before. If you haven’t read my previous articles then you might like to look at Continual Service Improvement (CSI) - The Most Important Service Management Process and The Help You Need to Adopt Continual Service Improvement. These will give you some background on what CSI is, and how you can get started. Theory of Constraints (TOC) is a set of “thinking tools” that were developed by Eliyahu Goldratt. TOC was popularised in a novel called The Goal, which described how TOC solved a range of problems at a fictional manufacturing plant. I can’t describe the various TOC tools in detail in this blog, but I will try to show how some of the TOC tools can make a significant contribution to your CSI efforts.
One key principle of TOC is that you need to consider the whole system, not just one aspect of it. This is a really important idea when you are thinking about continual improvement. TOC reminds us that sometimes improving one part of the system will make no difference to your overall result, and it is even possible that an improvement to one part will make the overall result worse. TOC summarises this with the statement “Any improvements made anywhere besides the bottleneck are an illusion”. For example you should not think about how you can improve “incident management” or “problem management” or “knowledge management” in isolation. These processes work together to deliver value to your customers and you need to think about improvements in terms of how they impact the whole end-to-end system, not just how they affect one part. The first TOC tool that I learned about is called the Evaporating Cloud. This tool provides a systematic way of resolving conflicts and problems. The Evaporating Cloud can be used in CSI to help with decisions such as which improvement opportunity you should invest in. You begin by identifying your conflict – whatever it is that is making your decision difficult – in the simplest possible terms. For example, you want to improve your change management process, but the change management team is happy with things as they are. There you go – that’s your conflict, and once you have done that, the approach taken by the Evaporating Cloud is quite different to other decision-making approaches. You don’t decide your change manager is a fool and dig your heels in.  You don’t even start looking at alternative courses of action.  What you do is look for a common goal. For example, in the context of IT service management (ITSM) continual improvement, this common goal might be to improve customer satisfaction, or increase profitability. If all participants can agree on a common goal then this gets you a long way towards agreeing on how to get there. In many ways this is similar to the ITILCSI approach, which starts by identifying the vision. After identifying a common goal, the Evaporating Cloud shows you how to continue by following the steps below:
  1. Documenting the opposed “wants” that lead to the conflict; for example, I want to invest in improvement X and you want to invest in improvement Y.
  2. Documenting the underlying “needs” that lead to each of the wants; for example: why do I want to invest in improvement X? what need does investing in X satisfy? why do you want to invest in improvement Y? what need does investing in Y satisfy?
  3. Crucially, you always talk to the other side of the conflict respectfully, making sure that you begin with their wants and needs, and checking that these have been identified correctly, making changes where necessary.
  4. Finally you identify an intervention that can separate one of the wants from the underlying need, so finding a way to meet everyone’s needs and satisfy the shared goal.
Another TOC tool that I have found really helpful in conjunction with CSI is the Ambitious Targets tool (if you are familiar with TOC, then this is a simplified version of the prerequisite tree). This can really engage staff in improvement planning, because it plays to our greatest strength.  All of us know how to resist change. The basic approach is to agree on the ambitious target, for example “we will create 500 new knowledge base articles next month”, and then to get everyone in the room to think of reasons why we can’t achieve it. Write these reasons on flipcharts, and keep going round the room until everyone has had a chance to list their objections. Then for each objection ask the person who raised it what they think should be done about it. I was quite sceptical about this approach until I tried it in a workshop, where it worked wonderfully well. People generally had excellent intuition about how to solve the problems that they had identified themselves, and really wanted to. We ended up with a set of actions and owners that would clearly make the initiative succeed. I have since used this in many workshops and it has always been really effective. In summary, TOC includes a great set of tools that can help you with continual service improvement. Here are some things you can do to start using them in your environment.
  • If you haven’t yet read The Goal, then get yourself a copy and read it now. If you have already read The Goal then read The Phoenix Project, which is based on The Goal and uses a very similar style to consider problems in an IT environment.
  • Start thinking about how you could improve end-to-end value delivery, rather than planning how to improve individual processes.
  • Try using the Ambitious Target tool approach next time you’re in a workshop trying to plan a difficult project.
  • Find out who runs TOC training in your local geography and consider attending a course.
  • If you enjoy learning complex ideas by reading, then buy a copy of Thinking for a Change. Putting the TOC Thinking Processes to Use. This book gives a detailed introduction to all of the TOC tools, as well as the TOC approach to improvement (based on understanding “What to change?”, “To what to change?” and “How to cause the change?”).
Image credit

Like this article? You may also like: The Help You Need to Adopt Continual Service Improvement

Please share your thoughts in the comments or on Twitter, Google+, or Facebook where we are always listening.
Continue reading

SITS15: Who Said Some Good Stuff at the ITSM Conference?

Posted by on June 8, 2015 in ITSM
The ITSM (Service Desk and IT Support) Show The ITSM Show (formerly known as the Service Desk and IT Support Show, SITS) is done and dusted for another year – congratulations to Toby Moore and his colleagues on a very well organized and delivered IT service management (ITSM) event. We are all hopefully back at work now but what did we learn? Or for those that didn’t attend did they learn anything from the event’s Twitter stream (#SITS15)? I hope we and they did, but just in case I have pulled together some sage advice from the sessions I attended and the Twitter stream.

So What Did I Learn (Or Think Was Valuable to Others)?

On Service Desks

  • “You are NOT the break/fix center, you have to take a strategic view.” – @jarodgreene
  • "Some people want the EasyJet of Service Desks. Some want BA. Know your customer expectations & what you can deliver." ­ – @stephenmann
  • “Your service desk should challenge your customer's expectations. Otherwise you'll never innovate at the rate you need to.” – @patb0512
  • “67% of service desks spend their time firefighting incidents. Even actual fire fighters don't spend that long on it!” –­ @GBaylisHall
  • "Only 17% of IT issues actually make it to the Service Desk." –­­ @stephenmann (stat via Forrester Research)
  • “None of the vendors at #sits15 are the leaders of ITSM. Google is the number 1 tool used to solve IT issues!” –­­ @stephenmann
  • “Outsourcing your service desk disconnects vital business users from the most vital business service” – @stephenmann
  •  “If you don't get the service desk right, it doesn't matter how good the rest of your IT department is.” ­– @GBaylisHall
  • “50% of the people you hire to your service desk will likely leave within 2 years.” – @GBaylisHall

On the Changing Expectations of Corporate IT

  • “What a 14 year old can do with IT vs. what corporate IT can do.” – @VigilantGuy IT vs Corporate IT
  • "Never assume that technology is enough to deliver against service expectations." ­– @sarahlahav
  • “Be aware employees will make comparisons between corporate IT experiences with their personal experience.” – @stephenmann
  • "Many IT orgs miss out on improvement opportunities by not looking outside of their IT ecosystem." – @sarahlahav
  • "Stop thinking about IT first. Start investing in new technology to create more (& new) business value." – @patb0512
  • “If you don't like change, you are going to like irrelevance even less.” – @patb0512
  • “It's quite easy to set user expectations. Just communicate with them!” – @AndieKis
  • “Companies tend to reject innovation as they're tied up with their customers' immediate needs.” – @IanAitchison
  • “People buy based on the services but stay with a supplier because of the service.” – @sarahlahav
  • “IT is not a function. It's a capability.” – @stephenmann

On Using ITSM Outside IT (Enterprise Service Management, ESM)

  • "Don't use #ITIL language with other departments when it comes to #ESM." –­­­ @VigilantGuy
  • "Don't try & sell #ESM as an IT strategy. It's a business strategy. Talk in IT terms & you likely won't succeed." ­– @stephenmann
  • “IT don't want to talk to humans. HR don't want to touch technology. And finance? Well they just don't give a sh!t (no budget!)” – a great barriers to ESM quote from an audience member
  • #ESM is sold by communication, delivered by communication , supported by communication not by #ITSM value prop.” – @gobbymidget
  • When speaking with other lines of business… “Ditch the term Enterprise Service Management. Just simply call it ‘a better way of doing things.” – @stephenmann
  • “IT shouldn't just try & sell technology to the business (ESM). Sell your expertise, your knowledge & lessons learned.” ­– @stephenmann

On Improving IT and Performance

  • “Don't just let an #ITSM vendor sell you a tool. Get their help with people & process issues. They have experience to help you.” – unknown
  • “People, attitude and governance need to be sorted out before processes will work.” – @barclayrae
  • “How many of you understand the journey your users go on with your service desk? Their service journey? START HERE.” – @patb0512
  • “DevOps isn't about just Dev and Ops. Must involve the whole community.” – @marksmalley
  • “Principles and values are more important than processes devops.” – @barclayrae
  • "You have to take several steps with configuration management before you can show real value to the business." – @NybergTobias
  • “The perfect configuration manager is a little bit butler, a little bit engineer, a little bit used car salesman, with a dash of politician.” –  @NybergTobias
  • “Knowledge management isn't just about writing documents. And your IT team shouldn't be the source of all your knowledge.” – @patb0512

Stuart Rance’s Session in Particular Had a Lot of Buzz

Stuart Rance, ITSM Contributor of the Year It’s also worth shouting about the fact that Stuart Rance was named “ITSM Contributor of the Year” at SITS. “#sits15 event manager @tobyonsushi presents @StuartRance with his #ITSM Contributor of the Year award. Well done!” Sadly I didn’t attend his session on “We Don’t Do People” but have still curated a number of interesting tweets for you:
  • “Talk less, listen more and storytelling.” .... Nailed it in the first 2 minutes
  • “Don't do what you have been told to do, when it's the wrong thing to do.”
  • “Let your staff know that they can do what they need to for customer. Ignore the process when it is okay to ignore it.”
  • “IT organisations need to teach their people intelligent disobedience.”
  • “Recruit appropriately. For behaviours not tech. Then monitor and reward to drive appropriate behavior.”
  • “Involve the customer in process design since almost every process is aimed at customer experience.”
  • “Caring about customers and putting them ahead of all else absolutely needs leadership from the very top.”
Further insights on this topic can be seen on Stuart’s recent blog here.

Additional Advice for Those Working on a Service Desk

AT SITS we asked a few ITSM industry authorities and presenters "What is your top tip for someone working on a service desk?". Watch the short video below to hear the gems we caught on camera. [embed=videolink]{"video":"https://youtu.be/Rd2iiqaWB5M","width":"400","height":"225"}[/embed] I hope you have found my curated tweets of interest and feel free to share your favorite tweets as comments below. You can see more curated #SITS15 Tweets in Toby Moore’s Storify. The ITSM (Service Desk and IT Support) Show

Like this article? You may also like: What Can Estonia Teach You about IT Service Management?

Please share your thoughts in the comments or on Twitter, Google+, or Facebook where we are always listening.
Continue reading

SysAid 15.2: Your Voice, Your Service Desk

Posted by on June 3, 2015 in SysAid
SysAid's new service desk release I have a confession to make: for me, the most exciting times, in the realm of my job, which I have the privilege to take part in, are the official releases of SysAid Help Desk Software. Even today, after orchestrating over a dozen On-Premise official releases, I still get the same excitement and butterflies in my stomach…. I am writing this blog after finalizing a great beta with our Pathfinders who helped test and fine-tune this release so it will be optimized for all of you. The content of this release is especially focused on your requests. 100% of the enhancements and fixes came directly from all of you — our customers. We always put resources on issues and challenges you raise to us; this time we put all of our resources on your issues.

What’s New in SysAid 15.2?

I would like to pick a few of the enhancements that I think are particularly worthy of sharing their story. The first bunch of enhancements is related to the SysAid Agent. We had several improvements over the past few releases, and 15.2 continues that momentum.

Ability to Download Agent Logs from Within the Asset Form

Simply add the get logs field to the asset form and you’re able to download the logs of any SysAid Agent. This enhancement is actually one of those issues that “helps you help us to help you….” SysAid Agent logs are usually required for our support engineers to help troubleshoot and solve issues that you encounter. Our agent for Windows is installed on millions of machines worldwide, and the variety of OS versions and flavors challenges us every once in a while. SysAid has an extensive lab where we test and re-create issues, but no lab can simulate your real environments. So when you report issues, the logs help us improve our agent. We just made retrieving these logs much easier for you, and it will definitely help us improve in helping you :).

Ability to Set Various Agent Settings from the Asset List

Continuing the agent improvements, you can now set various agent settings from the asset list, by simply selecting a single asset or a group of assets and changing their settings. This comes in very useful when you want to activate or update features on your agents, as you can easily do it from the asset list. It also keeps track of the version of the agent settings, so you can have better visibility on what settings the agents are using.

Efficiently Stop the Agent from Running

The last feature in this set is an efficiency feature — the option to stop the SysAid Agent from running when it loses connection with the SysAid Server. This is done in cases where the SysAid Agent fails to contact the SysAid Server over a very long period of time, so you can assume that something is wrong and it will never be able to contact the server. The new feature in 15.2 makes the agent give up trying by stopping the service, i.e. the SysAid Agent. The idea behind this is to be more efficient in cases where due to wrong settings, or any other environmental change, the agent can’t reach the server, creating unnecessary network traffic. In most of these cases, the issue won’t be able to be resolved from the server anyway, so we just taught the agent to give up trying until told otherwise. Once the issue is locally resolved, you can simply start the service again and set it to run on startup.

Third-Party Integrations

Third party integrations are a great way to enhance the capabilities of SysAid with other software. For SysAid 15.2, we developed a mechanism that allows you to dynamically add these integrations as “add ons”. One small ZIP file contains all the magic required to integrate SysAid with LogMeIn, Bomgar, Google Apps, and more. The greatest thing about having this mechanism in place is that we can now provide you with add-ons that, in most cases, won’t require a server upgrade. Over the next few months, we’ll be making available a large set of add-ons that will work with 15.2 and future versions.

Security Fixes

We also tightened SysAid security by fixing multiple security vulnerabilities that were discovered. As you know, new security threats pop up all the time, which is why we have a dedicated process and team to handle these threats and provide a quick turnaround. SysAid 15.2 includes a new set of enhancements that tighten the security surrounding the database, uploading files, and more. This release has a lot more enhancements and improvements, and I am sure you will all enjoy them. We’re already busy working on the next set of enhancements and can’t wait to deliver them to you! Meanwhile, though, you can check out this video we prepared that goes through many of the 15.2 enhancements. [embed=videolink]{"video":"https://www.youtube.com/watch?v=PV664Jm2NN8","width":"400","height":"225"}[/embed]

Like this article? You may also like: SysAid Support is About to Get Even More Supercalifragilisticexpiali-Help-You!

Please share your thoughts in the comments or on Twitter, Google+, or Facebook where we are always listening.
Continue reading

We Need to Talk…About Change Management

Posted by on May 27, 2015 in ITIL
Change Management process You know those awkward conversations that start with “we need to talk”? Well, it’s time. We need to talk. About ‘change management’. Ever see someone endorsed for ‘change management’ on professional networking sites, and wondered what kind of change management?  Ever thought, “wait, they don’t know anything about IT Service Management”? There seems to be a fair amount of confusion around  the term ‘change management’. Most of us IT service management folks think of IT change management, emphasis on the ‘IT’. Project managers think of changes in the scope or definition of a project - change management being the formal process to review and approve material changes to the project scope, schedule, or resources. Yet another is organizational management of change, frequently known as ‘change management’. This change management has to do with the people aspects of changes in an organization, and is sometimes used interchangeably with ‘transition’.

A Rose by Any Other Name

Add to these a host of also-known-as variations:
  • Change control
  • Change board
  • Change enablement
  • Change leadership
  • Transition management
  • Management of Change (MOC)
  • Change adverse culture
Not to mention:
  • Game changer
  • Culture change
  • Theory of change
  • Change agent
  • Course change
  • Change framework
And my favorite:
  • Spare change
Adding to the difficulty is that many of them are closely related. ‘Change control’, for instance, is often used interchangeably with ‘IT change management’. ‘Change board’ and change advisory board (CAB) are often used to describe the same thing. Change management is a process that’s covered in the ITIL® Service Transition lifecycle. Change agents and change leadership usually has to do with leadership and the ability to achieve change in an organization. In the United States, Management of Change (MOC) is a well-defined standard for risk management, generally associated with occupational health and safety in manufacturing and facilities management. It’s no wonder there’s a lot of confusion surrounding change management.

Time to Face the Strange Cha Cha Changes

Each term is important in its own right, and has a context-specific meaning. The problem isn’t so much confusing the terms themselves. That would be easy enough to clear up, and you can usually derive the meaning from the context. No harm done. Where there’s a problem is when the meanings get confused,andit happens more than you might think. Shall we, as David Bowie famously put it, turn and face the strain?

IT Change Management

Over the years, I’ve come to add ‘IT’ in front of ‘change management’ to make it more clear to what I’m referring.  ITIL doesn’t make this distinction; I’ve just found it helpful to avoid misunderstandings. IT change management, then, is the process that manages the lifecycle of all IT changes.  Stuart Rance does a great job describing it succinctly in What is Change Management For? There’s no single right way to manage change, but when talking about IT change management, we’re generally talking about some variation on the best practices approach described in ISO 20000, COBIT, and ITIL. In short, IT change management seeks to:
  • Ensure timely and effective implementation of business-required changes
  • Appropriately manage risk
  • Minimize business impact and unintended consequences from changes
  • Ensure changes achieve desired business outcomes
Most IT people are familiar with the change advisory board (CAB). CAB is perhaps the most recognized component of change management. The change management process is triggered by a request for change (RFC), which is a record that describes the proposed (requested) change in enough detail that CAB can effectively evaluate it. Where it gets complicated is when IT change management has to consider the cultural implications of a proposed change. In these cases, organizational changes must occur for the proposed change to produce the anticipated outcomes. This is where IT change management intersects with organizational management of change, which is an altogether different thing than IT change management.

Organizational Management of Change

Whereas IT change management is focused on managing changes to IT services, processes, and infrastructure, organizational management of change is about managing people and organizations through changes of any type, generally separate from IT changes. Good examples include implementing a new work-at-home policy, outsourcing a function, reorganizing a division, or closing a site. Management would be wise to carefully apply organizational management of change to successfully transition to the desired new state. Prosci describes change managementlike this:

“Change management is the application of a structured process and set of tools for leading the people side of change to achieve a desired outcome.”

The key difference here is ‘…the people side of change…”, which is similar to, and yet very different from IT change management.

Hey Buddy, Can You Spare Some Change?

The Greek philosopher Heraclitus infamously said that the only thing that’s constant is change, and that’s probably about right. In our time, businesses must constantly change and adapt to stay competitive. That requires an IT organization that can execute changes with speed and precision. Good reason to be clear about what we mean by change management. That’s a change we can all agree on.

Like this article? You may also like: Change Evaluation: The Seven R's Revisited

Please share your thoughts in the comments or on Twitter, Google+, or Facebook where we are always listening.
Continue reading

The 2015 ITSM Show – The Greatest Show on Earth

Posted by on May 19, 2015 in ITSM
ITSM Show - The Greatest Show on Earth It may be in a completely different month to normal, and at a new venue, but the buzz around the upcoming SITS15 - IT Service Management (ITSM) Show (formerly known as the Service Desk and IT Support Show) is as intense as ever. After all, it’s one of the biggest ITSM events in the world (as what happens in Vegas stays in Vegas, we’ll just completely ignore that big shiny Knowledge thing), so what’s there not to be excited about?!

The Content

Whilst this event is primarily an ITSM tool vendor exhibition, its ITSM presentations should not be underestimated. Some of the hot topics at this year’s event include:
  • Service integration and management (SIAM) – what it is, it’s importance, and best practice
  • Customer experience – as opposed to user experience, it’s a new hot topic in ITSM
  • Service catalogue – still popular after all these years, but it is so hard to get service catalogue right
  • Continual service improvement – it should be the first ITIL “process” adopted but often gets lost in a melee of incident, problem, and change investment
  • DevOps – so hot you might burn your fingers, find out why its DevOps and ITIL, not DevOps instead of ITIL
  • Service desk success – listen to those who have been there, done it, and bought the t-shirt
If you feel a little spoilt for choice and aren’t sure which sessions to attend, then let me help with some personal recommendations based on my knowledge of the presenters and their chosen topics:

Day 1

10:30–11:30: Stuart Rance, Optimal Service ManagementPutting people before technology and process 11:30–12:30: Andrea Kis and Martin Goble, Tata Consultancy Services Creating seamless service with SIAM 12:30–13:30: Girish Mathrubootham, Freshservice** – Using service catalogue for non-IT functions 13:30–14:30: Ian Connelly and Gregory Baylis-Hall, BCSPerfecting the service desk personality mix 14:30–15:30: Helen Bayliss, AccentureBuilding a culture of Continual Service Improvement 15:30–16:30: Daniel Breston, QriousityDoing more with less – a crash course in lean ITSM

Day 2

10:30–11:30: Patrick Bolger, Hornbill** – Is collaboration the future of business IT? 11:30–12:30: Duncan Watkins, Corporate Executive BoardNext-generation IT service skills 12:30–13:30: Sarah Lahav, SysAidWhat IT can learn from external customer relationship management 13:30–14:30: Jon Hall, BMC** – Swarming – a radical approach to managing critical problems 14:30–15:30: Tobias Nyberg, Handelsbanken How to win at configuration management 15:30–16:30: John Fahey, STI TrainingRe-invigorating a tired service desk ** At SysAid we’re not afraid to recommend that you check out presentations by our competition. Good quality content is good quality content no matter where it comes from. If you also find time to squeeze in a keynote or two I also highly recommend the Women in IT panel (more information below), and “Does your business really need a service desk?”, hosted by Stephen Mann. As an aside, and as a polite warning to Stephen Mann, if the answer is “no”, then neither I, nor any of the other vendors attending the event, are going to be very impressed (i.e. prepare to be lynched).

The Exhibition

Are you looking for a new IT help desk, service desk, or ITSM solution? Or are you simply out hunting for the best free giveaways (*cough* our swag was voted the best at a recent SDI event)? Or perhaps you’re a huge fan of Joe The IT Guy? If you answered “yes” to any of the above, then be sure to add a visit to the SysAid stand to your agenda. In addition to showcasing our ITSM product, we’ll also be offering a first peek at our new mobile asset management module and application (on iOS), which provides barcode scanning, audit, and reporting capabilities. The new module (driven by customer feedback) helps to address challenges such as:
  • Loss of assets
  • The inability to track inventory, including checking out and in scenarios
  • Limited auditing and reporting capabilities
Swing by and we’ll provide you with a little more information. Then, as if that isn’t enough, when you drop by you can also pick up a Conference In A Box, packed with free information and wisdom around improving service management and customer experience (as well as free chocolate). Phew, that’s the shameless marketing plug out of the way, now back to the event…

Women in IT

In the run up to the event, the team behind the ITSM Show has launched Women in IT Week, an initiative to inspire more women to pursue positive career pathways in IT. The aim is to help bridge the gap of gender inequality within the IT sector; something that us at SysAid fully support (not least with a female CEO at our healm). I’m personally very excited to listen to the all-women panel on Wednesday 3rd June at 13:45, hosted by Karen Ferris, on why we should champion equality in the IT workplace. You can also enjoy the upcoming series of blogs, written by women in IT, on how they started in their career, and what advice they have to offer to other women interested in joining the industry. Karen recently kicked off the blog series by sharing her Six life lessons for every ambitious IT professional.

Customer Dinner

Just like last year, we’ll also be holding a special customer dinner after day one of the ITSM Show. Hosted just across the road from the Olympia venue, you can expect to swap stories and ideas with other SysAid customers, hear about the upcoming SysAid roadmap, learn more about how to get extra value from your investment in SysAid, and enjoy free booze and food (which will be much needed after a long day on your feet at the show – trust me).  There’s also a rumour going around that there may be some special free gifts for the customers that attend… The dinner will take place at The Hilton London Olympia on Wednesday 3rd June from 5pm – 7pm. If you’re interested in attending, please contact my colleague Kim Haimovic. We look forward to seeing you at the show! And don’t forget to follow the Twitter feed with the hashtag #SITS15. Image credit

Like this article? You may also like: What Can Estonia Teach You about IT Service Management?

Please share your thoughts in the comments or on Twitter, Google+, or Facebook where we are always listening.
Continue reading
Subscribe
Watch & learn from industry experts about ITSM and help desk hot topics!