Showing posts with label #ITSM. Show all posts
Showing posts with label #ITSM. Show all posts

Thursday, June 9, 2011

Startups vs.best practices... can't we all just get along?

Transitioning from CIO to CEO has been an interesting move for me.  This is not my first time as a CEO, but my role as CEO of Vigilant was short, and Vigilant was an IT services company, so it was still chief of IT services.  However, as much as I dog on ITIL, CObIT and other industry frameworks for being too esoteric and vague, I always have appreciated and applauded the principles and intents.  As SMAK has launched from thought to design to code to hardware, my experiences and training in lifecycly management has served me well.   Our Strategy phase quickly incorporated what our resources and capabilities could be, would be, and should be.  Since I have the unique opportunity to start this IT operations from scratch, I wanted to get our LifeCycle management clear and correct from the start.

Just because we are a lean startup doesn't mean we need to run in chaos.  I certainly am not going to cast all hard lessons learned in the trash.  I know that if a disparate development team is not given a solid and stable platform for code migration, our IT ops will be a mess.  My ITIL students and past clients have heard this expression a million times from me.  If you want to cleanse the pond, you must clean the streams that feed it.  In other words, if you want a clean IT operations platform, you must have solids standards and architectures in place for all involved to work from.  Breaking down the DEV/QA/UAT/Prod barriers is a challenge.  Typically it is based on rights and security.  Access control can be a nightmare and causes much of this angst.  By setting up boundaries and protocols up-front, the streams will stay clean and the pond will be a source of value.

So here is my strategy straight out of SMAKs operation guide on how I plan to allow autonomy and control co-exist.

User Setup and Configuration:

To secure the environment we will utilize a strategy of layered access to systems. Each environment will utilize the same set of layers with a name denoting their environment.

To gain physical access to systems (keyboard, SSH, Remote windows) there will be a user created.
Once physical access is gained you will need to change user or run-as a user with rights to access either system settings / application data (php, xml files / database settings / database information.
Access controls are organized in to functional groups based on assetts. Asset types fall into 5 categories:
Production – Production environment with real users and customers. Needs to exhibit high service warranty.
Demo – Production+ build version of our site with fake data that we will use for demonstration at events, webinars, and other marketing events. (Production+ means at least production vesion with potentially new features to demonstrate functionality)
UAT – User Acceptance Testing Environment– QA Build version signed off on by production release team for Security; Availability; Performance testing. Now awaiting user interaction; regression; usability and design; product marketing sign off.
QA – Quality Assurance Environment – Build version that has been signed off by development team and gone through integration testing. Testing in this environment will focus on Functionality; Security; Performance; Availability; Installation; Recovery. Training to production release team will happen at this build stage. Sign off by Product Management.
Dev – Development Environment – Dynamic build versions be created in this environment with 2 core focus areas

  1. InnoDev - New product development focused on publishing new feature sets and requirements from Product Marketing team.
  2. ProbDev – Problem Management environment focused on production snapshots for replicating issues found in production.

The following table lists the usernames:  {obviously cleansed and changed for security purposes}  Key here is to create naming conventions that make it ease for each lifcycle to be identified and controlled.  This will make it a lot easier with building RACI models in your CMS map.
User Type Production User Name Demo User Name UAT User Name QA User Name Dev User Name
Group Name




Enterprise Cloud Administration




Access User




System Admin




Application Administration




Database Administration






Data Access User
(can see datapoint for customer information)





Customer Service Access
(access to configuration and registration info)





Monday, November 8, 2010

ITSM Weekly the Podcast (Week33) - Guest Speaker: Kevin More

In my last blog post I spoke about the human element of actions.  This becomes ever so much more prevalent when your corporation works with deviations from societal norms.  In my life I have worked for almost every type of corporation, marketing, sales, insurance, finance, hospitals, snack goods, education, engineering...  There is a few I haven't worked in by choice, but not many.  The actions of showing up at a desk, walking into a meeting, presenting a topic, evaluating a report, have all been relatively the same for me.  My strength has been FCAPS Fault, Capacity, Availability, Performance, Security, and Change management.  However, my experience for everyone of those actions has been completely different.  FCAPS management to be truly proactive you must understand the business.  What does that mean?  What do the people in the business do, and how do they do it?  You must observe the culture, understand the patterns.  For instance, my first work assignment in insurance I took the opportunity to evaluate when desks would clear out at the end of the day.  I noticed typically around 4pm employees were heading out and by 5pm it was fairly empty.  So before ever running my first system utilization report, I already head the suspicion that between 2-4pm the system was at high-load.  Lifestyle was a cultural element, and sports moms' and dads wanted to be home for 6pm practice. When evaluating network and system traffic, I was spot on. 2-4pm heavy usage.  So I then took that data and evaluated the load testing strategy.  Just as you would have suspected, a ramp load to an avg steady stay for 6 hours and then down again.  In other words, the simulation was emulating traffic and load based on a work-day schedule, not a cultural behavior or pattern.  So what am I getting at?   KNOW YOUR BUSINESS.

This week our special guest is a colleague of mine from Boston SIM, Kevin More.  Kevin is a very impressive proffesional, not just cause he is technical, a savvy business person, or has an iPad.  (Though I am jealous of his iPad).  It's because he knows his business.  He understands what his culture does, how they perform actions, and even more importantly WHY they do it.  Listen in as Kevin More, CIO of May Institute, discusses the delivery of IT services for an organization dedicated behavioral health and development of children and adults with brain dysfunctions and autism.

Enjoy this weeks episode with our special guest Kevin More.


ITSM Weekly The Podcast (Episode 33) from ServiceSphere on Vimeo.

Your Hosts:  Matthew Hooper and Matt Beran(twitter #ITSMWP)

AUTISM, iPADs and SIM-FUSION!
What happens when a CIO, a Service Desk Manager and an Industry Junkie Chat Weekly?!
Special Guest:  Kevin More

Submit Questions:  Anonymously or Email or Call In: (765) 236-6383 or Twitter Questions/Comments #ITSMWP

Friday, October 29, 2010

ITSM Weekly the Podcast (Week32) - Guest Speaker: Philip Neufeld & Matt Neigh

Service Management  - a term that continues to allude people who are in the service industry.  I'm not talking just IT, all be it probably we are the worst to embrace this.  I'm talking about those who just don't get that if you are not fabricating a tangible (electronic or physical) product or good, then you are performing services for your job.  Even if you make a product, say diamond plated dental instruments (something you would be surprised I have learned a lot about),  you still are performing services.  Turning shanks, dipping instruments, packaging, shipping, are all series of actions.  So what's my point?


Service Management is not process.  Processes are not Service Management.  Yet both involve the same series of actions.   You must perform a series of actions in a quality controlled form to produce a result that is consistent, expected, and predictable.  This is where PROCESS kicks in. Processes help you to know which actions to take, when to take them, and what to track about it so you can measure, tune and report on those steps.  SERVICE MANAGEMENT thus is all about the attitude, reflection, interaction, communication, and personalization that surrounds the people performing those actions.  Thus a simple way to think about it in my mind is a PROCESS gets the job done, SERVICE MANAGEMENT satisfies a the requester.  Thus if you spend too much time focusing on either one of these without the other, you will achieve an imbalance of not getting the job done and being a talking head to a requester, or being efficient but a royal pain to work with.  Remember if it's just an action, a robot can do that.  Humans desire a human element, and you must bring that human element to the table when perform actions for other humans.

Enjoy listening to this weeks episode where we speak with Special Guest:  Philip Neufeld Director of Service Management, IT Services State of California and  Matt Neigh from our Higher Education sponsor Cherwell Software

Show notes here: http://www.servicesphere.com/blog/2010/9/13/itsm-weekly-the-podcast-episode-32.html


ITSM Weekly The Podcast (Episode 32) from ServiceSphere on Vimeo.



Your Hosts Chris Dancy, Matthew Hooper and Matt Beran (twitter #ITSMWP)


Mobile Apps, Communication Intelligence and Fusion
What happens when a CIO, a Service Desk Manager and an Industry Junkie Chat Weekly?!
Special Guest:  Matt Neigh
Special Guest:  Philip Neufeld
Series:  ITSM and Higher Education
Submit Questions:  Anonymously or Email or Call In: (765) 236-6383 or Twitter Questions/Comments #ITSMWP
Episode 32 Topics: