SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
itSM Solutions®
DITY™ Newsletter
Reprint
This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and
have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals
who want a workable, practical guide to implementing ITIL best practices -- without the hype.

become a member
(It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm)

Publisher
itSM Solutions™ LLC
31 South Talbert Blvd #295
Lexington, NC 27292
Phone (336) 510-2885
Fax (336) 798-6296
Find us on the web at: http://www.itsmsolutions.com.
To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com
For information on obtaining copies of this guide contact: sales@itsmsolutions.com
Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the
permission of the Controller of HMSO and the Office of Government Commerce.
Notice of Rights / Restricted Rights Legend
All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of
the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner
License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof
beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited.
Notice of Liability
This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not
limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor
itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused
directly or indirectly by the contents of this guide.
Trademarks
itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a
Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent
and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No.
0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be
trademarks or registered trademarks of their respective companies.
ITIL MEASURING AND METRICS

IT Experience. Practical Solutions.

DITY™ Newsletter

The workable, practical guide to Do IT Yourself™

HOW TO MEASURE IT SERVICE
QUALITY

Vol. 2.6, feb. 8, 2006

By Hank Marquis

IT Infrastructure Library (ITIL®) tenets are that Business needs drive IT operations;
and that User perception is the true measure of IT Service Quality. However, most IT
organizations report on technical metrics like jitter and loss, which while necessary, do
not show how IT Services meet User needs, and offer little evidence of IT Service
Quality.
hank
MARQUIS
Articles
E-mail
Bio

Measuring User perception forms an intuitive bridge for effective communications;
reporting on technical metrics is the root of Business/IT communications failures. So,
how do you bridge this Business/IT communications gap? It turns out that just four
service attributes shape User perception: Availability, Capacity, Security, and Data
Integrity.

Taken together as degradation they measure IT Service quality. The ITIL also defines
an IT Service Quality metric for this degradation -- Impacted User Minutes (IUM).
Following is discussion on how to use IUM to truly measure IT Service Quality, bridge the Business/IT
communications gap and value IT Services at the same time.
Business Perspective of IT Service Quality
Business does not use technology for the sake of technology; rather business leverages technology to
empower Users to accomplish their job or mission. User's rely upon IT Services to accomplish some
goal, task, function or mission. It makes sense then that examining a Users ability to accomplish their
job or mission is the most pure and representative measure of IT Service quality from a business
perspective.
Consider how much more valuable your IT reporting would be to the Business if it was understandable
http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (1 of 4)11/11/2006 11:27:45 AM
ITIL MEASURING AND METRICS

and spoke to the reader in terms they understood. Further, consider the worth to the reader of your
reports if they could make decisions quickly based upon the data contained in your reports. IUM
delivers this value.
A Model for IT Service Quality
The needs of a User to accomplish their primary job function using IT Services serves as a model for
understanding IT Service Quality. The best analogy is to imagine that you are a User trying to get a job
done while relying upon IT Services. What would you think about?
“Can I get to where what I need to do my job resides?” (Availability)
“Can I get enough of what I need in time to do my job?” (Capacity)
“Can I get access to what I need to do my job when needed? (Security)
“Is what I access correct?” (Data Integrity)
There are just four aspects to the model: Availability, Capacity, Security, and Data Integrity. Within IT,
we have direct control of Availability, Capacity, and Security. However, we don't have control over Data
Integrity. For example, we can use data input forms to assure data fits acceptable patterns and
algorithms to ensure that data does not change enroute. But, bad data that fits an acceptable pattern it
is outside of IT’s control. Therefore, we need to focus on the three elements that IT does control:
Availability, Capacity, and Security.
The IUM assumes that requirements for Availability, Capacity, and Security are in place and
documented as Service Level Targets (SLTs) within Service Level Agreements (SLAs). Also required is
instrumentation to measure compliance with SLTs. Then, the concept of the IUM becomes clear. Each
minute during the defined period of availability in which observed Availability, Capacity or Security does
not comply with stated SLTs is an IUM. For example, if the SLTs in the SLA include:
“Monday through Friday, from 8:00am to 5:00pm” (Availability)
“Lookup requests will return customer records within 5 seconds” (Capacity)
“For users with appropriate account authority” (Security)
Example 1. Service Level Agreement Excerpt

If designed in cooperation with the Customer the above SLTs allow the User to accomplish their job as
required. Now imagine a condition that causes any degradation on any of the three SLTs -- for example,
a network failure that causes a slowdown in returning records. The IT Service degrades, and the IUM
correctly shows the IT Service is not sufficient for Users to accomplish their jobs or missions to the
degree required by the business and agreed with IT.
IUM and Cost of Downtime
The benefits of IUM are twofold. First, IUM lets you clearly understand the perception of IT Service
Quality. Applying IUM to an individual shows that User’s perception of the IT Service. Tabulating IUM
for a department shows the departments perception of IT Service Quality, and so up the organization
matrix. Second, IUM lends itself very nicely to another sought after metric -- the Cost of Downtime
(CoD). At key levels of work, one can also assign a value to an IUM and develop CoD. CoD is simply a
value per IUM.
CoD also requires collaboration and agreement with the Business and Customers, but the concept is very
simple. For example, the sales department takes 100 orders per hour, on average. There are six Users
(sales people) and each order has an average value of $149. Thus, simple math shows the CoD as:
http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (2 of 4)11/11/2006 11:27:45 AM
ITIL MEASURING AND METRICS

100 (orders per hour) / 6 (Users) = approximately 16 orders per User, per hour
60 minutes / 16 (order/User/hour) = approximately 4 minutes per order
Thus, 4 minutes of downtime is worth about $149.00 per User
1 Impacted User Minute (IUM) = $37.25
Example 2. IUM Business Transaction Cost Breakdown

If the entire sales department goes down for 8 minutes, the impact on the company is:
8 (minutes down) X 6 (Users) X $37.25 (dollar value per IUM) = $1,788.00
Example 3. IUM and CoD Calculation

Such a concept easily approximates any cash, business, mission or production loss: customers lost,
revenue lost, planes not launched, magazines not printed, motorcycles not manufactured, soldiers not
fed, etc. Anything that relies upon IT service quality fits into the IUM theme. You can even expand the
equation to take into account salary, benefits or other financial aspects of the business transaction for
more actuarial accounting.
Up, Down, and Degraded
You should use IUM (and CoD) in addition to Availability reporting. Availability shows "up" or "down"
-- an IT Service is "up" when the User can perform meaningful work; and "down" when the User is
unable to perform any meaningful work. IUM pertains to "degraded" IT service quality. You must
define the extent of the degradation and define the range of SLT's from "up" through "degraded" and
then to "down" with the Business and document these ranges in the SLA.
You must take care to be clear here as there is a difference between a User who is totally unable to work,
and a User who's work is impaired. You could assign a range of IUM values reflecting IT service quality
deterioration. For example, only showing Capacity SLTs for clarity and brevity, the following table
assigns values based on ranges of the Capacity SLT from the above example SLA excerpt:

CoD per IUM

State (Up,
Down,
Degraded)

1 to 4 seconds

N/A

Up

5 to 29 seconds

$9.31

Degraded

30 to 179 seconds

$18.62

Degraded

180 seconds or higher

$37.25

Down

Time To Return Customer Record

Table 1. Expanded IUM/CoD Implementation

Benefits Of IUM Reporting
The primary benefit of implementing and reporting on IUM is closer alignment with the Business, and a
real understanding of IT Service Quality -- one that the Business knows, understands, and trusts. There
are many additional benefits to the concept of IUM:
q IUM drives Business IT Alignment (BITA) as it requires both work together to define appropriate
SLTs
q IUM reporting involves the Customer -- the data in the metric is immediately obvious and actionable
http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (3 of 4)11/11/2006 11:27:45 AM
ITIL MEASURING AND METRICS
q
q
q

q

IUM provides an intuitive understanding of IT performance -- both inside and outside IT
IUM is the starting point for CoD -- which leads to easier justification of IT expenses
IUM, with CoD where appropriate, provides a means to measure, value and justify both IT Services
and costs
IUM and CoD can serve as the basis for Business Impact Analysis (BIA), Risk Assessment, etc.

There still exists the need for precise measurements of highly technical attributes like jitter and loss. In
fact, these types of measurements may underpin IUM (and thus CoD.) However, reporting to the
Business, Customers and IT Management should not be technical. The purpose of reporting is to
improve decision making, and the IUM is one of the most powerful methods yet devised to illustrate IT
service quality.
Consider including IUM and perhaps CoD into your Customer, Executive, and Senior IT reporting. Your
reporting will be more "transparent" and less technical. You will find it much easier to communicate
when you both have common ground, and you might just finally get that pet project of yours funded at
the same time!
-q
q

Subscribe to our newsletter and get new skills delivered right to your Inbox, click here.
To browse back-issues of the DITY Newsletter, click here.

Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved.

http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (4 of 4)11/11/2006 11:27:45 AM

Más contenido relacionado

La actualidad más candente

IT-As-A-Service-IT For Small And Medium Business
IT-As-A-Service-IT For Small And Medium BusinessIT-As-A-Service-IT For Small And Medium Business
IT-As-A-Service-IT For Small And Medium BusinessChirantan Ghosh
 
Information systems-outsourcingasperp4459
Information systems-outsourcingasperp4459Information systems-outsourcingasperp4459
Information systems-outsourcingasperp4459StudsPlanet.com
 
IT Strategic Planning (Case Studies)
IT Strategic Planning (Case Studies)IT Strategic Planning (Case Studies)
IT Strategic Planning (Case Studies)Nurhazman Abdul Aziz
 
Information Technology for Management and Business
Information Technology for Management and BusinessInformation Technology for Management and Business
Information Technology for Management and BusinessGanta Kishore Kumar
 
Edi (electronic data interchange)retail marketing
Edi (electronic data interchange)retail marketingEdi (electronic data interchange)retail marketing
Edi (electronic data interchange)retail marketingLEARNCOMMERCE
 
Case 2.1 : Modernization of NTUC Income
Case 2.1 : Modernization of NTUC IncomeCase 2.1 : Modernization of NTUC Income
Case 2.1 : Modernization of NTUC IncomeAya Wan Idris
 
ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE alraee
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc incomeZulkifflee Sofee
 
PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...
PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...
PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...1E: Software Lifecycle Automation
 
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentManagement Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentAG RD
 
Forrester report Digital Fuel IT financial management case-study
Forrester report Digital Fuel IT financial management case-studyForrester report Digital Fuel IT financial management case-study
Forrester report Digital Fuel IT financial management case-studyyisbat
 

La actualidad más candente (18)

IT-As-A-Service-IT For Small And Medium Business
IT-As-A-Service-IT For Small And Medium BusinessIT-As-A-Service-IT For Small And Medium Business
IT-As-A-Service-IT For Small And Medium Business
 
Information systems-outsourcingasperp4459
Information systems-outsourcingasperp4459Information systems-outsourcingasperp4459
Information systems-outsourcingasperp4459
 
Dit yvol5iss17
Dit yvol5iss17Dit yvol5iss17
Dit yvol5iss17
 
Acc 340 Preview Full Course
Acc 340 Preview Full CourseAcc 340 Preview Full Course
Acc 340 Preview Full Course
 
IT Strategic Planning (Case Studies)
IT Strategic Planning (Case Studies)IT Strategic Planning (Case Studies)
IT Strategic Planning (Case Studies)
 
Edi
EdiEdi
Edi
 
10120140502012
1012014050201210120140502012
10120140502012
 
Information Technology for Management and Business
Information Technology for Management and BusinessInformation Technology for Management and Business
Information Technology for Management and Business
 
Introduction to EDI
Introduction to EDIIntroduction to EDI
Introduction to EDI
 
Edi (electronic data interchange)retail marketing
Edi (electronic data interchange)retail marketingEdi (electronic data interchange)retail marketing
Edi (electronic data interchange)retail marketing
 
Case 2.1 : Modernization of NTUC Income
Case 2.1 : Modernization of NTUC IncomeCase 2.1 : Modernization of NTUC Income
Case 2.1 : Modernization of NTUC Income
 
ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc income
 
PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...
PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...
PUTTING YOUR USERS IN CHARGE COULD SAVE YOU MILLIONS HOW USER SELF SERVICE CA...
 
Ntuc income
Ntuc incomeNtuc income
Ntuc income
 
Goals Of E Business
Goals Of E BusinessGoals Of E Business
Goals Of E Business
 
Management Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA StudentManagement Information System one or two chapter By Amjad Ali Depar MBA Student
Management Information System one or two chapter By Amjad Ali Depar MBA Student
 
Forrester report Digital Fuel IT financial management case-study
Forrester report Digital Fuel IT financial management case-studyForrester report Digital Fuel IT financial management case-study
Forrester report Digital Fuel IT financial management case-study
 

Destacado

Evolucion del uso de las opiniones online
Evolucion del uso de las opiniones onlineEvolucion del uso de las opiniones online
Evolucion del uso de las opiniones onlinealbertusb
 
Dossier prensa plaza_norte_2
Dossier prensa plaza_norte_2Dossier prensa plaza_norte_2
Dossier prensa plaza_norte_2blancaperse
 
The European Innovation Partnership on Water Online Marketplace
The European Innovation Partnership on Water Online MarketplaceThe European Innovation Partnership on Water Online Marketplace
The European Innovation Partnership on Water Online MarketplaceMartin Kaltenböck
 
El Ecosistema de CRM que dicta el nuevo cliente social
El Ecosistema de CRM que dicta el nuevo cliente socialEl Ecosistema de CRM que dicta el nuevo cliente social
El Ecosistema de CRM que dicta el nuevo cliente socialMundo Contact
 
PINTORES Y NATURALEZA
PINTORES Y NATURALEZAPINTORES Y NATURALEZA
PINTORES Y NATURALEZAcarm
 
Canalizaciones electricas
Canalizaciones electricasCanalizaciones electricas
Canalizaciones electricasJime792
 
iBeacon - Conectar el mundo real con experiencias móviles - Freakend15
iBeacon - Conectar el mundo real con experiencias móviles - Freakend15iBeacon - Conectar el mundo real con experiencias móviles - Freakend15
iBeacon - Conectar el mundo real con experiencias móviles - Freakend15José Manuel García García
 
Data-Tech's Customer Promise Narrative
Data-Tech's Customer Promise NarrativeData-Tech's Customer Promise Narrative
Data-Tech's Customer Promise NarrativeChristopher Lietz
 
Prueba Saber Matemáticas 2013-3º ICFES
Prueba Saber Matemáticas  2013-3º ICFESPrueba Saber Matemáticas  2013-3º ICFES
Prueba Saber Matemáticas 2013-3º ICFESfrancisco páramo
 
Manual del usuario, Pagina Web UFT
Manual del usuario, Pagina Web UFTManual del usuario, Pagina Web UFT
Manual del usuario, Pagina Web UFTAmandaMiguel
 

Destacado (20)

Practica 1 problema 7
Practica 1 problema 7Practica 1 problema 7
Practica 1 problema 7
 
drogadiccion
drogadicciondrogadiccion
drogadiccion
 
Evolucion del uso de las opiniones online
Evolucion del uso de las opiniones onlineEvolucion del uso de las opiniones online
Evolucion del uso de las opiniones online
 
Dossier prensa plaza_norte_2
Dossier prensa plaza_norte_2Dossier prensa plaza_norte_2
Dossier prensa plaza_norte_2
 
The European Innovation Partnership on Water Online Marketplace
The European Innovation Partnership on Water Online MarketplaceThe European Innovation Partnership on Water Online Marketplace
The European Innovation Partnership on Water Online Marketplace
 
Publikation nzfh modul_6_entwicklung_begleiten_web
Publikation nzfh modul_6_entwicklung_begleiten_webPublikation nzfh modul_6_entwicklung_begleiten_web
Publikation nzfh modul_6_entwicklung_begleiten_web
 
PROGRAMMA FORUM DELLE RISORSE UMANE 2012
PROGRAMMA FORUM DELLE RISORSE UMANE 2012PROGRAMMA FORUM DELLE RISORSE UMANE 2012
PROGRAMMA FORUM DELLE RISORSE UMANE 2012
 
Aqui estoy
Aqui estoyAqui estoy
Aqui estoy
 
El Ecosistema de CRM que dicta el nuevo cliente social
El Ecosistema de CRM que dicta el nuevo cliente socialEl Ecosistema de CRM que dicta el nuevo cliente social
El Ecosistema de CRM que dicta el nuevo cliente social
 
PINTORES Y NATURALEZA
PINTORES Y NATURALEZAPINTORES Y NATURALEZA
PINTORES Y NATURALEZA
 
Canalizaciones electricas
Canalizaciones electricasCanalizaciones electricas
Canalizaciones electricas
 
iBeacon - Conectar el mundo real con experiencias móviles - Freakend15
iBeacon - Conectar el mundo real con experiencias móviles - Freakend15iBeacon - Conectar el mundo real con experiencias móviles - Freakend15
iBeacon - Conectar el mundo real con experiencias móviles - Freakend15
 
Data-Tech's Customer Promise Narrative
Data-Tech's Customer Promise NarrativeData-Tech's Customer Promise Narrative
Data-Tech's Customer Promise Narrative
 
Ingles12011
Ingles12011Ingles12011
Ingles12011
 
Fuerzas y leyes de newton
Fuerzas y leyes de newtonFuerzas y leyes de newton
Fuerzas y leyes de newton
 
Prueba Saber Matemáticas 2013-3º ICFES
Prueba Saber Matemáticas  2013-3º ICFESPrueba Saber Matemáticas  2013-3º ICFES
Prueba Saber Matemáticas 2013-3º ICFES
 
Gestion del tiempo_
Gestion del tiempo_Gestion del tiempo_
Gestion del tiempo_
 
Presentacion molina navarrete
Presentacion molina navarretePresentacion molina navarrete
Presentacion molina navarrete
 
Como se hacen las Perlas
Como se hacen las PerlasComo se hacen las Perlas
Como se hacen las Perlas
 
Manual del usuario, Pagina Web UFT
Manual del usuario, Pagina Web UFTManual del usuario, Pagina Web UFT
Manual del usuario, Pagina Web UFT
 

Similar a Dit yvol2iss6 (20)

Dit yvol4iss45
Dit yvol4iss45Dit yvol4iss45
Dit yvol4iss45
 
Dit yvol2iss41
Dit yvol2iss41Dit yvol2iss41
Dit yvol2iss41
 
Dit yvol2iss44
Dit yvol2iss44Dit yvol2iss44
Dit yvol2iss44
 
Dit yvol2iss28
Dit yvol2iss28Dit yvol2iss28
Dit yvol2iss28
 
Dit yvol2iss26
Dit yvol2iss26Dit yvol2iss26
Dit yvol2iss26
 
Dit yvol1iss4
Dit yvol1iss4Dit yvol1iss4
Dit yvol1iss4
 
Dit yvol2iss50
Dit yvol2iss50Dit yvol2iss50
Dit yvol2iss50
 
Dit yvol1iss3
Dit yvol1iss3Dit yvol1iss3
Dit yvol1iss3
 
Dit yvol1iss2
Dit yvol1iss2Dit yvol1iss2
Dit yvol1iss2
 
Dit yvol2iss33
Dit yvol2iss33Dit yvol2iss33
Dit yvol2iss33
 
Dit yvol2iss13
Dit yvol2iss13Dit yvol2iss13
Dit yvol2iss13
 
Dit yvol2iss10
Dit yvol2iss10Dit yvol2iss10
Dit yvol2iss10
 
Dit yvol2iss25
Dit yvol2iss25Dit yvol2iss25
Dit yvol2iss25
 
Dit yvol2iss43
Dit yvol2iss43Dit yvol2iss43
Dit yvol2iss43
 
Dit yvol2iss40
Dit yvol2iss40Dit yvol2iss40
Dit yvol2iss40
 
Dit yvol3iss5
Dit yvol3iss5Dit yvol3iss5
Dit yvol3iss5
 
Dit yvol2iss30
Dit yvol2iss30Dit yvol2iss30
Dit yvol2iss30
 
Dit yvol2iss17
Dit yvol2iss17Dit yvol2iss17
Dit yvol2iss17
 
Dit yvol2iss37
Dit yvol2iss37Dit yvol2iss37
Dit yvol2iss37
 
Dit yvol3iss8
Dit yvol3iss8Dit yvol3iss8
Dit yvol3iss8
 

Más de Rick Lemieux

Más de Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Dit yvol2iss6

  • 1. itSM Solutions® DITY™ Newsletter Reprint This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals who want a workable, practical guide to implementing ITIL best practices -- without the hype. become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm) Publisher itSM Solutions™ LLC 31 South Talbert Blvd #295 Lexington, NC 27292 Phone (336) 510-2885 Fax (336) 798-6296 Find us on the web at: http://www.itsmsolutions.com. To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com For information on obtaining copies of this guide contact: sales@itsmsolutions.com Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the permission of the Controller of HMSO and the Office of Government Commerce. Notice of Rights / Restricted Rights Legend All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited. Notice of Liability This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused directly or indirectly by the contents of this guide. Trademarks itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies.
  • 2. ITIL MEASURING AND METRICS IT Experience. Practical Solutions. DITY™ Newsletter The workable, practical guide to Do IT Yourself™ HOW TO MEASURE IT SERVICE QUALITY Vol. 2.6, feb. 8, 2006 By Hank Marquis IT Infrastructure Library (ITIL®) tenets are that Business needs drive IT operations; and that User perception is the true measure of IT Service Quality. However, most IT organizations report on technical metrics like jitter and loss, which while necessary, do not show how IT Services meet User needs, and offer little evidence of IT Service Quality. hank MARQUIS Articles E-mail Bio Measuring User perception forms an intuitive bridge for effective communications; reporting on technical metrics is the root of Business/IT communications failures. So, how do you bridge this Business/IT communications gap? It turns out that just four service attributes shape User perception: Availability, Capacity, Security, and Data Integrity. Taken together as degradation they measure IT Service quality. The ITIL also defines an IT Service Quality metric for this degradation -- Impacted User Minutes (IUM). Following is discussion on how to use IUM to truly measure IT Service Quality, bridge the Business/IT communications gap and value IT Services at the same time. Business Perspective of IT Service Quality Business does not use technology for the sake of technology; rather business leverages technology to empower Users to accomplish their job or mission. User's rely upon IT Services to accomplish some goal, task, function or mission. It makes sense then that examining a Users ability to accomplish their job or mission is the most pure and representative measure of IT Service quality from a business perspective. Consider how much more valuable your IT reporting would be to the Business if it was understandable http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (1 of 4)11/11/2006 11:27:45 AM
  • 3. ITIL MEASURING AND METRICS and spoke to the reader in terms they understood. Further, consider the worth to the reader of your reports if they could make decisions quickly based upon the data contained in your reports. IUM delivers this value. A Model for IT Service Quality The needs of a User to accomplish their primary job function using IT Services serves as a model for understanding IT Service Quality. The best analogy is to imagine that you are a User trying to get a job done while relying upon IT Services. What would you think about? “Can I get to where what I need to do my job resides?” (Availability) “Can I get enough of what I need in time to do my job?” (Capacity) “Can I get access to what I need to do my job when needed? (Security) “Is what I access correct?” (Data Integrity) There are just four aspects to the model: Availability, Capacity, Security, and Data Integrity. Within IT, we have direct control of Availability, Capacity, and Security. However, we don't have control over Data Integrity. For example, we can use data input forms to assure data fits acceptable patterns and algorithms to ensure that data does not change enroute. But, bad data that fits an acceptable pattern it is outside of IT’s control. Therefore, we need to focus on the three elements that IT does control: Availability, Capacity, and Security. The IUM assumes that requirements for Availability, Capacity, and Security are in place and documented as Service Level Targets (SLTs) within Service Level Agreements (SLAs). Also required is instrumentation to measure compliance with SLTs. Then, the concept of the IUM becomes clear. Each minute during the defined period of availability in which observed Availability, Capacity or Security does not comply with stated SLTs is an IUM. For example, if the SLTs in the SLA include: “Monday through Friday, from 8:00am to 5:00pm” (Availability) “Lookup requests will return customer records within 5 seconds” (Capacity) “For users with appropriate account authority” (Security) Example 1. Service Level Agreement Excerpt If designed in cooperation with the Customer the above SLTs allow the User to accomplish their job as required. Now imagine a condition that causes any degradation on any of the three SLTs -- for example, a network failure that causes a slowdown in returning records. The IT Service degrades, and the IUM correctly shows the IT Service is not sufficient for Users to accomplish their jobs or missions to the degree required by the business and agreed with IT. IUM and Cost of Downtime The benefits of IUM are twofold. First, IUM lets you clearly understand the perception of IT Service Quality. Applying IUM to an individual shows that User’s perception of the IT Service. Tabulating IUM for a department shows the departments perception of IT Service Quality, and so up the organization matrix. Second, IUM lends itself very nicely to another sought after metric -- the Cost of Downtime (CoD). At key levels of work, one can also assign a value to an IUM and develop CoD. CoD is simply a value per IUM. CoD also requires collaboration and agreement with the Business and Customers, but the concept is very simple. For example, the sales department takes 100 orders per hour, on average. There are six Users (sales people) and each order has an average value of $149. Thus, simple math shows the CoD as: http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (2 of 4)11/11/2006 11:27:45 AM
  • 4. ITIL MEASURING AND METRICS 100 (orders per hour) / 6 (Users) = approximately 16 orders per User, per hour 60 minutes / 16 (order/User/hour) = approximately 4 minutes per order Thus, 4 minutes of downtime is worth about $149.00 per User 1 Impacted User Minute (IUM) = $37.25 Example 2. IUM Business Transaction Cost Breakdown If the entire sales department goes down for 8 minutes, the impact on the company is: 8 (minutes down) X 6 (Users) X $37.25 (dollar value per IUM) = $1,788.00 Example 3. IUM and CoD Calculation Such a concept easily approximates any cash, business, mission or production loss: customers lost, revenue lost, planes not launched, magazines not printed, motorcycles not manufactured, soldiers not fed, etc. Anything that relies upon IT service quality fits into the IUM theme. You can even expand the equation to take into account salary, benefits or other financial aspects of the business transaction for more actuarial accounting. Up, Down, and Degraded You should use IUM (and CoD) in addition to Availability reporting. Availability shows "up" or "down" -- an IT Service is "up" when the User can perform meaningful work; and "down" when the User is unable to perform any meaningful work. IUM pertains to "degraded" IT service quality. You must define the extent of the degradation and define the range of SLT's from "up" through "degraded" and then to "down" with the Business and document these ranges in the SLA. You must take care to be clear here as there is a difference between a User who is totally unable to work, and a User who's work is impaired. You could assign a range of IUM values reflecting IT service quality deterioration. For example, only showing Capacity SLTs for clarity and brevity, the following table assigns values based on ranges of the Capacity SLT from the above example SLA excerpt: CoD per IUM State (Up, Down, Degraded) 1 to 4 seconds N/A Up 5 to 29 seconds $9.31 Degraded 30 to 179 seconds $18.62 Degraded 180 seconds or higher $37.25 Down Time To Return Customer Record Table 1. Expanded IUM/CoD Implementation Benefits Of IUM Reporting The primary benefit of implementing and reporting on IUM is closer alignment with the Business, and a real understanding of IT Service Quality -- one that the Business knows, understands, and trusts. There are many additional benefits to the concept of IUM: q IUM drives Business IT Alignment (BITA) as it requires both work together to define appropriate SLTs q IUM reporting involves the Customer -- the data in the metric is immediately obvious and actionable http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (3 of 4)11/11/2006 11:27:45 AM
  • 5. ITIL MEASURING AND METRICS q q q q IUM provides an intuitive understanding of IT performance -- both inside and outside IT IUM is the starting point for CoD -- which leads to easier justification of IT expenses IUM, with CoD where appropriate, provides a means to measure, value and justify both IT Services and costs IUM and CoD can serve as the basis for Business Impact Analysis (BIA), Risk Assessment, etc. There still exists the need for precise measurements of highly technical attributes like jitter and loss. In fact, these types of measurements may underpin IUM (and thus CoD.) However, reporting to the Business, Customers and IT Management should not be technical. The purpose of reporting is to improve decision making, and the IUM is one of the most powerful methods yet devised to illustrate IT service quality. Consider including IUM and perhaps CoD into your Customer, Executive, and Senior IT reporting. Your reporting will be more "transparent" and less technical. You will find it much easier to communicate when you both have common ground, and you might just finally get that pet project of yours funded at the same time! -q q Subscribe to our newsletter and get new skills delivered right to your Inbox, click here. To browse back-issues of the DITY Newsletter, click here. Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved. http://www.itsmsolutions.com/newsletters/DITYvol2iss6.htm (4 of 4)11/11/2006 11:27:45 AM