Difference between revisions of "Transition into Operation"

From EITBOK
Jump to: navigation, search
 
(7 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<p style="color: red">'''Note: This wiki is a work in progress, and may contain missing content, errors, or duplication. We welcome feedback, edits, and real-world examples.'''</p>
+
<table border="3">
----
+
<tr><td>
 +
<table>
 +
<tr>
 +
<td width="60%"><font color="#246196">'''Welcome to the initial version of the EITBOK wiki. Like all wikis, it is a work in progress and may contain errors. We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' </font></td>
 +
<td width="20%">[[File:Ieee logo 1.png|100px|center]]</td>
 +
<td width="20%">[[File:Acm_logo_3.png|175px|center]]</td></tr></table>
 +
</td></tr></table>
 +
<p>&nbsp;</p>
 
<h2>Introduction</h2>
 
<h2>Introduction</h2>
 
<p>''Transition'' consists of a set of processes and activities that release new solutions into an EIT environment, replace or update existing solutions, remove a solution or component from service, or move EIT components from one location to another. Examples of transition include the installation of a new software application, migration of an existing hardware infrastructure into a new location, a refresh of key business applications with new software, or decommissioning a datacenter, hardware, or network devices. </p>
 
<p>''Transition'' consists of a set of processes and activities that release new solutions into an EIT environment, replace or update existing solutions, remove a solution or component from service, or move EIT components from one location to another. Examples of transition include the installation of a new software application, migration of an existing hardware infrastructure into a new location, a refresh of key business applications with new software, or decommissioning a datacenter, hardware, or network devices. </p>
<p>''Retirement'' is a special case of transition. It is the set of processes and activities associated with the removal, withdrawal, or decommissioning of solutions from an EIT environment. Although one might try to distinguish retirement activities from deployment activities, the two processes are extremely similar in many respects, although one adds to the EIT environment and one subtracts from it. In addition, deployment and retirement processes often go together in a single deployment project &mdash; the deployment (transition) of a new EIT solution into the environment as well as the retirement of an old EIT solution. Therefore, this chapter covers both deployment and retirement-related activities under the term ''transition'', pointing out the differences between the two project types when they occur. </p>
+
<p>''Retirement'' is a special case of transition. It is the set of processes and activities associated with the removal, withdrawal, or decommissioning of solutions from an EIT environment. Although one might try to distinguish retirement activities from deployment activities, the two processes are extremely similar in many respects, although one adds to the EIT environment and one subtracts from it. In addition, deployment and retirement processes often go together in a single deployment project—the deployment (transition) of a new EIT solution into the environment as well as the retirement of an old EIT solution. Therefore, this chapter covers both deployment and retirement-related activities under the term ''transition'', pointing out the differences between the two project types when they occur. </p>
 
<p>To start a transition process, the EIT team creates a plan and submits it to the appropriate decision makers. The decision makers may ask a change advisory board to evaluate the proposed change for risk and unintended consequences, and advise the transition (change) manager of their findings and recommendations. When the decision body approves the plan, they fund the project in accordance with strategic guidelines and priorities. In addition, operations approves the schedule, carefully evaluating outage windows (time without service), the go-live dates, and the retirement dates. At the same time, the accounting and procurement teams evaluate the budget and approve the required purchases.</p>
 
<p>To start a transition process, the EIT team creates a plan and submits it to the appropriate decision makers. The decision makers may ask a change advisory board to evaluate the proposed change for risk and unintended consequences, and advise the transition (change) manager of their findings and recommendations. When the decision body approves the plan, they fund the project in accordance with strategic guidelines and priorities. In addition, operations approves the schedule, carefully evaluating outage windows (time without service), the go-live dates, and the retirement dates. At the same time, the accounting and procurement teams evaluate the budget and approve the required purchases.</p>
 
<h2>Goals and Principles</h2>
 
<h2>Goals and Principles</h2>
 
<ul>
 
<ul>
 
<li>Effectively plan and manage the successful transition (release from development or acquisition functions, to deployment, relocation, replacement, removal, and decommissioning) of approved EIT solutions (products and services) without negatively impacting the live environment.</li>
 
<li>Effectively plan and manage the successful transition (release from development or acquisition functions, to deployment, relocation, replacement, removal, and decommissioning) of approved EIT solutions (products and services) without negatively impacting the live environment.</li>
<li>Ensure a common understanding of the organization’s handoff or retirement processes among affected organizations and stakeholders to ensure that involved participants can collaborate successfully.</li>
+
<li>Ensure a common understanding of the organization's handoff or retirement processes among affected organizations and stakeholders to ensure that involved participants can collaborate successfully.</li>
 
<li>Effectively assess the risk and impact of releasing, relocating, replacing, deploying, and decommissioning EIT solutions that combine software applications, utilities, hardware, and network components.</li>
 
<li>Effectively assess the risk and impact of releasing, relocating, replacing, deploying, and decommissioning EIT solutions that combine software applications, utilities, hardware, and network components.</li>
 
<li>Plan, execute, and evaluate the results of pilot projects to allow for adjustment that can reduce the risk before the full solution rollout.</li>
 
<li>Plan, execute, and evaluate the results of pilot projects to allow for adjustment that can reduce the risk before the full solution rollout.</li>
Line 14: Line 21:
 
</ul>
 
</ul>
 
<h2>Context Diagram</h2>
 
<h2>Context Diagram</h2>
[[File:13 Transition CD.png|700px]]
+
<p>[[File:13 Transition CD.png|700px]]<br />'''Figure 1. Context Diagram for Transition'''</p>
<p>'''Figure 1. Context Diagram for Transition'''</p>
+
 
<h2>Transition and Retirement Activities</h2>
 
<h2>Transition and Retirement Activities</h2>
<p>The transition activities can be subdivided into three sets of activities: ''plan'', ''execute'', and release (or ''hand off''). Each of these phases contains a sequence of tasks that involve strategic, decision, and support groups as shown in the figure below.</p>
+
<p>The transition activities can be subdivided into three sets of activities: ''plan'', ''execute'', and ''release'' (or ''hand off''). Each of these phases contains a sequence of tasks that involve strategic, decision, and support groups as shown in the figure below.</p>
[[File:TransitionFlowchart.jpg|650px]]
+
<p>[[File:TransitionFlowchart.jpg|650px]]<br /><div id="figure_flowchart"></div>'''Figure 2. Transition Flowchart Diagram'''</p>  
<div id="figure_flowchart"></div><p>'''Figure 2. Transition Flowchart Diagram'''</p>
+
 
<ul>
 
<ul>
<li>'''Plan''' &mdash; In this phase, the transition team becomes familiar with the requirements and technical design of the solution or retirement. The team then creates detailed plans for the project that allow the transition to occur without negatively affecting the business. The team also evaluates the risks and impacts of the solution, and identifies mitigation techniques to handle any negative impacts.</li>
+
<li>'''Plan'''—In this phase, the transition team becomes familiar with the requirements and technical design of the solution or retirement. The team then creates detailed plans for the project that allow the transition to occur without negatively affecting the business. The team also evaluates the risks and impacts of the solution, and identifies mitigation techniques to handle any negative impacts.</li>
<li>'''Execute''' &mdash; In the second phase, the team executes the plan. All levels of the solution are deployed or retired, as specified, and appropriate personnel are trained. Typically there is a pilot of the project to test the solution in the eventual operations environment, identify any unforeseen issues, and refine the solution, as necessary. It is also common to have a phased rollout of the project that starts in one location or with one group of personnel, and then propagates throughout the organization.</li>
+
<li>'''Execute'''—In the second phase, the team executes the plan. All levels of the solution are deployed or retired, as specified, and appropriate personnel are trained. Typically there is a pilot of the project to test the solution in the eventual operations environment, identify any unforeseen issues, and refine the solution, as necessary. It is also common to have a phased rollout of the project that starts in one location or with one group of personnel, and then propagates throughout the organization.</li>
<li>'''Release''' &mdash; When the decision body feels that the solution is stable and ready for general release, the transition team hands the solution over to operations, they announce the release to the appropriate audience, and they review the project and collect the lessons learned. </li>
+
<li>'''Release'''—When the decision body feels that the solution is stable and ready for general release, the transition team hands the solution over to operations, they announce the release to the appropriate audience, and they review the project and collect the lessons learned. </li>
 
</ul>
 
</ul>
 
<p>In the rest of this chapter, we describe these three phases in more detail.</p>
 
<p>In the rest of this chapter, we describe these three phases in more detail.</p>
 
<h2>Planning the Transition Project</h2>
 
<h2>Planning the Transition Project</h2>
<p>The transition project starts with a management decision based on the organization’s priorities and goals, established during strategic planning (see [http://eitbokwiki.org/Strategy_and_Governance Strategy and Governance]). This decision includes the scope of the project, resources, technology, budget, and expected outcomes that are often determined as part of a change initiative (see [http://eitbokwiki.org/Change_Initiatives Change Initiatives]). Thus, transition planning is done in parallel with solution acquisition and construction activities.</p>
+
<p>The transition project starts with a management decision based on the organization's priorities and goals, established during strategic planning (see [http://eitbokwiki.org/Strategy_and_Governance Strategy and Governance]). This decision includes the scope of the project, resources, technology, budget, and expected outcomes that are often determined as part of a change initiative (see [http://eitbokwiki.org/Change_Initiatives Change Initiatives]). Thus, transition planning is done in parallel with solution acquisition and construction activities.</p>
 
<p>The transition planning team focuses on a number of activities, including: </p>
 
<p>The transition planning team focuses on a number of activities, including: </p>
<ul><li>Understanding the business and technical requirements for the solution</li>
+
<ul>
 +
<li>Understanding the business and technical requirements for the solution</li>
 
<li>Analyzing the business and technical requirements for the transition</li>
 
<li>Analyzing the business and technical requirements for the transition</li>
 
<li>Assessing the business and technical risks of altering the operations environment, and coming up with ways to mitigate those risks</li>
 
<li>Assessing the business and technical risks of altering the operations environment, and coming up with ways to mitigate those risks</li>
Line 40: Line 46:
 
<h3>Reviewing Business Goals and Requirements</h3>
 
<h3>Reviewing Business Goals and Requirements</h3>
 
<p>By the time the EIT solution has progressed to this stage, the business and technical requirements should be well understood and documented. The goal of the transition team is to review the goals and requirements so that they can roll out the solution into the enterprise.</p>
 
<p>By the time the EIT solution has progressed to this stage, the business and technical requirements should be well understood and documented. The goal of the transition team is to review the goals and requirements so that they can roll out the solution into the enterprise.</p>
<p>At times, the transition team needs clarification about the requirements the solution is meant to implement. That is why a [http://eitbokwiki.org/Glossary#cab change advisory board (CAB)] comprised of stakeholders such as business owners, managers, and PMO members is directly involved in the transition planning process. Enterprise architects, solution architects, program managers, and SMEs are also often asked to assist the team. They can help with the business and operational risk-analysis activities, and they can explain the existing dependencies between products and services currently in operation as well as dependencies existing between components planned for the transition into the live environment. </p>
+
<p>At times, the transition team needs clarification about the requirements the solution is meant to implement. That is why a [http://eitbokwiki.org/Glossary#cab change advisory board (CAB)] comprised of stakeholders such as business owners, managers, and PMO members is directly involved in the transition planning process. Enterprise architects, solution architects, program managers, and SMEs are also often asked to assist the team. They can help with the business and operational risk-analysis activities, and they can explain the existing dependencies between products and services currently in operation as well as dependencies existing between components planned for the transition into the live environment.</p>
<p>If new hardware or software needs to be purchased from a vendor (see [http://eitbokwiki.org/Acquisition Acquisition] and [http://eitbokwiki.org/Construction Construction]), it is important to meet with these contractors to avoid conflicts with existing warranties, and to identify the proper steps and guidelines to protect the organization’s investment. Accounting and procurement teams are often involved to manage the relationship with the vendors. The operations group is another important participant in transition-planning sessions, because they receive the solution in production and need to be ready to accept the responsibility when the solution is ready. </p>
+
<p>If new hardware or software needs to be purchased from vendors (see [http://eitbokwiki.org/Acquisition Acquisition] and [http://eitbokwiki.org/Construction Construction]), it is important to meet with these contractors to avoid conflicts with existing warranties, and to identify the proper steps and guidelines to protect the organization's investment. Accounting and procurement teams are often involved to manage the relationship with the vendors. The operations group is another important participant in transition-planning sessions, because they receive the solution in production and need to be ready to accept the responsibility when the solution is ready. </p>
 
<p>Any stakeholder or senior manager impacted (positively or negatively) should participate in the planning process, answering questions, and clarifying any possible drawback of delays of the project, before submitting the plan for approval. </p>
 
<p>Any stakeholder or senior manager impacted (positively or negatively) should participate in the planning process, answering questions, and clarifying any possible drawback of delays of the project, before submitting the plan for approval. </p>
 
<h3>Architecting the EIT Solution</h3>
 
<h3>Architecting the EIT Solution</h3>
<p>The team analyzes and elaborates the technical approach so that it can be deployed successfully. This group augments the already existing design and technical notes to facilitate field technicians with configuring and setting up the components needed to release the solution into production, and retiring any components that need to be removed. This analysis occurs at several levels.</p>
+
<p>The team analyzes and elaborates the technical approach so that it can be deployed successfully. This group augments the existing design and technical notes to facilitate field technicians with configuring and setting up the components needed to release the solution into production, and retiring any components that need to be removed. This analysis occurs at several levels.</p>
 
<h4>Transition Layers</h4>
 
<h4>Transition Layers</h4>
 
<p>Transition architecture, planning, and execution can be guided using the standard enterprise architecture ([http://eitbokwiki.org/Glossary#biat BIAT]) layer model (see [http://eitbokwiki.org/Enterprise_Architecture Enterprise Architecture]). The figure below shows our adaptation of the diagram for this discussion. </p>
 
<p>Transition architecture, planning, and execution can be guided using the standard enterprise architecture ([http://eitbokwiki.org/Glossary#biat BIAT]) layer model (see [http://eitbokwiki.org/Enterprise_Architecture Enterprise Architecture]). The figure below shows our adaptation of the diagram for this discussion. </p>
<p>Each layer typically has its own decision authorities and technical teams that work on the transition plan. For example, an infrastructure transition team might provide expertise on server clustering and virtual network (VLANs) architecture, switching, and routing. The application transition team might write code to interconnect business applications with existing databases.</p>
+
<p>[[File:TransitionLayerDiagram.jpg|290px]]<br /><div id="figure_transition"></div>'''Figure 3. Transition Layer Diagram'''</p>
[[File:TransitionLayerDiagram.jpg]]
+
<p>Each layer typically has its own decision authorities and technical teams that work on the transition plan. For example, an infrastructure transition team might provide expertise on server clustering and virtual network (VLAN) architecture, switching, and routing. The application transition team might write code to interconnect business applications with existing databases.</p>
<div id="figure_transition"></div><p>'''Figure 3: Transition Layer Diagram'''</p>
+
<p>The two teams work together to deploy an integrated and functional EIT solution and hand it over to the teams in charge of operations. If maintenance activities are required, the configuration management team hands over the sources for alteration (see [http://eitbokwiki.org/Construction Construction]).</p>
<p>The two teams work together to deploy an integrated a functional EIT solution and hand it over to the teams in charge of operations. If maintenance activities are required, the configuration management team hands over the sources for alteration (see Chapter 12 ***what is the correct link?).</p>
+
 
<p>A description of each layer and the involved activities help explain why the layered approach is often used:</p>
 
<p>A description of each layer and the involved activities help explain why the layered approach is often used:</p>
 
<ul>
 
<ul>
<li>A '''business layer''' change impacts the whole or a key part of the organization. Opening a new branch office outside of the country implies a business decision that involves many different unit areas, such as finance, marketing, legal, HR, and, of course, EIT. All of these areas need to coordinate with a single focus, which is owned by management. A business layer transition automatically cascades to the layers below, generating different transition projects (such as application, data, and infrastructure), creating a program management effort coordinating several projects rather than a simple project <br />Business transition changes are typically governed by a change advisory board (CAB) that consists of senior management, enterprise architects, and project managers. The project management members participate during strategic discussions, providing input on project management accepted practices, and information learned from previous projects. All of this work impacts the rest of the layers, because a single business decision usually cascades to affect many business units.</li>
+
<li>A '''business layer''' change impacts the whole or a key part of the organization. Opening a new branch office outside of the country implies a business decision that involves many different unit areas, such as finance, marketing, legal, HR, and, of course, EIT. All of these areas need to coordinate with a single focus, which is owned by management. A business layer transition automatically cascades to the layers below, generating different transition projects (such as application, data, and infrastructure), creating a program management effort coordinating several projects rather than a simple project <br />Business transition changes are typically governed by a change advisory board (CAB) that consists of senior management, enterprise architects, and project managers. The project management members participate during strategic discussions, providing input on accepted project management practices, and information learned from previous projects. All of this work impacts the rest of the layers, because a single business decision usually cascades to affect many business units.</li>
<li>'''Data &amp; information layer''' changes impact enterprise data and information assets. These transitions involve projects including those that modify databases, data structures, SQL programming, and stored procedures to be released and deployed into production. A data-transition project can impact business applications, which require code updates or database configuration changes to establish the connection between the applications and the data. As a result, these projects are often overseen by the same group that oversees the business layer modifications. Note that all data and information transitions must adhere to data management and data governance guidelines.</li>
+
<li>'''Data &amp; information layer''' changes impact enterprise data and information assets. These transitions involve projects including those that modify databases, data structures, SQL programming, and stored procedures to be released and deployed into production. A data-transition project can impact business applications, which require code updates or database configuration changes to establish the connection between the applications and the data. As a result, these projects are often overseen by the same group that supervises the business layer modifications. Note that all data and information transitions must adhere to data management and data governance guidelines.</li>
 
<li>Changes to the '''software application layer''' can impact all software applications, programs, and database platforms. The release or retirement of an application can involve the coordination of several teams including web designers and data programmers in charge of connecting the applications with live databases. <br />The application layer team needs to have members with the technical skills required to release, refresh, and update live software platforms. </li>
 
<li>Changes to the '''software application layer''' can impact all software applications, programs, and database platforms. The release or retirement of an application can involve the coordination of several teams including web designers and data programmers in charge of connecting the applications with live databases. <br />The application layer team needs to have members with the technical skills required to release, refresh, and update live software platforms. </li>
 
<li>Changes to the '''EIT infrastructure layer''' affect infrastructure facilities, such as datacenters and computer rooms. They involve the installation, refresh, and decommissioning of hardware including mainframes, servers, cabling, storage, security, and telecommunication components. The EIT infrastructure transition team incorporates network and hardware experts with the infrastructure skills required for planning, configuring, and setting up the EIT infrastructure architecture solution. <br />For this layer, the infrastructure team formulates architectural models of the modified infrastructure to understand how best to integrate new hardware components or remove old ones. The team looks to standardize network topologies, to upgrade hardware components, and to monitor, configure, and support accepted practices. Coordination with server, database, storage, backup, and security teams is typically required. The team might also run vulnerability tests on components and set up security procedures to be in compliance with corporate policies and procedures. </li>
 
<li>Changes to the '''EIT infrastructure layer''' affect infrastructure facilities, such as datacenters and computer rooms. They involve the installation, refresh, and decommissioning of hardware including mainframes, servers, cabling, storage, security, and telecommunication components. The EIT infrastructure transition team incorporates network and hardware experts with the infrastructure skills required for planning, configuring, and setting up the EIT infrastructure architecture solution. <br />For this layer, the infrastructure team formulates architectural models of the modified infrastructure to understand how best to integrate new hardware components or remove old ones. The team looks to standardize network topologies, to upgrade hardware components, and to monitor, configure, and support accepted practices. Coordination with server, database, storage, backup, and security teams is typically required. The team might also run vulnerability tests on components and set up security procedures to be in compliance with corporate policies and procedures. </li>
 
</ul>
 
</ul>
 
<h4>The Architecture Document</h4>
 
<h4>The Architecture Document</h4>
<p>The resulting architectural document, sometimes called the ''technical design for the transition'', should include all hardware and software relationship diagrams, and backplane photos of devices that indicate the cabling, switch ports, and IP address tables to be allocated, reserved, and used by the solution. Operating system batch commands, scripting code, database instructions, storage volumes to use, and detailed working instructions to be followed by technicians during setup need to be written so that there no question about what needs to be done. Checklists help technicians follow steps, and forms help technicians gather relevant information such as serial numbers, OS versions, IP addresses, and application versions for each of the components to be configured and released into the production environment.</p>
+
<p>The resulting architecture document, sometimes called the ''technical design for the transition'', should include all hardware and software relationship diagrams, and backplane photos of devices that indicate the cabling, switch ports, and IP address tables to be allocated, reserved, and used by the solution. Operating system batch commands, scripting code, database instructions, storage volumes to use, and detailed working instructions to be followed by technicians during setup need to be written so that there is no question about what needs to be done. Checklists help technicians follow steps, and forms help technicians gather relevant information such as serial numbers, OS versions, IP addresses, and application versions for each of the components to be configured and released into the production environment.</p>
 
<h3>Creating the Schedule</h3>
 
<h3>Creating the Schedule</h3>
<p>For a complex transition project, scheduling is often difficult. It needs to take into account not only the technical work being done, but also the enterprise’s calendar. It is often at this point where the team discusses the type of rollout to use for the solution.</p>
+
<p>For a complex transition project, scheduling is often difficult. It needs to take into account not only the technical work being done, but also the enterprise's calendar. It is often at this point where the team discusses the type of rollout to use for the solution.</p>
 
<p>Scheduling must take into account constraints such as business freeze periods, especially those related to finances, taxes, and in some companies, seasonal periods, because those periods can impact the transition plan calendar. </p>
 
<p>Scheduling must take into account constraints such as business freeze periods, especially those related to finances, taxes, and in some companies, seasonal periods, because those periods can impact the transition plan calendar. </p>
<p>Some companies also have a formal datacenter organization that has its own schedule (or outsourced services with restrictions), including maintenance periods and times to perform specific processes. In this situation, coordination is necessary to elaborate a risk analysis list and to determine the best transition timeframe. The tasks shown in [[#figure_flowchart|Figure&nbsp;2]] describe the transition flow.</p>
+
<p>Some companies also have a formal datacenter organization that has its own schedule (or outsourced services with restrictions), including maintenance periods and times to perform specific processes. In this situation, coordination is necessary to elaborate a risk-analysis list and to determine the best transition timeframe. The tasks shown in [[#figure_flowchart|Figure&nbsp;2]] describe the transition flow.</p>
 
<h4>Staging the Rollout</h4>
 
<h4>Staging the Rollout</h4>
<p>Some transitions are quite simple, such as adding a few servers to an existing server farm. Other transitions, such as deploying a new ERP system, are extremely complex, and it is difficult to anticipate all of the potential issues of integrating the new solution components into the existing environment. When the rollout is complex, the team often schedules a staged rollout &mdash; that is, only part of the rollout happens at any given time. When the initial part of the rollout is stabilized, another stage of the rollout is started. The staged rollout progresses until the entire solution is completely in production. Staged rollouts can happen along two different dimensions: by functionality and by location.</p>
+
<p>Some transitions are quite simple, such as adding a few servers to an existing server farm. Other transitions, such as deploying a new ERP system, are extremely complex, and it is difficult to anticipate all the potential issues of integrating the new solution components into the existing environment. When the rollout is complex, the team often schedules a staged rollout—that is, the rollout happens in increments. When the initial part of the rollout is stabilized, another stage of the rollout is started. The staged rollout progresses until the entire solution is completely in production. Staged rollouts can happen along two different dimensions: by functionality and by location.</p>
<p>When the staged rollout occurs ''by functionality or component'', the team might rollout particular hardware components before others and before the software. For software transitions, the team may decide to deploy certain functions and establish their stability before adding other functions. Possibly only a partial integration with existing applications or databases may occur until the basic functionality is stable. This tactic can reduce the risk of negatively effecting live operations until you are sure that base-level components are operating appropriately.</p>
+
<p>When the staged rollout occurs ''by functionality or component'', the team might roll out particular hardware components before others and before the software. For software transitions, the team may decide to deploy certain functions and establish their stability before adding other functions. Possibly only a partial integration with existing applications or databases may occur until the basic functionality is stable. This tactic can reduce the risk of negatively affecting live operations until you are sure that base-level components are operating appropriately.</p>
 
<p>When the staged rollout occurs ''by location'', the team often picks a particular location to deploy the solution to before rolling out to other locations. When the solution is stable in the first location, the team deploys the solution in other locations. This type of staged rollout not only reduces risk, but also reduces the number of personnel required for the rollout, because a single rollout team can travel from location to location, gaining experience (and often speed) as they go. This tactic also reduces the training time associated with the rollout team for global rollouts.</p>
 
<p>When the staged rollout occurs ''by location'', the team often picks a particular location to deploy the solution to before rolling out to other locations. When the solution is stable in the first location, the team deploys the solution in other locations. This type of staged rollout not only reduces risk, but also reduces the number of personnel required for the rollout, because a single rollout team can travel from location to location, gaining experience (and often speed) as they go. This tactic also reduces the training time associated with the rollout team for global rollouts.</p>
 
<p>Staged rollouts can be called ''beta tests'' or ''pilot tests'' in some organizations. In all cases, the goal is to reduce risk, catch errors, and refine the solution before it causes problems throughout the enterprise.</p>
 
<p>Staged rollouts can be called ''beta tests'' or ''pilot tests'' in some organizations. In all cases, the goal is to reduce risk, catch errors, and refine the solution before it causes problems throughout the enterprise.</p>
 
<h4>Freeze Periods, Outages, and Go-Live Dates</h4>
 
<h4>Freeze Periods, Outages, and Go-Live Dates</h4>
<p>When selecting the time and day to perform a transition, it is very important to consider all of the scheduled events defined by the company for their daily operations; however, special attention must be paid to company freeze periods.</p>
+
<p>When selecting the time and day to perform a transition, it is very important to consider all the scheduled events defined by the company for their daily operations; however, special attention must be paid to company freeze periods.</p>
 
<p>Financial freezes are those specific weeks and months when the entire company is focused on accounting, finance, tax, sales, and inventory systems, and managers need to attend to external auditors and shareholders. Many companies prohibit EIT from making changes, installing new components, or decommissioning any piece of software or hardware related to affected systems during these periods of time. The reasoning is to avoid losing or damaging financial information that might have negative legal, tax, or company image implications.</p>
 
<p>Financial freezes are those specific weeks and months when the entire company is focused on accounting, finance, tax, sales, and inventory systems, and managers need to attend to external auditors and shareholders. Many companies prohibit EIT from making changes, installing new components, or decommissioning any piece of software or hardware related to affected systems during these periods of time. The reasoning is to avoid losing or damaging financial information that might have negative legal, tax, or company image implications.</p>
<p>Freeze periods vary depending on the organization. Freeze dates can occur during harvest times or during other quarterly processes. Typically, the transition team analyzes all of the different outsourcing and operations freeze dates to consolidate a complete timeline that can facilitate the creation of the transition schedule. If done well, the resulting timeline can effectively communicate the effect of the transition upon business owners, procurement, contractors, marketing, sales people, and others.</p>
+
<p>Freeze periods vary depending on the organization. Freeze dates can occur during harvest times or during other quarterly processes. Typically, the transition team analyzes all the different outsourcing and operations freeze dates to consolidate a complete timeline that can facilitate the creation of the transition schedule. If done well, the resulting timeline can effectively communicate the effect of the transition upon business owners, procurement, contractors, marketing, sales people, and others.</p>
 
<p>It is important to accurately plan the time (minutes, hours, days) that systems are going to be made unavailable for service. Making changes in infrastructure or software applications sometimes requires the shutdown of other services or equipment, and management needs to know if their end users and customers could be impacted by these outage periods. Even a reboot of a server is considered an outage and it is a good practice to include it on the planning.</p>
 
<p>It is important to accurately plan the time (minutes, hours, days) that systems are going to be made unavailable for service. Making changes in infrastructure or software applications sometimes requires the shutdown of other services or equipment, and management needs to know if their end users and customers could be impacted by these outage periods. Even a reboot of a server is considered an outage and it is a good practice to include it on the planning.</p>
 
<p>Go-live, cutover, and retirement dates need to be planned and agreed to weeks ahead. The goal is to avoid business conflicts and to have required technical resources and management ready to act if any issue appears.</p>
 
<p>Go-live, cutover, and retirement dates need to be planned and agreed to weeks ahead. The goal is to avoid business conflicts and to have required technical resources and management ready to act if any issue appears.</p>
Line 95: Line 100:
 
<h4>Technical Impact Analysis (TIA)</h4>
 
<h4>Technical Impact Analysis (TIA)</h4>
 
<p>The technical impact of a transition depends on the size and interconnectedness of the different devices and applications. The analysis team discusses technical risks and creates a risk list associated with the hardware, software, and network components that could be negatively affected by the changes.</p>
 
<p>The technical impact of a transition depends on the size and interconnectedness of the different devices and applications. The analysis team discusses technical risks and creates a risk list associated with the hardware, software, and network components that could be negatively affected by the changes.</p>
<p>Relationships and dependencies between EIT assets are defined and evaluated as possible points of failure. Potential mitigation techniques are identified and analyzed during these sessions. For example, the group might examine the technical impact of installing utility software on a particular dedicated server. Or they might analyze a hardware upgrade for a server farm with redundant clusters, an uninstall of a database engine, an uninstall of some virtual machine applications, or the risks of exceeding power consumption limits. The technical impact analysis requires experienced practitioners in several areas including support personnel to evaluate the risk of the transition’s impact. </p>
+
<p>Relationships and dependencies between EIT assets are defined and evaluated as possible points of failure. Potential mitigation techniques are identified and analyzed during these sessions. For example, the group might examine the technical impact of installing utility software on a particular dedicated server. Or they might analyze a hardware upgrade for a server farm with redundant clusters, an uninstall of a database engine, an uninstall of some virtual machine applications, or the risks of exceeding power consumption limits. The technical impact analysis requires experienced practitioners in several areas including support personnel to evaluate the risk of the transition's impact. </p>
 
<h4>Cost Impact Estimation</h4>
 
<h4>Cost Impact Estimation</h4>
 
<p>Most EIT organizations pay support contract fees to suppliers for services, such as datacenter hosting, Internet access, hardware devices, operating systems, database engines, ERPs, CRMs, antivirus support, and other components. When a new EIT solution is going to be moved into production or an existing EIT solution is removed, the transition team needs to present the transition costs and steady-state production costs to accounting, procurement, and other concerned parties to avoid fiscal surprises. Note that in the case of a retirement, these departments need to be notified of reimbursements or cost savings. Accounting and procurement teams can contact the suppliers and let them know about the upcoming payment changes. </p>
 
<p>Most EIT organizations pay support contract fees to suppliers for services, such as datacenter hosting, Internet access, hardware devices, operating systems, database engines, ERPs, CRMs, antivirus support, and other components. When a new EIT solution is going to be moved into production or an existing EIT solution is removed, the transition team needs to present the transition costs and steady-state production costs to accounting, procurement, and other concerned parties to avoid fiscal surprises. Note that in the case of a retirement, these departments need to be notified of reimbursements or cost savings. Accounting and procurement teams can contact the suppliers and let them know about the upcoming payment changes. </p>
 
<p>A detailed list of software and hardware components to be installed or decommissioned with their associated costs must be created. Asset management systems make it easier to collect information about hardware models, quantity of processors and cores, server OS versions, database engines, ERP, CRM, and applications software licenses. Then it is relatively easy to make calculations about the total cost of the project.</p>
 
<p>A detailed list of software and hardware components to be installed or decommissioned with their associated costs must be created. Asset management systems make it easier to collect information about hardware models, quantity of processors and cores, server OS versions, database engines, ERP, CRM, and applications software licenses. Then it is relatively easy to make calculations about the total cost of the project.</p>
 
<h4>Total Risk Impact Calculation</h4>
 
<h4>Total Risk Impact Calculation</h4>
<p>Each company has its own method for evaluating the three subareas to enable the calculation of an overall risk evaluation. Some organizations rate each one of the risk areas from very low to very high risk, maybe on a 1&ndash;5 or 1&ndash;10 scale. An even number of risk levels is often used to avoid a value in the middle that doesn’t really give decision makers a positive or negative view of the risk. A “mid” value makes go/no-go decisions more difficult. </p>
+
<p>Each company has its own method for evaluating the three subareas to enable the calculation of an overall risk evaluation. Some organizations rate each one of the risk areas from very low to very high risk, maybe on a 1&ndash;5 or 1&ndash;10 scale. An even number of risk levels is often used to avoid a value in the middle that doesn't really give decision makers a positive or negative view of the risk. A "mid" value makes go/no-go decisions more difficult. </p>
 
<p>The overall calculation is based on guidelines that come from strategy and governance decisions. In the best of all situations, a simple equation can calculate the overall risk:</p>
 
<p>The overall calculation is based on guidelines that come from strategy and governance decisions. In the best of all situations, a simple equation can calculate the overall risk:</p>
 
<p style="margin-left:30px">'''Total Project Risk Impact = BIA + TIA + CIE'''</p>
 
<p style="margin-left:30px">'''Total Project Risk Impact = BIA + TIA + CIE'''</p>
 
<p>Using this simple calculation facilitates the understanding, management, and prioritization of the transition queue in a straightforward way, and at same time, facilitates the decision making. </p>
 
<p>Using this simple calculation facilitates the understanding, management, and prioritization of the transition queue in a straightforward way, and at same time, facilitates the decision making. </p>
<p>In reality, the decision process is more difficult. The CAB team supporting the transition often holds a meeting to get clarification and justification of the risks analysis reports from each stakeholder group. The decision authority often considers experiences from past transitions, team skills, and the corporate knowledge of what needs to be done for success. At the end, the CAB team comes up with an overall rating for the project.</p>
+
<p>In reality, the decision process is more difficult. The CAB team supporting the transition often holds a meeting to get clarification and justification of the risk analysis reports from each stakeholder group. The decision authority often considers experiences from past transitions, team skills, and the corporate knowledge of what needs to be done for success. At the end, the CAB team comes up with an overall rating for the project.</p>
 
<p>Another factor to consider when determining the overall risk of a project is the level of maturity of the organization. Mature organizations have well-understood institutionalized processes, policies, and activities in place for transitions, including change requests, external support, testing teams, audits, and compliance validation with general policies and security guidelines. Mature organizations are usually better at dealing with risk and employing mitigation techniques; therefore, they can (and will) take on riskier projects.</p>
 
<p>Another factor to consider when determining the overall risk of a project is the level of maturity of the organization. Mature organizations have well-understood institutionalized processes, policies, and activities in place for transitions, including change requests, external support, testing teams, audits, and compliance validation with general policies and security guidelines. Mature organizations are usually better at dealing with risk and employing mitigation techniques; therefore, they can (and will) take on riskier projects.</p>
<p>Some organizations decide to only approve very low-risk projects, but any organization’s risk appetite should be established during strategic planning, and the transition team should follow those guidelines when making their decision. </p>
+
<p>Some organizations decide to approve only very low-risk projects, but any organization's risk appetite should be established during strategic planning, and the transition team should follow those guidelines when making their decision. </p>
 
<h3>Creating the Transition Plan Document</h3>
 
<h3>Creating the Transition Plan Document</h3>
<p>The completed plan integrates all the documents and results for analysis sessions created during the planning session. The final plan often includes following sections:</p>
+
<p>The completed plan integrates all the documents and results for analysis sessions created during the planning session. The final plan often includes the following sections:</p>
 
<ul>
 
<ul>
<li>Information about the alignment with the enterprise’s strategic plan</li>
+
<li>Information about the alignment with the enterprise's strategic plan</li>
 
<li>Scope of the solution to be released (architecture)</li>
 
<li>Scope of the solution to be released (architecture)</li>
<li>Detailed technical design of the solution’s deployment including a list of components to be modified and in-place components that are attached or otherwise potentially affected</li>
+
<li>Detailed technical design of the solution's deployment including a list of components to be modified and in-place components that are attached or otherwise potentially affected</li>
 
<li>The release, test, training, and deployment activities for moving the EIT solution (product or service) into the live environment</li>
 
<li>The release, test, training, and deployment activities for moving the EIT solution (product or service) into the live environment</li>
 
<li>The backup, uninstall, decommissioning, archiving, and disposal activities to remove a product or service from the live environment for retirement projects</li>
 
<li>The backup, uninstall, decommissioning, archiving, and disposal activities to remove a product or service from the live environment for retirement projects</li>
<li>The project schedule that includes planned freezes and outages, point-of-no-return milestones, and crosscheck points with stakeholders </li>
+
<li>The project schedule that includes planned freezes and outages, point-of-no-return milestones, and crosscheck points with stakeholders</li>
 
<li>Personnel resources (staff, technical, contractors, and management)</li>
 
<li>Personnel resources (staff, technical, contractors, and management)</li>
 
<li>Roles and responsibility assignment for operations staff, technical staff, and stakeholders</li>
 
<li>Roles and responsibility assignment for operations staff, technical staff, and stakeholders</li>
Line 128: Line 133:
 
<h3>Managing the Transition</h3>
 
<h3>Managing the Transition</h3>
 
<p>As mentioned in the planning phase, the rollout of the solution might occur in stages or as one piece. Part of the execution phase is to manage the planned rollout. </p>
 
<p>As mentioned in the planning phase, the rollout of the solution might occur in stages or as one piece. Part of the execution phase is to manage the planned rollout. </p>
<p>Large transition projects often require a team (often known as a ''command center'') to coordinated the project. The mission of a command center is to coordinate the technical, operations, and procurement teams, to keep executives and stakeholders aware of the project status, to make cross-functional decisions, and to manage the budget and resources required to meet the goals of the project. Whether or not a command center is needed, it is necessary to designate a project manager to manage the project.</p>
+
<p>Large transition projects often require a team (often known as a ''command center'') to coordinate the project. The mission of a command center is to coordinate the technical, operations, and procurement teams, to keep executives and stakeholders aware of the project status, to make cross-functional decisions, and to manage the budget and resources required to meet the goals of the project. Whether or not a command center is needed, it is necessary to designate a project manager to manage the project.</p>
 
<p>It is the responsibility of the project manager (or command center staff) to ensure that the transition into the live environment is successful, secure, on time, on or under budget, and that it meets all quality standards. All the team members should be aware of the transition project scope, the resources assigned, and the task schedule to avoid project delays and access issues that require assistance from other groups.</p>
 
<p>It is the responsibility of the project manager (or command center staff) to ensure that the transition into the live environment is successful, secure, on time, on or under budget, and that it meets all quality standards. All the team members should be aware of the transition project scope, the resources assigned, and the task schedule to avoid project delays and access issues that require assistance from other groups.</p>
 
<h4>Backup and Storage Management</h4>
 
<h4>Backup and Storage Management</h4>
<p>Before the any major change is executed, run a full backup of all stored data, information, applications, databases, and network configurations that could change or be affected. A snapshot of a retired EIT solution is especially important because it enables a rollback to a previous state, in case of a disaster recovery situation. If there is a backup, the organization’s disaster plan can be activated to recover the data, or the configuration management team can rebuild the latest working version of an application from the definitive media location. </p>
+
<p>Before the any major change is executed, run a full backup of all stored data, information, applications, databases, and network configurations that could change or be affected. A snapshot of a retired EIT solution is especially important because it enables a rollback to a previous state, in case of a disaster-recovery situation. If there is a backup, the organization's disaster plan can be activated to recover the data, or the configuration management team can rebuild the latest working version of an application from the definitive media location. </p>
<p>Another complementary task to perform is the recovery testing procedure. An example can be to restore the recently removed version in temporary servers in order to practice the restoration task. This helps to test and ensure that restoring techniques and procedures are working as expected and under the disaster preparedness strategic guidelines. These tasks are crucial to develop and test to comply with auditing guidelines (see [http://eitbokwiki.org/Disaster_Preparedness Disaster Preparedness]).</p>
+
<p>Another complementary task to perform is the recovery testing procedure. An example can be to restore the recently removed version on temporary servers in order to practice the restoration task. This helps to test and ensure that restoration techniques and procedures are working as expected and under the disaster preparedness strategic guidelines. These tasks are crucial to develop and test to comply with auditing guidelines (see [http://eitbokwiki.org/Disaster_Preparedness Disaster Preparedness]).</p>
 
<h4>Access Management </h4>
 
<h4>Access Management </h4>
<p>The transition team needs to ensure that all transition personnel have access to the areas where they need to work. For example, if a badge is required to physically enter a datacenter or computer room, getting approval from security officers might take several days. As a result, the team needs to make requests for access in advance to avoid delay. It is also important to request system administration access to the hardware and logical devices involved in the project well in advance of the actual need. </p>
+
<p>The transition team needs to ensure that all transition personnel have access to the areas where they need to work. For example, if a badge is required to physically enter a datacenter or computer room, getting approval from the security office might take several days. As a result, the team needs to make requests for access in advance to avoid delay. It is also important to request system administration access to the hardware and logical devices involved in the project well in advance of the actual need. </p>
 
<p>The team needs to think through access needs that occur both during regular business hours as well as after hours. Sometimes a quick discussion with security early in the process can ensure that all the paperwork is in place before access is required. </p>
 
<p>The team needs to think through access needs that occur both during regular business hours as well as after hours. Sometimes a quick discussion with security early in the process can ensure that all the paperwork is in place before access is required. </p>
 
<h4>Managing Complexity and Minimizing Unexpected Changes</h4>
 
<h4>Managing Complexity and Minimizing Unexpected Changes</h4>
<p>Bringing all the teams together with local contacts inside the facilities during the transition of a highly complex environment is a good practice. This meeting can help the teams find the rooms, servers, and network devices quickly. Local resources can also help disconnect units from racks and transport the components to new locations. Similarly, it’s better to have personnel with the proper experience managing large databases or complex virtual machine configurations connected through SAN external storage devices. Having the right people involved minimizes the risk of slow responses to detected errors and slow decisions or responses to other non-planned steps. Always bring the right people with the right tools.</p>
+
<p>Bringing all the teams together with local contacts inside the facilities during the transition of a highly complex environment is a good practice. This meeting can help the teams find the rooms, servers, and network devices quickly. Local resources can also help disconnect units from racks and transport the components to new locations. Similarly, it's better to have personnel with the proper experience managing large databases or complex virtual machine configurations connected through SAN external storage devices. Having the right people involved minimizes the risk of slow responses to detected errors and slow decisions or responses to other non-planned steps. Always bring in the right people with the right tools.</p>
 
<h4>Change Request Management</h4>
 
<h4>Change Request Management</h4>
<p>It is critical to have a control list of all the change requests submitted to all teams during the transition phase. Special attention should be given to those that require formal approval from authorities such as the CAB or PMO decision boards. Let’s say that during the testing phase there is a request to change some rules on the router so that a particular group can have access into a certain group of systems. The security infrastructure team needs to analyze the impact of the change on the access throughout the organization. To proceed with the change, a security risk impact analysis should be performed and the organization might require that the analysis be submitted for approval of the request. In some organizations, the analysis and approval process takes time. So, it is a good practice to talk with these teams early in the project to avoid misunderstandings and delays on the overall transition project.</p>
+
<p>It is critical to have a control list of all the change requests submitted to all teams during the transition phase. Special attention should be given to those that require formal approval from authorities such as the CAB or PMO decision boards. Let's say that during the testing phase there is a request to change some rules on the router so that a particular group can have access to a certain group of systems. The security infrastructure team needs to analyze the impact of the change on the access throughout the organization. To proceed with the change, a security risk impact analysis should be performed and the organization might require that the analysis be submitted for approval of the request. In some organizations, the analysis and approval process takes time. So, it is a good practice to talk with these teams early in the project to avoid misunderstandings and delays in the overall transition project.</p>
 
<h4>Outage Management</h4>
 
<h4>Outage Management</h4>
 
<p>It is crucial to communicate all anticipated outages with technicians and stakeholders. They need to be informed several times to remind affected users that the facilities are not available. See the appropriate section in [http://eitbokwiki.org/Operations_and_Support Operations and Support] for recommendations about notifications.</p>
 
<p>It is crucial to communicate all anticipated outages with technicians and stakeholders. They need to be informed several times to remind affected users that the facilities are not available. See the appropriate section in [http://eitbokwiki.org/Operations_and_Support Operations and Support] for recommendations about notifications.</p>
 
<h4>Resource Management</h4>
 
<h4>Resource Management</h4>
<p>Contractors or third-party vendors hired only for the transition project, including SMEs, technicians, and electricians should be contracted in advance to ensure that all required access and permissions (physical and logical personal security items) are in place in time. Temporary remote access is a common practice used for this type of temporary resources. They need to have copies of all of the relevant documentation and reference material before execution of the transition plan starts. All these on-boarded resources need to be well-organized, well-trained, with access validated, assigned, and approved prior to arriving at the facility to perform their assigned tasks.</p>
+
<p>Contractors or third-party vendors hired only for the transition project, including SMEs, technicians, and electricians, should be contracted in advance to ensure that all required access and permissions (for physical and logical personal security items) are in place in time. Temporary remote access is a common practice used for this type of temporary resources. They need to have copies of all the relevant documentation and reference material before execution of the transition plan starts. All these on-boarded resources need to be well organized and well trained, with access validated, assigned, and approved prior to arriving at the facility to perform their assigned tasks.</p>
 
<p>After the transition project is finished or the resource has completed the assigned task, it is important to submit the requests that release the resources, collect badges, access keys, physical and logical security tokens, and remove server and database access. If this is not done promptly, it can generate security and access vulnerabilities. System auditors usually check active and non-active accounts of non-employees and off-boarding contractors.</p>
 
<p>After the transition project is finished or the resource has completed the assigned task, it is important to submit the requests that release the resources, collect badges, access keys, physical and logical security tokens, and remove server and database access. If this is not done promptly, it can generate security and access vulnerabilities. System auditors usually check active and non-active accounts of non-employees and off-boarding contractors.</p>
 
<h2>Handing Off to Operations</h2>
 
<h2>Handing Off to Operations</h2>
 
<p>When the pilot is over and the team determines that all the components are ready and the staff is trained, the solution is released into production and is handed off to the operations team. Then the final results are evaluated, and the operations group formally accepts the solution. </p>
 
<p>When the pilot is over and the team determines that all the components are ready and the staff is trained, the solution is released into production and is handed off to the operations team. Then the final results are evaluated, and the operations group formally accepts the solution. </p>
 
<h3>Handing Over to Operations</h3>
 
<h3>Handing Over to Operations</h3>
<p>The transition levels diagram implies that each level needs specific documentation related to the type of EIT solution as it is moved into production. Documents, troubleshooting techniques, testing results, QA references, and a list of acceptance criteria established in the release criteria should be adopted as a reference for the operations group.</p>
+
<p>The transition levels diagram implies that each level needs specific documentation related to the type of EIT solution as it is moved into production. Documents, troubleshooting techniques, test results, QA references, and a list of acceptance criteria established in the release criteria should be adopted as a reference for the operations group.</p>
 
<p>Training of the operations support team should already be complete with special attention given to new infrastructure, hardware, and software platforms. The team should be ready to take over the operations of the solution.</p>
 
<p>Training of the operations support team should already be complete with special attention given to new infrastructure, hardware, and software platforms. The team should be ready to take over the operations of the solution.</p>
<p>The operations team should review the list of operational risks and the set of workaround techniques available for incident management purposes. If an incident needs to be escalated to a more skilled technical team, the command center can provide an assessment and address the request for specialized resources. The command center might need to approve funds for outsourced resources, purchases of new software licenses, or hardware to solve issues or mitigate risks for the transition.</p>
+
<p>The operations team should review the list of operational risks and the set of workaround techniques available for incident management purposes. If an incident needs to be escalated to a more skilled technical team, the command center can provide an assessment and address the request for specialized resources. The command center might need to approve funds for outsourced resources, new software licenses, or hardware to solve issues or mitigate risks for the transition.</p>
<p>It is not uncommon for the handover to occur after a period of joint operations, where the transition team and the operations team work side by side. This overlap ensures that the operations team’s training is complete and that unwritten information makes it into the hands of operations.</p>
+
<p>It is not uncommon for the handover to occur after a period of joint operations, where the transition team and the operations team work side by side. This overlap ensures that the operations team's training is complete and that unwritten information makes it into the hands of operations.</p>
 
<h3>Announcing the EIT Solution Release or Retirement</h3>
 
<h3>Announcing the EIT Solution Release or Retirement</h3>
 
<p>A set of formal and informal messages to users, technicians, and stakeholders to announce the release of the new EIT solution should be distributed as the solution is coming online and at its cutover to operational status.</p>
 
<p>A set of formal and informal messages to users, technicians, and stakeholders to announce the release of the new EIT solution should be distributed as the solution is coming online and at its cutover to operational status.</p>
 
<p>The release announcement is often done with several kinds of media. For example, the organization might send shareholders and executives a formal brief communication. For management and other business units inside the organization, the organization might create a user brochure and publish it on the intranet. For internal EIT teams, a diagram with related components and a description some of the features is a good communication option.</p>
 
<p>The release announcement is often done with several kinds of media. For example, the organization might send shareholders and executives a formal brief communication. For management and other business units inside the organization, the organization might create a user brochure and publish it on the intranet. For internal EIT teams, a diagram with related components and a description some of the features is a good communication option.</p>
<p>Often organizations do a survey to gather feedback and measure the perceived value of the new solution from clients and end users. This feedback can often be used to show that the solution has met its business objectives.</p>
+
<p>Often organizations do a survey to gather feedback and measure the perceived value of the new solution from clients and end users. This feedback can be used to show that the solution has met its business objectives.</p>
 
<h3>Monitoring and Stabilizing the EIT Solution</h3>
 
<h3>Monitoring and Stabilizing the EIT Solution</h3>
 
<p>Monitoring and stabilizing a new EIT solution is more reactive than proactive. The operations team should monitor the new systems, attend to any incident that arises, and resolve it as soon as possible.</p>
 
<p>Monitoring and stabilizing a new EIT solution is more reactive than proactive. The operations team should monitor the new systems, attend to any incident that arises, and resolve it as soon as possible.</p>
 
<p>The main objective of this activity is to create mechanisms that provide real-time event monitoring of key components, while sending status alerts during the release and beyond.</p>
 
<p>The main objective of this activity is to create mechanisms that provide real-time event monitoring of key components, while sending status alerts during the release and beyond.</p>
<p>Giving daily reports to the transition project owner regarding the health of the EIT solution is a sound practice. At the end of the stabilization period (one or two weeks is common), schedule a meeting to share experiences and review incident and issue reports, as well as any other report required by nature of the transition. </p>
+
<p>Giving daily reports to the transition project owner regarding the health of the EIT solution is a sound practice. At the end of the stabilization period (one or two weeks is common), schedule a meeting to share experiences and review incident and issue reports, as well as any other reports required by nature of the transition. </p>
 
<h3>Closing the Project</h3>
 
<h3>Closing the Project</h3>
 
<p>Like any project, a transition project needs to be closed according to the policies and procedures of the organization. In some organizations, a document with the operations acceptance checklist, lessons learned collected during this session, and results of any surveys are included. </p>
 
<p>Like any project, a transition project needs to be closed according to the policies and procedures of the organization. In some organizations, a document with the operations acceptance checklist, lessons learned collected during this session, and results of any surveys are included. </p>
<p>In organizations using a CAB team, a change request to close the transition project is submitted to the CAB team for evaluation. Then, during next CAB session, the board members evaluate the completed transition, and confirm that all requests sent to different teams are now closed. A discussion can arise regarding the lessons shared and collected by the team and stakeholders, and the transition project owner can then officially close the transition project.</p>
+
<p>In organizations using a CAB team, a change request to close the transition project is submitted to the CAB team for evaluation. Then, during the next CAB session, the board members evaluate the completed transition, and confirm that all requests sent to different teams are now closed. A discussion can arise regarding the lessons shared and collected by the team and stakeholders, and the transition project owner can then officially close the transition project.</p>
<p>Gathering a final, detailed list of components (configuration items) added or removed during the process is key to maintain an updated configuration management database (CMDB).&nbsp;[[#One|[1]]] The operations team can then take full control and manage all of the different components when the new/updated EIT solution is in the production environment. </p>
+
<p>Gathering a final, detailed list of components (configuration items) added or removed during the process is key to maintain an updated configuration management database (CMDB).&nbsp;[[#One|[1]]] The operations team can then take full control and manage all the different components when the new/updated EIT solution is in the production environment. </p>
<p>Any detailed troubleshooting and workaround techniques created for a transition (including a retirement) should be formulated and recorded into the incident database to be used by operations team during steady state. </p>
+
<p>Any detailed troubleshooting and workaround techniques created for a transition (including a retirement) should be formulated and recorded into the incident database to be used by the operations team during steady state. </p>
 
<h2>Summary</h2>
 
<h2>Summary</h2>
<p>The transition knowledge area consists of a set of practices, processes, and activities that assist the organization with the successful insertion (or removal) of EIT solutions into the production environment. The overall process can be divided into three main phases: plan, execute, and release. Each phase involves different personnel and has it own set of artifacts. As with any project, designated decision bodies are responsible for the management of the project. They provide the funds, set priorities, and approve the required resources.</p>
+
<p>The transition knowledge area consists of a set of practices, processes, and activities that assist the organization with the successful insertion (or removal) of EIT solutions into the production environment. The overall process can be divided into three main phases: plan, execute, and release. Each phase involves different personnel and has its own set of artifacts. As with any project, designated decision bodies are responsible for the management of the project. They provide the funds, set priorities, and approve the required resources.</p>
<p>The planning phase produces a transition plan for the new solution. The execution phase executes the plan and moves the solution into the production environment. The release phase hands over the EIT solution to the operations team and helps them stabilize the solution in the production environment. Final steps include the announcement of the new release in the production environment and a final meeting to ensure that all the objective are met and that all the lessons learned are collected for reference by future projects.</p>
+
<p>The planning phase produces a transition plan for the new solution. The execution phase executes the plan and moves the solution into the production environment. The release phase hands over the EIT solution to the operations team and helps them stabilize the solution in the production environment. Final steps include the announcement of the new release in the production environment and a final meeting to ensure that all the objectives are met and that all the lessons learned are collected for reference by future projects.</p>
 
+
<h2>Key Maturity Frameworks</h2>
<h2> Key Maturity Frameworks</h2>
+
<p>Capability maturity for EIT refers to its ability to reliably perform. Maturity is measured by an organization's readiness and capability expressed through its people, processes, data, technologies, and the consistent measurement practices that are in place. See [http://eitbokwiki.org/Enterprise_IT_Maturity_Assessments Appendix F] for additional information about maturity frameworks.</p>
<p> Capability maturity for EIT refers to its ability to reliably perform. Maturity is a measured by an organization’s readiness and capability expressed through its people, processes, data and technologies and the consistent measurement practices that are in place. Please see [http://eitbokwiki.org/Enterprise_IT_Maturity_Assessments Appendix F] for additional information about maturity frameworks.</p>
+
<p>Many specialized frameworks have been developed since the original Capability Maturity Model (CMM) that was developed by the Software Engineering Institute in the late 1980s. This section describes how some of those apply to the activities described in this chapter. </p>
<p> Many specialized frameworks have been developed since the original Capability Maturity Model (CMM) that was developed by the Software Engineering Institute in the late 1980s. This section describes how some of those apply to the activities described in this chapter. </p>
+
<h3>IT-Capability Maturity Framework (IT-CMF) </h3>
 
+
<p>The IT-CMF was developed by the Innovation Value Institute in Ireland. This framework helps organizations to measure, develop, and monitor their EIT capability maturity progression. It consists of 35 EIT management capabilities that are organized into four macro capabilities: </p>
<h3> IT-Capability Maturity Framework (IT-CMF) </h3>
+
<p>The IT-CMF was developed by the Innovation Value Institute in Ireland. It helps organizations to measure, develop, and monitor their EIT capability maturity progression. It consists of 35 IT management capabilities that are organized into four macro capabilities: </p>
+
 
<ul>
 
<ul>
<li>Managing IT like a business</li>
+
<li>Managing EIT like a business</li>
<li>Managing the IT budget</li>
+
<li>Managing the EIT budget</li>
<li>Managing the IT capability</li>
+
<li>Managing the EIT capability</li>
<li>Managing IT for business value</li>
+
<li>Managing EIT for business value</li>
 
</ul>
 
</ul>
 
+
<p>The three most relevant critical capabilities are service provisioning (SRP), the technical infrastructure management (TIM), and solutions delivery (SD). </p>
<p>The three most relevant critical capabilities are Service Provisioning (SRP), the Technical Infrastructure Management (TIM) , and Solutions Delivery (SD). </p>
+
 
+
 
<h4>Service Provisioning Maturity</h4>
 
<h4>Service Provisioning Maturity</h4>
<p>The following statements provide a high-level overview of the Service Provisioning (SRP) capability at successive levels of maturity.</p>
+
<p>The following statements provide a high-level overview of the service provisioning (SRP) capability at successive levels of maturity.</p>
 
<table>  
 
<table>  
<tr valign="top">
+
<tr valign="top"><td width="10%">Level 1</td><td>The service provisioning processes are ad hoc, resulting in unpredictable EIT service quality. </td></tr>
<td width="10%">Level 1</td>
+
<tr valign="top"><td>Level 2</td><td>Service provisioning processes are increasingly defined and documented, but execution is dependent on individual interpretation of the documentation. Service level agreements (SLAs) are typically defined at the technical operational level only. </td></tr>
<td>The service provisioning processes are ad hoc, resulting in unpredictable IT service quality. </td>
+
<tr valign="top"><td>Level 3</td><td>Service provisioning is supported by standardized tools for most EIT services, but may not yet be adequately integrated. SLAs are typically defined at the business operational level. </td></tr>
</tr>
+
<tr valign="top"><td>Level 4</td><td>Customers have access to services on demand. Management and troubleshooting of services are highly automated.</td></tr>
<tr valign="top">
+
<tr valign="top"><td>Level 5</td><td>Customers experience zero downtime or delays, and service provisioning is fully automated. </td></tr>
<td>Level 2</td>
+
<td>Service provisioning processes are increasingly defined and documented, but execution is dependent on individual interpretation of the documentation. Service level agreements (SLAs) are typically defined at the technical operational level only. </td>
+
</tr>
+
<tr valign="top">
+
<td>Level 3</td>
+
<td>Service provisioning is supported by standardized tools for most IT services, but may not yet be adequately integrated. SLAs are typically defined at the business operational level. </td>
+
</tr>
+
<tr valign="top">
+
<td>Level 4</td>
+
<td>Customers have access to services on demand. Management and troubleshooting of services are highly automated. </td>
+
</tr>
+
<tr valign="top">
+
<td>Level 5</td>
+
<td>Customers experience zero downtime or delays, and service provisioning is fully automated. </td>
+
</tr>
+
 
</table>
 
</table>
 
 
<h4>Technical Infrastructure Management Maturity</h4>
 
<h4>Technical Infrastructure Management Maturity</h4>
<p>The following statements provide a high-level overview of the Technical Infrastructure Management (TIM) capability at successive levels of maturity.</p>
+
<p>The following statements provide a high-level overview of the technical infrastructure management (TIM) capability at successive levels of maturity.</p>
 
<table>
 
<table>
<tr valign="top">
+
<tr valign="top"><td width="10%">Level 1</td><td>Management of the EIT infrastructure is reactive or ad hoc. </td></tr>
<td width="10%">Level 1</td>
+
<tr valign="top"><td>Level 2</td><td>Documented policies are emerging relating to the management of a limited number of infrastructure components. Predominantly manual procedures are used for EIT infrastructure management. Visibility of capacity and utilization across infrastructure components is emerging. </td></tr>
<td>Management of the IT infrastructure is reactive or ad hoc. </td>
+
<tr valign="top"><td>Level 3</td><td>Management of infrastructure components is increasingly supported by standardized tool sets that are partly integrated, resulting in decreased execution times and improving infrastructure utilization.</td></tr>
<tr valign="top">
+
<tr valign="top"><td>Level 4</td><td>Policies related to EIT infrastructure management are implemented automatically, promoting execution agility and achievement of infrastructure utilization targets. </td></tr>
<td>Level 2</td>
+
<tr valign="top"><td>Level 5</td><td>The EIT infrastructure is continually reviewed so that it remains modular, agile, lean, and sustainable.</td></tr>
<td>Documented policies are emerging relating to the management of a limited number of infrastructure components. Predominantly manual procedures are used for IT infrastructure management. Visibility of capacity and utilization across infrastructure components is emerging. </td>
+
<tr valign="top">
+
<td>Level 3</td>
+
<td>Management of infrastructure components is increasingly supported by standardized tool sets that are partly integrated, resulting in decreased execution times and improving infrastructure utilization. </td>
+
<tr valign="top">
+
<td>Level 4</td>
+
<td>Policies relating to IT infrastructure management are implemented automatically, promoting execution agility and achievement of infrastructure utilization targets. </td>
+
<tr valign="top">
+
<td>Level 5</td>
+
<td>The IT infrastructure is continually reviewed so that it remains modular, agile, lean, and sustainable. </td>
+
 
</table>
 
</table>
 
 
<h4>Solutions Delivery Maturity</h4>
 
<h4>Solutions Delivery Maturity</h4>
<p>The following statements provide a high-level overview of the Solutions Delivery (SD) capability at successive levels of maturity.</p>
+
<p>The following statements provide a high-level overview of the solutions delivery (SD) capability at successive levels of maturity.</p>
<table>
+
<table>  
<tr valign="top">
+
<tr valign="top"><td width="10%">Level 1</td><td>There is ad hoc use of solutions delivery methodologies. EIT solutions are typically delivered with wide variations in quality, schedule, and cost expectations.</td></tr>
<td width="10%">Level 1</td>
+
<tr valign="top"><td>Level 2</td><td>Basic solutions delivery methodologies are defined and applied to a limited number of EIT solution projects, which are beginning to meet expectations, but variations in quality, schedule, and cost still occur. </td></tr>
<td>There is ad hoc use of solutions delivery methodologies. IT solutions are typically delivered with wide variations in quality, schedule, and cost expectations. </td>
+
<tr valign="top"><td>Level 3</td><td>Standardized solutions delivery methodologies are applied to most EIT solution projects, enabling many of them to regularly meet expectations for quality, schedule, and cost. </td></tr>
<tr valign="top">
+
<tr valign="top"><td>Level 4</td>
<td>Level 2</td>
+
<td>Comprehensive and flexible project delivery methodologies are applied to all projects, enabling most projects to meet expectations for quality, schedule, and cost.</td></tr>
<td>Basic solutions delivery methodologies are defined and applied to a limited number of IT solution projects, which are beginning to meet expectations, but variations in quality, schedule, and cost still occur. </td>
+
<tr valign="top"><td>Level 5</td><td>Solutions delivery methodologies are continually analyzed and refreshed. Solutions delivery expectations for quality, schedule, and cost are nearly always met. </td></tr>
<tr valign="top">
+
<td>Level 3</td>
+
<td>Standardized solutions delivery methodologies are applied to most IT solution projects, enabling many of them to regularly meet expectations for quality, schedule, and cost. </td>
+
<tr valign="top">
+
<td>Level 4</td>
+
<td>Comprehensive and flexible project delivery methodologies are applied to all projects, enabling most projects to meet expectations for quality, schedule, and cost. </td>
+
<tr valign="top">
+
<td>Level 5</td>
+
<td>Solutions delivery methodologies are continually analysed and refreshed. Solutions delivery expectations for quality, schedule, and cost are nearly always met. </td>
+
 
</table>
 
</table>
 
 
<h2> Key Competence Frameworks</h2>
 
<h2> Key Competence Frameworks</h2>
<p>While many large companies have defined their own sets of skills for purposes of talent management (to recruit, retain, and further develop the highest quality staff members that they can find, afford and hire), the advancement of EIT professionalism will require common definitions of EIT skills that can be used not just across enterprises, but also across countries. We have selected 3 major sources of skill definitions. While none of them is used universally, they provide a good cross-section of options. </p>
+
<p>While many large companies have defined their own sets of skills for purposes of talent management (to recruit, retain, and further develop the highest quality staff members that they can find, afford and hire), the advancement of EIT professionalism will require common definitions of EIT skills that can be used not just across enterprises, but also across countries. We have selected three major sources of skill definitions. While none of them is used universally, they provide a good cross-section of options. </p>
 
+
<p>Creating mappings between these frameworks and our chapters is challenging, because they come from different perspectives and have different goals. There is rarely a 100 percent correspondence between the frameworks and our chapters, and, despite careful consideration some subjectivity was used to create the mappings. Please take that in consideration as you review them.</p>
<p>Creating mappings between these frameworks and our chapters is challenging, because they come from different perspectives and have different goals. There is rarely a 100% correspondence between the frameworks and our chapters, and, despite careful consideration some subjectivity was used to create the mappings. Please take that in consideration as you review them.</p>
+
 
+
 
<h3>Skills Framework for the Information Age</h3>
 
<h3>Skills Framework for the Information Age</h3>
<p> The Skills Framework for the Information Age (SFIA) has defined nearly 100 skills. SFIA describes 7 levels of competency which can be applied to each skill. Not all skills, however, cover all seven levels. Some reach only partially up the seven step ladder. Others are based on mastering foundational skills, and start at the fourth or fifth level of competency. It is used in nearly 200 countries, from Britain to South Africa, South America, to the Pacific Rim, to the United States. (http://www.sfia-online.org)</p>
+
<p>The Skills Framework for the Information Age (SFIA) has defined nearly 100 skills. SFIA describes seven levels of competency that can be applied to each skill. However, not all skills cover all seven levels. Some reach only partially up the seven-step ladder. Others are based on mastering foundational skills, and start at the fourth or fifth level of competency. SFIA is used in nearly 200 countries, from Britain to South Africa, South America, to the Pacific Rim, to the United States. (http://www.sfia-online.org)</p>
+
<table cellpadding="5" border="1">
<table cellpadding="5" border="1">
+
<tr valign="top"><th style="background-color: #58ACFA;"><font color="white">Skill</font></th><th style="background-color: #58ACFA;"><font color="white">Skill Description</font></th><th width="10%" style="background-color: #58ACFA;"><font color="white">Competency Levels</font></th></tr>
<tr>
+
<tr valign="top"><td>Asset management</td><td>The management of the lifecycle for all managed assets (hardware, software, intellectual property, licenses, warranties, etc.) including security, inventory, compliance, usage, and disposal, aiming to protect and secure the corporate assets portfolio, optimize the total cost of ownership and sustainability by minimizing operating costs, improve investment decisions, and capitalize on potential opportunities. Knowledge and use of international standards for asset management and close integration with security, change, and configuration management are examples of enhanced asset management development.</td><td valign="top">4-6</td></tr>
<th width="15%">Skill</th>
+
<tr valign="top"><td>Benefits management</td><td>Monitoring for the emergence and effective realization of anticipated benefits (typically specified as part of the business case for a change program or project). Action (typically by the program management team) to optimize the business impact of individual and combined benefits.</td><td valign="top">5-6</td></tr>
<th>Skill Description</th>
+
<tr valign="top"><td>Business process testing</td><td>The planning, design, management, execution, and reporting of business process tests and usability evaluations. The application of evaluation skills to the assessment of the ergonomics, usability, and fitness for purpose of defined processes. This includes the synthesis of test tasks to be performed (from statement of user needs and user interface specification), the design of an evaluation program, the selection of user samples, the analysis of performance, and inputting results to the development team.</td><td valign="top">4-6</td></tr>
<th width="10%">Competency Levels</th>
+
<tr valign="top"><td>Change implementation planning and management</td><td>The definition and management of the process for deploying and integrating new digital capabilities into the business in a way that is sensitive to and fully compatible with business operations.</td><td valign="top">5-6</td></tr>
</tr>
+
<tr valign="top"><td>Change management</td><td>The management of change to the service infrastructure including service assets, configuration items, and associated documentation. Change management uses requests for change (RFC) for standard or emergency changes, and changes due to incidents or problems to provide effective control and reduction of risk to the availability, performance, security, and compliance of the business services impacted by the change.</td><td valign="top">2-6</td></tr>
<tr>
+
<tr valign="top"><td>Configuration management</td><td>The lifecycle planning, control, and management of the assets of an organization (such as documentation, software, and service assets, including information relating to those assets and their relationships. This involves identification, classification, and specification of all configuration items (CIs) and the interfaces to other processes and data. Required information relates to storage, access, service relationships, versions, problem reporting, and change control of CIs. The application of status accounting and auditing, often in line with acknowledged external criteria such as ISO 9000, ISO/IEC 20000, ISO/IEC 27000, and security throughout all stages of the CI lifecycle, including the early stages of system development.</td><td valign="top">2-6</td></tr>
<td valign="top">Asset management</td>
+
<tr valign="top"><td>Information content publishing</td><td>The evaluation and application of different publishing methods and options, recognizing key features, including open source and proprietary options. The management and tuning of the processes that collect, assemble, and publish information, including in unstructured and semi-structured forms, for delivery to the user at the point at which it is needed. The management of copyright, data protection, and other legal issues associated with publishing and re-use of published information and data.</td><td valign="top">1-6</td></tr>
<td>The management of the lifecycle for all managed assets (hardware, software, intellectual property, licences, warranties etc) including security, inventory, compliance, usage and disposal, aiming to protect and secure the corporate assets portfolio, optimise the total cost of ownership and sustainability by minimising operating costs, improving investment decisions and capitalising on potential opportunities. Knowledge and use of international standards for asset management and close integration with security, change, and configuration management are examples of enhanced asset management development.</td>
+
<tr valign="top"><td>Learning and development management</td><td>The provision of learning and development processes (including learning management systems) in order to develop the professional, business, and technical skills required by the organization.</td><td valign="top">3-7</td></tr>
<td valign="top" >4 - 6</td>
+
<tr valign="top"><td>Learning assessment and evaluation</td><td>The assessment of knowledge, skills, and behavior by any means, whether formal or informal, against capability and qualification frameworks such as SFIA. The evaluation of learning or education programs against defined outcomes.</td><td valign="top">3-6</td></tr>
</tr>
+
<tr valign="top"><td>Learning delivery</td><td>The transfer of business and technical skills and knowledge and the promotion of professional attitudes in order to facilitate learning and development. Uses a range of techniques, resources, and media (which might include eLearning, online virtual environments, self-assessment, peer-assisted learning, simulation, and other current methods).</td><td valign="top">3-5</td></tr>
<tr>
+
<tr valign="top"><td>Learning design and development</td><td>The specification, design, creation, packaging, and maintenance of materials and resources for use in learning and development in the workplace or in compulsory, further, or higher education. Typically involves the assimilation of information from existing sources, selection, and re-presentation in a form suitable to the intended purpose and audience. Includes instructional design, content development, configuration, and testing of learning environments, and use of appropriate current technologies such as audio, video, simulation, and assessment. May include third-party accreditation.</td><td valign="top">4-6</td></tr>
<td valign="top">Benefits management</td>
+
<tr valign="top"><td>Penetration testing</td><td>The assessment of organizational vulnerabilities through the design and execution of penetration tests that demonstrate how an adversary can either subvert the organization's security goals (e.g., the protection of specific intellectual property) or achieve specific adversarial objectives (e.g., establishment of a covert command and control infrastructure). Pen test results provide deeper insight into the business risks of various vulnerabilities.</td><td valign="top">4-6</td></tr>
<td>Monitoring for the emergence and effective realisation of anticipated benefits (typically specified as part of the business case for a change programme or project). Action (typically by the programme management team) to optimise the business impact of individual and combined benefits.</td>
+
<tr valign="top"><td>Release and deployment</td><td>The management of the processes, systems, and functions to package, build, test, and deploy changes and updates (which are bounded as "releases") into a live environment, establishing or continuing the specified service, to enable controlled and effective handover to operations and the user community.</td><td valign="top">2-6</td></ tr>
<td valign="top" >5 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Business process testing</td>
+
<td>The planning, design, management, execution and reporting of business process tests and usability evaluations. The application of evaluation skills to the assessment of the ergonomics, usability and fitness for purpose of defined processes. This includes the synthesis of test tasks to be performed (from statement of user needs and user interface specification), the design of an evaluation programme, the selection of user samples, the analysis of performance, and inputting results to the development team.</td>
+
<td valign="top" >4 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Change implementation planning and management</td>
+
<td>The definition and management of the process for deploying and integrating new digital capabilities into the business in a way that is sensitive to and fully compatible with business operations.</td>
+
<td valign="top" >5 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Change management</td>
+
<td>The management of change to the service infrastructure including service assets, configuration items and associated documentation. Change management uses requests for change (RFC) for standard or emergency changes, and changes due to incidents or problems to provide effective control and reduction of risk to the availability, performance, security and compliance of the business services impacted by the change.</td>
+
<td valign="top" >2 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Configuration management</td>
+
<td>The lifecycle planning, control and management of the assets of an organisation (such as documentation, software and service assets, including information relating to those assets and their relationships. This involves identification, classification and specification of all configuration items (CIs) and the interfaces to other processes and data. Required information relates to storage, access, service relationships, versions, problem reporting and change control of CIs. The application of status accounting and auditing, often in line with acknowledged external criteria such as ISO 9000, ISO/IEC 20000, ISO/IEC 27000 and security throughout all stages of the CI lifecycle, including the early stages of system development.</td>
+
<td valign="top" >2 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Information content publishing</td>
+
<td>The evaluation and application of different publishing methods and options, recognising key features, including open source and proprietary options. The management and tuning of the processes that collect, assemble and publish information, including in unstructured and semi-structured forms, for delivery to the user at the point at which it is needed. The management of copyright, data protection and other legal issues associated with publishing and re-use of published information and data.</td>
+
<td valign="top" >1 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Learning and development management</td>
+
<td>The provision of learning and development processes (including learning management systems) in order to develop the professional, business and/or technical skills required by the organisation.</td>
+
<td valign="top" >3 - 7</td>
+
</tr>
+
<tr>
+
<td valign="top">Learning assessment and evaluation</td>
+
<td>The assessment of knowledge, skills and behaviour by any means whether formal or informal against capability and qualification frameworks such as SFIA. The evaluation of learning or education programmes against defined outcomes.</td>
+
<td valign="top" >3 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Learning delivery</td>
+
<td>The transfer of business and/or technical skills and knowledge and the promotion of professional attitudes in order to facilitate learning and development. Uses a range of techniques, resources and media (which might include eLearning, on-line virtual environments, self-assessment, peer-assisted learning, simulation, and other current methods).</td>
+
<td valign="top" >3 - 5</td>
+
</tr>
+
<tr>
+
<td valign="top">Learning design and development</td>
+
<td>The specification, design, creation, packaging and maintenance of materials and resources for use in learning and development in the workplace or in compulsory, further or higher education. Typically involves the assimilation of information from existing sources, selection and re-presentation in a form suitable to the intended purpose and audience. Includes instructional design, content development, configuration and testing of learning environments, and use of appropriate current technologies such as audio, video, simulation and assessment. May include third party accreditation.</td>
+
<td valign="top" >4 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Penetration testing</td>
+
<td>The assessment of organisational vulnerabilities through the design and execution of penetration tests that demonstrate how an adversary can either subvert the organisation's security goals (e.g. the protection of specific Intellectual Property) or achieve specific adversarial objectives (e.g. establishment of a covert Command and Control infrastructure). Pen Test results provide deeper insight into the business risks of various vulnerabilities.</td>
+
<td valign="top" >4 - 6</td>
+
</tr>
+
<tr>
+
<td valign="top">Release and deployment</td>
+
<td>The management of the processes, systems and functions to package, build, test and deploy changes and updates (which are bounded as “releases”) into a live environment, establishing or continuing the specified Service, to enable controlled and effective handover to Operations and the user community.</td>
+
<td valign="top" >levels</td>
+
</tr>
+
 
</table>
 
</table>
 
 
<h3>European Competency Framework</h3>
 
<h3>European Competency Framework</h3>
<p> The European Union’s European e-Competence Framework (e-CF) has 40 competences and is used by a large number of companies, qualification providers and others in public and private sectors across the EU. It uses five levels of competence proficiency (e-1 to e-5). No competence is subject to all five levels.</p>
+
<p>The European Union's European e-Competence Framework (e-CF) has 40 competences and is used by a large number of companies, qualification providers, and others in public and private sectors across the EU. It uses five levels of competence proficiency (e-1 to e-5). No competence is subject to all five levels.</p>
<p>The e-CF is published and legally owned by CEN, the European Committee for Standardization, and its National Member Bodies (www.cen.eu). Its creation and maintenance has been co-financed and politically supported by the European Commission, in particular, DG (Directorate General) Enterprise and Industry, with contributions from the EU ICT multi-stakeholder community, to support competitiveness, innovation, and job creation in European industry. The Commission works on a number of initiatives to boost ICT skills in the workforce.
+
<p>The e-CF is published and legally owned by CEN, the European Committee for Standardization, and its National Member Bodies (www.cen.eu). Its creation and maintenance has been co-financed and politically supported by the European Commission, in particular, DG (Directorate General) Enterprise and Industry, with contributions from the EU ICT multi-stakeholder community, to support competitiveness, innovation, and job creation in European industry. The Commission works on a number of initiatives to boost ICT skills in the workforce. Version 1.0 to 3.0 were published as CEN Workshop Agreements (CWA). The e-CF 3.0 CWA 16234-1 was published as an official European Norm (EN), EN 16234-1. For complete information, see http://www.ecompetences.eu. </p>
 
+
<table cellpadding="5" border="1">
Version 1.0 to 3.0 were published as CEN Workshop Agreements (CWA).  
+
<tr valign="top"><th width="85%" style="background-color: #58ACFA;"><font color="white">e-CF Dimension 2</font></th><th width="15%" style="background-color: #58ACFA;"><font color="white">e-CF Dimension 3</font></th></tr>
The e-CF 3.0 CWA 16234-1 was published as an official European Norm (EN), EN 16234-1.
+
<tr valign="top"><td><strong>B.3. Testing (BUILD)</strong><br />Constructs and executes systematic test procedures for ICT systems or customer usability requirements to establish compliance with design specifications. Ensures that new or revised components or systems perform to expectation. Ensures meeting of internal, external, national, and international standards; including health and safety, usability, performance, reliability, or compatibility. Produces documents and reports to evidence certification requirements. </td><td valign="top">Level 1-4</td></tr>
For complete information, please see http://www.ecompetences.eu. </p>
+
<tr valign="top"><td><strong>B.4. Solution Deployment (BUILD)</strong><br />Following predefined general standards of practice carries out planned necessary interventions to implement solution, including installing, upgrading, or decommissioning. Configures hardware, software, or network to ensure interoperability of system components and debugs any resultant faults or incompatibilities. Engages additional specialist resources if required, such as third-party network providers. Formally hands over fully operational solution to user and completes documentation recording all relevant information, including equipment addressees, configuration, and performance data.</td><td valign="top">Level 1-3</td></tr>
 
+
<tr valign="top"><td><strong>D.9. Personnel Development (ENABLE)</strong><br />Diagnoses individual and group competence, identifying skill needs and skill gaps. Reviews training and development options and selects appropriate methodology taking into account the individual, project, and business requirements. Coaches/mentors individuals and teams to address learning needs.</td><td valign="top">Level 2-4</td></tr>
<table cellpadding="5" border="1">
+
<tr valign="top"><td><strong>E.7. Business Change Management (MANAGE)</strong><br />Assesses implications of new digital solutions. Defines requirements and quantifies business benefits. Manages deployment of change taking into account structural and cultural issues. Maintains business and process continuity throughout change, monitoring the impact, taking any required remedial action and refining approach.</td><td valign="top">Level 3-5</td></tr>
<tr>
+
<th width="85%">e-CF Dimension 2</th><th width="15%">e-CF Dimension 3</th>
+
</tr>
+
<tr>
+
<td valign="top"><strong>B.3. Testing (BUILD)</strong><br />Constructs and executes systematic test procedures for ICT systems or customer usability requirements to establish compliance with design specifications. Ensures that new or revised components or systems perform to expectation. <strong>Ensures meeting of internal, external, national and international standards; including health and safety, usability, performance, reliability or compatibility. Produces documents and reports to evidence certification requirements.</strong> </td>
+
<td valign="top">Level 1-4</td>
+
</tr>
+
 
+
<tr>
+
<td valign="top"><strong>B.4. Solution Deployment (BUILD)<br />Following predefined general standards of practice carries out planned necessary interventions to implement solution, including installing, upgrading or decommissioning. Configures hardware, software or network to ensure interoperability of system components and debugs any resultant faults or incompatibilities. Engages additional specialist resources if required, such as third party network providers. Formally hands over fully operational solution to user and completes documentation recording all relevant information, including equipment addressees, configuration and performance data.</strong></td>
+
<td valign="top">Level 1-3</td>
+
</tr>
+
 
+
<tr>
+
<td valign="top"><strong>D.9. Personnel Development (ENABLE)</strong><br />Diagnoses individual and group competence, identifying skill needs and skill gaps. Reviews training and development options and selects appropriate methodology taking into account the individual, project and business requirements. <strong>Coaches and / or mentors individuals and teams to address learning needs.</strong> </td>
+
<td valign="top">Level 2-4</td>
+
</tr>
+
 
+
<tr>
+
<td valign="top"><strong>E.7. Business Change Management (MANAGE)</strong><br />Assesses the implications of new digital solutions. Defines the requirements and quantifies the business benefits. Manages the deployment of change taking into account structural and cultural issues. <strong>Maintains business and process continuity throughout change, monitoring the impact, taking any required remedial action and refining approach.</strong>  </td>
+
<td valign="top">Level 3-5</td>
+
</tr>
+
 
+
 
</table>
 
</table>
 
+
<h3>i&nbsp;Competency Dictionary </h3>
<h3>i Competency Dictionary </h3>
+
<p>The Information Technology Promotion Agency (IPA) of Japan has developed the i&nbsp;Competency Dictionary (iCD) and translated it into English, and describes it at https://www.ipa.go.jp/english/humandev/icd.html. The iCD is an extensive skills and tasks database, used in Japan and southeast Asian countries. It establishes a taxonomy of tasks and the skills required to perform the tasks. The IPA is also responsible for the Information Technology Engineers Examination (ITEE), which has grown into one of the largest scale national examinations in Japan, with approximately 600,000 applicants each year.</p>
<p>The Information Technology Promotion Agency (IPA) of Japan has developed the i Competency Dictionary (iCD), translated it into English, and describes it at https://www.ipa.go.jp/english/humandev/icd.html. It is an extensive skills and tasks database, used in Japan and southeast Asian countries. It establishes a taxonomy of tasks and the skills required to perform the tasks. The IPA is also responsible for the Information Technology Engineers Examination (ITEE), which has grown into one of the largest scale national examinations in Japan, with approximately 600,000 applicants each year. </p>
+
<p>The iCD consists of a Task Dictionary and a Skill Dictionary. Skills for a specific task are identified via a "Task x Skill" table. (See [http://eitbokwiki.org/Glossary Appendix A] for the task layer and skill layer structures.) EITBOK activities in each chapter require several tasks in the Task Dictionary. </p>
 
+
<p>The table below shows a sample task from iCD Task Dictionary Layer 2 (with Layer 1 in parentheses) that corresponds to activities in this chapter. It also shows the Layer 2 (Skill Classification), Layer 3 (Skill Item), and Layer 4 (knowledge item from the IPA Body of Knowledge) prerequisite skills associated with the sample task, as identified by the Task x Skill Table of the iCD Skill Dictionary. The complete iCD Task Dictionary (Layer 1-4) and Skill Dictionary (Layer 1-4) can be obtained by returning the request form provided at http://www.ipa.go.jp/english/humandev/icd.html. </p>
<p>The iCD consists of a Task Dictionary and a Skill Dictionary. Skills for a specific task are identified via a “Task x Skill” table. (Please see Appendix A for the task layer and skill layer structures.) EITBOK activities in each chapter require several tasks in the Task Dictionary. </p>
+
 
+
<p>The table below shows a sample task from iCD Task Dictionary Layer 2 (with Layer 1 in parentheses) that correspond to activities in this chapter. It also shows the Layer 2 (Skill Classification), Layer 3 (Skill Item), and Layer 4 (knowledge item from the IPA Body of Knowledge) prerequisite skills associated with the sample task, as identified by the Task x Skill Table of the iCD Skill Dictionary. The complete iCD Task Dictionary (Layer 1-4) and Skill Dictionary (Layer 1-4) can be obtained by returning the request form provided at http://www.ipa.go.jp/english/humandev/icd.html. </p>
+
 
+
 
<table cellpadding="5" border="1">
 
<table cellpadding="5" border="1">
<tr>
+
<tr valign="top"><th width="15%" style="background-color: #58ACFA;" font-size="14pt"><font color="white">Task Dictionary</font></th><th colspan="3" style="background-color: #58ACFA;" font-size="14pt"><font color="white">Skill Dictionary</font></th></tr>
<th font-size="14pt">Task Dictionary</th><th colspan="3">Skill Dictionary</th>
+
<tr valign="top"><th width="30%" style="background-color: #58ACFA;"><font color="white">Task Layer 1 (Task Layer 2)</font></th><th width="15%" style="background-color: #58ACFA;"><font color="white">Skill Classification</font></th><th width="15%" style="background-color: #58ACFA;"><font color="white">Skill Item</font></th><th width="40%" style="background-color: #58ACFA;"><font color="white">Associated Knowledge Items</font></th></tr>
</tr>
+
<tr valign="top"><td><em><strong>Transition design <br />(transition design)</strong></em></td>
<tr>
+
<th width="30%">Task Layer 1 (Task Layer 2)</th><th width="15%">Skill Classification</th><th width="15%">Skill Item</th><th width="40%">Associated Knowledge Items</th>
+
</tr>
+
 
+
<tr>
+
<td valign="top"><em><strong>Transition design <br />(Transition design)</strong></em></td>
+
 
<td valign="top">Design and transition of service</td>
 
<td valign="top">Design and transition of service</td>
 
<td valign="top">Service transition methods</td>
 
<td valign="top">Service transition methods</td>
Line 398: Line 269:
 
<li>Progress monitoring</li>
 
<li>Progress monitoring</li>
 
</ul>
 
</ul>
</td>
+
</td></tr>
</tr>
+
 
</table>
 
</table>
<p align="right"><strong>(More)</strong></p>
 
 
 
<h2>Key Roles</h2>
 
<h2>Key Roles</h2>
Common ITSM roles:
+
<p>Common ITSM roles:</p>
 
<ul>
 
<ul>
 
<li>Application Developer</li>
 
<li>Application Developer</li>
Line 416: Line 284:
 
<li>Test Manager</li>
 
<li>Test Manager</li>
 
</ul>
 
</ul>
 
+
<p>Other key roles are:</p>
 +
<ul>
 +
<li>Communications Manager</li>
 +
<li>Deployment Manager </li>
 +
<li>Operations Manager</li>
 +
<li>Problem Manager</li>
 +
<li>Solution Management Team</li>
 +
<li>Transition Manager</li>
 +
</ul>
 
<p>The table below shows the four levels of the transition category model: business, data and information, software application, and hardware infrastructure transition.</p>
 
<p>The table below shows the four levels of the transition category model: business, data and information, software application, and hardware infrastructure transition.</p>
 
+
<table cellpadding="5" border="1">
<table border="1" cellpadding="10">
+
<tr valign="top"><th style="background-color: #58ACFA;"><font color="white">Transition Level</font></th><th style="background-color: #58ACFA;"><font color="white">Stakeholders</font></th><th style="background-color: #58ACFA;"><font color="white">Resources</font></th></tr>
<tr valign="top">
+
<tr valign="top"><td>'''Business level'''</td><td>Strategic decision people, top management, C-level officers, regulatory authority</td><td>Enterprise architects and risk management, project management office (PMO), experienced team lead engineers</td></tr>
<td style="background-color: #58ACFA;"><font color="white">'''Transition Level'''</font></td>
+
<tr valign="top"><td>'''Data and information level'''</td><td>Strategic decision people, top management, C-level officers</td><td>Enterprise data architect and modelers, data manager, data stewards, database administrators</td></tr>
<td style="background-color: #58ACFA;"><font color="white">'''Stakeholders'''</font></td>
+
<tr valign="top"><td>'''Software application level'''</td><td>Tactical/operational business decision participants, business owner, application owners, application contractors</td><td>Solution architects, data management, business analysts, user experience team, quality and multiplatform application and utility programmers, subject matter experts (SMEs)</td></tr>
<td style="background-color: #58ACFA;"><font color="white">'''Resources'''</font></td></tr>
+
<tr valign="top"><td>'''Hardware EIT infrastructure level'''</td><td>Server owners, datacenter administrators, security and risk operations teams, infrastructure contractors, Internet and cloud service providers</td><td>Infrastructure solution architects, cloud services, datacenter and operation management, procurement, release management, network, security, server, storage devices specialists</td></tr>
<tr valign="top">
+
<td>'''Business level'''</td><td>Strategic decision people, top management, C-level officers, regulatory authority</td><td>Enterprise architects and risk management, project management office (PMO), experienced team lead engineers</td></tr>
+
<tr valign="top">
+
<td>'''Data and information level'''</td><td>Strategic decision people, top management, C-level officers</td><td>Enterprise data architect and modelers, data manager, data stewards, database administrators</td></tr>
+
<tr valign="top">
+
<td>'''Software application level'''</td><td>Tactical/operational business decision participants, business owner, application owners, application contractors</td><td>Solution architects, data mgmt, business analysts, user experience team, quality and multiplatform application and utility programmers, subject matter experts (SMEs)</td></tr>
+
<tr valign="top">
+
<td>'''Hardware EIT infrastructure level'''</td><td>Server owners, datacenter administrators, security and risk operations teams, infrastructure contractors, internet and cloud service providers</td><td>Infrastructure solution architects, cloud services, datacenter and operation management, procurement, release management, network, security, server, storage devices specialists</td></tr>
+
 
</table>
 
</table>
 
<h2>Standards</h2>
 
<h2>Standards</h2>
<p>ISO/IEC 20000-1:2011, (IEEE Std 20000-1:2013) Information technology – Service management – Part 1: Service management system requirements </p>
+
<p>ISO/IEC 20000-1:2011, (IEEE Std 20000-1:2013) Information technology—Service management—Part 1: Service management system requirements </p>
<p> IEEE Std 828™-2012, IEEE Standard for Configuration Management in Systems and Software Engineering </p>
+
<p>IEEE Std 828™-2012, IEEE Standard for Configuration Management in Systems and Software Engineering </p>
 
+
 
<h2>References</h2>
 
<h2>References</h2>
 
<div id="One"></div><p>[1] Configuration management system (CMS) and configuration management database (CMDB). ITIL Service Transition. OGC 2007. Service Transition Processes. Service Assets and Configuration Management 4.3.4.3 Configuration Management System p. 68-69.</p>
 
<div id="One"></div><p>[1] Configuration management system (CMS) and configuration management database (CMDB). ITIL Service Transition. OGC 2007. Service Transition Processes. Service Assets and Configuration Management 4.3.4.3 Configuration Management System p. 68-69.</p>

Latest revision as of 23:17, 22 December 2017

Welcome to the initial version of the EITBOK wiki. Like all wikis, it is a work in progress and may contain errors. We welcome feedback, edits, and real-world examples. Click here for instructions about how to send us feedback.
Ieee logo 1.png
Acm logo 3.png

 

1 Introduction

Transition consists of a set of processes and activities that release new solutions into an EIT environment, replace or update existing solutions, remove a solution or component from service, or move EIT components from one location to another. Examples of transition include the installation of a new software application, migration of an existing hardware infrastructure into a new location, a refresh of key business applications with new software, or decommissioning a datacenter, hardware, or network devices.

Retirement is a special case of transition. It is the set of processes and activities associated with the removal, withdrawal, or decommissioning of solutions from an EIT environment. Although one might try to distinguish retirement activities from deployment activities, the two processes are extremely similar in many respects, although one adds to the EIT environment and one subtracts from it. In addition, deployment and retirement processes often go together in a single deployment project—the deployment (transition) of a new EIT solution into the environment as well as the retirement of an old EIT solution. Therefore, this chapter covers both deployment and retirement-related activities under the term transition, pointing out the differences between the two project types when they occur.

To start a transition process, the EIT team creates a plan and submits it to the appropriate decision makers. The decision makers may ask a change advisory board to evaluate the proposed change for risk and unintended consequences, and advise the transition (change) manager of their findings and recommendations. When the decision body approves the plan, they fund the project in accordance with strategic guidelines and priorities. In addition, operations approves the schedule, carefully evaluating outage windows (time without service), the go-live dates, and the retirement dates. At the same time, the accounting and procurement teams evaluate the budget and approve the required purchases.

2 Goals and Principles

  • Effectively plan and manage the successful transition (release from development or acquisition functions, to deployment, relocation, replacement, removal, and decommissioning) of approved EIT solutions (products and services) without negatively impacting the live environment.
  • Ensure a common understanding of the organization's handoff or retirement processes among affected organizations and stakeholders to ensure that involved participants can collaborate successfully.
  • Effectively assess the risk and impact of releasing, relocating, replacing, deploying, and decommissioning EIT solutions that combine software applications, utilities, hardware, and network components.
  • Plan, execute, and evaluate the results of pilot projects to allow for adjustment that can reduce the risk before the full solution rollout.
  • Effectively hand off new solutions to operations at the completion of the transition.

3 Context Diagram

13 Transition CD.png
Figure 1. Context Diagram for Transition

4 Transition and Retirement Activities

The transition activities can be subdivided into three sets of activities: plan, execute, and release (or hand off). Each of these phases contains a sequence of tasks that involve strategic, decision, and support groups as shown in the figure below.

TransitionFlowchart.jpg

Figure 2. Transition Flowchart Diagram

  • Plan—In this phase, the transition team becomes familiar with the requirements and technical design of the solution or retirement. The team then creates detailed plans for the project that allow the transition to occur without negatively affecting the business. The team also evaluates the risks and impacts of the solution, and identifies mitigation techniques to handle any negative impacts.
  • Execute—In the second phase, the team executes the plan. All levels of the solution are deployed or retired, as specified, and appropriate personnel are trained. Typically there is a pilot of the project to test the solution in the eventual operations environment, identify any unforeseen issues, and refine the solution, as necessary. It is also common to have a phased rollout of the project that starts in one location or with one group of personnel, and then propagates throughout the organization.
  • Release—When the decision body feels that the solution is stable and ready for general release, the transition team hands the solution over to operations, they announce the release to the appropriate audience, and they review the project and collect the lessons learned.

In the rest of this chapter, we describe these three phases in more detail.

5 Planning the Transition Project

The transition project starts with a management decision based on the organization's priorities and goals, established during strategic planning (see Strategy and Governance). This decision includes the scope of the project, resources, technology, budget, and expected outcomes that are often determined as part of a change initiative (see Change Initiatives). Thus, transition planning is done in parallel with solution acquisition and construction activities.

The transition planning team focuses on a number of activities, including:

  • Understanding the business and technical requirements for the solution
  • Analyzing the business and technical requirements for the transition
  • Assessing the business and technical risks of altering the operations environment, and coming up with ways to mitigate those risks
  • Elaborating a solution transition strategy that allows the team to deploy, move, and then target the solution to or extract target solution components from the operating environment without negatively impacting operations
  • Evaluating the training plan and adding components as deemed necessary
  • Creating a schedule for the transition activities
  • Creating a detailed plan document with all the pertinent information
  • Submitting the plan to the decision authority for authorization to start the project

5.1 Reviewing Business Goals and Requirements

By the time the EIT solution has progressed to this stage, the business and technical requirements should be well understood and documented. The goal of the transition team is to review the goals and requirements so that they can roll out the solution into the enterprise.

At times, the transition team needs clarification about the requirements the solution is meant to implement. That is why a change advisory board (CAB) comprised of stakeholders such as business owners, managers, and PMO members is directly involved in the transition planning process. Enterprise architects, solution architects, program managers, and SMEs are also often asked to assist the team. They can help with the business and operational risk-analysis activities, and they can explain the existing dependencies between products and services currently in operation as well as dependencies existing between components planned for the transition into the live environment.

If new hardware or software needs to be purchased from vendors (see Acquisition and Construction), it is important to meet with these contractors to avoid conflicts with existing warranties, and to identify the proper steps and guidelines to protect the organization's investment. Accounting and procurement teams are often involved to manage the relationship with the vendors. The operations group is another important participant in transition-planning sessions, because they receive the solution in production and need to be ready to accept the responsibility when the solution is ready.

Any stakeholder or senior manager impacted (positively or negatively) should participate in the planning process, answering questions, and clarifying any possible drawback of delays of the project, before submitting the plan for approval.

5.2 Architecting the EIT Solution

The team analyzes and elaborates the technical approach so that it can be deployed successfully. This group augments the existing design and technical notes to facilitate field technicians with configuring and setting up the components needed to release the solution into production, and retiring any components that need to be removed. This analysis occurs at several levels.

5.2.1 Transition Layers

Transition architecture, planning, and execution can be guided using the standard enterprise architecture (BIAT) layer model (see Enterprise Architecture). The figure below shows our adaptation of the diagram for this discussion.

TransitionLayerDiagram.jpg

Figure 3. Transition Layer Diagram

Each layer typically has its own decision authorities and technical teams that work on the transition plan. For example, an infrastructure transition team might provide expertise on server clustering and virtual network (VLAN) architecture, switching, and routing. The application transition team might write code to interconnect business applications with existing databases.

The two teams work together to deploy an integrated and functional EIT solution and hand it over to the teams in charge of operations. If maintenance activities are required, the configuration management team hands over the sources for alteration (see Construction).

A description of each layer and the involved activities help explain why the layered approach is often used:

  • A business layer change impacts the whole or a key part of the organization. Opening a new branch office outside of the country implies a business decision that involves many different unit areas, such as finance, marketing, legal, HR, and, of course, EIT. All of these areas need to coordinate with a single focus, which is owned by management. A business layer transition automatically cascades to the layers below, generating different transition projects (such as application, data, and infrastructure), creating a program management effort coordinating several projects rather than a simple project
    Business transition changes are typically governed by a change advisory board (CAB) that consists of senior management, enterprise architects, and project managers. The project management members participate during strategic discussions, providing input on accepted project management practices, and information learned from previous projects. All of this work impacts the rest of the layers, because a single business decision usually cascades to affect many business units.
  • Data & information layer changes impact enterprise data and information assets. These transitions involve projects including those that modify databases, data structures, SQL programming, and stored procedures to be released and deployed into production. A data-transition project can impact business applications, which require code updates or database configuration changes to establish the connection between the applications and the data. As a result, these projects are often overseen by the same group that supervises the business layer modifications. Note that all data and information transitions must adhere to data management and data governance guidelines.
  • Changes to the software application layer can impact all software applications, programs, and database platforms. The release or retirement of an application can involve the coordination of several teams including web designers and data programmers in charge of connecting the applications with live databases.
    The application layer team needs to have members with the technical skills required to release, refresh, and update live software platforms.
  • Changes to the EIT infrastructure layer affect infrastructure facilities, such as datacenters and computer rooms. They involve the installation, refresh, and decommissioning of hardware including mainframes, servers, cabling, storage, security, and telecommunication components. The EIT infrastructure transition team incorporates network and hardware experts with the infrastructure skills required for planning, configuring, and setting up the EIT infrastructure architecture solution.
    For this layer, the infrastructure team formulates architectural models of the modified infrastructure to understand how best to integrate new hardware components or remove old ones. The team looks to standardize network topologies, to upgrade hardware components, and to monitor, configure, and support accepted practices. Coordination with server, database, storage, backup, and security teams is typically required. The team might also run vulnerability tests on components and set up security procedures to be in compliance with corporate policies and procedures.

5.2.2 The Architecture Document

The resulting architecture document, sometimes called the technical design for the transition, should include all hardware and software relationship diagrams, and backplane photos of devices that indicate the cabling, switch ports, and IP address tables to be allocated, reserved, and used by the solution. Operating system batch commands, scripting code, database instructions, storage volumes to use, and detailed working instructions to be followed by technicians during setup need to be written so that there is no question about what needs to be done. Checklists help technicians follow steps, and forms help technicians gather relevant information such as serial numbers, OS versions, IP addresses, and application versions for each of the components to be configured and released into the production environment.

5.3 Creating the Schedule

For a complex transition project, scheduling is often difficult. It needs to take into account not only the technical work being done, but also the enterprise's calendar. It is often at this point where the team discusses the type of rollout to use for the solution.

Scheduling must take into account constraints such as business freeze periods, especially those related to finances, taxes, and in some companies, seasonal periods, because those periods can impact the transition plan calendar.

Some companies also have a formal datacenter organization that has its own schedule (or outsourced services with restrictions), including maintenance periods and times to perform specific processes. In this situation, coordination is necessary to elaborate a risk-analysis list and to determine the best transition timeframe. The tasks shown in Figure 2 describe the transition flow.

5.3.1 Staging the Rollout

Some transitions are quite simple, such as adding a few servers to an existing server farm. Other transitions, such as deploying a new ERP system, are extremely complex, and it is difficult to anticipate all the potential issues of integrating the new solution components into the existing environment. When the rollout is complex, the team often schedules a staged rollout—that is, the rollout happens in increments. When the initial part of the rollout is stabilized, another stage of the rollout is started. The staged rollout progresses until the entire solution is completely in production. Staged rollouts can happen along two different dimensions: by functionality and by location.

When the staged rollout occurs by functionality or component, the team might roll out particular hardware components before others and before the software. For software transitions, the team may decide to deploy certain functions and establish their stability before adding other functions. Possibly only a partial integration with existing applications or databases may occur until the basic functionality is stable. This tactic can reduce the risk of negatively affecting live operations until you are sure that base-level components are operating appropriately.

When the staged rollout occurs by location, the team often picks a particular location to deploy the solution to before rolling out to other locations. When the solution is stable in the first location, the team deploys the solution in other locations. This type of staged rollout not only reduces risk, but also reduces the number of personnel required for the rollout, because a single rollout team can travel from location to location, gaining experience (and often speed) as they go. This tactic also reduces the training time associated with the rollout team for global rollouts.

Staged rollouts can be called beta tests or pilot tests in some organizations. In all cases, the goal is to reduce risk, catch errors, and refine the solution before it causes problems throughout the enterprise.

5.3.2 Freeze Periods, Outages, and Go-Live Dates

When selecting the time and day to perform a transition, it is very important to consider all the scheduled events defined by the company for their daily operations; however, special attention must be paid to company freeze periods.

Financial freezes are those specific weeks and months when the entire company is focused on accounting, finance, tax, sales, and inventory systems, and managers need to attend to external auditors and shareholders. Many companies prohibit EIT from making changes, installing new components, or decommissioning any piece of software or hardware related to affected systems during these periods of time. The reasoning is to avoid losing or damaging financial information that might have negative legal, tax, or company image implications.

Freeze periods vary depending on the organization. Freeze dates can occur during harvest times or during other quarterly processes. Typically, the transition team analyzes all the different outsourcing and operations freeze dates to consolidate a complete timeline that can facilitate the creation of the transition schedule. If done well, the resulting timeline can effectively communicate the effect of the transition upon business owners, procurement, contractors, marketing, sales people, and others.

It is important to accurately plan the time (minutes, hours, days) that systems are going to be made unavailable for service. Making changes in infrastructure or software applications sometimes requires the shutdown of other services or equipment, and management needs to know if their end users and customers could be impacted by these outage periods. Even a reboot of a server is considered an outage and it is a good practice to include it on the planning.

Go-live, cutover, and retirement dates need to be planned and agreed to weeks ahead. The goal is to avoid business conflicts and to have required technical resources and management ready to act if any issue appears.

5.3.3 Scheduling the Training and Certification Program

Every transition plan should include a plan for the training sessions and certifications required to ensure that end users, technicians, and stakeholders are well informed about and able to use the new or updated EIT solution.

The training programs for users and most technicians should already have been developed during the acquisition or construction activities. The transition team needs to verify that the training is ready and needs to know whether it has already been delivered or how long that training takes so that they can schedule it accordingly.

Timely training is extremely important. Users and technicians need to be trained before the solution arrives at their desk. When certifications are required for the use of the new solution, the training schedule becomes even more critical. It needs to account for not only the training, but also for exam practice Q&A sessions so that the participants can pass the examination on the first try and before the new solution is available.

Note that the training program for the operations staff that will take responsibility for the deployed solution might need to be expanded or modified during the project. It is often the case that adjustments are made to procedures, settings, and configurations during the rollout. In addition, a good deal of the information about troubleshooting occurs during the rollout phase. As a result, operator training is often modified during the project, and anticipating this eventuality needs to be part of the plan, and the modifications must be documented in the training materials.

The training plan and schedule need to be included as part of the transition plan so that the transition team can have a better understanding of the interdependencies with personnel training.

5.4 Risk Impact Analysis

As mentioned above, understanding the risks associated with adding, changing, or removing components from live operations is a critical part of the transition plan. Those impacts and risks might be trivial; however, they can also affect the entire enterprise, customers, and vendors. So, careful consideration is in order.

Risk impact analysis evaluates the transition impact from three perspectives:

  • Business impact analysis (BIA) looks at the effects of the target changes to or interruptions of the business, whether they are contractual, legal, operational, or financial.
  • Technical impact analysis (TIA) looks at the effects of the target changes on the current production environment from an architectural and engineering point of view. This analysis examines the complexities of adding, modifying, and removing hardware, software, and data on the entire technical environment.
  • Cost impact analysis (CIA) estimates the cost of the project from all perspectives, including the engineering cost of the transition along with training, certifications, licenses, network appliances, hardware upgrades, and datacenter fees.

These three risk evaluations are used to determine an overall risk impact evaluation for the project.

5.4.1 Business Impact Analysis (BIA)

One of the main concerns when moving an EIT product or service into production is to estimate how the change might impact customers, end users, and stakeholders. Business impact sessions focus on managing the risks of the transition that might impact the organization at strategic, tactical, and operational levels. In essence, the analysis evaluates the change as if it were a business transition.

Not only does the team analyze the potential business risks and impacts, it determines mitigation strategies, and sets up communication processes with stakeholders that reduce or eliminate any negative impact.

5.4.2 Technical Impact Analysis (TIA)

The technical impact of a transition depends on the size and interconnectedness of the different devices and applications. The analysis team discusses technical risks and creates a risk list associated with the hardware, software, and network components that could be negatively affected by the changes.

Relationships and dependencies between EIT assets are defined and evaluated as possible points of failure. Potential mitigation techniques are identified and analyzed during these sessions. For example, the group might examine the technical impact of installing utility software on a particular dedicated server. Or they might analyze a hardware upgrade for a server farm with redundant clusters, an uninstall of a database engine, an uninstall of some virtual machine applications, or the risks of exceeding power consumption limits. The technical impact analysis requires experienced practitioners in several areas including support personnel to evaluate the risk of the transition's impact.

5.4.3 Cost Impact Estimation

Most EIT organizations pay support contract fees to suppliers for services, such as datacenter hosting, Internet access, hardware devices, operating systems, database engines, ERPs, CRMs, antivirus support, and other components. When a new EIT solution is going to be moved into production or an existing EIT solution is removed, the transition team needs to present the transition costs and steady-state production costs to accounting, procurement, and other concerned parties to avoid fiscal surprises. Note that in the case of a retirement, these departments need to be notified of reimbursements or cost savings. Accounting and procurement teams can contact the suppliers and let them know about the upcoming payment changes.

A detailed list of software and hardware components to be installed or decommissioned with their associated costs must be created. Asset management systems make it easier to collect information about hardware models, quantity of processors and cores, server OS versions, database engines, ERP, CRM, and applications software licenses. Then it is relatively easy to make calculations about the total cost of the project.

5.4.4 Total Risk Impact Calculation

Each company has its own method for evaluating the three subareas to enable the calculation of an overall risk evaluation. Some organizations rate each one of the risk areas from very low to very high risk, maybe on a 1–5 or 1–10 scale. An even number of risk levels is often used to avoid a value in the middle that doesn't really give decision makers a positive or negative view of the risk. A "mid" value makes go/no-go decisions more difficult.

The overall calculation is based on guidelines that come from strategy and governance decisions. In the best of all situations, a simple equation can calculate the overall risk:

Total Project Risk Impact = BIA + TIA + CIE

Using this simple calculation facilitates the understanding, management, and prioritization of the transition queue in a straightforward way, and at same time, facilitates the decision making.

In reality, the decision process is more difficult. The CAB team supporting the transition often holds a meeting to get clarification and justification of the risk analysis reports from each stakeholder group. The decision authority often considers experiences from past transitions, team skills, and the corporate knowledge of what needs to be done for success. At the end, the CAB team comes up with an overall rating for the project.

Another factor to consider when determining the overall risk of a project is the level of maturity of the organization. Mature organizations have well-understood institutionalized processes, policies, and activities in place for transitions, including change requests, external support, testing teams, audits, and compliance validation with general policies and security guidelines. Mature organizations are usually better at dealing with risk and employing mitigation techniques; therefore, they can (and will) take on riskier projects.

Some organizations decide to approve only very low-risk projects, but any organization's risk appetite should be established during strategic planning, and the transition team should follow those guidelines when making their decision.

5.5 Creating the Transition Plan Document

The completed plan integrates all the documents and results for analysis sessions created during the planning session. The final plan often includes the following sections:

  • Information about the alignment with the enterprise's strategic plan
  • Scope of the solution to be released (architecture)
  • Detailed technical design of the solution's deployment including a list of components to be modified and in-place components that are attached or otherwise potentially affected
  • The release, test, training, and deployment activities for moving the EIT solution (product or service) into the live environment
  • The backup, uninstall, decommissioning, archiving, and disposal activities to remove a product or service from the live environment for retirement projects
  • The project schedule that includes planned freezes and outages, point-of-no-return milestones, and crosscheck points with stakeholders
  • Personnel resources (staff, technical, contractors, and management)
  • Roles and responsibility assignment for operations staff, technical staff, and stakeholders
  • Non-personnel resources required to execute the plan
  • Training program content, certifications, and staffing
  • A risk-impact analysis section that covers business, technical, cost, and identified risks and mitigation strategies associated with the project
  • Approval and change request processes
  • The technical design of the solution updated for the transition as well as the training program details
    In infrastructure projects, some companies include diagrams and photos of the backplane providing a detailed explanation of the cabling to be used on each hardware device, especially with clusters or redundant hardware devices where the right connection is critical to comply with architecture specifications and recommended practices.

6 Executing the Transition Plan

When the transition plan is approved, the transition team can execute the plan. There are several activities that occur in this phase, as described in this section.

6.1 Managing the Transition

As mentioned in the planning phase, the rollout of the solution might occur in stages or as one piece. Part of the execution phase is to manage the planned rollout.

Large transition projects often require a team (often known as a command center) to coordinate the project. The mission of a command center is to coordinate the technical, operations, and procurement teams, to keep executives and stakeholders aware of the project status, to make cross-functional decisions, and to manage the budget and resources required to meet the goals of the project. Whether or not a command center is needed, it is necessary to designate a project manager to manage the project.

It is the responsibility of the project manager (or command center staff) to ensure that the transition into the live environment is successful, secure, on time, on or under budget, and that it meets all quality standards. All the team members should be aware of the transition project scope, the resources assigned, and the task schedule to avoid project delays and access issues that require assistance from other groups.

6.1.1 Backup and Storage Management

Before the any major change is executed, run a full backup of all stored data, information, applications, databases, and network configurations that could change or be affected. A snapshot of a retired EIT solution is especially important because it enables a rollback to a previous state, in case of a disaster-recovery situation. If there is a backup, the organization's disaster plan can be activated to recover the data, or the configuration management team can rebuild the latest working version of an application from the definitive media location.

Another complementary task to perform is the recovery testing procedure. An example can be to restore the recently removed version on temporary servers in order to practice the restoration task. This helps to test and ensure that restoration techniques and procedures are working as expected and under the disaster preparedness strategic guidelines. These tasks are crucial to develop and test to comply with auditing guidelines (see Disaster Preparedness).

6.1.2 Access Management

The transition team needs to ensure that all transition personnel have access to the areas where they need to work. For example, if a badge is required to physically enter a datacenter or computer room, getting approval from the security office might take several days. As a result, the team needs to make requests for access in advance to avoid delay. It is also important to request system administration access to the hardware and logical devices involved in the project well in advance of the actual need.

The team needs to think through access needs that occur both during regular business hours as well as after hours. Sometimes a quick discussion with security early in the process can ensure that all the paperwork is in place before access is required.

6.1.3 Managing Complexity and Minimizing Unexpected Changes

Bringing all the teams together with local contacts inside the facilities during the transition of a highly complex environment is a good practice. This meeting can help the teams find the rooms, servers, and network devices quickly. Local resources can also help disconnect units from racks and transport the components to new locations. Similarly, it's better to have personnel with the proper experience managing large databases or complex virtual machine configurations connected through SAN external storage devices. Having the right people involved minimizes the risk of slow responses to detected errors and slow decisions or responses to other non-planned steps. Always bring in the right people with the right tools.

6.1.4 Change Request Management

It is critical to have a control list of all the change requests submitted to all teams during the transition phase. Special attention should be given to those that require formal approval from authorities such as the CAB or PMO decision boards. Let's say that during the testing phase there is a request to change some rules on the router so that a particular group can have access to a certain group of systems. The security infrastructure team needs to analyze the impact of the change on the access throughout the organization. To proceed with the change, a security risk impact analysis should be performed and the organization might require that the analysis be submitted for approval of the request. In some organizations, the analysis and approval process takes time. So, it is a good practice to talk with these teams early in the project to avoid misunderstandings and delays in the overall transition project.

6.1.5 Outage Management

It is crucial to communicate all anticipated outages with technicians and stakeholders. They need to be informed several times to remind affected users that the facilities are not available. See the appropriate section in Operations and Support for recommendations about notifications.

6.1.6 Resource Management

Contractors or third-party vendors hired only for the transition project, including SMEs, technicians, and electricians, should be contracted in advance to ensure that all required access and permissions (for physical and logical personal security items) are in place in time. Temporary remote access is a common practice used for this type of temporary resources. They need to have copies of all the relevant documentation and reference material before execution of the transition plan starts. All these on-boarded resources need to be well organized and well trained, with access validated, assigned, and approved prior to arriving at the facility to perform their assigned tasks.

After the transition project is finished or the resource has completed the assigned task, it is important to submit the requests that release the resources, collect badges, access keys, physical and logical security tokens, and remove server and database access. If this is not done promptly, it can generate security and access vulnerabilities. System auditors usually check active and non-active accounts of non-employees and off-boarding contractors.

7 Handing Off to Operations

When the pilot is over and the team determines that all the components are ready and the staff is trained, the solution is released into production and is handed off to the operations team. Then the final results are evaluated, and the operations group formally accepts the solution.

7.1 Handing Over to Operations

The transition levels diagram implies that each level needs specific documentation related to the type of EIT solution as it is moved into production. Documents, troubleshooting techniques, test results, QA references, and a list of acceptance criteria established in the release criteria should be adopted as a reference for the operations group.

Training of the operations support team should already be complete with special attention given to new infrastructure, hardware, and software platforms. The team should be ready to take over the operations of the solution.

The operations team should review the list of operational risks and the set of workaround techniques available for incident management purposes. If an incident needs to be escalated to a more skilled technical team, the command center can provide an assessment and address the request for specialized resources. The command center might need to approve funds for outsourced resources, new software licenses, or hardware to solve issues or mitigate risks for the transition.

It is not uncommon for the handover to occur after a period of joint operations, where the transition team and the operations team work side by side. This overlap ensures that the operations team's training is complete and that unwritten information makes it into the hands of operations.

7.2 Announcing the EIT Solution Release or Retirement

A set of formal and informal messages to users, technicians, and stakeholders to announce the release of the new EIT solution should be distributed as the solution is coming online and at its cutover to operational status.

The release announcement is often done with several kinds of media. For example, the organization might send shareholders and executives a formal brief communication. For management and other business units inside the organization, the organization might create a user brochure and publish it on the intranet. For internal EIT teams, a diagram with related components and a description some of the features is a good communication option.

Often organizations do a survey to gather feedback and measure the perceived value of the new solution from clients and end users. This feedback can be used to show that the solution has met its business objectives.

7.3 Monitoring and Stabilizing the EIT Solution

Monitoring and stabilizing a new EIT solution is more reactive than proactive. The operations team should monitor the new systems, attend to any incident that arises, and resolve it as soon as possible.

The main objective of this activity is to create mechanisms that provide real-time event monitoring of key components, while sending status alerts during the release and beyond.

Giving daily reports to the transition project owner regarding the health of the EIT solution is a sound practice. At the end of the stabilization period (one or two weeks is common), schedule a meeting to share experiences and review incident and issue reports, as well as any other reports required by nature of the transition.

7.4 Closing the Project

Like any project, a transition project needs to be closed according to the policies and procedures of the organization. In some organizations, a document with the operations acceptance checklist, lessons learned collected during this session, and results of any surveys are included.

In organizations using a CAB team, a change request to close the transition project is submitted to the CAB team for evaluation. Then, during the next CAB session, the board members evaluate the completed transition, and confirm that all requests sent to different teams are now closed. A discussion can arise regarding the lessons shared and collected by the team and stakeholders, and the transition project owner can then officially close the transition project.

Gathering a final, detailed list of components (configuration items) added or removed during the process is key to maintain an updated configuration management database (CMDB). [1] The operations team can then take full control and manage all the different components when the new/updated EIT solution is in the production environment.

Any detailed troubleshooting and workaround techniques created for a transition (including a retirement) should be formulated and recorded into the incident database to be used by the operations team during steady state.

8 Summary

The transition knowledge area consists of a set of practices, processes, and activities that assist the organization with the successful insertion (or removal) of EIT solutions into the production environment. The overall process can be divided into three main phases: plan, execute, and release. Each phase involves different personnel and has its own set of artifacts. As with any project, designated decision bodies are responsible for the management of the project. They provide the funds, set priorities, and approve the required resources.

The planning phase produces a transition plan for the new solution. The execution phase executes the plan and moves the solution into the production environment. The release phase hands over the EIT solution to the operations team and helps them stabilize the solution in the production environment. Final steps include the announcement of the new release in the production environment and a final meeting to ensure that all the objectives are met and that all the lessons learned are collected for reference by future projects.

9 Key Maturity Frameworks

Capability maturity for EIT refers to its ability to reliably perform. Maturity is measured by an organization's readiness and capability expressed through its people, processes, data, technologies, and the consistent measurement practices that are in place. See Appendix F for additional information about maturity frameworks.

Many specialized frameworks have been developed since the original Capability Maturity Model (CMM) that was developed by the Software Engineering Institute in the late 1980s. This section describes how some of those apply to the activities described in this chapter.

9.1 IT-Capability Maturity Framework (IT-CMF)

The IT-CMF was developed by the Innovation Value Institute in Ireland. This framework helps organizations to measure, develop, and monitor their EIT capability maturity progression. It consists of 35 EIT management capabilities that are organized into four macro capabilities:

  • Managing EIT like a business
  • Managing the EIT budget
  • Managing the EIT capability
  • Managing EIT for business value

The three most relevant critical capabilities are service provisioning (SRP), the technical infrastructure management (TIM), and solutions delivery (SD).

9.1.1 Service Provisioning Maturity

The following statements provide a high-level overview of the service provisioning (SRP) capability at successive levels of maturity.

Level 1The service provisioning processes are ad hoc, resulting in unpredictable EIT service quality.
Level 2Service provisioning processes are increasingly defined and documented, but execution is dependent on individual interpretation of the documentation. Service level agreements (SLAs) are typically defined at the technical operational level only.
Level 3Service provisioning is supported by standardized tools for most EIT services, but may not yet be adequately integrated. SLAs are typically defined at the business operational level.
Level 4Customers have access to services on demand. Management and troubleshooting of services are highly automated.
Level 5Customers experience zero downtime or delays, and service provisioning is fully automated.

9.1.2 Technical Infrastructure Management Maturity

The following statements provide a high-level overview of the technical infrastructure management (TIM) capability at successive levels of maturity.

Level 1Management of the EIT infrastructure is reactive or ad hoc.
Level 2Documented policies are emerging relating to the management of a limited number of infrastructure components. Predominantly manual procedures are used for EIT infrastructure management. Visibility of capacity and utilization across infrastructure components is emerging.
Level 3Management of infrastructure components is increasingly supported by standardized tool sets that are partly integrated, resulting in decreased execution times and improving infrastructure utilization.
Level 4Policies related to EIT infrastructure management are implemented automatically, promoting execution agility and achievement of infrastructure utilization targets.
Level 5The EIT infrastructure is continually reviewed so that it remains modular, agile, lean, and sustainable.

9.1.3 Solutions Delivery Maturity

The following statements provide a high-level overview of the solutions delivery (SD) capability at successive levels of maturity.

Level 1There is ad hoc use of solutions delivery methodologies. EIT solutions are typically delivered with wide variations in quality, schedule, and cost expectations.
Level 2Basic solutions delivery methodologies are defined and applied to a limited number of EIT solution projects, which are beginning to meet expectations, but variations in quality, schedule, and cost still occur.
Level 3Standardized solutions delivery methodologies are applied to most EIT solution projects, enabling many of them to regularly meet expectations for quality, schedule, and cost.
Level 4 Comprehensive and flexible project delivery methodologies are applied to all projects, enabling most projects to meet expectations for quality, schedule, and cost.
Level 5Solutions delivery methodologies are continually analyzed and refreshed. Solutions delivery expectations for quality, schedule, and cost are nearly always met.

10 Key Competence Frameworks

While many large companies have defined their own sets of skills for purposes of talent management (to recruit, retain, and further develop the highest quality staff members that they can find, afford and hire), the advancement of EIT professionalism will require common definitions of EIT skills that can be used not just across enterprises, but also across countries. We have selected three major sources of skill definitions. While none of them is used universally, they provide a good cross-section of options.

Creating mappings between these frameworks and our chapters is challenging, because they come from different perspectives and have different goals. There is rarely a 100 percent correspondence between the frameworks and our chapters, and, despite careful consideration some subjectivity was used to create the mappings. Please take that in consideration as you review them.

10.1 Skills Framework for the Information Age

The Skills Framework for the Information Age (SFIA) has defined nearly 100 skills. SFIA describes seven levels of competency that can be applied to each skill. However, not all skills cover all seven levels. Some reach only partially up the seven-step ladder. Others are based on mastering foundational skills, and start at the fourth or fifth level of competency. SFIA is used in nearly 200 countries, from Britain to South Africa, South America, to the Pacific Rim, to the United States. (http://www.sfia-online.org)

</ tr>
SkillSkill DescriptionCompetency Levels
Asset managementThe management of the lifecycle for all managed assets (hardware, software, intellectual property, licenses, warranties, etc.) including security, inventory, compliance, usage, and disposal, aiming to protect and secure the corporate assets portfolio, optimize the total cost of ownership and sustainability by minimizing operating costs, improve investment decisions, and capitalize on potential opportunities. Knowledge and use of international standards for asset management and close integration with security, change, and configuration management are examples of enhanced asset management development.4-6
Benefits managementMonitoring for the emergence and effective realization of anticipated benefits (typically specified as part of the business case for a change program or project). Action (typically by the program management team) to optimize the business impact of individual and combined benefits.5-6
Business process testingThe planning, design, management, execution, and reporting of business process tests and usability evaluations. The application of evaluation skills to the assessment of the ergonomics, usability, and fitness for purpose of defined processes. This includes the synthesis of test tasks to be performed (from statement of user needs and user interface specification), the design of an evaluation program, the selection of user samples, the analysis of performance, and inputting results to the development team.4-6
Change implementation planning and managementThe definition and management of the process for deploying and integrating new digital capabilities into the business in a way that is sensitive to and fully compatible with business operations.5-6
Change managementThe management of change to the service infrastructure including service assets, configuration items, and associated documentation. Change management uses requests for change (RFC) for standard or emergency changes, and changes due to incidents or problems to provide effective control and reduction of risk to the availability, performance, security, and compliance of the business services impacted by the change.2-6
Configuration managementThe lifecycle planning, control, and management of the assets of an organization (such as documentation, software, and service assets, including information relating to those assets and their relationships. This involves identification, classification, and specification of all configuration items (CIs) and the interfaces to other processes and data. Required information relates to storage, access, service relationships, versions, problem reporting, and change control of CIs. The application of status accounting and auditing, often in line with acknowledged external criteria such as ISO 9000, ISO/IEC 20000, ISO/IEC 27000, and security throughout all stages of the CI lifecycle, including the early stages of system development.2-6
Information content publishingThe evaluation and application of different publishing methods and options, recognizing key features, including open source and proprietary options. The management and tuning of the processes that collect, assemble, and publish information, including in unstructured and semi-structured forms, for delivery to the user at the point at which it is needed. The management of copyright, data protection, and other legal issues associated with publishing and re-use of published information and data.1-6
Learning and development managementThe provision of learning and development processes (including learning management systems) in order to develop the professional, business, and technical skills required by the organization.3-7
Learning assessment and evaluationThe assessment of knowledge, skills, and behavior by any means, whether formal or informal, against capability and qualification frameworks such as SFIA. The evaluation of learning or education programs against defined outcomes.3-6
Learning deliveryThe transfer of business and technical skills and knowledge and the promotion of professional attitudes in order to facilitate learning and development. Uses a range of techniques, resources, and media (which might include eLearning, online virtual environments, self-assessment, peer-assisted learning, simulation, and other current methods).3-5
Learning design and developmentThe specification, design, creation, packaging, and maintenance of materials and resources for use in learning and development in the workplace or in compulsory, further, or higher education. Typically involves the assimilation of information from existing sources, selection, and re-presentation in a form suitable to the intended purpose and audience. Includes instructional design, content development, configuration, and testing of learning environments, and use of appropriate current technologies such as audio, video, simulation, and assessment. May include third-party accreditation.4-6
Penetration testingThe assessment of organizational vulnerabilities through the design and execution of penetration tests that demonstrate how an adversary can either subvert the organization's security goals (e.g., the protection of specific intellectual property) or achieve specific adversarial objectives (e.g., establishment of a covert command and control infrastructure). Pen test results provide deeper insight into the business risks of various vulnerabilities.4-6
Release and deploymentThe management of the processes, systems, and functions to package, build, test, and deploy changes and updates (which are bounded as "releases") into a live environment, establishing or continuing the specified service, to enable controlled and effective handover to operations and the user community.2-6

10.2 European Competency Framework

The European Union's European e-Competence Framework (e-CF) has 40 competences and is used by a large number of companies, qualification providers, and others in public and private sectors across the EU. It uses five levels of competence proficiency (e-1 to e-5). No competence is subject to all five levels.

The e-CF is published and legally owned by CEN, the European Committee for Standardization, and its National Member Bodies (www.cen.eu). Its creation and maintenance has been co-financed and politically supported by the European Commission, in particular, DG (Directorate General) Enterprise and Industry, with contributions from the EU ICT multi-stakeholder community, to support competitiveness, innovation, and job creation in European industry. The Commission works on a number of initiatives to boost ICT skills in the workforce. Version 1.0 to 3.0 were published as CEN Workshop Agreements (CWA). The e-CF 3.0 CWA 16234-1 was published as an official European Norm (EN), EN 16234-1. For complete information, see http://www.ecompetences.eu.

e-CF Dimension 2e-CF Dimension 3
B.3. Testing (BUILD)
Constructs and executes systematic test procedures for ICT systems or customer usability requirements to establish compliance with design specifications. Ensures that new or revised components or systems perform to expectation. Ensures meeting of internal, external, national, and international standards; including health and safety, usability, performance, reliability, or compatibility. Produces documents and reports to evidence certification requirements.
Level 1-4
B.4. Solution Deployment (BUILD)
Following predefined general standards of practice carries out planned necessary interventions to implement solution, including installing, upgrading, or decommissioning. Configures hardware, software, or network to ensure interoperability of system components and debugs any resultant faults or incompatibilities. Engages additional specialist resources if required, such as third-party network providers. Formally hands over fully operational solution to user and completes documentation recording all relevant information, including equipment addressees, configuration, and performance data.
Level 1-3
D.9. Personnel Development (ENABLE)
Diagnoses individual and group competence, identifying skill needs and skill gaps. Reviews training and development options and selects appropriate methodology taking into account the individual, project, and business requirements. Coaches/mentors individuals and teams to address learning needs.
Level 2-4
E.7. Business Change Management (MANAGE)
Assesses implications of new digital solutions. Defines requirements and quantifies business benefits. Manages deployment of change taking into account structural and cultural issues. Maintains business and process continuity throughout change, monitoring the impact, taking any required remedial action and refining approach.
Level 3-5

10.3 i Competency Dictionary

The Information Technology Promotion Agency (IPA) of Japan has developed the i Competency Dictionary (iCD) and translated it into English, and describes it at https://www.ipa.go.jp/english/humandev/icd.html. The iCD is an extensive skills and tasks database, used in Japan and southeast Asian countries. It establishes a taxonomy of tasks and the skills required to perform the tasks. The IPA is also responsible for the Information Technology Engineers Examination (ITEE), which has grown into one of the largest scale national examinations in Japan, with approximately 600,000 applicants each year.

The iCD consists of a Task Dictionary and a Skill Dictionary. Skills for a specific task are identified via a "Task x Skill" table. (See Appendix A for the task layer and skill layer structures.) EITBOK activities in each chapter require several tasks in the Task Dictionary.

The table below shows a sample task from iCD Task Dictionary Layer 2 (with Layer 1 in parentheses) that corresponds to activities in this chapter. It also shows the Layer 2 (Skill Classification), Layer 3 (Skill Item), and Layer 4 (knowledge item from the IPA Body of Knowledge) prerequisite skills associated with the sample task, as identified by the Task x Skill Table of the iCD Skill Dictionary. The complete iCD Task Dictionary (Layer 1-4) and Skill Dictionary (Layer 1-4) can be obtained by returning the request form provided at http://www.ipa.go.jp/english/humandev/icd.html.

Task DictionarySkill Dictionary
Task Layer 1 (Task Layer 2)Skill ClassificationSkill ItemAssociated Knowledge Items
Transition design
(transition design)
Design and transition of service Service transition methods
  • Communication
  • Service transition lifecycle
  • Acceptance criteria of services
  • Test
  • Cleanup and closure after testing
  • Report evaluation
  • Transition
  • Transition strategy
  • Handover of operations
  • Closure standard
  • Initial test
  • Advice
  • Progress monitoring

11 Key Roles

Common ITSM roles:

  • Application Developer
  • Change Advisory Board (CAB)
  • Change Manager
  • Configuration Manager
  • Emergency Change Advisory Board (ECAB)
  • Knowledge Manager
  • Project Manager
  • Release Manager
  • Test Manager

Other key roles are:

  • Communications Manager
  • Deployment Manager
  • Operations Manager
  • Problem Manager
  • Solution Management Team
  • Transition Manager

The table below shows the four levels of the transition category model: business, data and information, software application, and hardware infrastructure transition.

Transition LevelStakeholdersResources
Business levelStrategic decision people, top management, C-level officers, regulatory authorityEnterprise architects and risk management, project management office (PMO), experienced team lead engineers
Data and information levelStrategic decision people, top management, C-level officersEnterprise data architect and modelers, data manager, data stewards, database administrators
Software application levelTactical/operational business decision participants, business owner, application owners, application contractorsSolution architects, data management, business analysts, user experience team, quality and multiplatform application and utility programmers, subject matter experts (SMEs)
Hardware EIT infrastructure levelServer owners, datacenter administrators, security and risk operations teams, infrastructure contractors, Internet and cloud service providersInfrastructure solution architects, cloud services, datacenter and operation management, procurement, release management, network, security, server, storage devices specialists

12 Standards

ISO/IEC 20000-1:2011, (IEEE Std 20000-1:2013) Information technology—Service management—Part 1: Service management system requirements

IEEE Std 828™-2012, IEEE Standard for Configuration Management in Systems and Software Engineering

13 References

[1] Configuration management system (CMS) and configuration management database (CMDB). ITIL Service Transition. OGC 2007. Service Transition Processes. Service Assets and Configuration Management 4.3.4.3 Configuration Management System p. 68-69.