Wednesday, April 2, 2008

Best Practices IT

The ITIL-process Security Management describes the structured fitting of information security in the management organization. Outside of ITIL, other IT Service Management approaches and frameworks exist, including the Enterprise Computing Institute's library covering general issues of large scale IT management, including various Service Management subjects. ITIL has been criticized on several fronts.

Directeur ITIL Offre IT Service Management Newsletter ITIL Service Catalog Training

PRINCE2 is derived from the earlier PRINCE technique, which was initially developed in 1989 by the Central Computer and Telecommunications Agency (CCTA) as a UK Government standard for information systems (IT) project management; however, it soon became regularly applied outside the purely IT environment. The negative aspect is that many of the essential elements of PRINCE2 can be omitted sometimes resulting in a PINO project - Prince in Name Only. Best Practices IT Best Practice portfolio: new contracts awarded for publishing and accreditation services (HTML).

A change is "an event that results in a new status of one or more configuration items (CI's)" approved by management, cost effective, enhances business process changes (fixes) - with a minimum risk to IT infrastructure. These disciplines are less well understood than those of Service Management and therefore often some of their content is believed to be covered 'by implication' in Service Management disciplines.

Part of ITIL is maintaining a CMDB (Configuration Management Database).

No comments: