- Categorieën: Dit item verwijderen IT & IT Management
- IT Management (98)
- ITIL (67)
- ISO 27002 (12)
- VeriSM (11)
- SIAM BoK (9)
- ISO 27000 (8)
- ASL (8)
- Agile (8)
- IT4IT (6)
- Other IT and IT Management (6)
- EXIN Tracks (6)
- ISO 27001 (5)
- ISO 20000 (4)
- ABC of ICT (4)
- TRIM (4)
- BiSL (4)
- DevOps (3)
- SAF (3)
- Scrum (3)
- CoBIT (3)
- ISM (2)
- Resilia (2)
- Six Sigma (2)
- TOGAF (1)
- Lean IT (1)
- PRINCE2 (1)
- e-CF (1)
- ISPL (1)
- Other PM (1)
- MOF (1)
- IT-CMF (1)
- FSM (1)
- ICB/NCB (1)
- TIPA (1)
- Publish Year
VeriSM is a framework that describes a service management approach from the organizational level, looking at the end to end view rather than focusing on a single department. Based around the VeriSM model, it shows organizations how they can adopt a range of management practices in a flexible way to deliver the right product or service at the right time to their consumers. VeriSM allows for a tailored approach depending upon the type of business you are in, the size of your organization, your business priorities, your organizational culture – and even the nature of the individual project or service you are working on. Rather than focusing on one prescriptive way of working, VeriSM helps organizations to respond to their consumers and deliver value with integrated service management practices. Service management plays a leading role in digital transformation. Digital transformation looks outward; with a hyper-focus on the consumer experience. Service management can help shift the mindset from ’inside-out’ to ’outside-in’ by developing effective, transparent principles that help deliver services that are valuable to the customer. All organizational capabilities must understand: - How does the organization enable and deliver value? - What are the supply chains within an organization that support value delivery? - How do the individual capabilities contribute to or support these supply chains to deliver value?
Voor trainers is er gratis extra materiaal bij dit boek beschikbaar. Dit...
Dit boek is in eerste instantie ontwikkeld als studieboek voor het...
Deze Scrum Wegwijzer bevat alle essentiële informatie over het meest...
This book introduces service integration and management (SIAM). Its contents are the source material for the EXIN BCS Service Integration and Management Foundation (SIAM®F) certification. It will be useful for anyone working in a SIAM environment, whether they are a customer, a service integrator or a service provider. Drawing on experiences from companies including Atos, Sopra Steria, Syniad IT, TCS, Kinetic IT and ISG, the book describes topics including the origins of SIAM, the different SIAM structures, roles, challenges, risks and more.
Dit boek gaat over de rol van de CIO in het ICT 3.0 tijdperk. Deze is gericht op innovatie en business-transformatie om de digitale toekomst van de organisatie vorm te geven.
This Pocket Guide provides a concise introduction to the IT4IT™ Reference Architecture, Version 2.1, an Open Group Standard. The IT4IT standard provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT, enabling insight for continuous improvement. This Pocket Guide is based on the IT4IT Reference Architecture Version 2.1. What’s more, it’s authoritative with material derived from the official IT4IT documentation and contributions from members of the IT4IT Forum. The audience for this Pocket Guide is: • Individuals who require a basic understanding of the IT Value Chain and IT4IT Reference Architecture • IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals / Practitioners who are focused on instrumenting the IT management landscape • IT leaders who are concerned about their operating model • Enterprise Architects who are responsible for IT business transformation Topics covered include: • An introduction to the IT4IT Reference Architecture, the structure of the IT4IT standard, and the positioning of the IT4IT standard in the standards landscape • The IT Value Chain and IT4IT Reference Architecture concepts, including Value Streams • The Strategy to Portfolio (S2P) Value Stream • The Requirement to Deploy (R2D) Value Stream • The Request to Fulfill (R2F) Value Stream • The Detect to Correct (D2C) Value Stream • A summary of the differences between the IT4IT Reference Architecture and ITIL
The Open Group IT4IT™ Reference Architecture, Version 2.1, an Open Group Standard, provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT. The Open Group IT4IT Reference Architecture standard comprises a reference architecture and a value chain-based operating model. The IT Value Chain has four value streams supported by a reference architecture to drive efficiency and agility. The four value streams are: • Strategy to Portfolio • Request to Fulfill • Requirement to Deploy • Detect to Correct Each IT Value Stream is centered on a key aspect of the service model, the essential data objects (information model), and functional components (functional model) that support it. Together, the four value streams play a vital role in helping IT control the service model as it advances through its lifecycle. The IT4IT Reference Architecture: • Provides prescriptive guidance on the specification of and interaction with a consistent service model backbone (common data model/context) • Supports real-world use-cases driven by the Digital Economy (e.g., Cloud-sourcing, Agile, DevOps, and service brokering) • Embraces and complements existing process frameworks and methodologies (e.g., ITIL®, CoBIT®, SAFe, and TOGAF®) by taking a data-focused implementation model perspective, essentially specifying an information model across the entire value chain The audience for this standard is: • IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals / Practitioners who are focused on instrumenting the IT management landscape • IT Leaders who are concerned about their operating model • Enterprise Architects who are responsible for IT business transformation Topics covered include: • An introduction to the standard and the purpose of the IT4IT work • Key terminology of the standard • An introduction for executives and others introducing the IT Value Chain and IT4IT Reference Architecture concepts • IT4IT Core, which defines the structure of the IT4IT standard as well as the process and document structure used by the IT4IT standard • The Strategy to Portfolio (S2P) Value Stream • The Requirement to Deploy (R2D) Value Stream • The Request to Fulfill (R2F) Value Stream • The Detect to Correct (D2C) Value Stream • Background information on the standard.
The IT4IT Management Guide provides guidance on how the IT4IT Reference...
Dit Courseware pakket bestaat uit twee publicaties, Information Security Foundation op basis van ISO 27002 Courseware (ISBN: 978 94 018 0179 9) en Basiskennis informatiebeveiliging op basis van ISO27001 en ISO27002 - 2de herziene druk (ISBN: 978 94 018 0013 6). In de Information Security modulen van EXIN wordt de definitie van het PvIB (Platform voor Informatiebeveiliging) gebruikt: Informatiebeveiliging betreft het definiëren, implementeren, onderhouden, handhaven en evalueren van een samenhangend stelsel van maatregelen die de beschikbaarheid, de integriteit en de vertrouwelijkheid van de (handmatige en geautomatiseerde) informatievoorziening waarborgen. In deze training, Information Security Foundation based on ISO/IEC 27002 (ISFS), worden basisbegrippen van informatiebeveiliging en hun samenhang getoetst. De basiskennis die in deze module wordt getoetst, draagt vooral bij aan het bewustzijn dat informatie kwetsbaar is en dat maatregelen om informatie te beschermen, nodig zijn. Deze courseware omvat de onderwerpen: • Informatie en beveiliging: de begrippen, de waarde van informatie en het belang van betrouwbaarheid; • Bedreigingen en risico`s: de relatie tussen bedreigingen en betrouwbaarheid; • Aanpak en organisatie: het beveiligingsbeleid en de inrichting van informatiebeveiliging; • Maatregelen: fysieke, technische en organisatorische beveiligingsmaatregelen; • Wet- en regelgeving: het belang en de werking. Deze training is geschikt voor iedere medewerker, van de administratie tot directie, die omgaat met waardevolle informatie.
This book is intended for everyone in an organization who wishes to have...
This management guide offers an introduction to the IT Capability Maturity Framework™ (IT-CMF™), 2nd edition. The IT-CMF offers a comprehensive suite of tried and tested practices, organizational assessment approaches, and improvement roadmaps covering key IT capabilities needed to optimize value and innovation in the IT function and the wider organization. It enables organizations to devise more robust strategies, make better-informed decisions, and perform more effectively, efficiently, and consistently. IT-CMF is: • An integrated management toolkit covering 36 key capability management disciplines, with organizational maturity profiles, assessment methods, and improvement roadmaps for each. • A coherent set of concepts and principles, expressed in business language, that can be used to guide discussions on setting goals and evaluating performance. • A unifying (or umbrella) framework that complements other, domain-specific frameworks already in use in the organization, helping to resolve conflicts between them, and filling gaps in their coverage. • Industry/sector and vendor independent. IT-CMF can be used in any organizational context to guide performance improvement. • A rigorously developed approach, underpinned by the principles of Open Innovation and guided by the Design Science Research methodology, synthesizing leading academic research with industry practitioner expertise ‘IT-CMF provides us with a structured and systematic approach to identify the capabilities we need, a way to assess our strengths and weaknesses, and clear pathways to improve our performance.’ Suresh Kumar, Senior Executive Vice President and Chief Information Officer, BNY Mellon ‘To successfully respond to competitive forces, organizations need to continually review and evolve their existing IT practices, processes, and cultural norms across the entire organization. IT-CMF provides a structured framework for them to do that.’ Christian Morales, Corporate Vice President and General Manager EMEA, Intel Corporation ‘We have successfully applied IT-CMF in over 200 assignments for clients. It just works. Or, as our clients confirm, it helps them create more value from IT.’ Ralf Dreischmeier, Senior Partner and Managing Director, The Boston Consulting Group ‘By using IT-CMF, business leaders can make sure that the tremendous potential of information technology is realized in their organizations.’ Professor Philip Nolan, President, Maynooth University ‘I believe IT-CMF to be comprehensive and credible. Using the framework helps organizations to objectively identify and confirm priorities as the basis for driving improvements.’ Dr Colin Ashurst, Senior Lecturer and Director of Innovation, Newcastle University Business School
The issues, opportunities and challenges of aligning information technol...
The increasing complexity of the IT value chain and the rise of multi-ve...
Voor trainers is er gratis extra materiaal bij dit boek beschikbaar. Dit...