- Management Reference Guide
- Table of Contents
- Introduction
- Strategic Management
- Establishing Goals, Objectives, and Strategies
- Aligning IT Goals with Corporate Business Goals
- Utilizing Effective Planning Techniques
- Developing Worthwhile Mission Statements
- Developing Worthwhile Vision Statements
- Instituting Practical Corporate Values
- Budgeting Considerations in an IT Environment
- Introduction to Conducting an Effective SWOT Analysis
- IT Governance and Disaster Recovery, Part One
- IT Governance and Disaster Recovery, Part Two
- Customer Management
- Identifying Key External Customers
- Identifying Key Internal Customers
- Negotiating with Customers and Suppliers—Part 1: An Introduction
- Negotiating With Customers and Suppliers—Part 2: Reaching Agreement
- Negotiating and Managing Realistic Customer Expectations
- Service Management
- Identifying Key Services for Business Users
- Service-Level Agreements That Really Work
- How IT Evolved into a Service Organization
- FAQs About Systems Management (SM)
- FAQs About Availability (AV)
- FAQs About Performance and Tuning (PT)
- FAQs About Service Desk (SD)
- FAQs About Change Management (CM)
- FAQs About Configuration Management (CF)
- FAQs About Capacity Planning (CP)
- FAQs About Network Management
- FAQs About Storage Management (SM)
- FAQs About Production Acceptance (PA)
- FAQs About Release Management (RM)
- FAQs About Disaster Recovery (DR)
- FAQs About Business Continuity (BC)
- FAQs About Security (SE)
- FAQs About Service Level Management (SL)
- FAQs About Financial Management (FN)
- FAQs About Problem Management (PM)
- FAQs About Facilities Management (FM)
- Process Management
- Developing Robust Processes
- Establishing Mutually Beneficial Process Metrics
- Change Management—Part 1
- Change Management—Part 2
- Change Management—Part 3
- Audit Reconnaissance: Releasing Resources Through the IT Audit
- Problem Management
- Problem Management–Part 2: Process Design
- Problem Management–Part 3: Process Implementation
- Business Continuity Emergency Communications Plan
- Capacity Planning – Part One: Why It is Seldom Done Well
- Capacity Planning – Part Two: Developing a Capacity Planning Process
- Capacity Planning — Part Three: Benefits and Helpful Tips
- Capacity Planning – Part Four: Hidden Upgrade Costs and
- Improving Business Process Management, Part 1
- Improving Business Process Management, Part 2
- 20 Major Elements of Facilities Management
- Major Physical Exposures Common to a Data Center
- Evaluating the Physical Environment
- Nightmare Incidents with Disaster Recovery Plans
- Developing a Robust Configuration Management Process
- Developing a Robust Configuration Management Process – Part Two
- Automating a Robust Infrastructure Process
- Improving High Availability — Part One: Definitions and Terms
- Improving High Availability — Part Two: Definitions and Terms
- Improving High Availability — Part Three: The Seven R's of High Availability
- Improving High Availability — Part Four: Assessing an Availability Process
- Methods for Brainstorming and Prioritizing Requirements
- Introduction to Disk Storage Management — Part One
- Storage Management—Part Two: Performance
- Storage Management—Part Three: Reliability
- Storage Management—Part Four: Recoverability
- Twelve Traits of World-Class Infrastructures — Part One
- Twelve Traits of World-Class Infrastructures — Part Two
- Meeting Today's Cooling Challenges of Data Centers
- Strategic Security, Part One: Assessment
- Strategic Security, Part Two: Development
- Strategic Security, Part Three: Implementation
- Strategic Security, Part Four: ITIL Implications
- Production Acceptance Part One – Definition and Benefits
- Production Acceptance Part Two – Initial Steps
- Production Acceptance Part Three – Middle Steps
- Production Acceptance Part Four – Ongoing Steps
- Case Study: Planning a Service Desk Part One – Objectives
- Case Study: Planning a Service Desk Part Two – SWOT
- Case Study: Implementing an ITIL Service Desk – Part One
- Case Study: Implementing a Service Desk Part Two – Tool Selection
- Ethics, Scandals and Legislation
- Outsourcing in Response to Legislation
- Supplier Management
- Identifying Key External Suppliers
- Identifying Key Internal Suppliers
- Integrating the Four Key Elements of Good Customer Service
- Enhancing the Customer/Supplier Matrix
- Voice Over IP, Part One — What VoIP Is, and Is Not
- Voice Over IP, Part Two — Benefits, Cost Savings and Features of VoIP
- Application Management
- Production Acceptance
- Distinguishing New Applications from New Versions of Existing Applications
- Assessing a Production Acceptance Process
- Effective Use of a Software Development Life Cycle
- The Role of Project Management in SDLC— Part 2
- Communication in Project Management – Part One: Barriers to Effective Communication
- Communication in Project Management – Part Two: Examples of Effective Communication
- Safeguarding Personal Information in the Workplace: A Case Study
- Combating the Year-end Budget Blitz—Part 1: Building a Manageable Schedule
- Combating the Year-end Budget Blitz—Part 2: Tracking and Reporting Availability
- References
- Developing an ITIL Feasibility Analysis
- Organization and Personnel Management
- Optimizing IT Organizational Structures
- Factors That Influence Restructuring Decisions
- Alternative Locations for the Help Desk
- Alternative Locations for Database Administration
- Alternative Locations for Network Operations
- Alternative Locations for Web Design
- Alternative Locations for Risk Management
- Alternative Locations for Systems Management
- Practical Tips To Retaining Key Personnel
- Benefits and Drawbacks of Using IT Consultants and Contractors
- Deciding Between the Use of Contractors versus Consultants
- Managing Employee Skill Sets and Skill Levels
- Assessing Skill Levels of Current Onboard Staff
- Recruiting Infrastructure Staff from the Outside
- Selecting the Most Qualified Candidate
- 7 Tips for Managing the Use of Mobile Devices
- Useful Websites for IT Managers
- References
- Automating Robust Processes
- Evaluating Process Documentation — Part One: Quality and Value
- Evaluating Process Documentation — Part Two: Benefits and Use of a Quality-Value Matrix
- When Should You Integrate or Segregate Service Desks?
- Five Instructive Ideas for Interviewing
- Eight Surefire Tips to Use When Being Interviewed
- 12 Helpful Hints To Make Meetings More Productive
- Eight Uncommon Tips To Improve Your Writing
- Ten Helpful Tips To Improve Fire Drills
- Sorting Out Today’s Various Training Options
- Business Ethics and Corporate Scandals – Part 1
- Business Ethics and Corporate Scandals – Part 2
- 12 Tips for More Effective Emails
- Management Communication: Back to the Basics, Part One
- Management Communication: Back to the Basics, Part Two
- Management Communication: Back to the Basics, Part Three
- Asset Management
- Managing Hardware Inventories
- Introduction to Hardware Inventories
- Processes To Manage Hardware Inventories
- Use of a Hardware Inventory Database
- References
- Managing Software Inventories
- Business Continuity Management
- Ten Lessons Learned from Real-Life Disasters
- Ten Lessons Learned From Real-Life Disasters, Part 2
- Differences Between Disaster Recovery and Business Continuity , Part 1
- Differences Between Disaster Recovery and Business Continuity , Part 2
- 15 Common Terms and Definitions of Business Continuity
- The Federal Government’s Role in Disaster Recovery
- The 12 Common Mistakes That Cause BIAs To Fail—Part 1
- The 12 Common Mistakes That Cause BIAs To Fail—Part 2
- The 12 Common Mistakes That Cause BIAs To Fail—Part 3
- The 12 Common Mistakes That Cause BIAs To Fail—Part 4
- Conducting an Effective Table Top Exercise (TTE) — Part 1
- Conducting an Effective Table Top Exercise (TTE) — Part 2
- Conducting an Effective Table Top Exercise (TTE) — Part 3
- Conducting an Effective Table Top Exercise (TTE) — Part 4
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part One
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Two
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Three
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Four
- The Information Technology Infrastructure Library (ITIL)
- The Origins of ITIL
- The Foundation of ITIL: Service Management
- Five Reasons for Revising ITIL
- The Relationship of Service Delivery and Service Support to All of ITIL
- Ten Common Myths About Implementing ITIL, Part One
- Ten Common Myths About Implementing ITIL, Part Two
- Characteristics of ITIL Version 3
- Ten Benefits of itSMF and its IIL Pocket Guide
- Translating the Goals of the ITIL Service Delivery Processes
- Translating the Goals of the ITIL Service Support Processes
- Elements of ITIL Least Understood, Part One: Service Delivery Processes
- Case Study: Recovery Reactions to a Renegade Rodent
- Elements of ITIL Least Understood, Part Two: Service Support
- Case Studies
- Case Study — Preparing for Hurricane Charley
- Case Study — The Linux Decision
- Case Study — Production Acceptance at an Aerospace Firm
- Case Study — Production Acceptance at a Defense Contractor
- Case Study — Evaluating Mainframe Processes
- Case Study — Evaluating Recovery Sites, Part One: Quantitative Comparisons/Natural Disasters
- Case Study — Evaluating Recovery Sites, Part Two: Quantitative Comparisons/Man-made Disasters
- Case Study — Evaluating Recovery Sites, Part Three: Qualitative Comparisons
- Case Study — Evaluating Recovery Sites, Part Four: Take-Aways
- Disaster Recovery Test Case Study Part One: Planning
- Disaster Recovery Test Case Study Part Two: Planning and Walk-Through
- Disaster Recovery Test Case Study Part Three: Execution
- Disaster Recovery Test Case Study Part Four: Follow-Up
- Assessing the Robustness of a Vendor’s Data Center, Part One: Qualitative Measures
- Assessing the Robustness of a Vendor’s Data Center, Part Two: Quantitative Measures
- Case Study: Lessons Learned from a World-Wide Disaster Recovery Exercise, Part One: What Did the Team Do Well
- (d) Case Study: Lessons Learned from a World-Wide Disaster Recovery Exercise, Part Two
In the first segment of this two-part case study, I presented the initial strategy I used with a team from a large international insurance firm to upgrade its service desk. I discussed how we jointly decided to first brainstorm the overall objectives of their new and improved service desk and then to categorize these objectives as to short, medium or long-term. Next we prioritized the team's responses in each of the three categories using the nominal group technique. After I compiled the results of the voting I offered a brief analysis of the responses and their priorities.
In this final part I explain the results of a similar type of brainstorming in which we identified and prioritized the current strengths, weaknesses, opportunities and threats (SWOT) to the initiative to upgrade their service desk. For each of these categories I present a brief analysis of what the prioritized responses are really telling us.
Using techniques similar to those described in part one, the service desk improvement team (SDIT) brainstormed and prioritized the strengths, weaknesses, opportunities and threats (SWOT) currently apparent to their objectives. The reason we identified the objectives first was to allow the team to focus on the SWOT that specially applied to the objectives in question. This kept the brainstorming much more focused and effective. The next four sections describe the results of these sessions.
Identifying and Prioritizing Service Desk Strengths
The SDIT identified 12 strengths shown below in Table 1. The table also shows the prioritized ranking and the distribution of the priority voting points. Similar tables will be shown for the weaknesses, opportunities and strengths.
Table 1 Strengths
Rank |
Pts |
Description of Strengths |
Distribution |
1 |
11 |
Ambitious to help |
5,3,3 |
2 |
11 |
Committed staff |
4,3,3,1 |
3 |
10 |
Committed management team |
5,5 |
4 |
9 |
Staff has diverse skill sets |
5,4 |
5 |
5 |
Perceived as courteous and accurate |
4,1 |
6 |
4 |
Has a great manager |
4 |
7 |
4 |
Have strong relationships with Help Desks in other divisions |
2,2 |
8 |
3 |
Good feedback and follow-up |
2,1 |
9 |
2 |
Has no previous baggage |
2 |
10 |
1 |
Provides competitive salaries |
1 |
11 |
0 |
Prompting and reporting on SLOs (SL Outages) |
0 |
12 |
0 |
Issues customer feedback surveys |
0 |
Analysis:
The top four rated strengths are all closely ranked with 11, 10 and 9 points, and are all related to the positive aptitude and attitude of staff and management. Specifically, the strengths speak to people's helpfulness, commitment and diverse skill sets. These traits are essential for staffing a customer-oriented Service Desk.
Medium-ranked strengths include the perception of being courteous and accurate, having a great manager and having strong relationships with Help Desks in other divisions. These strengths had priority points of 5, 4 and 4 respectively. Responses such as these reinforce the notion that the proper caliber of staff and the proper level of management support are very much in evidence.
Identifying and Prioritizing Service Desk Weaknesses
The SDIT identified 12 weaknesses shown below in Table 2.
Table 2 Weaknesses
Rank |
Pts |
Description of Weaknesses |
Distribution |
1 |
15 |
Not chartered to provide service |
5,5,4,1 |
2 |
14 |
Unwilling to organize to better serve the customers and the organization |
5,5,4 |
3 |
7 |
Inefficient use of staff resources |
3,2,2 |
4 |
6 |
Inability to properly quantify and qualify work |
3,3 |
T5 |
4 |
Not structured to perform service tasks |
4 |
T5 |
4 |
Reports lack critical data to manage work well |
4 |
T7 |
3 |
Inability to retain staff |
3 |
T7 |
3 |
Duplicate work performed inconsistently in the various groups |
2,1 |
T7 |
3 |
Lack of skills, knowledge, experience and training to solve problems |
2,1 |
10 |
1 |
Management indifference to problems |
1 |
T11 |
0 |
Lack of reporting gives false impressions of the true number of incidents |
0 |
T11 |
0 |
Too many queues |
0 |
Analysis:
The top two ranked weaknesses involved not being chartered to provide service and an unwillingness by management to organize to better serve the customers and the organization, with 15 and 14 points respectively. The third ranked weakness with seven points deals with the inefficient use of staff resources. All of the top three ranked responses are management-related and indicate that management solutions are needed to mitigate these concerns.
The next three weaknesses, with 6, 4 and points, all deal with issues about the work environment, including the quantity, quality, structure and reporting of the work itself. Following these responses, the next three each tied for seventh place with identical votes of three points. These weaknesses all related to personnel issues of retention of staff, duplicate and inconsistent work efforts, and lack of training.
Looking at all of the weaknesses as a whole, they all appear in one way or another to be management issues involving organization, delegation, staffing and training. These can all be addressed with proper levels of management support and direction.
Identifying and Prioritizing Service Desk Opportunities
The SDIT identified the 12 opportunities shown below in Table 3.
Table 3 Opportunities
Rank |
Pts |
Description of Opportunities |
Distribution |
1 |
11 |
Potential to improve the customer experience and expectations |
5,3,2,1 |
T2 |
10 |
Adopts service management framework |
5,5 |
T2 |
10 |
Opportunity to distribute workloads based on demand and skill set |
4,3,3 |
4 |
9 |
Improve the performance of the centralized IT organization |
5,4 |
5 |
8 |
Potential for automation |
4,2,2 |
T6 |
4 |
Improved reporting |
4 |
T6 |
4 |
Consistency |
3,1 |
8 |
3 |
Improve diversity of knowledge and skills |
2,1 |
9 |
1 |
One central help desk for Pacific Life IT |
1 |
T10 |
0 |
Use of remedy |
0 |
T10 |
0 |
Potential to hire skilled, trained staff |
0 |
T10 |
0 |
Improve career path opportunities |
0 |
Analysis:
The top five opportunities are separated by only three points. The first two responses, with 11 and 10 points, consist of the potential to improve the customer experience and expectations, and the adoption of a service management framework. These are both customer-oriented opportunities that would strongly support the overall and long-range direction of the Service Desk.
The next three opportunities are more support and process-oriented responses with ten, nine and eight voting points. They involve improving the distribution, productivity and automation of the work associated with the Service Desk.
Additional opportunities identified include improvements to reporting, consistency, and the diversity of knowledge and skills. These all support an ongoing continual process improvement program on which the initiative of service management is soundly based.
Identifying and Prioritizing Service Desk Threats
Table 4 below lists the 14 threats that the SDIT identified.
Table 4 Threats
Rank |
Pts |
Description of Threats |
Distribution |
1 |
12 |
Inability to act decisively and swiftly |
5,4,3 |
2 |
9 |
Culture of silo-ism and resistance to change |
5,2,2 |
3 |
8 |
Funding |
5,3 |
4 |
7 |
Too many leaders, not enough followers |
4,3 |
5 |
4 |
Inability to stay on course |
4 |
6 |
2 |
Lack of executive support |
2 |
T7 |
1 |
Perceptions |
1 |
T7 |
1 |
Inability to agree |
1 |
T7 |
1 |
Decentralization |
1 |
T10 |
0 |
Outsourcing |
0 |
T10 |
0 |
Restrictions on staffing |
0 |
T10 |
0 |
Terrorists |
0 |
T10 |
0 |
Lack of understanding of business needs |
0 |
T10 |
0 |
Too much autonomy |
0 |
Analysis:
Two things stand out about the identification and prioritization of threats. One is that there were slightly more responses for this category (14 versus 12) than for the other three. The other is that the top four responses clustered toward the top in voting and there were less than half of the total responses receiving more than one vote.
What this all means is that most of the participants feel there is a very low likelihood that most of the responses (the eight of them receiving one or no votes) are probable threats. On the other hand, the relative high votes for the top six responses indicate that most feel these are indeed likely threats that could undermine the success of the Service Desk.
As a result, these top six responses should be addressed to whatever degree possible. Emphasizing swift decisions, benefits of change, need for funding, importance of delegating, staying focused and maintaining executive support should all be encouraged to increase the likelihood of success.
Summary of Service Desk Planning Case Study
In this two-part case study, I presented the activities that a large, international insurance company performed to initially plan for a significant upgrade to their IT service desk. I described how I facilitated brainstorming sessions to help them identify and prioritize short, medium and long-term objectives, and then did the same for current strengths, weaknesses, opportunities and threats (SWOT). The results of these sessions now position my client to proceed with implementing, in an orderly manner, the various objectives and opportunities they identified to significantly enhance the quality and effectiveness of their service desk. If you are in a similar position with your own service desk, consider using these strategies to plan how to improve its level of service.