SlideShare a Scribd company logo
1 of 4
Download to read offline
itSM Solutions®
DITY™ Newsletter
Reprint
This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and
have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals
who want a workable, practical guide to implementing ITIL best practices -- without the hype.

become a member
(It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm)

Publisher
itSM Solutions™ LLC
31 South Talbert Blvd #295
Lexington, NC 27292
Phone (336) 510-2885
Fax (336) 798-6296
Find us on the web at: http://www.itsmsolutions.com.
To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com
For information on obtaining copies of this guide contact: sales@itsmsolutions.com
Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the
permission of the Controller of HMSO and the Office of Government Commerce.
Notice of Rights / Restricted Rights Legend
All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of
the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner
License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof
beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited.
Notice of Liability
This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not
limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor
itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused
directly or indirectly by the contents of this guide.
Trademarks
itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a
Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent
and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No.
0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be
trademarks or registered trademarks of their respective companies.
Accelerating ITIL Implementations

By Jeb McIntyre

Effective IT is an absolutely critical component of any organization expecting to survive.
One of the main objectives of the IT Infrastructure Library® (ITL®) is to provide the
capabilities required to survive and thrive in the global economy.

jeb
MCINTYRE
Articles
E-mail

ITIL is important, but does not stand alone. Best practice for implementing ITIL calls for
use of Project Management. Within Project Management, there are two basic methods:
critical path and critical chain.
Critical Path scheduling and management, the most common method in use today, is
almost 100 years old, and has remained remarkably unchanged since its inception. Critical
Chain is a far more recent evolution that provides dramatic improvements in both
completion time and costs when properly utilized.

Critical Chain can be so much more effective one might wonder why everyone has not
switched. The answer is that like ITIL itself, it’s not so much sweeping and dramatic change that’s required
but rather a change in point of view.
Following I describe both methodologies, and explain how to accelerate any project, including ITIL
implementation.

ITIL, Critical Path, and Critical Chain
Peculiarly, the business world has come to prize predictability above all else. For public corporations, should
the company’s financial results deviate from analysts expectations by more than a few percentage points, the
market is likely to react negatively, even if the company makes more money than expected. The absurdity is
obvious, particularly as it relates to projects. The only way to assure that projects meet their time and budget
projections is to wildly over-estimate, then sand-bag at critical junctures if things are going well, all the while
being prepared with elaborate but plausible explanations if things are going poorly.
While lamentably this may be true (and inescapable) for the enterprise at large, it does not have to apply to the
subgroup of information technology, particularly under an ITIL compliant strategy of aligning IT to business
need and business urgency. If IT can deliver better faster cheaper technology closely aligned to and supporting
the goals of the enterprise, the enterprise is freed to make better decisions.
Both Critical Path and Critical Chain initially focus upon the deliverables required to fulfill the project, tasks to
be performed and the order in which they must be performed, any dependencies between tasks, and finally
identification of the resources required to perform the tasks and the estimates of time required to perform
these tasks.
Where they differ is most obvious and pronounced in the estimating activity. In Critical Path, each task is
estimated, but then a buffer is added to reflect the degree of uncertainty that the estimate is correct. The
primary flaw in this approach is that the schedule is based upon the duration of the task and its associated
buffer. Should a task be completed ahead of schedule (almost unheard of), the resources for succeeding tasks
are rarely able to re-arrange their schedules to accommodate. So, gains are rarely useful, but worse, any delay
to the Critical Path activities results in a delay to the completion of the project as a whole.

Critical Chain
In many ways Critical Chain is just the application of common sense. In Critical Chain, the same estimate is
made, but no buffer is provided at the task level. Instead, all buffers for all tasks are combined and applied to
file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol2iss36.htm (2 of 4)9/12/2006 3:12:44 PM
Accelerating ITIL Implementations

the whole project, not just to the task. There are a few rules however.
One is that estimates must be honest and specific, based upon the actual hours required under optimum
circumstances to perform the task. Let’s use an example. You, the reader, are asked to estimate how long a
task will take you to complete. You think “This is probably a week’s worth of effort, but to be safe I’ll estimate
two weeks”. Nothing wrong here, but in actual execution most people are likely to procrastinate. They don’t
start when they are expected to, in effect burning buffer, so that if “worst case” comes to pass, delay of the
whole project is inevitable.
Along similar lines, estimates are often made reflective of the resources normal work environment, in other
words the resource plans to “multi-task”. Estimates should be based upon the assumption that the resource
will not be multi-tasking. Project work usually requires a high degree of focus. Interruptions for any reason
dramatically rob through-put. It has been proven that for people doing work requiring concentration (like
writing software, writing processes, accounting, configuring servers, testing) recovery from something like a
phone call or a conversation with “the boss” takes 30-45 minutes to return to the previous level of
concentration regardless the outcome of the interruption. This means that 50% or more of a given work day
can be spent recovering from interruptions in concentration! In Critical Chain, multi-tasking is not allowed.
When a resource is working on a project that project is to be the exclusive focus. No resource is allowed to
“multi-task”.
“But what about emergencies” you might ask. The answer is simple. During emergencies, the resource is
released from the project for only as long as their contribution to the solution of the emergency is required,
then back to the project. Any time losses are taken from the project buffer, and managed accordingly.
Which leads to another key concept: Projects must be estimated reflecting the need for buffers. If the actual
truthful estimate is 6 months, a project buffer of 6 months must also be provided. In other words, the project
should be expected to require a full year, even though the sum of the tasks is half that. But, and here’s the key,
it’s entirely possible that the project might be completed in far less time under Critical Chain management,
where it’s almost impossible under Critical Path.
With Critical Chain, communications and cooperation between all members of the project team and
stakeholders are critical. Each resource (and their managers) understands that the schedule is just an
approximation, subject to change with notice, and that they must accommodate to the best of their ability.
Each also knows that any project worth doing at all is done because it provides significant business value and is
driven by business urgency. This leads to a brief few comments on the founder of Critical Chain, Elijahu
Goldratt, author of “The Goal” (focused upon manufacturing), “Critical Chain” (focused upon project
management), “Necessary but not Sufficient” (focused upon utilization of ERP systems), and a number of
equally excellent business novels based upon his Theory of Constraints (TOC).
In a highly simplified explanation, Theory of Constraints postulates that every system has a goal (for example,
business has the goal of making money, projects have a goal of meeting requirements on time and on budget)
and that there exists in every system constraints (usually one, occasionally two, rarely more) that if relieved
cause dramatic improvement in the thru-put of that system. However, when a constraint is relieved a new one
inevitably takes its place. Therefore, the goal of management is to constantly identify and relieve constraints,
thus continually improving the thru-put of the system. It is important to note here that in order to relieve a
constraint there must be excess capacity on either side of the constraint. This means that concepts of
“efficiency” must be re-evaluated. Efficiency has to be viewed from the point of view of the thru-put of the
whole system, not from the sum of its parts.
It therefore follows that only projects that improve a business’s ability to meet its’ goals should be undertaken.
This of course is entirely consistent with ITIL. If projects are closely aligned with business need and business
urgency, it follows that supporting those projects will be of high priority to management throughout the
enterprise. Woe to the manager who fails to support fully business imperative projects!
file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol2iss36.htm (3 of 4)9/12/2006 3:12:44 PM
Accelerating ITIL Implementations

Summary
The Rules of Critical Chain
1. Only projects delivering real business value will be performed
2. Business urgency will be factored into all project plans
3. All resources must start when promised, or as soon after as possible
4. No “multi-tasking”.
5. No task buffers
6. Buffers applied to the whole project
7. Project manager will communicate schedule updates at the earliest possible moment, allowing resources to
adjust their other work loads
8. Project managers agree to recognize resource constraints, such as previous commitments, emergencies,
and mis-estimation.
9. Project managers work closely with both the resource and their controlling management to secure
agreements that minimize impact to other activities outside the domain of the project.
--

Where to go from here:
q
q
q

Subscribe to our newsletter and get new skills delivered right to your Inbox, click here.
Download this article in PDF format for use at your own convenience, click here.
Browse back-issues of the DITY Newsletter, click here.

Related articles:

For more about resolving Problems please see:
q Making a Project of ITIL

Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved.

file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol2iss36.htm (4 of 4)9/12/2006 3:12:44 PM

More Related Content

What's hot

Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project ManagementShyam Kerkar
 
The Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their ManifestoThe Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their ManifestoGlen Alleman
 
Major Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperMajor Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperIan Heptinstall
 
DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...
DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...
DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...dev2ops
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...Abdul Naqashbandi
 
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...Association for Project Management
 
Running successful agile projects
Running successful agile projectsRunning successful agile projects
Running successful agile projectsMartin Aspeli
 
Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...Joe Cooper
 
Critical chain primer
Critical chain primerCritical chain primer
Critical chain primerDan Klarman
 
Merkur Case study JIPP.IT
Merkur Case study JIPP.ITMerkur Case study JIPP.IT
Merkur Case study JIPP.ITJIPP.IT
 
Lean and-kanban-final
Lean and-kanban-finalLean and-kanban-final
Lean and-kanban-finalAnh Huan Miu
 
It Project And Agile
It Project And AgileIt Project And Agile
It Project And AgileRoman Agaev
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops finalGene Kim
 
Why Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to SucceedWhy Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to SucceedKevin Wordon
 
Esteem and Estimates (Ti Stimo Fratello)
Esteem and Estimates (Ti Stimo Fratello)Esteem and Estimates (Ti Stimo Fratello)
Esteem and Estimates (Ti Stimo Fratello)Gaetano Mazzanti
 
The Art of Building a Process Design Team
The Art of Building a Process Design TeamThe Art of Building a Process Design Team
The Art of Building a Process Design TeamTroy DuMoulin
 
Project communications presentations
Project communications presentationsProject communications presentations
Project communications presentationsDow Publishing LLC
 

What's hot (20)

An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)An introduction to Critical Chain Project Management (CCPM)
An introduction to Critical Chain Project Management (CCPM)
 
Critical Chain Project Management
Critical Chain Project ManagementCritical Chain Project Management
Critical Chain Project Management
 
Critical chain project management - Gary Palmer
Critical chain project management - Gary PalmerCritical chain project management - Gary Palmer
Critical chain project management - Gary Palmer
 
Why it project fail
Why it project failWhy it project fail
Why it project fail
 
The Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their ManifestoThe Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their Manifesto
 
Major Projects - Faster Better Cheaper
Major Projects - Faster Better CheaperMajor Projects - Faster Better Cheaper
Major Projects - Faster Better Cheaper
 
DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...
DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...
DevOps Paradox: Going Faster Brings Higher Quality, Lower Costs, & Better Out...
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...
 
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
The Real Reason That Projects Fail and How to Fix it - An Introduction to Cri...
 
Running successful agile projects
Running successful agile projectsRunning successful agile projects
Running successful agile projects
 
Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...Improving Focus and Predictability on Projects with Critical Chain Project Ma...
Improving Focus and Predictability on Projects with Critical Chain Project Ma...
 
Critical chain primer
Critical chain primerCritical chain primer
Critical chain primer
 
Merkur Case study JIPP.IT
Merkur Case study JIPP.ITMerkur Case study JIPP.IT
Merkur Case study JIPP.IT
 
Lean and-kanban-final
Lean and-kanban-finalLean and-kanban-final
Lean and-kanban-final
 
It Project And Agile
It Project And AgileIt Project And Agile
It Project And Agile
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops final
 
Why Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to SucceedWhy Projects Fail + Four Steps to Succeed
Why Projects Fail + Four Steps to Succeed
 
Esteem and Estimates (Ti Stimo Fratello)
Esteem and Estimates (Ti Stimo Fratello)Esteem and Estimates (Ti Stimo Fratello)
Esteem and Estimates (Ti Stimo Fratello)
 
The Art of Building a Process Design Team
The Art of Building a Process Design TeamThe Art of Building a Process Design Team
The Art of Building a Process Design Team
 
Project communications presentations
Project communications presentationsProject communications presentations
Project communications presentations
 

Viewers also liked

Viewers also liked (10)

Dit yvol2iss35
Dit yvol2iss35Dit yvol2iss35
Dit yvol2iss35
 
Dit yvol5iss8
Dit yvol5iss8Dit yvol5iss8
Dit yvol5iss8
 
Dit yvol2iss39
Dit yvol2iss39Dit yvol2iss39
Dit yvol2iss39
 
Dit yvol4iss49
Dit yvol4iss49Dit yvol4iss49
Dit yvol4iss49
 
Dit yvol3iss5
Dit yvol3iss5Dit yvol3iss5
Dit yvol3iss5
 
Dit yvol2iss26
Dit yvol2iss26Dit yvol2iss26
Dit yvol2iss26
 
Dit yvol3iss48
Dit yvol3iss48Dit yvol3iss48
Dit yvol3iss48
 
Dit yvol2iss19
Dit yvol2iss19Dit yvol2iss19
Dit yvol2iss19
 
Dit yvol6iss2
Dit yvol6iss2Dit yvol6iss2
Dit yvol6iss2
 
Dit yvol4iss22
Dit yvol4iss22Dit yvol4iss22
Dit yvol4iss22
 

Similar to Dit yvol2iss36

Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITcapstera
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paperSatyaIluri
 
Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.
Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.
Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.Zan Kavtaskin
 
Five pitfalls of Agile Transformations in Healthcare
Five pitfalls of Agile Transformations in HealthcareFive pitfalls of Agile Transformations in Healthcare
Five pitfalls of Agile Transformations in HealthcareCorina Mihaela Paraschiv
 
Fear and Loathing in Agility: Long Live the Accounting Department
Fear and Loathing in Agility: Long Live the Accounting DepartmentFear and Loathing in Agility: Long Live the Accounting Department
Fear and Loathing in Agility: Long Live the Accounting DepartmentAccenture | SolutionsIQ
 
Jayanto bose prashantshrivastava
Jayanto bose prashantshrivastavaJayanto bose prashantshrivastava
Jayanto bose prashantshrivastavaPMI2011
 
Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01PMI_IREP_TP
 
Agile And Your Business V2
Agile And Your Business V2Agile And Your Business V2
Agile And Your Business V2edward1968
 
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011Pink Elephant
 
The 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 finalThe 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 finalTroy DuMoulin
 
about start up for you 12
about start up for you 12about start up for you 12
about start up for you 12aliaalistartup
 
Visual project management simplifying project execution to deliver on time an...
Visual project management simplifying project execution to deliver on time an...Visual project management simplifying project execution to deliver on time an...
Visual project management simplifying project execution to deliver on time an...ssuser52fa40
 
Give Me an Hour and i will triple your ROI
Give Me an Hour and i will triple your ROIGive Me an Hour and i will triple your ROI
Give Me an Hour and i will triple your ROIi-nexus
 

Similar to Dit yvol2iss36 (20)

Dit yvol2iss22
Dit yvol2iss22Dit yvol2iss22
Dit yvol2iss22
 
Dit yvol2iss25
Dit yvol2iss25Dit yvol2iss25
Dit yvol2iss25
 
Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and IT
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paper
 
Dit yvol2iss42
Dit yvol2iss42Dit yvol2iss42
Dit yvol2iss42
 
Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.
Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.
Rejuvenating Agile Operations By Putting Lead And Cycle Time Front And Centre.
 
Agile Paper Cutter
Agile Paper CutterAgile Paper Cutter
Agile Paper Cutter
 
Five pitfalls of Agile Transformations in Healthcare
Five pitfalls of Agile Transformations in HealthcareFive pitfalls of Agile Transformations in Healthcare
Five pitfalls of Agile Transformations in Healthcare
 
Fear and Loathing in Agility: Long Live the Accounting Department
Fear and Loathing in Agility: Long Live the Accounting DepartmentFear and Loathing in Agility: Long Live the Accounting Department
Fear and Loathing in Agility: Long Live the Accounting Department
 
Jayanto bose prashantshrivastava
Jayanto bose prashantshrivastavaJayanto bose prashantshrivastava
Jayanto bose prashantshrivastava
 
Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01
 
Agile And Your Business V2
Agile And Your Business V2Agile And Your Business V2
Agile And Your Business V2
 
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
The Seven Enablers & Constraints Of IT Service Management - Research Update 2011
 
The 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 finalThe 7 enablers and constraints of itsm 2011 v1 final
The 7 enablers and constraints of itsm 2011 v1 final
 
about start up for you 12
about start up for you 12about start up for you 12
about start up for you 12
 
Overcome barriers to good req mgmt
Overcome barriers to good req mgmtOvercome barriers to good req mgmt
Overcome barriers to good req mgmt
 
Dit yvol3iss12
Dit yvol3iss12Dit yvol3iss12
Dit yvol3iss12
 
Dit yvol2iss48
Dit yvol2iss48Dit yvol2iss48
Dit yvol2iss48
 
Visual project management simplifying project execution to deliver on time an...
Visual project management simplifying project execution to deliver on time an...Visual project management simplifying project execution to deliver on time an...
Visual project management simplifying project execution to deliver on time an...
 
Give Me an Hour and i will triple your ROI
Give Me an Hour and i will triple your ROIGive Me an Hour and i will triple your ROI
Give Me an Hour and i will triple your ROI
 

More from Rick Lemieux

More from Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Dit yvol2iss36

  • 1. itSM Solutions® DITY™ Newsletter Reprint This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals who want a workable, practical guide to implementing ITIL best practices -- without the hype. become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm) Publisher itSM Solutions™ LLC 31 South Talbert Blvd #295 Lexington, NC 27292 Phone (336) 510-2885 Fax (336) 798-6296 Find us on the web at: http://www.itsmsolutions.com. To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com For information on obtaining copies of this guide contact: sales@itsmsolutions.com Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the permission of the Controller of HMSO and the Office of Government Commerce. Notice of Rights / Restricted Rights Legend All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited. Notice of Liability This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused directly or indirectly by the contents of this guide. Trademarks itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies.
  • 2. Accelerating ITIL Implementations By Jeb McIntyre Effective IT is an absolutely critical component of any organization expecting to survive. One of the main objectives of the IT Infrastructure Library® (ITL®) is to provide the capabilities required to survive and thrive in the global economy. jeb MCINTYRE Articles E-mail ITIL is important, but does not stand alone. Best practice for implementing ITIL calls for use of Project Management. Within Project Management, there are two basic methods: critical path and critical chain. Critical Path scheduling and management, the most common method in use today, is almost 100 years old, and has remained remarkably unchanged since its inception. Critical Chain is a far more recent evolution that provides dramatic improvements in both completion time and costs when properly utilized. Critical Chain can be so much more effective one might wonder why everyone has not switched. The answer is that like ITIL itself, it’s not so much sweeping and dramatic change that’s required but rather a change in point of view. Following I describe both methodologies, and explain how to accelerate any project, including ITIL implementation. ITIL, Critical Path, and Critical Chain Peculiarly, the business world has come to prize predictability above all else. For public corporations, should the company’s financial results deviate from analysts expectations by more than a few percentage points, the market is likely to react negatively, even if the company makes more money than expected. The absurdity is obvious, particularly as it relates to projects. The only way to assure that projects meet their time and budget projections is to wildly over-estimate, then sand-bag at critical junctures if things are going well, all the while being prepared with elaborate but plausible explanations if things are going poorly. While lamentably this may be true (and inescapable) for the enterprise at large, it does not have to apply to the subgroup of information technology, particularly under an ITIL compliant strategy of aligning IT to business need and business urgency. If IT can deliver better faster cheaper technology closely aligned to and supporting the goals of the enterprise, the enterprise is freed to make better decisions. Both Critical Path and Critical Chain initially focus upon the deliverables required to fulfill the project, tasks to be performed and the order in which they must be performed, any dependencies between tasks, and finally identification of the resources required to perform the tasks and the estimates of time required to perform these tasks. Where they differ is most obvious and pronounced in the estimating activity. In Critical Path, each task is estimated, but then a buffer is added to reflect the degree of uncertainty that the estimate is correct. The primary flaw in this approach is that the schedule is based upon the duration of the task and its associated buffer. Should a task be completed ahead of schedule (almost unheard of), the resources for succeeding tasks are rarely able to re-arrange their schedules to accommodate. So, gains are rarely useful, but worse, any delay to the Critical Path activities results in a delay to the completion of the project as a whole. Critical Chain In many ways Critical Chain is just the application of common sense. In Critical Chain, the same estimate is made, but no buffer is provided at the task level. Instead, all buffers for all tasks are combined and applied to file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol2iss36.htm (2 of 4)9/12/2006 3:12:44 PM
  • 3. Accelerating ITIL Implementations the whole project, not just to the task. There are a few rules however. One is that estimates must be honest and specific, based upon the actual hours required under optimum circumstances to perform the task. Let’s use an example. You, the reader, are asked to estimate how long a task will take you to complete. You think “This is probably a week’s worth of effort, but to be safe I’ll estimate two weeks”. Nothing wrong here, but in actual execution most people are likely to procrastinate. They don’t start when they are expected to, in effect burning buffer, so that if “worst case” comes to pass, delay of the whole project is inevitable. Along similar lines, estimates are often made reflective of the resources normal work environment, in other words the resource plans to “multi-task”. Estimates should be based upon the assumption that the resource will not be multi-tasking. Project work usually requires a high degree of focus. Interruptions for any reason dramatically rob through-put. It has been proven that for people doing work requiring concentration (like writing software, writing processes, accounting, configuring servers, testing) recovery from something like a phone call or a conversation with “the boss” takes 30-45 minutes to return to the previous level of concentration regardless the outcome of the interruption. This means that 50% or more of a given work day can be spent recovering from interruptions in concentration! In Critical Chain, multi-tasking is not allowed. When a resource is working on a project that project is to be the exclusive focus. No resource is allowed to “multi-task”. “But what about emergencies” you might ask. The answer is simple. During emergencies, the resource is released from the project for only as long as their contribution to the solution of the emergency is required, then back to the project. Any time losses are taken from the project buffer, and managed accordingly. Which leads to another key concept: Projects must be estimated reflecting the need for buffers. If the actual truthful estimate is 6 months, a project buffer of 6 months must also be provided. In other words, the project should be expected to require a full year, even though the sum of the tasks is half that. But, and here’s the key, it’s entirely possible that the project might be completed in far less time under Critical Chain management, where it’s almost impossible under Critical Path. With Critical Chain, communications and cooperation between all members of the project team and stakeholders are critical. Each resource (and their managers) understands that the schedule is just an approximation, subject to change with notice, and that they must accommodate to the best of their ability. Each also knows that any project worth doing at all is done because it provides significant business value and is driven by business urgency. This leads to a brief few comments on the founder of Critical Chain, Elijahu Goldratt, author of “The Goal” (focused upon manufacturing), “Critical Chain” (focused upon project management), “Necessary but not Sufficient” (focused upon utilization of ERP systems), and a number of equally excellent business novels based upon his Theory of Constraints (TOC). In a highly simplified explanation, Theory of Constraints postulates that every system has a goal (for example, business has the goal of making money, projects have a goal of meeting requirements on time and on budget) and that there exists in every system constraints (usually one, occasionally two, rarely more) that if relieved cause dramatic improvement in the thru-put of that system. However, when a constraint is relieved a new one inevitably takes its place. Therefore, the goal of management is to constantly identify and relieve constraints, thus continually improving the thru-put of the system. It is important to note here that in order to relieve a constraint there must be excess capacity on either side of the constraint. This means that concepts of “efficiency” must be re-evaluated. Efficiency has to be viewed from the point of view of the thru-put of the whole system, not from the sum of its parts. It therefore follows that only projects that improve a business’s ability to meet its’ goals should be undertaken. This of course is entirely consistent with ITIL. If projects are closely aligned with business need and business urgency, it follows that supporting those projects will be of high priority to management throughout the enterprise. Woe to the manager who fails to support fully business imperative projects! file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol2iss36.htm (3 of 4)9/12/2006 3:12:44 PM
  • 4. Accelerating ITIL Implementations Summary The Rules of Critical Chain 1. Only projects delivering real business value will be performed 2. Business urgency will be factored into all project plans 3. All resources must start when promised, or as soon after as possible 4. No “multi-tasking”. 5. No task buffers 6. Buffers applied to the whole project 7. Project manager will communicate schedule updates at the earliest possible moment, allowing resources to adjust their other work loads 8. Project managers agree to recognize resource constraints, such as previous commitments, emergencies, and mis-estimation. 9. Project managers work closely with both the resource and their controlling management to secure agreements that minimize impact to other activities outside the domain of the project. -- Where to go from here: q q q Subscribe to our newsletter and get new skills delivered right to your Inbox, click here. Download this article in PDF format for use at your own convenience, click here. Browse back-issues of the DITY Newsletter, click here. Related articles: For more about resolving Problems please see: q Making a Project of ITIL Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved. file:///C|/Documents and Settings/hmarquis/My Documents/My Webs/itSM Solutions(v2)/newsletters/DITYvol2iss36.htm (4 of 4)9/12/2006 3:12:44 PM