SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
Business Service
Configurations
How Business Sees Meaning In Configurations
Archestra notebooks compile and organize decades of in-the-field
empirical findings, to offer explanations of why things happened or
can happen in certain ways or to certain effects. The descriptions
are determined mainly from the perspective of strategy and
architecture, to comment on and navigate between the motives and
potentials that predetermine the decisions and shapes of activity as
discussed in the notes. All notebooks are subject to change.
©2016 Malcolm Ryder / Archestra Research
The Point of Diminishing Returns
A business increasingly has to get things done using things it didn’t make, provided from
external sources it does not control.
At the same time it usually has a culture of risk prevention that is enforced in what it
makes itself, for its own use or use by customers and partners.
For management of risks in operations, the business needs information that explains why
something behaves in the business the way that it does.
But that is not the same as the information that explains how something works.
When something does not work, the need is to know if the why is because of the how.
If the link between the how and the why cannot be openly clarified, then who cares about
how much detailed data there is on either side?
What’s necessary is someplace dependable to get that clarification, on demand.
The more variable the data is on each side, the more obvious it is that the clarification
must come from rapid analysis of timely, reliable discoveries.
The Who Cares Test
Successfully leveraging “prospects” despite current challenges is the business of business.
In business tactics, the leverage involves a balancing act: the probability of losing an opportunity or
a customer, weighed against the difficulty of gaining new opportunities and customers.
Any imbalance necessitates a trade-off – a calculated risk. In any given business, that calculation can
be a strong point or a serious weak point in capability.
Discovering valuable new opportunities and customers (development) requires more intensive and
difficult analyses than does assuring continuity (support).
But for business, continuity essentially has meaning as “continual effectiveness from preparedness”,
not as “don’t change anything”.
Preparedness should always mean being able to do different things at different times, as necessary.
The new normal for business is that there is continuous environmental change exerting influences
that create imbalances and the subsequent need for re-evaluating trade-offs.
That puts pressure on whether the business’s current preparedness actually does include the ability
to do different things at different times as necessary.
Current preparedness fails if it cracks under pressure. It is necessary to understand how the
pressure threatens continuity, and how to organize management of the threats.
customers
competition
innovation
complexity
volume
velocity
variety
diversity
volatility
DEVELOPMENT
of value
RISK
of relevance
Systems
from integration
OPPORTUNITY
CHANGE
PROVISION Services
from orchestration
SUPPORT
of continuity
Options
from transparency
Performance
from pursuit
Recognition
through rules
Demand effects
Supply effects
Business TopicBusiness Prospect Business Challenge
Offers
from provision
©2016 Malcolm Ryder / Archestra Research
Engineering outcomes
Service Management is, of course, about managing services. But the point of management per se is
independent of what it is managing.
Management is always concerned that:
• The right thing is resulting
• in a reliable way
• with predictable effects
• that are not counter-productive
• and that immediately have adequate value
Increasingly, tasks that provide assurance of the above outcomes are tasks that can be automated.
Automation makes the production of desired outcomes significantly more readily achievable as
intended. Automation essentially turns the producing into persistent engineering.
Engineering is expected to “pre-configure” both a service for business and the underpinnings of the
service. If services as originally engineered were then impervious to damage and/or did not need to
change, then further managing their configuration would not be necessary. But damage and change
are both facts of life.
Due to the impacts of damage and change on finance and performance, management of the
configurations of services is not optional.
Services help management,
but a service itself must be managed.
What is a Configuration
In IT, a “service” has typically been a logical view of a “configuration” of components,
important for supply to the business.
A component is meaningful as a static item; components are sub-units of system
structures.
Components are managed through systems management, and there are component
topologies to describe their managed arrangement.
But, a “configuration” of a service is not just a structure of components; it is an
arrangement of elements.
An element is meaningful as a dynamic item: an element is a required aspect of a cause of
action. It is a logical view, important to demand by the business.
Action elements are implemented through forms that may be virtual (emulated) or real
(physical).
The implementation of the forms amounts to the configuration of the service.
What is a Configuration Item
A “CI” (configuration item) is not simply a component that has specified attributes.
An “item” of a service configuration is a logical view of an element (a cause of action) of a
service in operation as prescribed.
That logical view is identified as a form used to implement an element.
A configuration item is, therefore, a form used to implement an element of a service.
The form called a “CI” has a prescribed behavior as an element of an action or event that
constitutes a function.
The behavior may have dependencies on particular components made available as
resources, but the prescribed behavior is the focus of managing the service configuration.
In other words, an identified CI is a resourced instance (an identified “actor”) of a role.
The essential CMDB
An identified CI is a resourced instance (an identified “actor”) of a role.
The form called a “CI” is accountable as an element that has its prescribed behavior
engineered in a function.
What makes the entity behavior “engineered” is intentionality.
The intentionality is a combination of definitions identifying what is (to be) appropriate ,
with evidence indicating that the realization of the behavior (as is) correctly corresponds.
The definition and evidence data necessary to accurately account for the form in terms of
the intentionality are usually expected to be contained for management in a configurations
management database (CMDB).
The CMDB also includes identifiers of the interaction of the forms in terms of intentionality.
The Anti-agile CMDB
Up to now, a conventional Configuration Management Data Base (CMDB) has cataloged
and mapped managed components according to the dependent interactions that describe
the mechanics of production systems. It has called those components “CIs”.
In effect, it attempts to instrument quality assurance of system implementations that make
up a production environment.
Both as a purpose and as a result of that, the most prevalent use of a conventional CMDB
is to provide a blueprint allowing reverse-engineering and support of what it tries to
descriptively document. That amounts to supporting the systems usage by business.
But for current businesses, flexibility at high speed is the order of the day. Conventionally, a
system’s mechanics are not known to have flexibility without high levels of complexity.
In those mechanics, stabilizing complexity for the purpose of gaining reliability
(preparedness) usually involves high-energy optimization and/or high resistance to change.
That increases the risk of “stability” becoming rigidity or brittleness, reducing its relevance
to different future conditions than already existed.
A conventional CMDB, focusing on components, is thereby always at risk of becoming
either unmanageable or obsolete, unless the level of investment in its maintenance can be
sustained at any necessary intensity.
CMDB for Business Meanings
On the business side, the influences of competition, of technology innovation, and of cost-
efficiency are now each strongly escalated and together endlessly re-combined.
That has overwhelmed many traditional assumptions about how business production
environments work and evolve.
Most evolution is now user-demand driven, with remarkably low barriers against rapid and
dramatic changes at many architectural levels of production.
Consequently, the conventional CMDB is more unlikely to keep up with the velocity,
volume and variety of changes – except through extraordinary amounts of labor.
Its fundamental weakness for business use lies in the difficulty of maintaining complete and
accurate data despite the continually increasing dynamic (not mechanical) complexity of
what it tries to describe.
For business purposes, a corrected CMDB focus would be on service implementations
rather than on systems implementations.
Self-Healing Systems vs. Management
Everyone knows that automation is the principle solution to labor burdens.
Automation essentially brings execution power at high speed. More automation means
that, through any combination of prediction and response that it offers, significant
production can occur closer and closer to real-time demand.
In I.T., automation now must be understood as a phenomenon of intelligence driving
instructions that in turn are driving machine-based procedures.
That definition clearly involves analyses, communications, and commands – all matters
that are dramatically amplified and optimized by advanced information systems and
information management technologies available today.
I.T. automation brings both recovery (maintenance) and re-engineering (change) of the
production systems to much higher levels of effectiveness versus complexity, diversity or
volatility of operational circumstances, without manual intervention.
Even more significant, I.T. (intelligence-based) automation increasingly means that the vast
majority of adjustments may be made without requiring the notification and response of
people.
Management Automation
To operations, a major implication of the automation of management is that there is an
unprecedented availability of real-time transparency of all current effects and states.
Operations in a maintained engineered environment then automatically uses that
intelligence to guide immediate follow-up re-engineering at whatever intensity is
appropriate.
For managing continuity, that automation ultimately means promoting, adjusting and
correcting behaviors of service elements in real time, continuously.
For managing services, the automation dramatically reduces the required level of real-time
human attention to risks in the viability of systems underlying service elements.
That automation allows shifting management’s attention mainly to addressing the
business’s interpretation of service behaviors.
Value Recognition
The implications of intelligent automation are big and already very real.
Automation can detect, analyze and respond to vast amounts of data, both local
and remote, with otherwise unattainable speed and consistency.
Programming in automation removes the need for continual human interventions
in existing detection, analysis and response – and accommodates decentralization
of the data.
The data processing in automation drives automated interpretations of current
conditions.
Advancing along the lines of A.I., machine learning, Big Data, IoT, and digital
(virtual) architectures, configuration management will evolve to resemble the
operation of quantitative analyses driving trading behaviors on Wall Street.
Behaviors are evaluated for their meaning with regard to gains, stabilities, and
losses (i.e., value) in the market.
Central Intelligence
In the stock market, the enormous amount of intelligence is not held in some container as
a static reference.
Instead, it is continually streaming input.
The “central database” of significant information exists mainly as a channel with a credible
point of contact, for federated real-time reporting (feeds of data) about entities that are
recognized through qualification by rules.
Recognition rules process detected entity attributes (called fundamentals).
Those attributes logically correlate with when demand leads to gains, stabilities, and losses
in the market through transactions.
And they correlate with how arrangements of the events and behaviors underpin the
transactions.
The actual real-time correlations may or may not conform to prescriptions or expectations.
Business Model Logic
For business managers, the example of the stock market management processing is clearly
important.
In an environment where change continuously occurs aggressively and intentionally, the
market management model is a more logical approach than conventional component-
based factory management of IT services requiring control of a master inventory.
That is, the environment of business capability is described and interpreted mainly as a
selective market of opportunities for “provision” (offer) of benefits, not mainly as a
proprietary factory of machines for “production” (inventory) of systems.
Services are responsible for organizing the elements that make offers viable, feasible, and
available.
To support pursuing and exploiting business-relevant opportunities:
• the business expects the benefits manager to practice Portfolio management.
• the business expects the service provider to practice Performance management.
• the business expects the systems manufacturer to practice Product management.
Business Management perspective
The business brings its demand-orientated perspective to management.
It interprets current conditions in terms of their impacts on its portfolio.
The portfolio is a registry of items (including assets, capabilities, and positions) having a
specific type of value.
Current events and opportunities represent potential impacts on value.
Desirable impacts are explicitly pursued with services that are directed behaviors.
The services offer behaviors of recognized roles (entities and actors) in the environment.
The roles are “change agents” that themselves rely on supporting resources.
The business can tolerate a high volume of changes occurring at the resource level without
having to do anything about it – as long as it can still directly manage the current states at
the service level.
“Configurations” of Business Capability
For pursuing opportunities on demand, the business is offered prescribed capabilities to use.
The capabilities are based on co-operative functioning of prescribed entities.
Under management, services offer prescribed behaviors of recognized roles in the environment.
The roles rely on prescribed resourcing.
• Systems instantiate the entities and actors that resource the roles.
• Components constitute prescribed modules of systems.
To enable managed business capability:
An operations director deals with functional (entity) relation.
A service provider deals with behavioral (role) orchestration.
A systems manufacturer deals with structural (resource) integration.
A component supplier deals with unit (part) assembly.
Four Types of
prescribed
Configurations
customers
competition
innovation
complexity
volume
velocity
variety
diversity
volatility
DEVELOPMENT
of value
RISK
of relevance
Systems
from integration
OPPORTUNITY
CHANGE
PROVISION Services
from orchestration
SUPPORT
of continuity
Options
from transparency
Performance
from pursuit
Recognition
through rules
Demand effects
Supply effects
Business TopicBusiness Prospect Business Challenge
Offers
from provision
©2016 Malcolm Ryder / Archestra Research
Configuration Information
for Business
A “CI” is a resourced instance (an identified “actor”) of a role.
A configuration is a purposeful arrangement of the instances for a capability.
Engineering desired effects with
prefabrication and orchestration
Innovative technology automation has created a new range of infrastructure patterns by offering
more of what appears to be “prefabricated” functionality.
Prefabrication suggests to the business user that there is little-to-no need for “micro-managing” the
item engaged as the source of the functionality.
In this view, the quality and integrity of the item’s “internals” are the responsibility of the item
producer, not the item user. The producer, not the user, is held accountable for a reliable assurance
that the item’s functionality will be available as advertised.
The overall approach is to assemble modules of capability, where a module has “no user-serviceable
parts inside” but can work with other modules in a user-required way called a “deliverable”.
A defined deliverable comes with a designated scope, time and cost – all of which apply to a module
of capability providing enabling behaviors. But with modularity, assurance of capability shifts from a
basis of producers building things with user-owned assets to a basis of providers enabling things
with user-defined behaviors.
Assembling behavior modules for their co-operation means that they must be coordinated. The
coordination is aimed at all modules supporting the same designated function requested by
demand. Orchestrating the behaviors is a sophisticated mode of coordination that addresses the
diversity and variability of requirements imposed by demand on the modules. The resulting
coordination is called a configuration.
Defining Capability Modules: Actors
Functions exist at all scales and scopes
of responsibility.
To execute a function, operators within
the boundary of the function perform
actions in a specified role within a
production.
Operators can be solo, integrated,
chained, bundled, or sequenced in
order to have them generate production
progress through a coordination of their
responsibilities.
A defined operator, when included by a
function, is an actor.
Actors exist at all scales and
complexities of form, as necessary to
retain singular accountability for a
defined influence recognized as an
effect.
The effective influence is the value of
the actor to the function.
Small/simple
large/simple
Medium/complex
Medium/simple
large/complex
Medium/complex
Producing Actors (functional operators)
Actors in a role are created through a combination of:
Character definition (conception)
Training and support (development)
Casting and Rehearsal (testing)
Direction (monitoring, evaluation and adjustment)
As a result, we can say that the behavior supplied by the role has been engineered, where all
aspects from the “expectation” to the “reality” are being managed to have a particular outcome.
Successfully creating needed actors generates the availability of production capability, through role
performance.
One actor can perform several roles.
One role can be performed by several actors.
One actor can interact distinctively with several other actors.
Capability is the existing potential for an intended performance, which is expressed in operation.
The on-demand delivery of effects to known users is the target function of production.
DESIGN
Manage per Effect (describe)
INSPECT FEEDBACKCONSTRUCT
DEVELOP
“To Be”
Information
Manage per Intention (prescribe)
(Iteration) (Validation)
“CONFIGURED“ Appropriate Authorized ValuablePrescribed Productive
TEST
“As Is”
Implementation
Correct
“ENGINEERED“
“DEFINED“
“CONCEIVED“
©2016 Malcolm Ryder / Archestra Research
POLICY
RULES
SCRIPT
FUNCTION
SPECIFICATION
MODEL
Actor behavior is engineered for Demand by
defining the expectations applied as
constraints by the consumer of the behavior
DEVELOP
“To Be”
Information
Manage per Intention
Actor behavior is engineered for Supply by
defining the type and the conditions that
allow its use and cooperation
An “agent of capability” is an entity with an
intended and appropriate behavior, which
makes it an ACTOR.
Appropriate
A range of standard types of information will constitute
a definition complete enough for reliable management.
©2016 Malcolm Ryder / Archestra Research
POLICY
RULES
SCRIPT
FUNCTION
SPECIFICATION
MODEL
BEHAVIOR
ENGINEERED
FOR DEMAND
Situation
Constraint
Capability
Execution
Resource
Form
TESTDEVELOP
“To Be”
Information
“As Is”
Implementation
ENGINEERING
“CONFIGURED“
BEHAVIOR
ENGINEERED
FOR SUPPLY
CorrectAppropriate
The instantiation of an ACTOR realizes the
conceived and intended entity as an item that
is, according to its logical definition, detectable
and supportable in an implementation.
©2016 Malcolm Ryder / Archestra Research
DESIGN
Priority
Tolerance
Role
Demonstration
Properties
Relations
(Iteration)
Prescribed
Manage for “To Be” Effect
An ACTOR managed according to plan will be
effective as prescribed.
Actor behavior is developed for Demand by
defining the expectations applied as
constraints by the user of the behavior
Actor behavior is developed for Supply by
defining the type and conditions that allow
its use and cooperation
A range of standard types of information will constitute
a definition complete enough for reliable management.
©2016 Malcolm Ryder / Archestra Research
BEHAVIOR
ENGINEERED
FOR DEMAND
“CONFIGURED“
BEHAVIOR
ENGINEERED
FOR SUPPLY
DESIGN CONSTRUCT
Event
Deployment
Process
Assignment
Instance
System
Priority
Tolerance
Role
Demonstration
Properties
Relations
(Iteration)
AuthorizedPrescribed
OFFER
The “Offered” version of the Actor is
positioned to behave in an authorized way or
else will be redirected, restrained, revised or
removed. The authorized behavior is exhibited
and observable in defined circumstances.
©2016 Malcolm Ryder / Archestra Research
INSPECT
Context
Assignment
Compliance
Usage
Dependency
Persistence
(Validation)
Productive
An ACTOR managed according to plan will be
effective for productivity.
Actor behavior is tested for Demand by
defining the proposed conditions relevant
to the party requesting the behavior
Actor behavior is tested for Supply by
defining the type and characteristics that
justify its responsibility to the utilization.
Manage for “As Is” Effect
A range of standard types of information will constitute
a definition complete enough for reliable management.
©2016 Malcolm Ryder / Archestra Research
INSPECT FEEDBACK
Context
Assignment
Compliance
Usage
Dependency
Persistence
State
Risk
Performance
Impact
Availability
Continuity
(Validation)
ValuableProductive
ASSESS
BEHAVIOR
ENGINEERED
FOR DEMAND
“CONFIGURED“
BEHAVIOR
ENGINEERED
FOR SUPPLY
The “Assessed” instance of the Actor is
measured to determine if and how its actual
behavior is valuable.
©2016 Malcolm Ryder / Archestra Research
DESIGN
AUTOMATE from “To Be” through “As Is”
INSPECT FEEDBACKCONSTRUCT
Event
Deployment
Process
Assignment
Instance
System
Context
Assignment
Compliance
Usage
Dependency
Persistence
State
Risk
Performance
Impact
Availability
Continuity
Priority
Tolerance
Role
Demonstration
Properties
Relations
From “To Be”
Information
To “As Is”
Implementation
CONFIGURE
(Iteration) (Validation)
“Configuration” is a meaningful term
primarily in that it expresses concern for
whether the desired effect of utilizing a
source of capability (an actor) is logically
supported by the actual state of the source.
Management is applied to proactively
ensure (engineer) the support, bridging the
intended “to be” and the actual “as is”.
All of the iteration and validation work
involves defining and monitoring the
occasions in which the designated actor
should be evident. Although there are
many things involved, each of them can
now be defined and monitored more
rapidly and completely with automation,
which also now means continuously.
Authorized ValuablePrescribed Productive
©2016 Malcolm Ryder / Archestra Research
POLICY
RULES
SCRIPT
FUNCTION
SPECIFICATION
MODEL
DESIGN INSPECT
BEHAVIOR
ENGINEERED
FOR DEMAND
Situation
Constraint
Capability
Execution
Resource
Form
FEEDBACKCONSTRUCT
Event
Deployment
Process
Assignment
Instance
System
Context
Assignment
Compliance
Usage
Dependency
Persistence
State
Risk
Performance
Impact
Availability
Continuity
Priority
Tolerance
Role
Demonstration
Properties
Relations
TESTDEVELOP
“To Be”
Information
“As Is”
Implementation
ENGINEERED
(Iteration) (Validation)
“CONFIGURED“
BEHAVIOR
ENGINEERED
FOR SUPPLY
CorrectAppropriate Authorized ValuablePrescribed Productive
OFFERED “To Be” ASSESSED “As Is”
How a Business
sees meaning in
Configurations
©2016 Malcolm Ryder / Archestra Research
©2016 Malcolm Ryder / Archestra Research
www.archestra.com
mryder@archestra.com

Mais conteúdo relacionado

Mais procurados

A process view framework for artifact centric business processes
A process view framework  for artifact centric business processesA process view framework  for artifact centric business processes
A process view framework for artifact centric business processesDr. Sira Yongchareon
 
How to Implement a Manufacturing System
How to Implement a Manufacturing SystemHow to Implement a Manufacturing System
How to Implement a Manufacturing SystemSania Baker
 
Governance and Autonomous IT
Governance and Autonomous ITGovernance and Autonomous IT
Governance and Autonomous ITMalcolm Ryder
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesMichael zur Muehlen
 
Performing Innovation Under Governance
Performing Innovation Under GovernancePerforming Innovation Under Governance
Performing Innovation Under GovernanceMalcolm Ryder
 
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES ijwscjournal
 
Raising the Stakes - IT Governance
Raising the Stakes - IT GovernanceRaising the Stakes - IT Governance
Raising the Stakes - IT GovernanceMalcolm Ryder
 
Allegro Opportune Success Factors For Etrm System Implementation
Allegro Opportune  Success Factors For Etrm System ImplementationAllegro Opportune  Success Factors For Etrm System Implementation
Allegro Opportune Success Factors For Etrm System Implementationrobertjparker
 
Building an effective and extensible data and analytics operating model
Building an effective and extensible data and analytics operating modelBuilding an effective and extensible data and analytics operating model
Building an effective and extensible data and analytics operating modelJayakumar Rajaretnam
 
The value-of-energy-trading-and-risk-management-systems (1)
The value-of-energy-trading-and-risk-management-systems (1)The value-of-energy-trading-and-risk-management-systems (1)
The value-of-energy-trading-and-risk-management-systems (1)Samantha Johnston
 
Strategy & Business Process Management
Strategy & Business Process ManagementStrategy & Business Process Management
Strategy & Business Process Management451 Research
 
11 Aggressive Ideas About Configuration Management
11 Aggressive Ideas About Configuration Management11 Aggressive Ideas About Configuration Management
11 Aggressive Ideas About Configuration ManagementMalcolm Ryder
 
The Three Pillars of Modern Business Process Management Solutions
The Three Pillars of Modern Business Process Management SolutionsThe Three Pillars of Modern Business Process Management Solutions
The Three Pillars of Modern Business Process Management SolutionsAppian
 
The Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp SoftwareThe Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp SoftwareDonovan Mulder
 

Mais procurados (19)

A process view framework for artifact centric business processes
A process view framework  for artifact centric business processesA process view framework  for artifact centric business processes
A process view framework for artifact centric business processes
 
How to Implement a Manufacturing System
How to Implement a Manufacturing SystemHow to Implement a Manufacturing System
How to Implement a Manufacturing System
 
Bsa 400 preview full class
Bsa 400 preview full classBsa 400 preview full class
Bsa 400 preview full class
 
Governance and Autonomous IT
Governance and Autonomous ITGovernance and Autonomous IT
Governance and Autonomous IT
 
Business process management
Business process managementBusiness process management
Business process management
 
BPM - better without the waterfall
BPM - better without the waterfall BPM - better without the waterfall
BPM - better without the waterfall
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business Processes
 
Performing Innovation Under Governance
Performing Innovation Under GovernancePerforming Innovation Under Governance
Performing Innovation Under Governance
 
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
 
Raising the Stakes - IT Governance
Raising the Stakes - IT GovernanceRaising the Stakes - IT Governance
Raising the Stakes - IT Governance
 
Allegro Opportune Success Factors For Etrm System Implementation
Allegro Opportune  Success Factors For Etrm System ImplementationAllegro Opportune  Success Factors For Etrm System Implementation
Allegro Opportune Success Factors For Etrm System Implementation
 
Building an effective and extensible data and analytics operating model
Building an effective and extensible data and analytics operating modelBuilding an effective and extensible data and analytics operating model
Building an effective and extensible data and analytics operating model
 
The value-of-energy-trading-and-risk-management-systems (1)
The value-of-energy-trading-and-risk-management-systems (1)The value-of-energy-trading-and-risk-management-systems (1)
The value-of-energy-trading-and-risk-management-systems (1)
 
Strategy & Business Process Management
Strategy & Business Process ManagementStrategy & Business Process Management
Strategy & Business Process Management
 
11 Aggressive Ideas About Configuration Management
11 Aggressive Ideas About Configuration Management11 Aggressive Ideas About Configuration Management
11 Aggressive Ideas About Configuration Management
 
Dit yvol4iss46
Dit yvol4iss46Dit yvol4iss46
Dit yvol4iss46
 
GEM-EMA Practitioner Guide
GEM-EMA Practitioner GuideGEM-EMA Practitioner Guide
GEM-EMA Practitioner Guide
 
The Three Pillars of Modern Business Process Management Solutions
The Three Pillars of Modern Business Process Management SolutionsThe Three Pillars of Modern Business Process Management Solutions
The Three Pillars of Modern Business Process Management Solutions
 
The Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp SoftwareThe Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp Software
 

Semelhante a Business Service Configurations

Making Every Asset Count - A Lean IT Best Practice
Making Every Asset Count - A Lean IT Best PracticeMaking Every Asset Count - A Lean IT Best Practice
Making Every Asset Count - A Lean IT Best PracticeDavid Messineo
 
ITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachDavid Messineo
 
CIOs and the Shock of the New
CIOs and the Shock of the NewCIOs and the Shock of the New
CIOs and the Shock of the NewMalcolm Ryder
 
Demand-Based ITSM as Business Resource Management
Demand-Based ITSM as Business Resource ManagementDemand-Based ITSM as Business Resource Management
Demand-Based ITSM as Business Resource ManagementMalcolm Ryder
 
Organizing Asset Management Today
Organizing Asset Management TodayOrganizing Asset Management Today
Organizing Asset Management TodayDavid Messineo
 
How Good Are You At Managing ITSM?
How Good Are You At Managing ITSM?How Good Are You At Managing ITSM?
How Good Are You At Managing ITSM?Malcolm Ryder
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management AgentJerald Burget
 
Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of DutiesWill Kelly
 
Cost reduction tool_complexity_management_2020
Cost reduction tool_complexity_management_2020Cost reduction tool_complexity_management_2020
Cost reduction tool_complexity_management_2020Peter Soetevent
 
Managing Interdependencies in Complex Organizations
Managing Interdependencies in Complex OrganizationsManaging Interdependencies in Complex Organizations
Managing Interdependencies in Complex OrganizationsNicolay Worren
 
How Evolven Blended Analytics Is Helping to Transform IT Efficiency and Value
How Evolven Blended Analytics Is Helping to Transform IT Efficiency and ValueHow Evolven Blended Analytics Is Helping to Transform IT Efficiency and Value
How Evolven Blended Analytics Is Helping to Transform IT Efficiency and ValueEvolven Software
 
Manufacturing a digital transformation - ebook
Manufacturing a digital transformation - ebookManufacturing a digital transformation - ebook
Manufacturing a digital transformation - ebookElliot Drabs
 
Responsibility Concept At P&G
Responsibility Concept At P&GResponsibility Concept At P&G
Responsibility Concept At P&GManoj Agarwal
 
Management as a Service - MaaS for IT
Management as a Service - MaaS for ITManagement as a Service - MaaS for IT
Management as a Service - MaaS for ITMalcolm Ryder
 
IT Production Mgmt issues Map
IT Production Mgmt issues MapIT Production Mgmt issues Map
IT Production Mgmt issues MapMalcolm Ryder
 
Continual Improvement with Status Enterprise
Continual Improvement with Status EnterpriseContinual Improvement with Status Enterprise
Continual Improvement with Status EnterpriseRich Hunzinger
 
Migration To Innovation
Migration To InnovationMigration To Innovation
Migration To InnovationMalcolm Ryder
 

Semelhante a Business Service Configurations (20)

A CMDB. A What?
A CMDB. A What?A CMDB. A What?
A CMDB. A What?
 
Making Every Asset Count - A Lean IT Best Practice
Making Every Asset Count - A Lean IT Best PracticeMaking Every Asset Count - A Lean IT Best Practice
Making Every Asset Count - A Lean IT Best Practice
 
ITAM and CCM - A Unified Approach
ITAM and CCM - A Unified ApproachITAM and CCM - A Unified Approach
ITAM and CCM - A Unified Approach
 
CIOs and the Shock of the New
CIOs and the Shock of the NewCIOs and the Shock of the New
CIOs and the Shock of the New
 
Demand-Based ITSM as Business Resource Management
Demand-Based ITSM as Business Resource ManagementDemand-Based ITSM as Business Resource Management
Demand-Based ITSM as Business Resource Management
 
Organizing Asset Management Today
Organizing Asset Management TodayOrganizing Asset Management Today
Organizing Asset Management Today
 
How Good Are You At Managing ITSM?
How Good Are You At Managing ITSM?How Good Are You At Managing ITSM?
How Good Are You At Managing ITSM?
 
EA as a Change Management Agent
EA as a Change Management AgentEA as a Change Management Agent
EA as a Change Management Agent
 
Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of Duties
 
Cost reduction tool_complexity_management_2020
Cost reduction tool_complexity_management_2020Cost reduction tool_complexity_management_2020
Cost reduction tool_complexity_management_2020
 
ebizQ publication
ebizQ publicationebizQ publication
ebizQ publication
 
Managing Interdependencies in Complex Organizations
Managing Interdependencies in Complex OrganizationsManaging Interdependencies in Complex Organizations
Managing Interdependencies in Complex Organizations
 
How Evolven Blended Analytics Is Helping to Transform IT Efficiency and Value
How Evolven Blended Analytics Is Helping to Transform IT Efficiency and ValueHow Evolven Blended Analytics Is Helping to Transform IT Efficiency and Value
How Evolven Blended Analytics Is Helping to Transform IT Efficiency and Value
 
Manufacturing a digital transformation - ebook
Manufacturing a digital transformation - ebookManufacturing a digital transformation - ebook
Manufacturing a digital transformation - ebook
 
Togaf
TogafTogaf
Togaf
 
Responsibility Concept At P&G
Responsibility Concept At P&GResponsibility Concept At P&G
Responsibility Concept At P&G
 
Management as a Service - MaaS for IT
Management as a Service - MaaS for ITManagement as a Service - MaaS for IT
Management as a Service - MaaS for IT
 
IT Production Mgmt issues Map
IT Production Mgmt issues MapIT Production Mgmt issues Map
IT Production Mgmt issues Map
 
Continual Improvement with Status Enterprise
Continual Improvement with Status EnterpriseContinual Improvement with Status Enterprise
Continual Improvement with Status Enterprise
 
Migration To Innovation
Migration To InnovationMigration To Innovation
Migration To Innovation
 

Mais de Malcolm Ryder

Strategic structures for aligning Cooperation_the Enterprise.pdf
Strategic structures for aligning Cooperation_the Enterprise.pdfStrategic structures for aligning Cooperation_the Enterprise.pdf
Strategic structures for aligning Cooperation_the Enterprise.pdfMalcolm Ryder
 
Inclusion is the Equity of Diversity 04.19.23.pdf
Inclusion is the Equity of Diversity 04.19.23.pdfInclusion is the Equity of Diversity 04.19.23.pdf
Inclusion is the Equity of Diversity 04.19.23.pdfMalcolm Ryder
 
A Semantic Model of Enterprise Change.pdf
A Semantic Model of Enterprise Change.pdfA Semantic Model of Enterprise Change.pdf
A Semantic Model of Enterprise Change.pdfMalcolm Ryder
 
Complexity and Simplicity Unpacked
Complexity and Simplicity UnpackedComplexity and Simplicity Unpacked
Complexity and Simplicity UnpackedMalcolm Ryder
 
Decision Knowledge: Sense and Respond
Decision Knowledge: Sense and RespondDecision Knowledge: Sense and Respond
Decision Knowledge: Sense and RespondMalcolm Ryder
 
Decoding cognitive bias
Decoding cognitive biasDecoding cognitive bias
Decoding cognitive biasMalcolm Ryder
 
Change Enablement Framework - Introduction
Change Enablement Framework - IntroductionChange Enablement Framework - Introduction
Change Enablement Framework - IntroductionMalcolm Ryder
 
Alignment of Value and Performance - Reference model
Alignment of Value and Performance - Reference modelAlignment of Value and Performance - Reference model
Alignment of Value and Performance - Reference modelMalcolm Ryder
 
Management for Production
Management for ProductionManagement for Production
Management for ProductionMalcolm Ryder
 
Complexity, Simplicity, and Management
Complexity, Simplicity, and ManagementComplexity, Simplicity, and Management
Complexity, Simplicity, and ManagementMalcolm Ryder
 
Meetings as Information Behaviors
Meetings as Information BehaviorsMeetings as Information Behaviors
Meetings as Information BehaviorsMalcolm Ryder
 
Revisiting Waterfall
Revisiting WaterfallRevisiting Waterfall
Revisiting WaterfallMalcolm Ryder
 
Organizational Architecture and Models
Organizational Architecture and ModelsOrganizational Architecture and Models
Organizational Architecture and ModelsMalcolm Ryder
 
Producing Change - Getting Beyond Execution
Producing Change - Getting Beyond ExecutionProducing Change - Getting Beyond Execution
Producing Change - Getting Beyond ExecutionMalcolm Ryder
 
Authority versus Leadership
Authority versus LeadershipAuthority versus Leadership
Authority versus LeadershipMalcolm Ryder
 
Archestra Adaptive Enterprise
Archestra Adaptive EnterpriseArchestra Adaptive Enterprise
Archestra Adaptive EnterpriseMalcolm Ryder
 

Mais de Malcolm Ryder (20)

Strategic structures for aligning Cooperation_the Enterprise.pdf
Strategic structures for aligning Cooperation_the Enterprise.pdfStrategic structures for aligning Cooperation_the Enterprise.pdf
Strategic structures for aligning Cooperation_the Enterprise.pdf
 
Inclusion is the Equity of Diversity 04.19.23.pdf
Inclusion is the Equity of Diversity 04.19.23.pdfInclusion is the Equity of Diversity 04.19.23.pdf
Inclusion is the Equity of Diversity 04.19.23.pdf
 
A Semantic Model of Enterprise Change.pdf
A Semantic Model of Enterprise Change.pdfA Semantic Model of Enterprise Change.pdf
A Semantic Model of Enterprise Change.pdf
 
Complexity and Simplicity Unpacked
Complexity and Simplicity UnpackedComplexity and Simplicity Unpacked
Complexity and Simplicity Unpacked
 
Decision Knowledge: Sense and Respond
Decision Knowledge: Sense and RespondDecision Knowledge: Sense and Respond
Decision Knowledge: Sense and Respond
 
Decoding cognitive bias
Decoding cognitive biasDecoding cognitive bias
Decoding cognitive bias
 
Designing design
Designing designDesigning design
Designing design
 
Change Enablement Framework - Introduction
Change Enablement Framework - IntroductionChange Enablement Framework - Introduction
Change Enablement Framework - Introduction
 
Alignment of Value and Performance - Reference model
Alignment of Value and Performance - Reference modelAlignment of Value and Performance - Reference model
Alignment of Value and Performance - Reference model
 
Management for Production
Management for ProductionManagement for Production
Management for Production
 
Complexity, Simplicity, and Management
Complexity, Simplicity, and ManagementComplexity, Simplicity, and Management
Complexity, Simplicity, and Management
 
Meetings as Information Behaviors
Meetings as Information BehaviorsMeetings as Information Behaviors
Meetings as Information Behaviors
 
Groups versus Teams
Groups versus TeamsGroups versus Teams
Groups versus Teams
 
Revisiting Waterfall
Revisiting WaterfallRevisiting Waterfall
Revisiting Waterfall
 
Changing Work
Changing WorkChanging Work
Changing Work
 
Organizing Agility
Organizing AgilityOrganizing Agility
Organizing Agility
 
Organizational Architecture and Models
Organizational Architecture and ModelsOrganizational Architecture and Models
Organizational Architecture and Models
 
Producing Change - Getting Beyond Execution
Producing Change - Getting Beyond ExecutionProducing Change - Getting Beyond Execution
Producing Change - Getting Beyond Execution
 
Authority versus Leadership
Authority versus LeadershipAuthority versus Leadership
Authority versus Leadership
 
Archestra Adaptive Enterprise
Archestra Adaptive EnterpriseArchestra Adaptive Enterprise
Archestra Adaptive Enterprise
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Business Service Configurations

  • 1. Business Service Configurations How Business Sees Meaning In Configurations
  • 2. Archestra notebooks compile and organize decades of in-the-field empirical findings, to offer explanations of why things happened or can happen in certain ways or to certain effects. The descriptions are determined mainly from the perspective of strategy and architecture, to comment on and navigate between the motives and potentials that predetermine the decisions and shapes of activity as discussed in the notes. All notebooks are subject to change. ©2016 Malcolm Ryder / Archestra Research
  • 3. The Point of Diminishing Returns A business increasingly has to get things done using things it didn’t make, provided from external sources it does not control. At the same time it usually has a culture of risk prevention that is enforced in what it makes itself, for its own use or use by customers and partners. For management of risks in operations, the business needs information that explains why something behaves in the business the way that it does. But that is not the same as the information that explains how something works. When something does not work, the need is to know if the why is because of the how. If the link between the how and the why cannot be openly clarified, then who cares about how much detailed data there is on either side? What’s necessary is someplace dependable to get that clarification, on demand. The more variable the data is on each side, the more obvious it is that the clarification must come from rapid analysis of timely, reliable discoveries.
  • 4. The Who Cares Test Successfully leveraging “prospects” despite current challenges is the business of business. In business tactics, the leverage involves a balancing act: the probability of losing an opportunity or a customer, weighed against the difficulty of gaining new opportunities and customers. Any imbalance necessitates a trade-off – a calculated risk. In any given business, that calculation can be a strong point or a serious weak point in capability. Discovering valuable new opportunities and customers (development) requires more intensive and difficult analyses than does assuring continuity (support). But for business, continuity essentially has meaning as “continual effectiveness from preparedness”, not as “don’t change anything”. Preparedness should always mean being able to do different things at different times, as necessary. The new normal for business is that there is continuous environmental change exerting influences that create imbalances and the subsequent need for re-evaluating trade-offs. That puts pressure on whether the business’s current preparedness actually does include the ability to do different things at different times as necessary. Current preparedness fails if it cracks under pressure. It is necessary to understand how the pressure threatens continuity, and how to organize management of the threats.
  • 5. customers competition innovation complexity volume velocity variety diversity volatility DEVELOPMENT of value RISK of relevance Systems from integration OPPORTUNITY CHANGE PROVISION Services from orchestration SUPPORT of continuity Options from transparency Performance from pursuit Recognition through rules Demand effects Supply effects Business TopicBusiness Prospect Business Challenge Offers from provision ©2016 Malcolm Ryder / Archestra Research
  • 6. Engineering outcomes Service Management is, of course, about managing services. But the point of management per se is independent of what it is managing. Management is always concerned that: • The right thing is resulting • in a reliable way • with predictable effects • that are not counter-productive • and that immediately have adequate value Increasingly, tasks that provide assurance of the above outcomes are tasks that can be automated. Automation makes the production of desired outcomes significantly more readily achievable as intended. Automation essentially turns the producing into persistent engineering. Engineering is expected to “pre-configure” both a service for business and the underpinnings of the service. If services as originally engineered were then impervious to damage and/or did not need to change, then further managing their configuration would not be necessary. But damage and change are both facts of life. Due to the impacts of damage and change on finance and performance, management of the configurations of services is not optional. Services help management, but a service itself must be managed.
  • 7. What is a Configuration In IT, a “service” has typically been a logical view of a “configuration” of components, important for supply to the business. A component is meaningful as a static item; components are sub-units of system structures. Components are managed through systems management, and there are component topologies to describe their managed arrangement. But, a “configuration” of a service is not just a structure of components; it is an arrangement of elements. An element is meaningful as a dynamic item: an element is a required aspect of a cause of action. It is a logical view, important to demand by the business. Action elements are implemented through forms that may be virtual (emulated) or real (physical). The implementation of the forms amounts to the configuration of the service.
  • 8. What is a Configuration Item A “CI” (configuration item) is not simply a component that has specified attributes. An “item” of a service configuration is a logical view of an element (a cause of action) of a service in operation as prescribed. That logical view is identified as a form used to implement an element. A configuration item is, therefore, a form used to implement an element of a service. The form called a “CI” has a prescribed behavior as an element of an action or event that constitutes a function. The behavior may have dependencies on particular components made available as resources, but the prescribed behavior is the focus of managing the service configuration. In other words, an identified CI is a resourced instance (an identified “actor”) of a role.
  • 9. The essential CMDB An identified CI is a resourced instance (an identified “actor”) of a role. The form called a “CI” is accountable as an element that has its prescribed behavior engineered in a function. What makes the entity behavior “engineered” is intentionality. The intentionality is a combination of definitions identifying what is (to be) appropriate , with evidence indicating that the realization of the behavior (as is) correctly corresponds. The definition and evidence data necessary to accurately account for the form in terms of the intentionality are usually expected to be contained for management in a configurations management database (CMDB). The CMDB also includes identifiers of the interaction of the forms in terms of intentionality.
  • 10. The Anti-agile CMDB Up to now, a conventional Configuration Management Data Base (CMDB) has cataloged and mapped managed components according to the dependent interactions that describe the mechanics of production systems. It has called those components “CIs”. In effect, it attempts to instrument quality assurance of system implementations that make up a production environment. Both as a purpose and as a result of that, the most prevalent use of a conventional CMDB is to provide a blueprint allowing reverse-engineering and support of what it tries to descriptively document. That amounts to supporting the systems usage by business. But for current businesses, flexibility at high speed is the order of the day. Conventionally, a system’s mechanics are not known to have flexibility without high levels of complexity. In those mechanics, stabilizing complexity for the purpose of gaining reliability (preparedness) usually involves high-energy optimization and/or high resistance to change. That increases the risk of “stability” becoming rigidity or brittleness, reducing its relevance to different future conditions than already existed. A conventional CMDB, focusing on components, is thereby always at risk of becoming either unmanageable or obsolete, unless the level of investment in its maintenance can be sustained at any necessary intensity.
  • 11. CMDB for Business Meanings On the business side, the influences of competition, of technology innovation, and of cost- efficiency are now each strongly escalated and together endlessly re-combined. That has overwhelmed many traditional assumptions about how business production environments work and evolve. Most evolution is now user-demand driven, with remarkably low barriers against rapid and dramatic changes at many architectural levels of production. Consequently, the conventional CMDB is more unlikely to keep up with the velocity, volume and variety of changes – except through extraordinary amounts of labor. Its fundamental weakness for business use lies in the difficulty of maintaining complete and accurate data despite the continually increasing dynamic (not mechanical) complexity of what it tries to describe. For business purposes, a corrected CMDB focus would be on service implementations rather than on systems implementations.
  • 12. Self-Healing Systems vs. Management Everyone knows that automation is the principle solution to labor burdens. Automation essentially brings execution power at high speed. More automation means that, through any combination of prediction and response that it offers, significant production can occur closer and closer to real-time demand. In I.T., automation now must be understood as a phenomenon of intelligence driving instructions that in turn are driving machine-based procedures. That definition clearly involves analyses, communications, and commands – all matters that are dramatically amplified and optimized by advanced information systems and information management technologies available today. I.T. automation brings both recovery (maintenance) and re-engineering (change) of the production systems to much higher levels of effectiveness versus complexity, diversity or volatility of operational circumstances, without manual intervention. Even more significant, I.T. (intelligence-based) automation increasingly means that the vast majority of adjustments may be made without requiring the notification and response of people.
  • 13. Management Automation To operations, a major implication of the automation of management is that there is an unprecedented availability of real-time transparency of all current effects and states. Operations in a maintained engineered environment then automatically uses that intelligence to guide immediate follow-up re-engineering at whatever intensity is appropriate. For managing continuity, that automation ultimately means promoting, adjusting and correcting behaviors of service elements in real time, continuously. For managing services, the automation dramatically reduces the required level of real-time human attention to risks in the viability of systems underlying service elements. That automation allows shifting management’s attention mainly to addressing the business’s interpretation of service behaviors.
  • 14. Value Recognition The implications of intelligent automation are big and already very real. Automation can detect, analyze and respond to vast amounts of data, both local and remote, with otherwise unattainable speed and consistency. Programming in automation removes the need for continual human interventions in existing detection, analysis and response – and accommodates decentralization of the data. The data processing in automation drives automated interpretations of current conditions. Advancing along the lines of A.I., machine learning, Big Data, IoT, and digital (virtual) architectures, configuration management will evolve to resemble the operation of quantitative analyses driving trading behaviors on Wall Street. Behaviors are evaluated for their meaning with regard to gains, stabilities, and losses (i.e., value) in the market.
  • 15. Central Intelligence In the stock market, the enormous amount of intelligence is not held in some container as a static reference. Instead, it is continually streaming input. The “central database” of significant information exists mainly as a channel with a credible point of contact, for federated real-time reporting (feeds of data) about entities that are recognized through qualification by rules. Recognition rules process detected entity attributes (called fundamentals). Those attributes logically correlate with when demand leads to gains, stabilities, and losses in the market through transactions. And they correlate with how arrangements of the events and behaviors underpin the transactions. The actual real-time correlations may or may not conform to prescriptions or expectations.
  • 16. Business Model Logic For business managers, the example of the stock market management processing is clearly important. In an environment where change continuously occurs aggressively and intentionally, the market management model is a more logical approach than conventional component- based factory management of IT services requiring control of a master inventory. That is, the environment of business capability is described and interpreted mainly as a selective market of opportunities for “provision” (offer) of benefits, not mainly as a proprietary factory of machines for “production” (inventory) of systems. Services are responsible for organizing the elements that make offers viable, feasible, and available. To support pursuing and exploiting business-relevant opportunities: • the business expects the benefits manager to practice Portfolio management. • the business expects the service provider to practice Performance management. • the business expects the systems manufacturer to practice Product management.
  • 17. Business Management perspective The business brings its demand-orientated perspective to management. It interprets current conditions in terms of their impacts on its portfolio. The portfolio is a registry of items (including assets, capabilities, and positions) having a specific type of value. Current events and opportunities represent potential impacts on value. Desirable impacts are explicitly pursued with services that are directed behaviors. The services offer behaviors of recognized roles (entities and actors) in the environment. The roles are “change agents” that themselves rely on supporting resources. The business can tolerate a high volume of changes occurring at the resource level without having to do anything about it – as long as it can still directly manage the current states at the service level.
  • 18. “Configurations” of Business Capability For pursuing opportunities on demand, the business is offered prescribed capabilities to use. The capabilities are based on co-operative functioning of prescribed entities. Under management, services offer prescribed behaviors of recognized roles in the environment. The roles rely on prescribed resourcing. • Systems instantiate the entities and actors that resource the roles. • Components constitute prescribed modules of systems. To enable managed business capability: An operations director deals with functional (entity) relation. A service provider deals with behavioral (role) orchestration. A systems manufacturer deals with structural (resource) integration. A component supplier deals with unit (part) assembly. Four Types of prescribed Configurations
  • 19. customers competition innovation complexity volume velocity variety diversity volatility DEVELOPMENT of value RISK of relevance Systems from integration OPPORTUNITY CHANGE PROVISION Services from orchestration SUPPORT of continuity Options from transparency Performance from pursuit Recognition through rules Demand effects Supply effects Business TopicBusiness Prospect Business Challenge Offers from provision ©2016 Malcolm Ryder / Archestra Research
  • 20. Configuration Information for Business A “CI” is a resourced instance (an identified “actor”) of a role. A configuration is a purposeful arrangement of the instances for a capability.
  • 21. Engineering desired effects with prefabrication and orchestration Innovative technology automation has created a new range of infrastructure patterns by offering more of what appears to be “prefabricated” functionality. Prefabrication suggests to the business user that there is little-to-no need for “micro-managing” the item engaged as the source of the functionality. In this view, the quality and integrity of the item’s “internals” are the responsibility of the item producer, not the item user. The producer, not the user, is held accountable for a reliable assurance that the item’s functionality will be available as advertised. The overall approach is to assemble modules of capability, where a module has “no user-serviceable parts inside” but can work with other modules in a user-required way called a “deliverable”. A defined deliverable comes with a designated scope, time and cost – all of which apply to a module of capability providing enabling behaviors. But with modularity, assurance of capability shifts from a basis of producers building things with user-owned assets to a basis of providers enabling things with user-defined behaviors. Assembling behavior modules for their co-operation means that they must be coordinated. The coordination is aimed at all modules supporting the same designated function requested by demand. Orchestrating the behaviors is a sophisticated mode of coordination that addresses the diversity and variability of requirements imposed by demand on the modules. The resulting coordination is called a configuration.
  • 22. Defining Capability Modules: Actors Functions exist at all scales and scopes of responsibility. To execute a function, operators within the boundary of the function perform actions in a specified role within a production. Operators can be solo, integrated, chained, bundled, or sequenced in order to have them generate production progress through a coordination of their responsibilities. A defined operator, when included by a function, is an actor. Actors exist at all scales and complexities of form, as necessary to retain singular accountability for a defined influence recognized as an effect. The effective influence is the value of the actor to the function. Small/simple large/simple Medium/complex Medium/simple large/complex Medium/complex
  • 23. Producing Actors (functional operators) Actors in a role are created through a combination of: Character definition (conception) Training and support (development) Casting and Rehearsal (testing) Direction (monitoring, evaluation and adjustment) As a result, we can say that the behavior supplied by the role has been engineered, where all aspects from the “expectation” to the “reality” are being managed to have a particular outcome. Successfully creating needed actors generates the availability of production capability, through role performance. One actor can perform several roles. One role can be performed by several actors. One actor can interact distinctively with several other actors. Capability is the existing potential for an intended performance, which is expressed in operation. The on-demand delivery of effects to known users is the target function of production.
  • 24. DESIGN Manage per Effect (describe) INSPECT FEEDBACKCONSTRUCT DEVELOP “To Be” Information Manage per Intention (prescribe) (Iteration) (Validation) “CONFIGURED“ Appropriate Authorized ValuablePrescribed Productive TEST “As Is” Implementation Correct “ENGINEERED“ “DEFINED“ “CONCEIVED“ ©2016 Malcolm Ryder / Archestra Research
  • 25. POLICY RULES SCRIPT FUNCTION SPECIFICATION MODEL Actor behavior is engineered for Demand by defining the expectations applied as constraints by the consumer of the behavior DEVELOP “To Be” Information Manage per Intention Actor behavior is engineered for Supply by defining the type and the conditions that allow its use and cooperation An “agent of capability” is an entity with an intended and appropriate behavior, which makes it an ACTOR. Appropriate A range of standard types of information will constitute a definition complete enough for reliable management. ©2016 Malcolm Ryder / Archestra Research
  • 26. POLICY RULES SCRIPT FUNCTION SPECIFICATION MODEL BEHAVIOR ENGINEERED FOR DEMAND Situation Constraint Capability Execution Resource Form TESTDEVELOP “To Be” Information “As Is” Implementation ENGINEERING “CONFIGURED“ BEHAVIOR ENGINEERED FOR SUPPLY CorrectAppropriate The instantiation of an ACTOR realizes the conceived and intended entity as an item that is, according to its logical definition, detectable and supportable in an implementation. ©2016 Malcolm Ryder / Archestra Research
  • 27. DESIGN Priority Tolerance Role Demonstration Properties Relations (Iteration) Prescribed Manage for “To Be” Effect An ACTOR managed according to plan will be effective as prescribed. Actor behavior is developed for Demand by defining the expectations applied as constraints by the user of the behavior Actor behavior is developed for Supply by defining the type and conditions that allow its use and cooperation A range of standard types of information will constitute a definition complete enough for reliable management. ©2016 Malcolm Ryder / Archestra Research
  • 28. BEHAVIOR ENGINEERED FOR DEMAND “CONFIGURED“ BEHAVIOR ENGINEERED FOR SUPPLY DESIGN CONSTRUCT Event Deployment Process Assignment Instance System Priority Tolerance Role Demonstration Properties Relations (Iteration) AuthorizedPrescribed OFFER The “Offered” version of the Actor is positioned to behave in an authorized way or else will be redirected, restrained, revised or removed. The authorized behavior is exhibited and observable in defined circumstances. ©2016 Malcolm Ryder / Archestra Research
  • 29. INSPECT Context Assignment Compliance Usage Dependency Persistence (Validation) Productive An ACTOR managed according to plan will be effective for productivity. Actor behavior is tested for Demand by defining the proposed conditions relevant to the party requesting the behavior Actor behavior is tested for Supply by defining the type and characteristics that justify its responsibility to the utilization. Manage for “As Is” Effect A range of standard types of information will constitute a definition complete enough for reliable management. ©2016 Malcolm Ryder / Archestra Research
  • 30. INSPECT FEEDBACK Context Assignment Compliance Usage Dependency Persistence State Risk Performance Impact Availability Continuity (Validation) ValuableProductive ASSESS BEHAVIOR ENGINEERED FOR DEMAND “CONFIGURED“ BEHAVIOR ENGINEERED FOR SUPPLY The “Assessed” instance of the Actor is measured to determine if and how its actual behavior is valuable. ©2016 Malcolm Ryder / Archestra Research
  • 31. DESIGN AUTOMATE from “To Be” through “As Is” INSPECT FEEDBACKCONSTRUCT Event Deployment Process Assignment Instance System Context Assignment Compliance Usage Dependency Persistence State Risk Performance Impact Availability Continuity Priority Tolerance Role Demonstration Properties Relations From “To Be” Information To “As Is” Implementation CONFIGURE (Iteration) (Validation) “Configuration” is a meaningful term primarily in that it expresses concern for whether the desired effect of utilizing a source of capability (an actor) is logically supported by the actual state of the source. Management is applied to proactively ensure (engineer) the support, bridging the intended “to be” and the actual “as is”. All of the iteration and validation work involves defining and monitoring the occasions in which the designated actor should be evident. Although there are many things involved, each of them can now be defined and monitored more rapidly and completely with automation, which also now means continuously. Authorized ValuablePrescribed Productive ©2016 Malcolm Ryder / Archestra Research
  • 32. POLICY RULES SCRIPT FUNCTION SPECIFICATION MODEL DESIGN INSPECT BEHAVIOR ENGINEERED FOR DEMAND Situation Constraint Capability Execution Resource Form FEEDBACKCONSTRUCT Event Deployment Process Assignment Instance System Context Assignment Compliance Usage Dependency Persistence State Risk Performance Impact Availability Continuity Priority Tolerance Role Demonstration Properties Relations TESTDEVELOP “To Be” Information “As Is” Implementation ENGINEERED (Iteration) (Validation) “CONFIGURED“ BEHAVIOR ENGINEERED FOR SUPPLY CorrectAppropriate Authorized ValuablePrescribed Productive OFFERED “To Be” ASSESSED “As Is” How a Business sees meaning in Configurations ©2016 Malcolm Ryder / Archestra Research
  • 33. ©2016 Malcolm Ryder / Archestra Research www.archestra.com mryder@archestra.com