Understanding service requirements: How true are the truisms?

How to please the hard to please


Workshop How easy it is to say that ‘IT service delivery should start with the business’? It’s one of those statements like ‘the customer is king’ or ‘always clean up as you go along’, that may indeed save time in the long run but which can be a lot harder in practice than some theorists would like.

Like many a true word, just because it’s glib doesn’t make it any less relevant. But when faced with the hustle and bustle of keeping systems up and running, it can be easy to forget that IT is just a means to an end.

Business users don’t necessarily make things easier either. They are tough to please, and even if you can get past the “We want everything, and now” mentality, they can also find it hard to say what they want. I paraphrase but I can recall being told on more than occasion, “Service requirements? Isn’t that your job to work them out?”

To be fair, medium-sized organisations do have less of a challenge in trying to understand business needs than larger companies/enterprises simply because the former are less complex than the latter. This doesn’t always mean such organisations are in for an easy ride, however.

I remember one of my formative early jobs as an IT consultant. I was brought in to help write a Service Level Agreement (SLA) for a public body. What I didn’t know before I arrived was that the designated IT department representatives weren’t actually talking to their business counterparts anymore - an IT-business equivalent of a marital breakdown. I wish I could say I saved the day, but sadly all I did manage to coax out of the situation were a few response time targets.

Even in the best of cases, SLAs are only one element of service delivery. We all know whether or not we are getting what we would perceive as ‘good service’, be it in a restaurant or a shop or indeed from IT. The challenge (as I’m sure anyone who has worked in hospitality or retail would profess) is knowing what to put in place to support the delivery of services, whatever their shape or form.

In IT terms this boils down to the infrastructure itself, and how it is managed and operated. In a previous article we considered the architectural aspects of IT and how to deploy infrastructure that supports/enables the service requirements of the business.

While all organisations are different, a simple way to think about different service requirements is to remember that business activities tend to fall into one of two categories. The first is activities that are, or can benefit from being executed in a structured manner; and the second is those that cannot.

Considering more structured activities first; these have been given various names at various points over the past few decades – workflows, business processes and so on. Methodologies abound to identify and restructure them, with the goal of improving their efficiency and repeatability. Such treatments may also serve as the basis for understanding what can be automated – tasks which may or may not benefit from use of technology – and what their service expectations.

Forgive me if this is egg-sucking stuff, but in reality things don’t always work out that way. How many times have we seen software applications that are used only in part, if at all, because they don’t fit with the way the business actually works? Of course, the business can (and sometimes should) change to fit with new capabilities provided by technology. Still, business activities should be in the driving seat until it is ascertained that it is unique or adds considerable value, or is generic and does not.

For IT to support structured activities, it needs to operate efficiently – that is, as cheaply as possible. Interactions are largely transactional – responding to specific service requests or updating specific information items. In the structured world, flexibility is a second priority to service levels. If the service is unavailable or inaccessible for whatever reason, the cost to the business can be very high.

The second activity type – “everything that cannot be structured” – is no less important when it comes to deciding IT service requirements. We talk about collaboration tools, portals and information sharing facilities in this context, as well as mobile devices and other communication and information access capabilities.

For less structured activities, accessibility, flexibility and responsiveness are key drivers. There is no point at all, for example, in having a world class customer management system if it isn’t able to cough up a phone number to the service engineer who is working off-site.

From a service delivery perspective, the type of management required depends largely on the type of service being delivered. Transaction workers in structured environments need a similar structure when it comes to fault reporting and resolution, whereas more collaborative environments by their very nature will probably build in several different ways of getting to an answer (“Can’t access the file? OK, I’ll email it to you”).

At the heart of it all, however, lies a service mindset, which can be difficult to teach. I can think back to a number of colleagues who just knew that the quickest way to working out the answer was first to ask the right question. “Hang on,” said one, “Exactly what problem are we trying to solve here?”

A good starting point to find out is of course the business. Even if we think we know what the business priorities are, it doesn’t take much to check in with someone who is well placed enough to say. Assuming, of course, that the two sides are still talking. If not, it’s going to take more than an SLA to resolve that one.


Other stories you might like

  • Lonestar plans to put datacenters in the Moon's lava tubes
    How? Founder tells The Register 'Robots… lots of robots'

    Imagine a future where racks of computer servers hum quietly in darkness below the surface of the Moon.

    Here is where some of the most important data is stored, to be left untouched for as long as can be. The idea sounds like something from science-fiction, but one startup that recently emerged from stealth is trying to turn it into a reality. Lonestar Data Holdings has a unique mission unlike any other cloud provider: to build datacenters on the Moon backing up the world's data.

    "It's inconceivable to me that we are keeping our most precious assets, our knowledge and our data, on Earth, where we're setting off bombs and burning things," Christopher Stott, founder and CEO of Lonestar, told The Register. "We need to put our assets in place off our planet, where we can keep it safe."

    Continue reading
  • Conti: Russian-backed rulers of Costa Rican hacktocracy?
    Also, Chinese IT admin jailed for deleting database, and the NSA promises no more backdoors

    In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it doesn't pay a $20 million ransom. 

    Costa Rican president Rodrigo Chaves said that the country is effectively at war with the gang, who in April infiltrated the government's computer systems, gaining a foothold in 27 agencies at various government levels. The US State Department has offered a $15 million reward leading to the capture of Conti's leaders, who it said have made more than $150 million from 1,000+ victims.

    Conti claimed this week that it has insiders in the Costa Rican government, the AP reported, warning that "We are determined to overthrow the government by means of a cyber attack, we have already shown you all the strength and power, you have introduced an emergency." 

    Continue reading
  • China-linked Twisted Panda caught spying on Russian defense R&D
    Because Beijing isn't above covert ops to accomplish its five-year goals

    Chinese cyberspies targeted two Russian defense institutes and possibly another research facility in Belarus, according to Check Point Research.

    The new campaign, dubbed Twisted Panda, is part of a larger, state-sponsored espionage operation that has been ongoing for several months, if not nearly a year, according to the security shop.

    In a technical analysis, the researchers detail the various malicious stages and payloads of the campaign that used sanctions-related phishing emails to attack Russian entities, which are part of the state-owned defense conglomerate Rostec Corporation.

    Continue reading
  • FTC signals crackdown on ed-tech harvesting kid's data
    Trade watchdog, and President, reminds that COPPA can ban ya

    The US Federal Trade Commission on Thursday said it intends to take action against educational technology companies that unlawfully collect data from children using online educational services.

    In a policy statement, the agency said, "Children should not have to needlessly hand over their data and forfeit their privacy in order to do their schoolwork or participate in remote learning, especially given the wide and increasing adoption of ed tech tools."

    The agency says it will scrutinize educational service providers to ensure that they are meeting their legal obligations under COPPA, the Children's Online Privacy Protection Act.

    Continue reading
  • Mysterious firm seeks to buy majority stake in Arm China
    Chinese joint venture's ousted CEO tries to hang on - who will get control?

    The saga surrounding Arm's joint venture in China just took another intriguing turn: a mysterious firm named Lotcap Group claims it has signed a letter of intent to buy a 51 percent stake in Arm China from existing investors in the country.

    In a Chinese-language press release posted Wednesday, Lotcap said it has formed a subsidiary, Lotcap Fund, to buy a majority stake in the joint venture. However, reporting by one newspaper suggested that the investment firm still needs the approval of one significant investor to gain 51 percent control of Arm China.

    The development comes a couple of weeks after Arm China said that its former CEO, Allen Wu, was refusing once again to step down from his position, despite the company's board voting in late April to replace Wu with two co-chief executives. SoftBank Group, which owns 49 percent of the Chinese venture, has been trying to unentangle Arm China from Wu as the Japanese tech investment giant plans for an initial public offering of the British parent company.

    Continue reading
  • SmartNICs power the cloud, are enterprise datacenters next?
    High pricing, lack of software make smartNICs a tough sell, despite offload potential

    SmartNICs have the potential to accelerate enterprise workloads, but don't expect to see them bring hyperscale-class efficiency to most datacenters anytime soon, ZK Research's Zeus Kerravala told The Register.

    SmartNICs are widely deployed in cloud and hyperscale datacenters as a means to offload input/output (I/O) intensive network, security, and storage operations from the CPU, freeing it up to run revenue generating tenant workloads. Some more advanced chips even offload the hypervisor to further separate the infrastructure management layer from the rest of the server.

    Despite relative success in the cloud and a flurry of innovation from the still-limited vendor SmartNIC ecosystem, including Mellanox (Nvidia), Intel, Marvell, and Xilinx (AMD), Kerravala argues that the use cases for enterprise datacenters are unlikely to resemble those of the major hyperscalers, at least in the near term.

    Continue reading

Biting the hand that feeds IT © 1998–2022