Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.

ITIL Tattle

ITIL Tattle

Blog posts on ITIL and ITSM news and best practice from the ISG ITIL Team

In my last post  I spoke about the different types of calls that we see here at the University of Edinburgh and this post is an expansion on the topic, where I’ll explain more about the considerations that we need to make when handling different types of calls and what makes each call type unique. […]

Prepnicalities is a horrific portmanteau that I’ve created just for the purposes of this blog post. It’s such an awful combination, that I’m hoping it’s memorable. Or at least, that it sticks in your craw long enough for me to illustrate the concept I’m outlining in this post. The thing is, considering Changes isn’t usually […]

The majority of people don’t want to plan. They want to be free of the responsibility of planning. B. F. Skinner (Walden Two) I once heard a senior manager declare that they didn’t consider disaster planning useful as their staff did their best work under pressure… So, why should we plan?  I think we may […]

The word “Incident” has been used for many years at The University of Edinburgh. We used it in our original Call Management tool Remedy, then in CMS and when UniDesk our current ITSM tool launched, our individual tickets were called “Incidents”. This never really sat well with the ITIL aware among us and so, in […]

Introduction In a less enlightened age, when computers were something seen on Star Trek and toys made from plastic could be purchased without guilt, a game Guess Who enjoyed a brief few years of popularity.   We now live in a world of high tech and high expectation. Paradoxically Big Data has made us less […]

Both Robert and I have recently talked about Risk, which is one of the key factors we use to categorise Changes into Minor, Significant or Major types. The other factor that plays into this categorisation is Impact. How we categorise Changes is important, because it affects how they can be authorised for Release, as well […]

For the final Kepner-Tregoe thinking process we return to risk analysis – despite Matt having covered this recently from a change management perspective, I make no apology for the repetition! Many service management disciplines encounter risk as, in the real world, perfect knowledge is not possible – much of what we do will involve a degree of […]

ucisa (That lower case U is not a typo!) is an organisation which the University of Edinburgh has been a member of for a number of years, but it’s one that you might not know much about. ucisa is the member-led professional body for digital practitioners within education and encourages FE and HE organisations to […]

  Decision Analysis is our next Kepner-Tregoe thinking process.  The steps provided will be very familiar to anyone who has undertaken a procurement, theft or recruitment exercise, yet they can be scaled down to decision making at an operational level.  A key aim of this process is to balance benefits and risks. 1. State Decision […]

Change Management is an interesting proposition, when it comes to risk. At first pass Change Management sounds like the kind of discipline where it would be important to minimise risk. In practice, Change Management is better described as balancing risk. Changes are inherently risky. Any time we upset a known quantity, we’re introducing risk. It’s […]

css.php

Report this page

To report inappropriate content on this page, please use the form below. Upon receiving your report, we will be in touch as per the Take Down Policy of the service.

Please note that personal data collected through this form is used and stored for the purposes of processing this report and communication with you.

If you are unable to report a concern about content via this form please contact the Service Owner.

Please enter an email address you wish to be contacted on. Please describe the unacceptable content in sufficient detail to allow us to locate it, and why you consider it to be unacceptable.
By submitting this report, you accept that it is accurate and that fraudulent or nuisance complaints may result in action by the University.

  Cancel