This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
The Application Services Library (ASL) is a public domain framework of best practices used to standardize processes within Application Management, the discipline of producing and maintaining information systems and applications. The term "library" is used because ASL is presented as a set of books describing best practices from the IT industry.
ASL is closely related to the frameworks ITIL (for IT Service Management) and BiSL (for Information Management and Functional Management) and to the Capability Maturity Model (CMM).
The ASL framework was developed because ITIL proved inadequate for Application Management.[ citation needed ] At that time, ITIL lacked specific guidance for application design, development, maintenance and support. Newer ITIL versions, particularly V3, have increasingly addressed the Application Development and Application Management domains; the ASL BiSL Foundation has published a white paper comparing ITIL v3 and ASL. [1]
ASL was developed in the late nineties in the Netherlands, originally as the proprietary R2C model, which evolved into ASL in 2000. In 2001 it was donated by the IT Service Provider PinkRoccade to the ASL Foundation, now the ASL BiSL Foundation. The version ASL2 was published in 2009.
The ASL2 is intended to support Application Management by providing tools.[ citation needed ] Two main categories of aids are defined:
ASL2 contains 3 levels, 6 clusters of processes (3 on the operational level, 1 on the tactical level, 2 on the strategic level) and a totality of 26 processes.
There are 4 processes within the Application Support cluster. The processes in the Service Organisation cluster support the daily use of the information systems. The processes in this cluster are:
These processes have as well been defined in the ITIL framework. The processes are similar, but are viewed from another point of view[ which? ], therefore the activities in each of these processes may differ from the activities in an ITIL-environment.[ citation needed ]
There are 5 processes within the Application Maintenance and Renewal cluster. Within this cluster the majority of the work of Application Development is done. A major part of the work of Application Management deals with designing, programming and testing applications and information systems.[ citation needed ] Processes are:
These processes are not described at all in the ITIL V1 framework, but do have their counterparts in BiSL, the model for Information management / Functional Management.[ citation needed ]
There are 2 processes within the Connecting Processes Operational Level cluster. The connecting processes aim at the synchronisation of the activities between Service Organisation/operations (using the applications) and development and maintenance (changing the applications). The two processes included are:
There are 5 processes within the Management Processes cluster. The processes in this cluster are used in the management of the activities within the clusters on the operational level. The processes are located on the tactical level, are used for steering the operational processes. The processes included are:
There are 5 processes within the Application Strategy cluster. Applications live for longer than expected. Systems, functionality, concepts and structure of information systems remain stable over many years. This knowledge is rarely used. It is important that, while maintaining and enhancing systems, there is a clear view needed what the demands are in the future, and based on that, what and how the future of these applications should look like. This view, the application management strategies, is created within the cluster Application Strategy. The processes in this cluster are:
There are 5 processes within the Application Management Organization Strategy cluster. Also the future of the Application Management organisation, with aspects as skills and capabilities, markets and customers, is very important. Creating the organisation management strategies for this is the aim of Application Management Organization Strategy cluster. Processes in this cluster include:
This section needs expansion. You can help by adding to it. (November 2024) |
There is also ASL2 Maturity Model with 5 levels of process maturity:
The Capability Maturity Model (CMM) is a development model created in 1986 after a study of data collected from organizations that contracted with the U.S. Department of Defense, who funded the research. The term "maturity" relates to the degree of formality and optimization of processes, from ad hoc practices, to formally defined steps, to managed result metrics, to active optimization of the processes.
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, network switches, servers, workstations, printers, and more.
Information technology (IT)governance is a subset discipline of corporate governance, focused on information technology (IT) and its performance and risk management. The interest in IT governance is due to the ongoing need within organizations to focus value creation efforts on an organization's strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders. It has evolved from The Principles of Scientific Management, Total Quality Management and ISO 9001 Quality Management System.
Information technology service management (ITSM) are the activities performed by an organization to design, build, deliver, operate and control IT services offered to customers.
The Information Services Procurement Library (ISPL) is a best practice library for the management of Information Technology related acquisition processes. It helps both the customer and supplier organization to achieve the desired quality using the corresponded amount of time and money by providing methods and best practices for risk management, contract management, and planning. ISPL focuses on the relationship between the customer and supplier organization: It helps constructing the request for proposal, it helps constructing the contract and delivery plan according to the project situation and risks, and it helps monitoring the delivery phase. ISPL is a unique Information Technology method because where most other Information Technology methods and frameworks focus on development, ISPL focuses purely on the procurement of information services. The target audience for ISPL consists of procurement managers, acquisition managers, programme managers, contract managers, facilities managers, service level managers, and project managers in the IT area. Because of ISPL's focus on procurement it is very suitable to be used with ITIL and PRINCE2.
COBIT is a framework created by ISACA for information technology (IT) management and IT governance.
The Department of Defense Architecture Framework (DoDAF) is an architecture framework for the United States Department of Defense (DoD) that provides visualization infrastructure for specific stakeholders concerns through viewpoints organized by various views. These views are artifacts for visualizing, understanding, and assimilating the broad scope and complexities of an architecture description through tabular, structural, behavioral, ontological, pictorial, temporal, graphical, probabilistic, or alternative conceptual means. The current release is DoDAF 2.02.
ISO/IEC 20000 is the international standard for IT service management. It was developed in 2005 by ISO/IEC JTC1/SC7 and revised in 2011 and 2018. It was originally based on the earlier BS 15000 that was developed by BSI Group.
ITIL security management describes the structured fitting of security into an organization. ITIL security management is based on the ISO 27001 standard. "ISO/IEC 27001:2005 covers all types of organizations. ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties."
IT portfolio management is the application of systematic management to the investments, projects and activities of enterprise Information Technology (IT) departments. Examples of IT portfolios would be planned initiatives, projects, and ongoing IT services. The promise of IT portfolio management is the quantification of previously informal IT efforts, enabling measurement and objective evaluation of investment scenarios.
Performance engineering encompasses the techniques applied during a systems development life cycle to ensure the non-functional requirements for performance will be met. It may be alternatively referred to as systems performance engineering within systems engineering, and software performance engineering or application performance engineering within software engineering.
Capability management is a high-level management function, with particular application in the context of defense.
Business Information Services Library (BiSL), previously known as Business Information Service Management Library, is a framework used for information management.
Information technology infrastructure is defined broadly as a set of information technology (IT) components that are the foundation of an IT service; typically physical components, but also various software and network components.
GQM+Strategies is a method that provides concepts and actionable steps for creating the link between goals and strategies across an organization and allows for measurement-based decision-making. It was developed by Victor Basili, Jens Heidrich, Mikael Lindvall, Jürgen Münch, Myrna Regardie, Carolyn B. Seaman, and Adam Trendowicz. The method was originally developed for organizations having a strong focus on IT and the development of software systems, but the method's popularity has grown to other domains and can be applied to any organization. The book Aligning Organizations through Measurement gives a comprehensive overview of the method, provides actionable guidance, case studies, and practical applications.
A definitive media library is a secure information technology repository in which an organisation's definitive, authorised versions of software media are stored and protected. Before an organisation releases any new or changed application software into its operational environment, any such software should be fully tested and quality assured. The definitive media library provides the storage area for software objects ready for deployment and should only contain master copies of controlled software media configuration items (CIs) that have passed appropriate quality assurance checks, typically including both procured and bespoke application and gold build source code and executables. In the context of the ITIL best practice framework, the term definitive media library supersedes the term definitive software library referred to prior to version ITIL v3.
Tudor IT Process Assessment (TIPA) is a methodological framework for process assessment. Its first version was published in 2003 by the Public Research Centre Henri Tudor based in Luxembourg. TIPA is now a registered trademark of the Luxembourg Institute of Science and Technology (LIST). TIPA offers a structured approach to determine process capability compared to recognized best practices. TIPA also supports process improvement by providing a gap analysis and proposing improvement recommendations.
The Service Design Package (SDP) contains the core documentation of a service and is attached to its entry in the ITIL Service Portfolio.
The Service Portfolio is described in the ITIL books Service Strategy and Service Design. The Service Portfolio is the core repository for all information for all services in an organization. Each service is listed along with its current status and history. The main descriptor in the Service Portfolio is the Service Design Package (SDP).
The Information Technology Infrastructure Library (ITIL) is a set of practices and a framework for IT activities such as IT service management (ITSM) and IT asset management (ITAM) that focus on aligning IT services with the needs of the business.