become-itil-foundation-certified-abhinav-kaiser(www.ebook-dl.com)
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 6 ■ Service Transition<br />
• Reduce service transition efforts<br />
• Set the right expectations on the services from various parties:<br />
customers, senior management, suppliers, and other stakeholders<br />
6.4 Service Transition Processes<br />
Service transition is a major phase for ITIL applicability and popularity in terms of roles<br />
in organizations. You might find roles such as change managers, release managers,<br />
and transition managers being touted for opportunities and acquisition. There are five<br />
processes in the ITIL <strong>foundation</strong> syllabus that you will study in the service transition phase:<br />
1. Change management<br />
2. Release and deployment management<br />
3. Service asset and configuration management<br />
4. Knowledge management<br />
5. Transition planning and support<br />
6.4.1 Change Management<br />
Change management governs all the changes performed on the IT services that are<br />
offered to customers. It ensures that only the necessary changes go through after proper<br />
validation, approvals, and analysis. This process is the gatekeeper for any new services<br />
that get introduced, services that are retired, and all the major and minor modifications<br />
that are done to IT services.<br />
A change in ITIL is defined as an activity performed (generally on<br />
a configuration item) that affects IT services (either positively or<br />
negatively). It could be modification of existing configuration, additions,<br />
or de<strong>com</strong>missions.<br />
Here are some examples of changes:<br />
• Implementation of optic fiber Internet service to the customer<br />
organization<br />
• Transition of e-mail services from Exchange to Gmail<br />
• De<strong>com</strong>missioning of mainframe <strong>com</strong>puters<br />
• Adding extra memory to servers<br />
• Changing ownership of a core switch<br />
• Adding an IP to blacklist on firewall<br />
118