ASL® 2 - A Framework for Application Management


Book Description

Note: This book is available in several languages: Dutch, English. For trainers free additional material of this book is available. This can be found under the "Training Material" tab. Log in with your trainer account to access the material. Domain process framework for application management. This book describes the application management processes as recognized by ASL. It also describes the finer details of these processes. This book is also used by the ASL BiSL Foundation in order to determine what ASL is. This book has been written with the assumption that the reader is familiar with application management, with how it is executed, and with the activities concerned. It contains tips and suggestions to assist in the implementation of processes, Therefore it can be used as a starting point from which to set up application management processes. The ASL 2 framework supports the implementation of application management, supported by additional best practices; these can be found on the website of the ASL BiSL Foundation. See: www.aslbislfoundation.org ASL 2 aligns with other frameworks e.g. ITIL? and BiSL? (for Business information management). The following topics are addressed in this book: Introduction to the main structure of ASL 2; Description of all ASL 2 clusters; Introduction to the implementation of ASL 2; Frequently Asked Questions on the ASL 2 framework; Changes between ASL version 1 and ASL 2. This book is the official core study guide for the ASL 2 Foundation exam.




ASL® 2 Self-assessment -diagnosis for application management


Book Description

Note: This book is available in several languages: Dutch, English. Self-assessment is the individual, systematic review of a way of working and the results of it. Filling out this ASL® 2 Self-assessment results into a clear notion how the application management and its processes and activities are arranged within your own organization. An important purpose for this self-assessment is not only to get a clear notion how certain processes are arranged, but also to make the constraints within the organization transparent as well as the consequences this has for (the continuity and quality of) the services. Based on the results of this evaluation actions can be initiated for further improvement. The eBook ISBN 9789087537647 is only available via Van Haren Publishing




ASL® 2 - A Pocket Guide


Book Description

Note: This book is available in several languages: Dutch, English. The Application Services Library ASL is a public domain framework and the standard for application management. This pocket guide offers an introduction to the framework ASL 2, an evolutionary update of the ASL framework that was introduced in 2001 and is used by more and more organizations since then. This compact book offers a generic introduction and additional background information through a case study. This case study offers a historic perspective, with examples comparing the past situation for ASL and the present with ASL 2. ASL will offer support to anyone implementing application management. Additional support is given by best practices that are published on the website of the ASL BiSL Foundation. ASL aligns with other frameworks, e.g. BiSL for Business Information Management and ITIL for IT Service Management.




BiSL® Next - A Framework for Business Information Management 2nd edition


Book Description

This book describes the framework of the next generation of Business Information Services Library, BiSL®. BiSL Next is a public domain standard for business information management with guiding principles, good practices and practical templates. It offers guidance for digitally engaged business leaders and those who collaborate with them, with the ultimate goal to improve business performance through better use of information and technology. Twelve elements - four drivers, four domains and four perspectives - are the basis of the guidance in BiSL Next. Target audience of this book are business managers, business information managers, business analysts, CIO’s and IT managers, as well as consultants in this field. While describing the twelve elements, the book offers them insight in the best way to manage, execute and profit from business information management in their enterprise. The book is also the official literature for the BiSL® Next Foundation exam.




BiSL® Next - A Framework for Business Information Management


Book Description

This book describes the framework of the next generation of Business Information Services Library, BiSL®. BiSL Next is a public domain standard for business information management with guiding principles, good practices and practical templates. It offers guidance for digitally engaged business leaders and those who collaborate with them, with the ultimate goal to improve business performance through better use of information and technology. Twelve elements - four drivers, four domains and four perspectives - are the basis of the guidance in BiSL Next. Target audience of this book are business managers, business information managers, business analysts, CIO’s and IT managers, as well as consultants in this field. While describing the twelve elements, the book offers them insight in the best way to manage, execute and profit from business information management in their enterprise. The book is also the official literature for the BiSL® Next Foundation exam.




Digital Information Design (DID) Foundation


Book Description

Digital Information Design (DID) is primarily a business information management (BIM) model. As with any model it is used to help you to describe problems and test potential solutions. DID is not like any other method or framework model; it is independent of any other existing model or framework and does not claim to manage the entirety of the design of business information services. DID identifies useful and widely used best practices that are designed specifically for use in any phase of business information service development from idea, conception, specification, design, test, handover, service management and operation, or managing architectural issues or hardware and software installation. Primarily, DID was developed to manage the quality of information, and how to put it to good use. The DID model has been designed for you to identify what you need and when you need it when designing business information services and as a broad guide, identifies key points in existing frameworks that are particularly useful. The model is wholly independent of all other frameworks (including BiSL and BiSL Next in which the basic design is rooted). You can choose and use whatever you wish, the model will help you to assess the validity of your choice(s) and identify strengths and weaknesses in your approach. The DID model focuses on the common languages to describe key elements of design (need and value, mission and capability), key business information perspectives (business, information/data, services and technology) and the high-level domains (governance, strategy, improvement and operation) that must be managed in order to effectively run any business. DID helps you to identify only what you need to ensure that business information design reflects what is needed by your enterprise. The model can be used entirely separately from the framework level guidance discussed and it can be used at any level in the organization. The essentials of DID are explained in two books: this book, Foundation and the Practitioner book that will be published later.




The ISM method Version 3


Book Description

This book describes a revolutionary approach on how to successfully implement IT service management (ITSM) in an easier, faster, cheaper, and especially more effective way. In the book, the lessons of 30 years are used to put an end to the chaos and complexity of ineffective ITSM projects. Based on simple paradigms, a single and compact solution is described for the integrated service management with People, Process and Product. This is not achieved by setting ITIL or ASL aside, but by rearranging the many valuable elements of these frameworks into a simple logical structure, and filling the gaps. Although the paradigms are explained extensively in the book, the solution is very practical and has been proven in recent years in dozens of projects with small and large organizations. This publication describes the implementation method, with a strong focus on quality assurance and cultural change, a comprehensive definition list, and an example of a compact process model.




ICT Governance, Management and Organization


Book Description

Governing, managing and organizing the supply and demand for IT is the subject of this book. The book consists of five parts. These parts are the basic concepts, organizing IT demand and supply, governing and controlling IT, aspects of IT governance and management, and IT governance and management, which in the future will often use IT platforms.




Manage IT!


Book Description

Discusses the IT management tasks and the objects involved. This book outlines traditional IT management; deals with controlling IT; and, tackles the financial, personnel, purchasing, legal and security aspects in IT. It explains the effects of striving for 'utility computing' and control of IT by means of 'IT portfolio management'.




IT Security Governance Innovations: Theory and Research


Book Description

Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.