SlideShare a Scribd company logo
1 of 2
Download to read offline
Consolidated demands
and opportunities
Improve
Obtain/build
Policies, requirements, and constraintsValue-chain
performance information
Knowledge and information
about new and changed
products and services
Knowledge and
information
about third-party
service components
Strategic, tactical, and operational plans
Portfolio decisions
Architectures & Policies
Improvement
Opportunities
Product &
Service portfolio
Contracts
and agreement
requirements
Product and service
performance
information
Knowledge and information
about third-party
service components
Performance information and improvement opportunities
provided by all
value chain activities
Knowledge and information
about new and changed
products and services
Improvement
opportunities &
Stakeholders’
feedback
Improvement initiatives for
all value chain activities
Value chain
performance
Information, improvement
status reports and
improvement initiatives
Improve status report for all
value chain activities
Service performance
Information
High-level
demand
for services and
products
Detailed requirements
for services
and products
Internal and
external
customers &
users (incl.
potential
customers)
Organization’s
Governing Body
Requests and Feedback
Incidents, service requests,
and feedback
Information on the completion
of user support tasks
Marketing opportunities from
current and
potential customers
Partners &
Suppliers
Cooperation opportunities and feedback
PlanPlan
EngageEngage
Contracts
and agreement
requirements
Knowledge and information
about new and changed
products and services
Knowledge and
information
about third-party
service components
Product and service performance information
Deliver and
support
Product and service
requirements
Design and transition
User support tasks
Change and project
Initiation requests
Contracts and agreements
with external and internal
suppliers and partners
Service
Performance
reports
Service
performance
information
Service
components
Requirements &
specifications
New and changed
products and services
Goods and services
Change
requests
Service
components
Services delivered to
customers and users
Description
Visualization
created by
Title
Derived from ITIL 4 Foundation Book 2019 (by
Axelos)
Rob Akershoek,
Fruition Partners
Version 0.9 March
2019
Service Value Chain Activity Inputs and Outputs
All IT Value Chain ActivitiesAll IT Value Chain Activities
Contract and agreement
requirements
Improvement initiatives &
Status reports
Improvement initiatives &
Status reports Improvement initiatives &
Status reports
Knowledge and information
about third-party
service components
Knowledge and information
about new and changed
products and services
Knowledge and
information
about new and
changed
products and services
Knowledge and
information about third-party
service components
Contracts
and agreement
requirements
The ITIL 4 Service Value Chain Activities - Inputs & Outputs
Common Rules:
• All incoming and outgoing interactions with parties
external to the value chain are performed via engage.
• All new resources are obtained via obtain/build.
• Planning at all levels are performed via plan.
• Improvements at all levels are initiated and managed via
improve.
Strategy to
Portfolio
Requirement to
Deploy
Request to Fulfill Detect to Correct
Business & Suppler Interface
Supporting Activities
(e.g. Finance, Risk & Compliance, HR, Supplier Management, Intelligence & Reporting)
Requirements / FeaturesDemand Requests Incidents, Questions & Feedback
EngageEngage
PlanPlan
ImproveImprove
Deliver and SupportDeliver and SupportDesign and transitionDesign and transition
Obtain/BuildObtain/Build
Service Backbone (services, products, releases, CMDB, …)
High Level Mapping of ITIL 4 Value Chain Activities to the IT4IT Value Streams
https://www.opengroup.org/it4it
Value Streams as part of the IT
Value Chain:
• Strategy to Portfolio
• Requirement to Deploy
• Request to Fulfill
• Detect to Correct
IT4IT:
Connecting the
Dots
Building an integrated,
automated and streamlined
digital delivery pipeline

More Related Content

What's hot

IT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITIT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITThe Open Group SA
 
History of IT Service Management Practices and Standards
History of IT Service Management Practices and StandardsHistory of IT Service Management Practices and Standards
History of IT Service Management Practices and StandardsRob Akershoek
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingRob Akershoek
 
IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2Mohamed Zakarya Abdelgawad
 
Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Rob Akershoek
 
ITIL v3 vs v4
ITIL v3 vs v4ITIL v3 vs v4
ITIL v3 vs v4BITIL.COM
 
Best Practices for Implementing a Service Catalog and Enhanced ITSM
Best Practices for Implementing a Service Catalog and Enhanced ITSMBest Practices for Implementing a Service Catalog and Enhanced ITSM
Best Practices for Implementing a Service Catalog and Enhanced ITSMhdicapitalarea
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1Mohamed Zakarya Abdelgawad
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
 
IT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITIT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITReal IRM
 
Managed it services
Managed it servicesManaged it services
Managed it servicesGss America
 
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doCliffordEgbomeade
 
Future Proofing Your IT Operating Model for Digital
Future Proofing Your IT Operating Model for DigitalFuture Proofing Your IT Operating Model for Digital
Future Proofing Your IT Operating Model for DigitalDavid Favelle
 

What's hot (20)

IT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITIT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of IT
 
History of IT Service Management Practices and Standards
History of IT Service Management Practices and StandardsHistory of IT Service Management Practices and Standards
History of IT Service Management Practices and Standards
 
ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
 
IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2IT4IT - The Full Story for Digital Transformation - Part 2
IT4IT - The Full Story for Digital Transformation - Part 2
 
Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)Request to Fulfill Presentation (IT4IT)
Request to Fulfill Presentation (IT4IT)
 
AXELOS - ITIL® Foundation
AXELOS - ITIL® FoundationAXELOS - ITIL® Foundation
AXELOS - ITIL® Foundation
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
ITIL v3 vs v4
ITIL v3 vs v4ITIL v3 vs v4
ITIL v3 vs v4
 
Best Practices for Implementing a Service Catalog and Enhanced ITSM
Best Practices for Implementing a Service Catalog and Enhanced ITSMBest Practices for Implementing a Service Catalog and Enhanced ITSM
Best Practices for Implementing a Service Catalog and Enhanced ITSM
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 
ITIL Basic concepts
ITIL   Basic conceptsITIL   Basic concepts
ITIL Basic concepts
 
IT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of ITIT4IT™ - Managing the Business of IT
IT4IT™ - Managing the Business of IT
 
Itil 4 34 Management Practices
Itil 4 34 Management PracticesItil 4 34 Management Practices
Itil 4 34 Management Practices
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
 
Introducing ITIL
Introducing ITILIntroducing ITIL
Introducing ITIL
 
Future Proofing Your IT Operating Model for Digital
Future Proofing Your IT Operating Model for DigitalFuture Proofing Your IT Operating Model for Digital
Future Proofing Your IT Operating Model for Digital
 

Similar to ITIL 4 service value chain data flows (input and outputs)

Outsourcing Challenges
Outsourcing ChallengesOutsourcing Challenges
Outsourcing ChallengesJoann Martin
 
Business plan format_
Business plan format_Business plan format_
Business plan format_artipradhan
 
Evalueserve Procurement Supplier Management Services February 2009
Evalueserve   Procurement  Supplier Management Services   February 2009Evalueserve   Procurement  Supplier Management Services   February 2009
Evalueserve Procurement Supplier Management Services February 2009BrianAllanEvalueserve
 
ITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service StrategyITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service StrategyAxios Systems
 
ISO 9001:2015 DIS Changes, Requirements and Implementation
ISO 9001:2015 DIS Changes, Requirements and ImplementationISO 9001:2015 DIS Changes, Requirements and Implementation
ISO 9001:2015 DIS Changes, Requirements and Implementation Govind Ramu
 
Innovative Procurement Strategies for Thriving in a Networked Economy
Innovative Procurement Strategies for Thriving in a Networked EconomyInnovative Procurement Strategies for Thriving in a Networked Economy
Innovative Procurement Strategies for Thriving in a Networked EconomySAP Ariba
 
Procurement Training Introduction to Procurement Final Version
Procurement Training Introduction to Procurement Final VersionProcurement Training Introduction to Procurement Final Version
Procurement Training Introduction to Procurement Final VersionBusiness Services Support Limited
 
Vendor Selection Process
Vendor Selection ProcessVendor Selection Process
Vendor Selection Processgrinehart
 
July 2015 webinar d2 slides
July 2015 webinar d2 slidesJuly 2015 webinar d2 slides
July 2015 webinar d2 slidesBella Akora
 
July 2015 webinar d2 slides
July 2015 webinar d2 slidesJuly 2015 webinar d2 slides
July 2015 webinar d2 slidesBella Akora
 
Feasibility And Rfp Design Final
Feasibility And Rfp Design FinalFeasibility And Rfp Design Final
Feasibility And Rfp Design FinalAnn Treacy
 
Roberta O'Keith
Roberta O'Keith Roberta O'Keith
Roberta O'Keith BMAChicago
 
Roberta O'Keith Presentation
Roberta O'Keith Presentation Roberta O'Keith Presentation
Roberta O'Keith Presentation BMAChicago
 
Roberta O'Keith Presentation
Roberta O'Keith PresentationRoberta O'Keith Presentation
Roberta O'Keith PresentationBMAChicago
 
G Cottam Strategic Sourcing
G Cottam Strategic SourcingG Cottam Strategic Sourcing
G Cottam Strategic SourcingGCottam
 
Strategy and Business Planning
Strategy and Business PlanningStrategy and Business Planning
Strategy and Business PlanningKiran Sohi
 
Portfolio overview 130910.pptx
Portfolio overview 130910.pptxPortfolio overview 130910.pptx
Portfolio overview 130910.pptxsteve539601
 

Similar to ITIL 4 service value chain data flows (input and outputs) (20)

Outsourcing Challenges
Outsourcing ChallengesOutsourcing Challenges
Outsourcing Challenges
 
Resume [2016]
Resume [2016]Resume [2016]
Resume [2016]
 
Business plan format_
Business plan format_Business plan format_
Business plan format_
 
Evalueserve Procurement Supplier Management Services February 2009
Evalueserve   Procurement  Supplier Management Services   February 2009Evalueserve   Procurement  Supplier Management Services   February 2009
Evalueserve Procurement Supplier Management Services February 2009
 
ITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service StrategyITIL Practical Guide - Service Strategy
ITIL Practical Guide - Service Strategy
 
ISO 9001:2015 DIS Changes, Requirements and Implementation
ISO 9001:2015 DIS Changes, Requirements and ImplementationISO 9001:2015 DIS Changes, Requirements and Implementation
ISO 9001:2015 DIS Changes, Requirements and Implementation
 
Innovative Procurement Strategies for Thriving in a Networked Economy
Innovative Procurement Strategies for Thriving in a Networked EconomyInnovative Procurement Strategies for Thriving in a Networked Economy
Innovative Procurement Strategies for Thriving in a Networked Economy
 
Sourcing Gurus Profile
Sourcing Gurus ProfileSourcing Gurus Profile
Sourcing Gurus Profile
 
Procurement Training Introduction to Procurement Final Version
Procurement Training Introduction to Procurement Final VersionProcurement Training Introduction to Procurement Final Version
Procurement Training Introduction to Procurement Final Version
 
Vendor Selection Process
Vendor Selection ProcessVendor Selection Process
Vendor Selection Process
 
July 2015 webinar d2 slides
July 2015 webinar d2 slidesJuly 2015 webinar d2 slides
July 2015 webinar d2 slides
 
July 2015 webinar d2 slides
July 2015 webinar d2 slidesJuly 2015 webinar d2 slides
July 2015 webinar d2 slides
 
Feasibility And Rfp Design Final
Feasibility And Rfp Design FinalFeasibility And Rfp Design Final
Feasibility And Rfp Design Final
 
Roberta O'Keith
Roberta O'Keith Roberta O'Keith
Roberta O'Keith
 
Roberta O'Keith Presentation
Roberta O'Keith Presentation Roberta O'Keith Presentation
Roberta O'Keith Presentation
 
Roberta O'Keith Presentation
Roberta O'Keith PresentationRoberta O'Keith Presentation
Roberta O'Keith Presentation
 
G Cottam Strategic Sourcing
G Cottam Strategic SourcingG Cottam Strategic Sourcing
G Cottam Strategic Sourcing
 
Strategy and Business Planning
Strategy and Business PlanningStrategy and Business Planning
Strategy and Business Planning
 
Portfolio overview 130910.pptx
Portfolio overview 130910.pptxPortfolio overview 130910.pptx
Portfolio overview 130910.pptx
 
Outsource.ppt
Outsource.pptOutsource.ppt
Outsource.ppt
 

More from Rob Akershoek

De IT organisatie staat in de steigers...maar waar is het bouwplan?
De IT organisatie staat in de steigers...maar waar is het bouwplan?De IT organisatie staat in de steigers...maar waar is het bouwplan?
De IT organisatie staat in de steigers...maar waar is het bouwplan?Rob Akershoek
 
Management van cloud-diensten nog zeer onvolwassen (2014)
Management van cloud-diensten nog zeer onvolwassen (2014)Management van cloud-diensten nog zeer onvolwassen (2014)
Management van cloud-diensten nog zeer onvolwassen (2014)Rob Akershoek
 
Gebruik IT of IT-management te automatiseren (Boardroom IT)
Gebruik IT of IT-management te automatiseren (Boardroom IT)Gebruik IT of IT-management te automatiseren (Boardroom IT)
Gebruik IT of IT-management te automatiseren (Boardroom IT)Rob Akershoek
 
Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)
Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)
Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)Rob Akershoek
 
Automatiseren van IT activiteiten
Automatiseren van IT activiteitenAutomatiseren van IT activiteiten
Automatiseren van IT activiteitenRob Akershoek
 
10 trend in IT automation
10 trend in IT automation10 trend in IT automation
10 trend in IT automationRob Akershoek
 
IT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe IT
IT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe ITIT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe IT
IT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe ITRob Akershoek
 

More from Rob Akershoek (7)

De IT organisatie staat in de steigers...maar waar is het bouwplan?
De IT organisatie staat in de steigers...maar waar is het bouwplan?De IT organisatie staat in de steigers...maar waar is het bouwplan?
De IT organisatie staat in de steigers...maar waar is het bouwplan?
 
Management van cloud-diensten nog zeer onvolwassen (2014)
Management van cloud-diensten nog zeer onvolwassen (2014)Management van cloud-diensten nog zeer onvolwassen (2014)
Management van cloud-diensten nog zeer onvolwassen (2014)
 
Gebruik IT of IT-management te automatiseren (Boardroom IT)
Gebruik IT of IT-management te automatiseren (Boardroom IT)Gebruik IT of IT-management te automatiseren (Boardroom IT)
Gebruik IT of IT-management te automatiseren (Boardroom IT)
 
Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)
Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)
Koppelen van project- en applicatie portfoliomanagement (Informatie 2013)
 
Automatiseren van IT activiteiten
Automatiseren van IT activiteitenAutomatiseren van IT activiteiten
Automatiseren van IT activiteiten
 
10 trend in IT automation
10 trend in IT automation10 trend in IT automation
10 trend in IT automation
 
IT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe IT
IT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe ITIT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe IT
IT4IT Reference Architecture : Blauwdruk voor het managen van de nieuwe IT
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

ITIL 4 service value chain data flows (input and outputs)

  • 1. Consolidated demands and opportunities Improve Obtain/build Policies, requirements, and constraintsValue-chain performance information Knowledge and information about new and changed products and services Knowledge and information about third-party service components Strategic, tactical, and operational plans Portfolio decisions Architectures & Policies Improvement Opportunities Product & Service portfolio Contracts and agreement requirements Product and service performance information Knowledge and information about third-party service components Performance information and improvement opportunities provided by all value chain activities Knowledge and information about new and changed products and services Improvement opportunities & Stakeholders’ feedback Improvement initiatives for all value chain activities Value chain performance Information, improvement status reports and improvement initiatives Improve status report for all value chain activities Service performance Information High-level demand for services and products Detailed requirements for services and products Internal and external customers & users (incl. potential customers) Organization’s Governing Body Requests and Feedback Incidents, service requests, and feedback Information on the completion of user support tasks Marketing opportunities from current and potential customers Partners & Suppliers Cooperation opportunities and feedback PlanPlan EngageEngage Contracts and agreement requirements Knowledge and information about new and changed products and services Knowledge and information about third-party service components Product and service performance information Deliver and support Product and service requirements Design and transition User support tasks Change and project Initiation requests Contracts and agreements with external and internal suppliers and partners Service Performance reports Service performance information Service components Requirements & specifications New and changed products and services Goods and services Change requests Service components Services delivered to customers and users Description Visualization created by Title Derived from ITIL 4 Foundation Book 2019 (by Axelos) Rob Akershoek, Fruition Partners Version 0.9 March 2019 Service Value Chain Activity Inputs and Outputs All IT Value Chain ActivitiesAll IT Value Chain Activities Contract and agreement requirements Improvement initiatives & Status reports Improvement initiatives & Status reports Improvement initiatives & Status reports Knowledge and information about third-party service components Knowledge and information about new and changed products and services Knowledge and information about new and changed products and services Knowledge and information about third-party service components Contracts and agreement requirements The ITIL 4 Service Value Chain Activities - Inputs & Outputs Common Rules: • All incoming and outgoing interactions with parties external to the value chain are performed via engage. • All new resources are obtained via obtain/build. • Planning at all levels are performed via plan. • Improvements at all levels are initiated and managed via improve.
  • 2. Strategy to Portfolio Requirement to Deploy Request to Fulfill Detect to Correct Business & Suppler Interface Supporting Activities (e.g. Finance, Risk & Compliance, HR, Supplier Management, Intelligence & Reporting) Requirements / FeaturesDemand Requests Incidents, Questions & Feedback EngageEngage PlanPlan ImproveImprove Deliver and SupportDeliver and SupportDesign and transitionDesign and transition Obtain/BuildObtain/Build Service Backbone (services, products, releases, CMDB, …) High Level Mapping of ITIL 4 Value Chain Activities to the IT4IT Value Streams https://www.opengroup.org/it4it Value Streams as part of the IT Value Chain: • Strategy to Portfolio • Requirement to Deploy • Request to Fulfill • Detect to Correct IT4IT: Connecting the Dots Building an integrated, automated and streamlined digital delivery pipeline