TBM Taxonomy V3 - IT Towers (Pool 2/3) Flashcards
Technology Business Management (TBM) provides a standard taxonomy to describe cost sources, technologies, IT resources (IT Towers), applications, and services. The TBM Taxonomy provides the ability to compare technologies, towers, and services to peers, and third-party options. There are 3 hierarchical layers starting at the bottom with Cost Pools, flowing up to IT Towers and finally reaching Products & Services.
What is ‘End User’?
End User includes end user computing devices and support for end users. The scope includes costs to build, manage and run end user computing devices for the enterprise and deliver centralized support to end users.
What is ‘End User - Conferencing & AV’?
Audio and video conferencing equipment typically used in conference rooms and dedicated telepresence rooms to enable workforce communications.
What is ‘End User - Deskside Support’?
Local support resources that provide on-site support for moves, adds, changes and hands on issue resolution.
What is ‘End User - End User Software’?
Client related software used to author, create, collaborate and share documents and other content. Examples include email, communications, messaging, word processing, spreadsheets, presentations, desktop publishing, graphics and others. Optional Level 3 categories include Productivity; Communications; Collaboration.
What is ‘End User - IT Help Desk’?
Centralized Tier 1 help desk resources that handle user requests, answer questions and resolve issues.
What is ‘End User - Mobile Devices’?
Client compute tablets, smart phones (iOS, Android, Windows Mobile) and apps used by individuals to perform work.
What is ‘End User - Network Printers’?
Printers located on or near users’ desktops. Examples include network connected personal printers, ink-jet printers, laser printers, departmental or copy-room printers. Only include network connected printers. Do not include printers connected to an end user computer.
What is ‘End User - Workspace’?
Client compute physical desktops, portable laptops, thin client machines, peripherals (including monitors, pointer devices and attached personal printers) used by individuals to perform work?
What is ‘Application’?
The Application tower includes costs related to applications in the enterprise. The scope includes the cost of business software and the costs to develop, manage and run applications for the enterprise.
What is ‘Application - Application Development’?
Resources involved with the analysis, design, development, code, test and release packaging services associated with application development projects. Optional Level 3 categories include: Development, QA.
What is ‘Application - Application Support & Operations’?
The operations, support, fix and minor enhancements associated with existing applications.
What is ‘Application - Business Software’?
Software expenditures including licensing, maintenance and support related to off-the-shelf software purchases.
What is ‘Delivery’?
The delivery tower includes the costs to monitor, support, manage, and run IT operations for the enterprise and includes the IT Service Management (ITSM) functions.
What is ‘Delivery - Client Management’?
Resources or ‘‘account managers’’ aligned with the lines of business to understand business needs, communicate IT products, services and status of IT projects.
What is ‘Delivery - IT Service Management’?
Resources involved with the incident, problem and change management activities as part of the IT Service Management process (excludes the Tier 1 help desk).
What is ‘Delivery - Operations Center’?
Resources involved with the incident, problem and change management activities as part of the IT Service Management process (excludes the Tier 1 help desk).
What is ‘Delivery - Program, Product & Project Management’?
Resources involved with managing and supporting IT related projects and/or continuous product development (e.g., Agile) across business and IT-driven initiatives.
What is ‘Security & Compliance’?
The Security & Compliance tower includes service costs related to IT security compliance and disaster recovery. The scope includes costs to define, establish, enforce, and measure security, compliance, and disaster recovery readiness for the enterprise.
What is ‘Security & Compliance - Compliance’?
IT Compliance resources setting policy, establishing controls and measuring compliance to relevant legal and compliance requirements. Optional Level 3 categories include: Data Privacy. The implementation actions defined by Compliance policy (e.g., implementing controls like multi-factor authentication) are not included in the Compliance sub-tower and are part of the respective towers where the actions take place (e.g., Compute, Storage, Network, Application, End User).
What is ‘Security & Compliance - Disaster Recovery’?
IT Disaster Recovery resources setting DR policy, establishing process & means, dedicated failover facilities, performing DR testing. NOTE: DR designated equipment is included directly in its own sub-tower (e.g., extra servers for DR are included in Compute tower, etc.). The implementation actions defined by Disaster Recovery policy (e.g., building DR servers) are not included in the Disaster & Recovery sub-tower and are part of the respective towers where the actions take place (e.g., Compute, Storage, Network).