Objective: This process start an assessment what the customer needs and the market, then determine what services an IT organization will offer. The ultimate goal is to make to any IT company or organization to act in a strategic manner.
Objective: This process focus in design new services, design the changes in existing services or improve them.
Objective: Build and deploy services designed for Service Design state, also make sure the changes in the services are carried out in a coordinate way without negative impact the business.
Objective: This is the day to day activity, to make sure the IT services are working effectively and efficiently. This include any user request, fixing problems and any failures. Also this include any operations task in the IT environment.
Continual Service Improvements - CSI
Objectives: This focus and continually improve the effectiveness and efficiency of the IT process and services, this process is continual.
Some virtual machines lose connection with the physical network or the virtual switch lose connection with the physical network, after you unplug the cable and plug it backup the virtual machine reconnect o after you reboot the host server
It happen to me with ProLiant DL360 Gen9 and ProLiant DL385p Gen8
After a lot of testing and research the only way at this moment is to run a command in power shell to sidable VMQ:
Get-NetAdapterVmq | Disable-NetAdapterVmq
This problem I got it with and without full updates., also I updated the HP driver for the network interface and still getting the problem
The Access control can fit in the following categories:
Preventing: The name is saying, prevent to something happen. For example some companies make some background checks, with this they can find out if a person is getting some economics or law problems and avoid hire somebody for a risky position.
For example, if somebody is getting economic problems and it is managing money or secrets, this person could get some money or sell some secrets, the background check will prevent to hire a person for this position.
Detective control: This detect something when is happening or after happen, like the intrusion detection system in a network.
Corrective: Correct some situations, like the antivirus detect a virus and try to clean the file or quarantine it.
Recovery: This control recovery after an incident, for example after a hard drive fail, or user delete some data, or a virus damage data, all this situations require to restore from backups, install OS, reconfigure, etc, etc to restore the functionality of the system or availability of the data.
Deterrent: This deter a user to do something, for example when you see signs like "Smile you are on camera" or "beware of dog" or "security on duty" etc. The user/attacker/person avoid to do something because he/she doesn't want to be catch or get problem in that situation.
Compensating: This compensate or complement the weakness in one area to full fill the missing part or make it stronger.