A - acceptance to availability plan | B - back-out to business unit | C - call to customer-facing service | D - dashboard to driver | E - early life support (ELS) to external service provider | F - facilities management to functional escalation | G - H - gap analysis to hot standby | I - identity to ITIL | J - K - job description to known error record | L - lifecycle to live environment | M - maintainability to monitoring | N - near-shore to notional charging | O - objective to overhead | P - pain value analysis to PRojects IN Controlled Environments (PRINCE2) | Q - qualification to quick win | R - RACI to running costs | S - Sarbanes-Oxley (SOX) to system management | T - tactical to Type III service provider | U - underpinning contract (UC) to utility | V - validation to vulnerability | W - warm standby to workload
V - validation to vulnerability
validation
(ITIL Service Transition) An activity that ensures a new or changed IT service, process, plan or other deliverable meets the needs of the business. Validation ensures that business requirements are met even though these may have changed since the original design. See also acceptance; qualification; service validation and testing; verification.
value chain
(ITIL Service Strategy) A sequence of processes that creates a product or service that is of value to a customer. Each step of the sequence builds on the previous steps and contributes to the overall product or service. See also value network.
value for money
An informal measure of cost effectiveness. Value for money is often based on a comparison with the cost of alternatives. See also cost benefit analysis.
value network
(ITIL Service Strategy) A complex set of relationships between two or more groups or organizations. Value is generated through exchange of knowledge, information, goods or services. See also partnership; value chain.
value on investment (VOI)
(ITIL Continual Service Improvement) A measurement of the expected benefit of an investment. Value on investment considers both financial and intangible benefits. See also return on investment.
variable cost
(ITIL Service Strategy) A cost that depends on how much the IT service is used, how many products are produced, the number and type of users, or something else that cannot be fixed in advance.
variance
The difference between a planned value and the actual measured value. Commonly used in financial management, capacity management and service level management, but could apply in any area where plans are in place.
verification
(ITIL Service Transition) An activity that ensures that a new or changed IT service, process, plan or other deliverable is complete, accurate, reliable and matches its design specification. See also acceptance; validation; service validation and testing.
verification and audit
(ITIL Service Transition) The activities responsible for ensuring that information in the configuration management system is accurate and that all configuration items have been identified and recorded. Verification includes routine checks that are part of other processes – for example, verifying the serial number of a desktop PC when a user logs an incident. Audit is a periodic, formal check.
version
(ITIL Service Transition) A version is used to identify a specific baseline of a configuration item. Versions typically use a naming convention that enables the sequence or date of each baseline to be identified. For example, payroll application version 3 contains updated functionality from version 2.
vision
A description of what the organization intends to become in the future. A vision is created by senior management and is used to help influence culture and strategic planning. See also mission.
Download a Vision Statement Template - Mind map, Word or PDF format
vital business function (VBF)
(ITIL Service Design) Part of a business process that is critical to the success of the business. Vital business functions are an important consideration of business continuity management, IT service continuity management and availability management.
vulnerability
A weakness that could be exploited by a threat – for example, an open firewall port, a password that is never changed, or a flammable carpet. A missing control is also considered to be a vulnerability.
Copyright © AXELOS Limited 2012. All rights reserved. Material is reproduced with the permission of AXELOS