IF Rube Goldberg Ran IT

CA Technologies
CA TechnologiesWriter and Editor at CA Technologies
If Rube Goldberg Ran IT
Rube Goldberg (1883 – 1970)
Cartoonist, sculptor, and author
Rube Goldberg was famous for his cartoons depicting complex machines
that perform simple tasks in convoluted ways.
IT seems to have a similar talent …
… for making simple tasks complicated.
Let’s have some serious fun!
Here’s what might happen if Rube Goldberg ran IT
Simple Task #1:
Resetting a password
Seriously: Automate those everyday requests
Even today, IT departments are handling routine, everyday requests
manually.
It’s boring, it’s error-prone, and it’s a waste of your valuable resources.
Worst of all, it takes away your bandwidth to focus on new and
innovative growth initiatives.
Simple Task #2:
Ordering a laptop
Seriously: Automating multi-step workflows improves
throughput and accountability
In a manual system, requests get lost and approvals sit on hold.
Automation can ensure a consistent process. Requests don’t get lost.
SLAs keep things on-time. Staff get reminded of pending tasks. Users get
feedback on the status of their requests.
Simple Task #3: Provisioning a cloud environment
Seriously: Set up self-service portals, and tie back-end
systems together
Why do users need to wait around for IT?
Let them do it themselves!
Create a single place for all requests.
Leverage a simple request and approval process.
Remove redundant entry. Why make IT staff manually
move information from one system into another?
Simple Task #4: Using a mobile phone to enter a service
request
Seriously: Deliver a positive user experience across all
platforms
Users want anytime, anywhere access to the services and applications
they need to do their job.
They don’t have the time or patience for outdated systems and
inefficient processes. And neither do you.
Simple Task #5: Speeding up IT
Seriously: Business is running faster than ever, and so
should IT
The role of IT has changed – from IT-centric to customer-centric. IT
needs to keep pace with the business to remain relevant. No coding.
Easy to use and understand without extensive training. Cloud-based for
fast and easy deployment, easy upgrade.
Simplify your service management.
• Try a free trial of the SaaS-based CA Cloud Service Management.
• Easy to implement. Easy to maintain. Easy to use.
• Try It NOW
1 of 14

Recommended

Google Cloud Platform for the Enterprise by
Google Cloud Platform for the EnterpriseGoogle Cloud Platform for the Enterprise
Google Cloud Platform for the EnterpriseVMware Tanzu
5.4K views25 slides
이준행 - 일간워스트 커뮤니티 공격 유입 사례 소개 by
이준행 - 일간워스트 커뮤니티 공격 유입 사례 소개이준행 - 일간워스트 커뮤니티 공격 유입 사례 소개
이준행 - 일간워스트 커뮤니티 공격 유입 사례 소개SKOOPMEDIA
1.4K views42 slides
Good clinical practices(GCP) by
Good clinical practices(GCP)Good clinical practices(GCP)
Good clinical practices(GCP)Fardan Qadeer
20.9K views30 slides
CA Mainframe Resource Intelligence by
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
17.1K views25 slides
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence by
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
2.5K views26 slides
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes... by
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
1.6K views23 slides

More Related Content

More from CA Technologies

Case Study: Privileged Access in a World on Time by
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
1.4K views23 slides
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ... by
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
1.1K views16 slides
Case Study: Putting Citizens at The Center of Digital Government by
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
684 views26 slides
Making Security Work—Implementing a Transformational Security Program by
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
720 views27 slides
Keynote: Making Security a Competitive Advantage by
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
523 views37 slides
Emerging Managed Services Opportunities in Identity and Access Management by
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
844 views25 slides

More from CA Technologies(20)

Case Study: Privileged Access in a World on Time by CA Technologies
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies1.4K views
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ... by CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies1.1K views
Case Study: Putting Citizens at The Center of Digital Government by CA Technologies
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies684 views
Making Security Work—Implementing a Transformational Security Program by CA Technologies
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies720 views
Keynote: Making Security a Competitive Advantage by CA Technologies
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies523 views
Emerging Managed Services Opportunities in Identity and Access Management by CA Technologies
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies844 views
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid... by CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies512 views
Leveraging Monitoring Governance: How Service Providers Can Boost Operational... by CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies641 views
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting... by CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies674 views
Application Experience Analytics Services: The Strategic Digital Transformati... by CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies549 views
Application Experience Analytics Services: The Strategic Digital Transformati... by CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies679 views
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat... by CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies638 views
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit... by CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies486 views
Blockchain: Strategies for Moving From Hype to Realities of Deployment by CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies573 views
Establish Digital Trust as the Currency of Digital Enterprise by CA Technologies
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies433 views
How Components Increase Speed and Risk by CA Technologies
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
CA Technologies406 views
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol... by CA Technologies
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
CA Technologies609 views
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio... by CA Technologies
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
CA Technologies859 views
When You Test Matters: Why Testing Early in the SDLC is Important by CA Technologies
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
CA Technologies435 views
Application Security in a DevOps World by CA Technologies
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
CA Technologies572 views

Recently uploaded

Attacking IoT Devices from a Web Perspective - Linux Day by
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 views68 slides
Five Things You SHOULD Know About Postman by
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
27 views43 slides
handbook for web 3 adoption.pdf by
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
19 views16 slides
Black and White Modern Science Presentation.pptx by
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptxmaryamkhalid2916
14 views21 slides
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... by
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
28 views70 slides
Combining Orchestration and Choreography for a Clean Architecture by
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean ArchitectureThomasHeinrichs1
69 views24 slides

Recently uploaded(20)

Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman27 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
Black and White Modern Science Presentation.pptx by maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 views
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... by NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 views
Combining Orchestration and Choreography for a Clean Architecture by ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs169 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 views
Future of Learning - Khoong Chan Meng by NUS-ISS
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS33 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 views
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze by NUS-ISS
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS19 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta15 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada121 views
Perth MeetUp November 2023 by Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price15 views
The Importance of Cybersecurity for Digital Transformation by NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS27 views

IF Rube Goldberg Ran IT

  • 2. Rube Goldberg (1883 – 1970) Cartoonist, sculptor, and author Rube Goldberg was famous for his cartoons depicting complex machines that perform simple tasks in convoluted ways.
  • 3. IT seems to have a similar talent … … for making simple tasks complicated. Let’s have some serious fun! Here’s what might happen if Rube Goldberg ran IT
  • 5. Seriously: Automate those everyday requests Even today, IT departments are handling routine, everyday requests manually. It’s boring, it’s error-prone, and it’s a waste of your valuable resources. Worst of all, it takes away your bandwidth to focus on new and innovative growth initiatives.
  • 7. Seriously: Automating multi-step workflows improves throughput and accountability In a manual system, requests get lost and approvals sit on hold. Automation can ensure a consistent process. Requests don’t get lost. SLAs keep things on-time. Staff get reminded of pending tasks. Users get feedback on the status of their requests.
  • 8. Simple Task #3: Provisioning a cloud environment
  • 9. Seriously: Set up self-service portals, and tie back-end systems together Why do users need to wait around for IT? Let them do it themselves! Create a single place for all requests. Leverage a simple request and approval process. Remove redundant entry. Why make IT staff manually move information from one system into another?
  • 10. Simple Task #4: Using a mobile phone to enter a service request
  • 11. Seriously: Deliver a positive user experience across all platforms Users want anytime, anywhere access to the services and applications they need to do their job. They don’t have the time or patience for outdated systems and inefficient processes. And neither do you.
  • 12. Simple Task #5: Speeding up IT
  • 13. Seriously: Business is running faster than ever, and so should IT The role of IT has changed – from IT-centric to customer-centric. IT needs to keep pace with the business to remain relevant. No coding. Easy to use and understand without extensive training. Cloud-based for fast and easy deployment, easy upgrade.
  • 14. Simplify your service management. • Try a free trial of the SaaS-based CA Cloud Service Management. • Easy to implement. Easy to maintain. Easy to use. • Try It NOW