This document provides guidance on effectively managing major incidents by separating work into four key streams: understanding what's happening, restoring service, investigating causes, and preventing future incidents. It emphasizes keeping all relevant information visible, updated, and organized on a shared incident dashboard. An example dashboard is shown and updated as a simulated incident involving a broken brick sorting robot is resolved over 60 minutes. Lessons include avoiding long calls, transparency of information, specificity from participants, and regular simulations to maintain skills.
Introducing our content ready ITIL Incident Management Workflow PowerPoint Presentation Slides. Talk about the need for implementing incident management processes such as maintaining service levels, meeting service availability requirements and so on. The topic-specific incident resolution workflow PowerPoint presentation contains twenty-two editable PPT slides to serve all your business needs. Take advantage of the professionally designed problem management best practices PPT slideshow to discuss with your team the key issues of ITIL workflow like lack of transparency, decreased customer satisfaction, high risk of business etc. Demonstrate best practice of ITIL management like creating and maintaining a knowledge base and handling major incidents etc. Utilize the visually appealing ITIL framework PowerPoint compete deck to showcase benefits of ITIL e.g. maintain dashboard and reports etc. You can also use the PPT slides to represent stages of the IT incident management lifecycle. Thus, download the informative and interactive PowerPoint templates to list down the key performance indicators of IT incident management. From this day forward you won't look back. Our ITIL Incident Management Workflow PowerPoint Presentation Slides keep you focused ahead. https://bit.ly/2So2pXt
ITIL Incident Management aims to minimize disruption to the business by restoring service operation to agreed levels as quickly as possible. Incident Management is often the first process instigated when introducing the ITIL quality framework to a Service Desk, and it offers the most immediate and highly visible cost reduction and quality gains.
Ensure that the best possible level of service quality and availability is maintained with this Incident Management Powerpoint Presentation Slides. Showcase the activities within the incident management procedure by incorporating this incident detection and recording PPT visuals. Determine how quickly a resolution of the incident is required by using this professionally designed investigation and analysis PPT graphic. Present the primary ITIL management roles with the help of our incident closure PowerPoint infographics. Also, determine the relative impact of an issue on business processes by taking the aid of the resolution and record the PPT template. Take the advantage of this problem management PowerPoint layout to determine the level of risk by considering the category of probability against consequence severity. Showcase the procedures to deal with the potential problems using the incident monitoring PPT templates. Download problem reporting and communication PPT presentation to restore a normal service operation as quickly as possible. https://bit.ly/3jH7J6u
Best Practices in Major Incident ManagementxMatters Inc
This report examines the challenges and best practices
for automating the communication process to resolve
major IT incidents as quickly and effectively as possible.
Introducing our content ready ITIL Incident Management Workflow PowerPoint Presentation Slides. Talk about the need for implementing incident management processes such as maintaining service levels, meeting service availability requirements and so on. The topic-specific incident resolution workflow PowerPoint presentation contains twenty-two editable PPT slides to serve all your business needs. Take advantage of the professionally designed problem management best practices PPT slideshow to discuss with your team the key issues of ITIL workflow like lack of transparency, decreased customer satisfaction, high risk of business etc. Demonstrate best practice of ITIL management like creating and maintaining a knowledge base and handling major incidents etc. Utilize the visually appealing ITIL framework PowerPoint compete deck to showcase benefits of ITIL e.g. maintain dashboard and reports etc. You can also use the PPT slides to represent stages of the IT incident management lifecycle. Thus, download the informative and interactive PowerPoint templates to list down the key performance indicators of IT incident management. From this day forward you won't look back. Our ITIL Incident Management Workflow PowerPoint Presentation Slides keep you focused ahead. https://bit.ly/2So2pXt
ITIL Incident Management aims to minimize disruption to the business by restoring service operation to agreed levels as quickly as possible. Incident Management is often the first process instigated when introducing the ITIL quality framework to a Service Desk, and it offers the most immediate and highly visible cost reduction and quality gains.
Ensure that the best possible level of service quality and availability is maintained with this Incident Management Powerpoint Presentation Slides. Showcase the activities within the incident management procedure by incorporating this incident detection and recording PPT visuals. Determine how quickly a resolution of the incident is required by using this professionally designed investigation and analysis PPT graphic. Present the primary ITIL management roles with the help of our incident closure PowerPoint infographics. Also, determine the relative impact of an issue on business processes by taking the aid of the resolution and record the PPT template. Take the advantage of this problem management PowerPoint layout to determine the level of risk by considering the category of probability against consequence severity. Showcase the procedures to deal with the potential problems using the incident monitoring PPT templates. Download problem reporting and communication PPT presentation to restore a normal service operation as quickly as possible. https://bit.ly/3jH7J6u
Best Practices in Major Incident ManagementxMatters Inc
This report examines the challenges and best practices
for automating the communication process to resolve
major IT incidents as quickly and effectively as possible.
Incident Management
REMEDY is a customer relationship tool which can be used to log / monitor the issues or problems faced by customers by the means of incident management tickets. Each ticket is like an incident (problem) which is created by helpdesk and assigned to relevant support team. Concerned support team member take the ownership of the ticket and updates the work log (troubleshooting steps performed during the course of action) Also , it can be used to monitor Service Requests / change management ( Change Requests) and problem management. It’s developed by BMC software.
I ncident detection and recording Classification and initial support Investigation and diagnosis Resolution and recovery, Incident closure Incident Control Incident ownership, monitoring, tracking and communication In many organizations roles may be combined because of the small size of the organization or because of cost. Within Incident management we recognize the role of Incident Manager and the role of Incident Management staff.
for more details please visit
www.iicecollege.com
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here
http://flevy.com/browse/business-document/itil-incident-management-workflow--process-guide-3020
DOCUMENT DESCRIPTION
This document establishes an Incident Management (IM) process according to ITIL v3 best practice and ISO 20000. (Word document including Visio diagram of the process)
This document introduces the Incident Management process Framework; the workflow, roles and responsibilities, RACI Matrix, KPIs, metrics, procedures, and policies needed to implement a high quality process.
Document contains suggested templates for:
Incident Life-cycle stages
Prioritization Matrix
Categorization
Incident Closure codes
Functional and Hierarchic Escalation Matrix
Major Incident Procedure
Reporting
Let’s understand the concepts of business continuity and Disaster Recovery in brief. To know more, visit: www.eccouncil.org/business-continuity-and-disaster-recovery
This complete deck is oriented to make sure you do not lag in your presentations. Our creatively crafted slides come with apt research and planning. This exclusive deck with twenty four slides is here to help you to strategize, plan, analyse, or segment the topic with clear understanding and apprehension. Utilize ready to use presentation slides on Incident Management Powerpoint Presentation Slides with all sorts of editable templates, charts and graphs, overviews, analysis templates. It is usable for marking important decisions and covering critical issues. Display and present all possible kinds of underlying nuances, progress factors for an all inclusive presentation for the teams. This presentation deck can be used by all professionals, managers, individuals, internal external teams involved in any company organization.
Short presentation-on incident management, as per ITIL definition,In today’s article we are going to learn all about the “Incident Tracking and management” Process – How to track and manage incidents in Software Testing with sample templates.
Are you thinking- “STH has published a lot of content on defect/bug tracking, so how is this going to be different”? That is exactly the reason why we have to look at what we mean by incident first.
Preparing for System Failure. Our approach and learnings from rolling out an incident management framework at Rentman.
An incident response plan is a document that outlines an organization's procedures, steps, and responsibilities of its incident response program.
Presented by John Pereira.
We struggled because of too many issues in the live products. They didn't allow project teams to make any forecasts or develop new features without interruptions. In the presentation I share the successful experience how we applied ITIL Problem and Incident Management processes, by talking only the best from them. It allowed to start fixing the problems that existed in our organization more effectively, while organization allowed to use different methodologies for different teams.
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...Jesse Andrew
The nature of complex & dynamic systems makes it challenging to predict how any action will positively or negatively impact service availability and performance. However, one certainty that you can take to the bank is that eventually these systems will fail and require rapid recovery. Another certainty is that due to the dynamic nature of these same systems the impact and criticality of service failure can change quickly, dramatically and unexpectedly requiring very different support models.
The ITIL Service Management process framework identifies three separate but highly dependent processes to deal with this challenge. However in most organizations these support practices are implemented as silos with little to no integration. In this informative session Troy DuMoulin, VP of Research and Development at Pink Elephant will provide an overview of the three separate processes. He will outline how they are related and how each one is triggered to support the rapid escalation or de-escalation of your service recovery processes to ensure the best possible Mean Time To Repair balanced with cost and risk.
Watch the webinar on-demand: http://go.italerting.com/itil-service-management-pink-elephant
A small section of the course ECP-901, Business Continuity & Resiliency Management, by the Institute for Business Continuity Training, https://www.ibct.com
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
This presentation was delivered to the Business Resumption Planners Association of Chicago meeting on 3/11/2010.
IT leaders who assume responsibility for their firm's DR/BC efforts need to understand how to build a cross-organization strategy that transcends IT organizational boundaries. In the presentation, we discuss the need for IT leaders to reach across the aisles to work with Line-of-Business leaders, and present a six-step framework on how to accomplish a cross-business IT-centric strategy.
Incident Management
REMEDY is a customer relationship tool which can be used to log / monitor the issues or problems faced by customers by the means of incident management tickets. Each ticket is like an incident (problem) which is created by helpdesk and assigned to relevant support team. Concerned support team member take the ownership of the ticket and updates the work log (troubleshooting steps performed during the course of action) Also , it can be used to monitor Service Requests / change management ( Change Requests) and problem management. It’s developed by BMC software.
I ncident detection and recording Classification and initial support Investigation and diagnosis Resolution and recovery, Incident closure Incident Control Incident ownership, monitoring, tracking and communication In many organizations roles may be combined because of the small size of the organization or because of cost. Within Incident management we recognize the role of Incident Manager and the role of Incident Management staff.
for more details please visit
www.iicecollege.com
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here
http://flevy.com/browse/business-document/itil-incident-management-workflow--process-guide-3020
DOCUMENT DESCRIPTION
This document establishes an Incident Management (IM) process according to ITIL v3 best practice and ISO 20000. (Word document including Visio diagram of the process)
This document introduces the Incident Management process Framework; the workflow, roles and responsibilities, RACI Matrix, KPIs, metrics, procedures, and policies needed to implement a high quality process.
Document contains suggested templates for:
Incident Life-cycle stages
Prioritization Matrix
Categorization
Incident Closure codes
Functional and Hierarchic Escalation Matrix
Major Incident Procedure
Reporting
Let’s understand the concepts of business continuity and Disaster Recovery in brief. To know more, visit: www.eccouncil.org/business-continuity-and-disaster-recovery
This complete deck is oriented to make sure you do not lag in your presentations. Our creatively crafted slides come with apt research and planning. This exclusive deck with twenty four slides is here to help you to strategize, plan, analyse, or segment the topic with clear understanding and apprehension. Utilize ready to use presentation slides on Incident Management Powerpoint Presentation Slides with all sorts of editable templates, charts and graphs, overviews, analysis templates. It is usable for marking important decisions and covering critical issues. Display and present all possible kinds of underlying nuances, progress factors for an all inclusive presentation for the teams. This presentation deck can be used by all professionals, managers, individuals, internal external teams involved in any company organization.
Short presentation-on incident management, as per ITIL definition,In today’s article we are going to learn all about the “Incident Tracking and management” Process – How to track and manage incidents in Software Testing with sample templates.
Are you thinking- “STH has published a lot of content on defect/bug tracking, so how is this going to be different”? That is exactly the reason why we have to look at what we mean by incident first.
Preparing for System Failure. Our approach and learnings from rolling out an incident management framework at Rentman.
An incident response plan is a document that outlines an organization's procedures, steps, and responsibilities of its incident response program.
Presented by John Pereira.
We struggled because of too many issues in the live products. They didn't allow project teams to make any forecasts or develop new features without interruptions. In the presentation I share the successful experience how we applied ITIL Problem and Incident Management processes, by talking only the best from them. It allowed to start fixing the problems that existed in our organization more effectively, while organization allowed to use different methodologies for different teams.
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...Jesse Andrew
The nature of complex & dynamic systems makes it challenging to predict how any action will positively or negatively impact service availability and performance. However, one certainty that you can take to the bank is that eventually these systems will fail and require rapid recovery. Another certainty is that due to the dynamic nature of these same systems the impact and criticality of service failure can change quickly, dramatically and unexpectedly requiring very different support models.
The ITIL Service Management process framework identifies three separate but highly dependent processes to deal with this challenge. However in most organizations these support practices are implemented as silos with little to no integration. In this informative session Troy DuMoulin, VP of Research and Development at Pink Elephant will provide an overview of the three separate processes. He will outline how they are related and how each one is triggered to support the rapid escalation or de-escalation of your service recovery processes to ensure the best possible Mean Time To Repair balanced with cost and risk.
Watch the webinar on-demand: http://go.italerting.com/itil-service-management-pink-elephant
A small section of the course ECP-901, Business Continuity & Resiliency Management, by the Institute for Business Continuity Training, https://www.ibct.com
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
This presentation was delivered to the Business Resumption Planners Association of Chicago meeting on 3/11/2010.
IT leaders who assume responsibility for their firm's DR/BC efforts need to understand how to build a cross-organization strategy that transcends IT organizational boundaries. In the presentation, we discuss the need for IT leaders to reach across the aisles to work with Line-of-Business leaders, and present a six-step framework on how to accomplish a cross-business IT-centric strategy.
5 forces incident problem mgmt-presentationAnna Sadokhina
Academic course: Business Process Management and Modelling
Process improvements and new processes design for IT-department of Leroy Merlin Italia with the focus on Incident and Problem management.
Activities: Analysis and organization for process improvements for currently existing incident management process, strategies proposals for smooth process improvements implementation. Analysis, description, mapping, design and modelling (with use of ARIS platform) of Problem Management processes from scratch.
Process Mining and AI for Continuous Process ImprovementMarlon Dumas
Talk delivered at BPM Day Rio Grande do Sul on 11 November 2021.
Abstract.
Process mining is a technology that marries methods from business process management and from data science, to support operational excellence and digital transformation. Process mining tools can transform data extracted from enterprise systems, into visualizations and reports that allow managers to improve organizational performance along different dimensions, such as efficiency, quality, and compliance. In this talk, we will give an overview of the capabilities of process mining tools, and we will illustrate the benefits of process mining via several case studies in the fields of insurance, manufacturing, and IT service management.
Process Mining and Predictive Process MonitoringMarlon Dumas
Presentation delivered at the Second Colombian Forum on Business Process Management, University of Los Andes, Bogotá, 22 June 2018 - https://sistemas.uniandes.edu.co/en/foros-isis/temas-foros-isis/bpm/foro-2/80-foros-isis/bpm
Process Mining in Action: Self-service data science for business teamsMarlon Dumas
Talk delivered at University of Tartu's Data Science Seminar, 17 February 2021. The talk explains the role of process mining as a self-service data analytics technology for business teams.
Drupalcamp Scotland - Usability testing in an agile development processNeil Allison
A run through how I execute collaborative usability testing in an agile development process. Covering the operational detail, and tips to get stakeholders on board.
Delivered at Drupalcamp Scotland, 7 November 2015
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionMarlon Dumas
Paper presentation at the 3rd International Conference on Process Mining (ICPM), 4 November 2021.
The paper is available at: https://arxiv.org/abs/2105.07111
Doing Analytics Right - Designing and Automating AnalyticsTasktop
There is no “one-sized fits all” of development analytics. It is not as simple as “here are the measures you need, go implement them.” The world of software delivery is too complex, and software organizations differ too significantly, to make it that simple. As discussed in the first webinar, the analytics you need depend on your unique business goals and environment.
That said, the design of your analytics solution will still require:
* The dashboards,
* the required data, and
* an appropriate choice of analytical techniques and statistics to apply to the data.
This webinar will describe a straightforward method for finding your analytic solution. In particular, we will explain how to adapt the Goal, Question, Metric (GQM) method to development processes. In addition, we will explain how to avoid “the light is brighter here” analytics anti-pattern: the idea that organizations tend to design metrics programs around the data they can easily get, rather than figuring out how to get the data they really need.
Outpost24 webinar - The economics of penetration testing in the new threat la...Outpost24
Penetration testing has long been a tried and tested method to simulate an attack against companies’ IT systems to find exploitable vulnerabilities before anyone does. But is the price tag worth it?
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
So exactly how do you integrate information security metrics into action in an organization and actually achieve value from the effort. Learn what efforts are currently underway in the industry to create consensus metrics guides and what initial steps an organization can take to start measuring the effectiveness of their security program.
Information Security Metrics - Practical Security MetricsJack Nichelson
So exactly how do you integrate information security metrics into action in an organization and actually achieve value from the effort. Learn what efforts are currently underway in the industry to create consensus metrics guides and what initial steps an organization can take to start measuring the effectiveness of their security program.
Nicola Reeves and John McDermott: Value Creation in a Hybrid WorlditSMF UK
In this presentation HPE demonstrates that service management remains an essential ingredient in delivering services and supporting your models, including, but not limited to, practices such as ITIL, DevOps, Security, Cloud, and SIAM.
Gary Gamp: The 21st Century Service ManageritSMF UK
The 21st century service manager must evolve their skills and approach to focus on relationships, commercial aspects, and at the same time be able to maximise the customer experience. This presentation focuses on the key aspects of what it will take to transform to the service manager of the future in line with PSMF.
Martin Huddleston: No Service Management, No SecurityitSMF UK
Cyber security is no different from any other management activity, the theory is straight forward and well known, but the execution is very difficult. Interestingly, recent research carried out by a UK/ NATO industry team identified that one key element of high quality cyber security is world class service management as the majority of controls used to secure a system lie within the service management realm.
So how do you effectively encompass cyber security into service management? In this presentation Martin outlines the background to the research and shares the results that identify how service management controls fit within a cyber security life cycle. Then, building on this work, Martin showcases how we need to think more about effectiveness and continuous improvement rather than compliance to give us the best chance of staying ahead of the attackers.
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a TimeitSMF UK
When you look at organisational strategy today, 90% of it is based on getting technology to do the work. Digitalisation is brilliant and will futureproof channel shift and personalisation, but we need to be wary of leaving behind the human element. We are always going to require people to deliver customer service – it’s all about bringing in the right people with the right skills and mindsets; but unfortunately some of the messages around that are getting confused. Whether you work in service or support, customers expect to get value from the time they invest in every conversation with you. Top performers, in all sectors, really get it. We should be talking about creating value at every single touch point.
Best-in-class companies realise that spending time and effort on customer conversations, combined with the right mindset and skills, will result in value for both the customer and the business. In this presentation, Rebecca shares examples of companies who are getting it right. Take a look at her presentation to: understand the science that backs up the thinking, hear of case studies that have shaped thinking, and to better understand the mindsets and skills required to create more human conversations.
Chris Bryan: Continuous Service Improvement in a SIAM EnvironmentitSMF UK
In a time of digital transformation there is a business imperative to continuously improve services, yet too often continual service improvement (CSI) is often left as an isolated afterthought in IT operations. In this presentation Chris outlines a proven model for implementing CSI driven by business value, and intelligently inter-connected with other service management capabilities, processes, and functions.
Learn how to: govern CSI, identify business benefits, align metrics across initiatives, introduce a portfolio approach to CSI, make CSI both agile and lean, and integrate CSI with problem management.
Johann Diaz: The New Management of Service – Joining Up the EnterpriseitSMF UK
Take a look at this presentation to discover how enterprises can now focus from the top down, on delivery outstanding customer services, whilst simultaneously cutting costs and improving compliance.
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't TransformationitSMF UK
It has already been well documented that the service desk is under increasing amounts of pressure – whether it is to improve speed of response, be more agile, support non-traditional functions, and, usually, do more with a reduced budget. The answer? “Going digital.” Or so they think… In this presentation Peter examines how many organisations have, by purchasing a plethora of tools that overlap one another, inadvertently created data siloes that have hampered the transformation and growth of the enterprise; and how instead of allowing these siloes to reside side-by-side with different departments managing the data in different ways, now is the time to connect them in order to streamline operations and create a positive change within the business.
Take a look at this presentation to learn proven ways in which businesses can successfully leverage service management technologies and approaches into their operational processes, whilst simultaneously improving outcomes and building a strong foundation for future business growth.
Our fascination with machines is infinite, as is the unceasing focus to humanise them. The question is, how far are we willing to take artifical intelligence (AI)? Humans are emotional but not always emotionally intelligent, so it’s therefore possible that we end up we limiting the technology, losing ourselves in what we create. As such, to deal with the volatility, uncertainty, complexity, and ambiguity of our environment we must look beyond IT!
In this presentation, Simone explores the positives and negatives of volatility, uncertainty, complexity, and ambiguity (VUCA) with resilience vs. resistance, and teaches you how to understand talent diversity requirements in the machine age. In addition, she shows you how to elevate good habits while still retaining originality.
Hayley Butler and Spenser Arnold: Agile Service ManagementitSMF UK
As HM Land registry transforms the services they deliver, they transform the way they manage services. Earlier this year they began a trial on increasing the agility of their service management functions. In this presentation they share where they started from, where they are now, and where they think they're headed.
As the operator of Britain's railway infrastructure, Network Rail (NR) is tasked with managing a highly complex, multi-dimensional and ageing railway consisting of 20,000 miles of track, 40,000 bridges and tunnels, and 23,000 switches and crossings. The challenge to NR to run a safe, high performing railway meant it had to look at new, innovative ways of working to exploit the current infrastructure to meet current and future demands. This presentation describes the part that IT is playing in that transformation.
Clare McAleese: Verism at Vocalink Mastercard... Our Journey so FaritSMF UK
Vocalink Mastercard has been running a proof of concept on VeriSM, with a view to introducing the approach into the wider organisation, and in this session they will be sharing their journey with the audience. Looking at governance (how they carried our gap analysis against the introduction of the new "product"); service management principles (how they reviewed VeriSM to ensure alignment with existing best practices), management proactices (how they formally introduced agile and DevOps into the business), and more. The presentation aims to assist other organisations with their own implementations, by showing how Vocalink Mastercard has taken the theory from the book and put it into practice in the real-world.
Take a look at this presentation to discover how to introduce VeriSM into your own organisation and keep it gathering momentum, how to get approval from senior management and executives to proceed with any given rollout, what training and qualifications you will require (if any), and how to agree your objectives for the successful adoption of VeriSM.
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised StandarditSMF UK
ISO/IEC 20000 is a standard for service management that can be applied to IT and non-IT services and is already used around the world, which can be supported by ITIL, VeriSM, Devops, IT4IT, or any other framework. With the third edition of the standard being published in Q4 of 2018 and officially launced at ITSM18, this presentation is perfect for those that already use ISO/IEC 20000 and want to find out about what is new; or those who are wishing to improve their services and learn more about what ISO/IEC 20000 is.
Take a look at this presentation to get an overview of the revised standard covering: why the revision was needed and how it addresses today's business and service management challenges; the benefits of the standard and of the revision; what is new, changed, or removed; and the timeline for transition for organizations already certified.
Stuart Howitt: Honey, I Shrunk the IncidentitSMF UK
2016 was a transitional year for Capital One, branching out into new partnerships and new services. But change and growth always presents a challenge to technology management. This presentation tells the story of Capital One's service journey, but mainly focuses on the lessons learnt which can be applied in your own IT organisation.
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service DeskitSMF UK
Gamification in service management is nothing new, but all too often it only focuses on points, badges, and leaderboards. In this presentation, Sanjeev goes beyond this, and shows you how you can apply gaming techniques to drive the right behaviours amongst end users and agents. Plus he shares examples of specific game techniques that can be applied to your service desk, based on Yukai Chou's Octalysis framework for gamification and behavioural design.
Take a look at this presentation to gain actionable insights based on game techniques when applied to the service desk; to take away advice on how to improve end user adoption (of the likes of self-service) and agent motivation. Plus learn a new behavioural design framework (Octalysis).
Jon Terry: Respect for People Lean's Neglected PillaritSMF UK
Respect for People is one of the pillars of Lean. If you read the Lean-Agile and DevOps literature or attend conferences, you will hear plenty about culture. However, these ideas usually aren’t presented as systematically and tangibly as the process tools. Most of the Lean principles that we study are focused on the other pillar, continuous improvement. Cultural ideas may be mixed in there but in a way that’s hard to untangle. Or, at the risk of ruffling some feathers, they may seem overly touchy-feely or theoretical brain science-y. This is a real shame. A business can’t just be a nice place to work, full of nice people; it must deliver a steady stream of results for customers and financial stakeholders. But the best long-term results come from providing a sustainable, healthy work environment. So investing in a strong culture is a wise decision for executives and managers.
Here ITSM17 top-rated speaker Jon Terry explores some key ideas around team structure and the responsibilities of both team members and managers in a respectful Lean-Agile company. The presentation provides candidates with a set of seven principles to spell out respect for people to match those for continuous improvement. And it shares some of the source material from which these ideas are derived.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
4. Keep questions helpful
When will it be fixed?
Is everything under control?
Who’s responsible for this?
Did you change anything?
Why did we let this happen?
5. Too much vital information is hidden
Some more
Emails
Magic
Happens
Case Closed
Case Opened
Some
Emails & Calls
Sometimes the
magic is “Spoke
to Mike & Steve”
Most case
documentation
does not include
the actual root
cause of a problem,
therefore knowledge
reuse is minimised
6. Processes must be second nature
Emergency services
depend on:
•Clear processes
•Checklists
•Repeated training
Limited time to
think: needs
responses to be fast
and automatic
7. Four things need effective control:
• What’s happening?
• How will we restore
service?
• What risks are there?
• What investigation is
needed?
Major
Incidents
Understanding
InvestigatingRestoring
Preventing
8. Separate the workstreams
Four key questions:
What’s happening?
What will we do about it?
What risks are there?
How do we find the cause?
The goal is always-
effective action
DECISION
ANALYSIS
To select the
right fix or
workaround
POTENTIAL
PROBLEM
ANALYSIS
To manage
risksSITUATION
APPRAISAL
To Sort Out
Priority
Actions
PROBLEM
ANALYSIS
To Find True
Cause
11. Major Incident Simulation
Please go to:
http://mindstormrobotics.com/
You will find information about
the incident there
SITUATION
AUGUST
30
Tom Lewis, production manager at
Stockholm Brick Company, has contacted
you because one of their brick sorting
robots, the TX72-6, has a problem.
You repaired the conveyor belt yesterday, but now the
sorting system has broken down again. The breakdown
costs the company roughly 1,000 dollars per minute.
Tom requests your assistance to solve the problem
immediately.
12. Teamwork is key
In teams:
• Review your information
• Complete the Major Incident Dashboard
• Decide what to do next
• Take the necessary actions and update the
dashboard
14. Check point
• How much has your team spent so far?
• What progress has been made in incident recovery?
• Which moves did you make that added value?
15. Wrap up
Start with a clear incident statement
(what process, what symptom)
Look early for similar but unaffected CIs for comparison
The solution is…
16. First 10 minutes
KT INCIDENT DASHBOARD time: August 30, 11:15
Incident Summary:
Customer Issues, Priorities, Impact -
What When Where
Actions Needed Due Done Who Diagnostic Data we have Possible Causes Next Investigation stepDue Done Who
Bricksorting robot TX72-6 problems
Sorting system broken down
Conveyor repaired yesterday
Impact to client= $1,000/minute
Goals fix must meet Possible fixes Best
Fit?
Due Who
Risks and Opportunities
list
Preventive Actions Contingent Actions Due Done Who
Restore fast
Certainty of fix
Avoid causing other incidents
Bricksorting robot TX72-6 problems today
Incident Overview & Action Plan Problem Investigation - Finding Cause
Decisions to be made Risk Management
17. After 30 minutes
KT INCIDENT DASHBOARD time: August 30
Incident Summary:
Customer Issues, Priorities, Impact -
What When Where
Actions Needed Due Done Who Diagnostic Data we have Possible Causes Next Investigation step Due Done Who
Bricksorting robot TX72-6 problems The chute assembly presses
long against the touch sensor
Application update
yesterday
Sorting system broken down IS NOT badly Sorting bricks
when initially moving right
Touchsensor sw update
Conveyor repaired yesterday Happens during reset Database slow to respond
Impact to client= $1,000/minute Started August 30
Goals fix must meet Possible fixes Best
Fit?
Due Who
Risks and Opportunities list Preventive Actions Contingent Actions Due Done Who
Restore fast Reload database
Certainty of fix Replace touch sensor
Avoid causing other incidents Repair conveyor (again)
Replace control unit
Replace Motor B
Brick sorting robot sorting incorrectly; possible causes determined.
Incident Overview & Action Plan Problem Investigation - Finding Cause
Decisions to be made Risk Management
18. After 60 minutesKT INCIDENT DASHBOARD time: August 30
Incident Summary:
Customer Issues, Priorities,
Impact - What When Where
Actions Needed Due Done Who Diagnostic Data we have Possible Causes Next Investigation step Due Done Who
Bricksorting robot TX72-6
problems
The chute assembly presses
long against the touch sensor
Application update
yesterday
Check log files for
evidence
Sorting system broken down IS NOT badly Sorting bricks
when initially moving right
Touchsensor sw update Check log files for
evidence
Conveyor repaired yesterday Happens during reset Database slow to respond Contact DB team
Impact to client= $1,000/minute Started August 30
Goals fix must meet Possible fixes Best
Fit?
Due Who
Risks and Opportunities list Preventive Actions Contingent Actions Due Done Who
Restore fast Reload database Replacing Touch sensor Review work instructions Contact MR support
Certainty of fix Replace touch sensor X Check part upfront for
DOAAvoid causing other incidents Repair conveyor (again) temp
Replace control unit
Replace Motor B
Brick sorting robot TX72-6 now sorting correctly
Incident Overview & Action Plan Problem Investigation - Finding Cause
Decisions to be made Risk Management
19. Takeaways for Major Incident Managers
(and for everyone):
1. Avoid holding people on calls for many hours
2. Keep all information visible in real time
3. Require specific information from participants
4. Run regular simulations to keep skills high
5. Set clear update times and stick to them
20. Leaders in Problem Solving
twitter.com @KepnerTregoe
facebook.com/KepnerTregoe
linkedin.com/company/kepner-tregoe
Andrew Vermes
Senior Consultant
+44 (0) 7973506628
avermes@kepner-tregoe.com
Editor's Notes
KT discovered early on that effective problem solvers focused on one thing at a time: Understanding what’s happening, the impact is a necessary prelude to the other four colours; in some cases we can go directly to a solution; in others we need to step back and understand the risk before we take action. If there are choices about the fix, we need to consider the goals and environment in a quick Decision Analysis. Sometimes, it’s unwise to move forward if we have no idea about the cause: we might make things worse- so Problem Analys needs to be done.
This sessions is about speeding that path to root cause, so now a challenge for you.