This document outlines a 4-step approach to comprehensive software management: 1) Assessment to understand current software usage and licensing, 2) Validation of strategic plans through proof of concepts and ROI analysis, 3) Deployment with implementation plans and knowledge transfer, and 4) Ongoing Management through health checks, license compliance and software renewals. CDW's Total Software Management service provides experts to guide organizations through each step and help maximize value from software investments over the long term.
Surviving the Software Selection ProcessAnthony D'Ugo
I presented at a CMA Ontario professional development event to 50+ attendees on Dec 3, 2009, and again on Dec 17, 2009 due to a sold out first session with an accompanying waiting list. I shared insights and approaches with the attendees to help them find opportunities to reduce the costs, risks, and time associated with software evaluation and selection. I was then asked to write an article on the topic for the CMA Ontario Member Newsletter because of the high level of interest from their members - published on Jan 2010.
In today’s global marketplace, successful companies must be able to integrate and quickly view quality audit information from their manufacturing sites all over the world. This strategic capability has become even more important as manufacturers have moved offshore and have become more complex. The value and immediacy of quality assurance data is a critical element to the survival of competitive manufacturing organizations. Software systems can address these issues.
Source:
Lyons Information Systems, Inc
http://www.lyonsinfo.com
The primary goal of most companies is to successfully grow and one notable challenge facing companies seeking to expand their business is often managing the growth of their IT infrastructure. The 5 tips listed in this guide provide a comprehensive set of measures for organising and structuring your IT infrastructure to support your company’s growth.
Learn How to Maximize Your ServiceNow InvestmentStave
Understand how leading companies are adopting an aPaaS strategy
Learn the evolution of ServiceNow's platform capabilities
Assert IT's influence over shadow IT practices
OPEN SOURCE BPM vs. Programación (RED HAT)Kay Winkler
Según Forrester, desarrolladores consideran Open Source BPM como una alternativa atractiva a la codificación "manual" -
"En los equipos de tecnología se tendrán que iniciar a mirar más allá de los conceptos erróneos comunes acerca de BPM de código abierto en la evaluación de diferentes opciones con el fin de acelerar el desarrollo y la entrega de aplicaciones más sofisticadas..."
2012 Survey of Higher Education CRM Deployment PracticesJohn Copeland
How are colleges and universities using CRM software? A 2012 research study investigates deployment efforts and uncovers best practices for higher education enrollment management and marketing.
Surviving the Software Selection ProcessAnthony D'Ugo
I presented at a CMA Ontario professional development event to 50+ attendees on Dec 3, 2009, and again on Dec 17, 2009 due to a sold out first session with an accompanying waiting list. I shared insights and approaches with the attendees to help them find opportunities to reduce the costs, risks, and time associated with software evaluation and selection. I was then asked to write an article on the topic for the CMA Ontario Member Newsletter because of the high level of interest from their members - published on Jan 2010.
In today’s global marketplace, successful companies must be able to integrate and quickly view quality audit information from their manufacturing sites all over the world. This strategic capability has become even more important as manufacturers have moved offshore and have become more complex. The value and immediacy of quality assurance data is a critical element to the survival of competitive manufacturing organizations. Software systems can address these issues.
Source:
Lyons Information Systems, Inc
http://www.lyonsinfo.com
The primary goal of most companies is to successfully grow and one notable challenge facing companies seeking to expand their business is often managing the growth of their IT infrastructure. The 5 tips listed in this guide provide a comprehensive set of measures for organising and structuring your IT infrastructure to support your company’s growth.
Learn How to Maximize Your ServiceNow InvestmentStave
Understand how leading companies are adopting an aPaaS strategy
Learn the evolution of ServiceNow's platform capabilities
Assert IT's influence over shadow IT practices
OPEN SOURCE BPM vs. Programación (RED HAT)Kay Winkler
Según Forrester, desarrolladores consideran Open Source BPM como una alternativa atractiva a la codificación "manual" -
"En los equipos de tecnología se tendrán que iniciar a mirar más allá de los conceptos erróneos comunes acerca de BPM de código abierto en la evaluación de diferentes opciones con el fin de acelerar el desarrollo y la entrega de aplicaciones más sofisticadas..."
2012 Survey of Higher Education CRM Deployment PracticesJohn Copeland
How are colleges and universities using CRM software? A 2012 research study investigates deployment efforts and uncovers best practices for higher education enrollment management and marketing.
Having developed itself as a saas head in office productivity and CRM tools, infox offers a number of data analytics platform gearing for both professional
data scientists and mid level staffers who need a self service option. The application has an instictive drag and drop interface and also a
classic spreadsheet interface. infox Analytics is geared for organization that need to give actionable data analytics insight to staffers at every stage.
Having developed itself as a saas head in office productivity and CRM tools, infox offers a number of data analytics platform gearing for both professional
data scientists and mid level staffers who need a self service option. The application has an instictive drag and drop interface and also a
classic spreadsheet interface. infox Analytics is geared for organization that need to give actionable data analytics insight to staffers at every stage.
Having developed itself as a saas head in office productivity and CRM tools, infox offers a number of data analytics platform gearing for both professional
data scientists and mid level staffers who need a self service option. The application has an instictive drag and drop interface and also a
classic spreadsheet interface. infox Analytics is geared for organization that need to give actionable data analytics insight to staffers at every stage.
http://www.infoxtechnologies.com/technologies.html
Selection of a standard collaboration platform and toolset used to be easy: Microsoft or IBM Lotus. Now there are many competitors in this market, fueled by the rise of Web 2.0 collaboration paradigms, requiring organizations to know what the problem is they are trying to solve.
This storyboard will help you:
•Understand and identify collaboration opportunities that exist within your organization.
•Identify leading vendors and compare capabilities.
•Select the right solution to implement.
Organizations are embracing the need to support teams with enterprise collaboration solutions.
Review the five signs that you need a new Segregation of Duties compliance st...Symmetry™
SOD solutions that worked a decade ago have become unmanageable for many organizations. First-generation GRC tools and manual processes haven’t kept up with today’s auditors, who now want proof of SOD controls. Periodic samplings have given way to demand for all-the-time, no-exception execution. Here are five ways to know you’ve put yourself at risk of SOD noncompliance.
oftware modernization, otherwise known as legacy modernization, refers to the work of converting, rewriting or porting a legacy program to bring it up to the latest standards in computing and software. This includes such things as modern programming language, software libraries, protocols, cloud technologies (Serverless architecture, Microservices, etc.), hardware platforms, etc.
Perhaps this is a good place to define legacy software, to help us better understand what is at stake when we talk about software modernization.
The term ‘technical debt' and the challenges it can bring are becoming more widely understood and discussed by IT practitioners, vendor managers and business leaders. If you're looking at technical debt in your organization, or already thinking about measuring technical debt with your vendors, you will find this report useful.
Joint Application Design (JAD) was developed by IBM in the late 1970s. It is a requirements determination method that brings together business and IT professionals in a structured workshop to determine and discuss system requirements
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...CAST
Do you want to make your systems more reliable and resilient before your organization becomes the next headline? View the slides from our recent webinar with Melinda Ballou, Program Director for IDC's Application Life-Cycle Management & Executive Strategies research.
Melinda discusses the trends driving recent high-profile outages with increasing frequency, and gives practical advice on adapting your strategy for quality analysis and improving architectural design upfront. To view the recording, visit http://www.castsoftware.com/news-events/event/avoid-system-failure-idc?gad=ss
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
Maclear specializes in enterprise governance, risk and compliance (eGRC) solutions. The IT GRC Solution integrates various business functions such as IT governance, policy management, risk management, compliance management, audit management, and incident management. Enables an automated and workflow driven approach to managing, communicating and implementing IT policies and procedures across the enterprise
Read More at: http://www.maclear-grc.com/
More than Code: Contributions in Scrum Software Engineering TeamsChristoph Matthies
Presentation slides for the CHASE 2020 paper “More than Code: Contributions in Scrum Software Engineering Teams,” F. Ramin, C. Matthies, and R. Teusner, in IEEE/ACM 42nd International Conference on Software Engineering Workshops, ACM Press, 2020. doi: https://doi.org/10.1145/3387940.3392241
http://www.chaseresearch.org/workshops/chase2020
Kick-Starting Digital Transformation: Four IT StrategiesCognizant
For IT organizations, digital transformation can be an especially daunting task. Keeping up with and managing ever-evolving technologies and applications entails four essential components that help accelerate time to market, minimize project risk; automate and handle thousands of requirements, enrich collaboration and manage costs.
Enterprise Architecture in the Boardroom with Dragon1Dragon1 Inc.
How do we get a good overview and insight of the organization? What information do you need as decision-maker, and what are the costs that have to be made to solve the business issues to continue the business operations?
In this blog, you will gain a full understanding of the benefits of custom software, what to look for when hiring a custom software development company, the risks and costs, what to expect in the entire software development lifecycle, and how to ensure the success.
Read full article here: https://www.vrinsofts.com/an-ultimate-guide-to-custom-software-development/
Having developed itself as a saas head in office productivity and CRM tools, infox offers a number of data analytics platform gearing for both professional
data scientists and mid level staffers who need a self service option. The application has an instictive drag and drop interface and also a
classic spreadsheet interface. infox Analytics is geared for organization that need to give actionable data analytics insight to staffers at every stage.
Having developed itself as a saas head in office productivity and CRM tools, infox offers a number of data analytics platform gearing for both professional
data scientists and mid level staffers who need a self service option. The application has an instictive drag and drop interface and also a
classic spreadsheet interface. infox Analytics is geared for organization that need to give actionable data analytics insight to staffers at every stage.
Having developed itself as a saas head in office productivity and CRM tools, infox offers a number of data analytics platform gearing for both professional
data scientists and mid level staffers who need a self service option. The application has an instictive drag and drop interface and also a
classic spreadsheet interface. infox Analytics is geared for organization that need to give actionable data analytics insight to staffers at every stage.
http://www.infoxtechnologies.com/technologies.html
Selection of a standard collaboration platform and toolset used to be easy: Microsoft or IBM Lotus. Now there are many competitors in this market, fueled by the rise of Web 2.0 collaboration paradigms, requiring organizations to know what the problem is they are trying to solve.
This storyboard will help you:
•Understand and identify collaboration opportunities that exist within your organization.
•Identify leading vendors and compare capabilities.
•Select the right solution to implement.
Organizations are embracing the need to support teams with enterprise collaboration solutions.
Review the five signs that you need a new Segregation of Duties compliance st...Symmetry™
SOD solutions that worked a decade ago have become unmanageable for many organizations. First-generation GRC tools and manual processes haven’t kept up with today’s auditors, who now want proof of SOD controls. Periodic samplings have given way to demand for all-the-time, no-exception execution. Here are five ways to know you’ve put yourself at risk of SOD noncompliance.
oftware modernization, otherwise known as legacy modernization, refers to the work of converting, rewriting or porting a legacy program to bring it up to the latest standards in computing and software. This includes such things as modern programming language, software libraries, protocols, cloud technologies (Serverless architecture, Microservices, etc.), hardware platforms, etc.
Perhaps this is a good place to define legacy software, to help us better understand what is at stake when we talk about software modernization.
The term ‘technical debt' and the challenges it can bring are becoming more widely understood and discussed by IT practitioners, vendor managers and business leaders. If you're looking at technical debt in your organization, or already thinking about measuring technical debt with your vendors, you will find this report useful.
Joint Application Design (JAD) was developed by IBM in the late 1970s. It is a requirements determination method that brings together business and IT professionals in a structured workshop to determine and discuss system requirements
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...CAST
Do you want to make your systems more reliable and resilient before your organization becomes the next headline? View the slides from our recent webinar with Melinda Ballou, Program Director for IDC's Application Life-Cycle Management & Executive Strategies research.
Melinda discusses the trends driving recent high-profile outages with increasing frequency, and gives practical advice on adapting your strategy for quality analysis and improving architectural design upfront. To view the recording, visit http://www.castsoftware.com/news-events/event/avoid-system-failure-idc?gad=ss
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
Maclear specializes in enterprise governance, risk and compliance (eGRC) solutions. The IT GRC Solution integrates various business functions such as IT governance, policy management, risk management, compliance management, audit management, and incident management. Enables an automated and workflow driven approach to managing, communicating and implementing IT policies and procedures across the enterprise
Read More at: http://www.maclear-grc.com/
More than Code: Contributions in Scrum Software Engineering TeamsChristoph Matthies
Presentation slides for the CHASE 2020 paper “More than Code: Contributions in Scrum Software Engineering Teams,” F. Ramin, C. Matthies, and R. Teusner, in IEEE/ACM 42nd International Conference on Software Engineering Workshops, ACM Press, 2020. doi: https://doi.org/10.1145/3387940.3392241
http://www.chaseresearch.org/workshops/chase2020
Kick-Starting Digital Transformation: Four IT StrategiesCognizant
For IT organizations, digital transformation can be an especially daunting task. Keeping up with and managing ever-evolving technologies and applications entails four essential components that help accelerate time to market, minimize project risk; automate and handle thousands of requirements, enrich collaboration and manage costs.
Enterprise Architecture in the Boardroom with Dragon1Dragon1 Inc.
How do we get a good overview and insight of the organization? What information do you need as decision-maker, and what are the costs that have to be made to solve the business issues to continue the business operations?
In this blog, you will gain a full understanding of the benefits of custom software, what to look for when hiring a custom software development company, the risks and costs, what to expect in the entire software development lifecycle, and how to ensure the success.
Read full article here: https://www.vrinsofts.com/an-ultimate-guide-to-custom-software-development/
The decision to automate your agency or to change your current Agency Management System is a challenging endeavor—figuring out which one to choose, even more so.
10 things you need to know before buying manufacturing softwareMRPeasy
It is inevitable that for many companies experiencing growth, there comes a point when MRP software is needed. Here are 10 things you need to know before buying manufacturing software.
Selecting an App Security Testing Partner: An eGuideHCLSoftware
In the age of digital transformation, global businesses leverage web application scanning tools to shape innovative employee cultures, business processes, and customer experiences. The surge in remote work, cloud computing, and online services unveils unprecedented vulnerabilities and threats.
Learn more: https://hclsw.co/ftpwvz
Procuring an Application Security Testing PartnerHCLSoftware
Procuring an Application Security Testing Partner is crucial for safeguarding digital assets. An Application Security Testing Partner specializes in conducting comprehensive assessments using keywords like vulnerability scanning, penetration testing, code review, and threat modeling. Their expertise ensures your applications are fortified against cyber threats, providing peace of mind in an increasingly interconnected digital landscape.
Learn More: https://hclsw.co/ftpwvz
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxhelzerpatrina
Week 7 - Choices in Systems Acquisition and Risks, Security, and Disaster Recovery
Sousa, K., & Oz, E. (2015). Management Information Systems, 7th Edition. Cengage Learning.
ISBN-13: 978-1285186139
Read:
· Chapter 13
· Chapter 14
Week 7 Lecture 1 - Choices in Systems Acquisition and Risks, Security
Management of Information Systems
Choices in Systems Acquisition and Risks, Security
Systems Acquisition
Options to consider when acquiring a new system are, development in-house, outsourcing, licensing, software as a service (SaaS), and having users develop the system. There are trade-offs to consider for each option. In-house development has several advantages to consider such as a good fit to organizational need and culture, dedicated maintenance, since the developers are accessible within the company, seamless interface, when the system is custom-made for an organization special requirements can be implemented to ensure that it has proper interfaces with other systems, and specialized security, special security measures can be integrated into an application. Additionally, there is a potential for strategic advantage. Some of the disadvantages of in-house development are, high cost, a long wait for development personnel, who might be busy with other projects and the application may be excessively organization specific to integrate with other systems.
Outsourcing
Advantages of outsourcing are improved financial planning sense outsourcing enables a client to know the exact costs of IT functions over the period of a contract. Another advantage is reduced license and maintenance fee discounts. Outsourcing gives businesses an opportunity to increase their attention to the core business by letting experts manage IT. Outsourcing also provides shorter implementation time as IT vendors can in most cases complete a new application in less time than in-house development. A reduction in personnel as another advantage as IS salaries and benefits are expensive. Outsourcing increases access to highly qualified knowledge. Clients can tap into the IT vendor’s knowledge and experience gained by working with many clients in different environments.
Some of the risks of outsourcing IT services are a loss of control, a loss of experienced employees, outsourcing involves transferring organizations employees to the highest vendor, the risk of losing competitive advantage outsourcing the development of strategic systems is the same as disclosing trade secrets. Another disadvantage is high price despite careful pre-contractual calculations companies find that outsourcing cost them significantly more than if they had spent their resources on in-house development.
Licensing
Benefits of licensing software are immediate system availability, low price (the license fee), available support, and high quality. Immediate availability shortens the time from when a decision is made to acquire the new system and when the new system begins to be productive. The product is high qual ...
Top Software panies to Outsource.pdfTesting ComMindfire LLC
However, finding one good company is a constant concern as the demand for software testing specialists is rising, and many companies face a severe shortage of them. Getting started with a list of companies is just not the right way to do it. First, you must know how to begin your search for a company that meets your needs. Hence, unlike other blogs, we’ll help you get started on your search for the best testing companies to outsource.
Major benefits of software outsourcing and best ways to find remote software ...CodeRiders
Software outsourcing or IT outsourcing has become a beneficial strategy for doing business for various companies from different industries.
Companies hiring dedicated software engineers from software vendors decrease the time, effort, and additional expenses spent on custom software development and so much more.
This presentation clarifies the major reasons businesses regardless of their industry benefit from software outsourcing. It also explains how to find the right and qualified software outsourcing firms to avoid poor software outsourcing experience.
Find out the 7 major benefits of software outsourcing and 4 best practices for finding good software vendors. Save your efforts, money, and time for more investments by software outsourcing.
TRANSCRIPT:
7 MAJOR BENEFITS OF IT OUTSOURCING
1. Huge International Talent Pool at Your Disposal
2. Dramatic Increase of ROI as a Result of Cost-Efficiency
3. Opportunity for Easy and Fast Scale-Up
4. Faster Implementation and Quick Results
5. No Worry About Finding New Employees
6. East Office Task Enhancements
7. No Responsibility for the Developers' Professional and Personal Growth
HOW TO CHOOSE A QUALIFIED SOFTWARE VENDOR
4 MUST-KNOW TACTICS IN CHOOSING A SOFTWARE OUTSOURCING FIRM
1. The Cheapest is not Always Cost-Efficient
2. Communication is the KEY
3. Reputation is Important
4. Time and Price Estimation Should Be Rational
FINAL WORDS
Software Licensing & Compliance: Two Strategies, One GoalJeff Gustafson
Presentation on software licensing and compliance given at SoftSummit 2008 on Oct 20-22, 2008 in Santa Clara, CA.
Note: More presentations available at www.softsummit.com for download.
Keys:
Software license compliance
Software licensing and compliance
Software licensing entitlements
Software Asset Management (SAM)
Software Asset Optimization
Electronic License Management (ELM)
Contract Compliance and Risk
sales enablement
sales support
itam
it asset management
sam
software asset management
software asset management maturity
software licensing
license entitlements
licensing optimization
governance risk management and compliance
contract compliance
license compliance
it audit
software audit
software compliance
ISO19770
asset management white paper
software compliance white paper
software licensing white paper
By focusing on organizational enablers and robust software engineering practices, e-commerce companies can shorten the development lifecycle, outmaneuver the competition and remain relevant in the eyes of customers.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Software Management
1. FEATURE | SOFTWARE MANAGEMENT
4 STEPS TO SUCCESSFUL
SOFTWARE MANAGEMENT
A comprehensive approach is essential to mitigate the risks and optimize the rewards of modern
software environments.
Software has become a critical element of
just about any organization’s operations and one
of the most important investments a modern
organization can make. It runs core systems,
stores and protects sensitive data and ensures
that hardware operates effectively. But a host
of factors that includes virtualization, cloud
computing, and the growing complexity of
today’s applications have made managing this
vital resource more challenging than ever.
4
To learn how SAM can play a critical role in helping
to manage and secure your software, check out
our webinar at CDW.com/SAMwebinar.
2. 43%
OF THE SOFTWARE
INSTALLED ON
PERSONAL COMPUTERS
GLOBALLY IN 2013
WAS NOT
PROPERLY
LICENSED.
Source: BSA, The Software Alliance Global Software Survey,
5
Examples such as these show why a
holistic approach to managing software
resources is becoming a necessity.
Fortunately, help is available. Outside
experts can help IT departments
develop a strategy for comprehensive
software management. The best options
devise a strategic software plan to fully
capitalize on all the benefits of modern
applications, operating systems and
middleware, while mitigating risks
associated with improper licensing
and unmanaged purchasing.
For example, CDW’s Total Software
Management (TSM) service deploys
teams of technical experts that
support organizations in a range
of important areas. TSM teams:
• Assess how effectively an
organization’s software resources
are in supporting the overall
goals of the organization and
find ways to enhance value
• Provide in-depth information to
help with new product selections
• Identify and validate licensing
model choices that help save the
organization money by right-sizing
licenses to avoid noncompliance
fees or overspending for seats
• Aid in deployments of software
updates and new products,
while educating the IT staff
and users about how to get
the most out of technology
• Support long-term software
management activities with
regular infrastructure reviews
and “health checks”
“In short, we educate, evaluate
and evolve our customers,” says
Phillip Pollicove, CDW’s regional
manager for the Northeast Software
Practice and part of the TSM team.
Guiding all of these activities is a
unique strategic roadmap that TSM
advisers develop by working closely
with each organization to produce
the biggest returns on software
investments. “Unlike other software
management advisers that may
Consider these scenarios:
1. In June, a Denver-based construction
firm that specializes in the energy
industry agreed to pay nearly
$115,000 to settle legal claims that it
used unlicensed copies of Microsoft
software, according to BSA | The
Software Alliance, an industry trade
group. As part of the settlement,
the company also agreed to meet
foundational principles of proper
software asset management (SAM).
2. Industry sources say that soon after
some IT departments roll out new
applications to meet organizational
needs, the solutions become a
source of frustration rather than
support for end users. The problem:
inadequate training during the
deployment leaves stakeholders
confused about important features
that should help users to become
more productive on the job.
3. Some applications never reach
the deployment stage. Experts
say that when organizations fail to
develop a comprehensive software
implementation strategy, specialized
applications may often be purchased
to satisfy a new operational
requirement but ultimately just add
to a pile of expensive shelfware
— programs that don’t move into
production systems and thus never
deliver a return on the investment.
4. Prompted by end-of-support
deadlines and the chance to
capitalize on a host of new features,
a number of IT departments are
upgrading legacy operating systems
to newer versions. But because
of poor change management
processes, the IT staff doesn’t take
advantage of modern tools, such as
automated scripting routines, and
instead follows traditional manual
practices when pushing out security
patches and other updates. The
result: a lost opportunity to relieve
technicians of routine tasks and free
them up for more strategic activities.
CDW.com/sam | 800.800.4239
reflect a single vendor’s view, the TSM
approach provides a holistic view of
each client’s software options,” says
Jaime Waterfield, senior manager of
software services at CDW and another
TSM team member. “TSM offers an
ongoing relationship with customers to
June 2014
help them manage the entire software
lifecycle, including advice about the
servers and other hardware that will be
needed to best support the software.”
Organizations looking for the right
comprehensive software management
solution should analyze a potential
service provider’s expertise in four
key stages: assessment, validation,
deployment and ongoing management.
3. FEATURE | SOFTWARE MANAGEMENT
6
Assessment tools can help the discovery phase. For
example, CDW’s SAM solution gathers relevant information
about applications running on every networked device
within an organization. “With this data in hand, the customer
is better informed when speaking with a software vendor,”
Pollicove explains. “It knows exactly what programs are
running in production systems and require full compliance
versus those being used by the development staff, which
just stands up a program, tests it and then brings it down.”
Remote auditing capabilities within the SAM solution
help the TSM team identify necessary updates over time.
With the complexity of today’s software, it’s not enough
simply to take a headcount of each program. Organizations
also need advisers who understand the differences in
licensing models and other nuances in all major platforms.
For example, Microsoft offers the True-Up option for
enterprise-class agreements within organizations. With
True-Up, IT managers don’t have to cut a purchase order
every time an additional person starts using software
covered by the agreement. Instead, at the end of the
contract year, the organization pays a lump sum for the
number of seats required to bring it into compliance.
Vendors such as Adobe, Microsoft, Symantec and VMware
offer other types of licensing options, such as product suites
that cost significantly less than if purchased as individual
components.
STEP 2
VALIDATION: A REALITY CHECK FOR ROI
Validation is essential for narrowing the choices of
software outlined in the strategic plan and then picking
the specific solutions that will deliver concrete benefits.
This key step requires strategy briefings to map out the
organization’s technology requirements. “The reality is
that most companies rely on multiple software vendors,
and sometimes, the best solution consists of applications
from a mix of different vendors,” Waterfield says. “CDW
works to keep the customer’s best interest in mind at all
times by taking a vendor-agnostic approach. Customers
see the full choice of vendors and learn about the pros and
cons of those various choices in an unbiased way. We can
compare features, different pricing models and the hardware
requirements for each choice, all from a solution perspective.”
In some cases, a proof of concept is called for to ensure
that solutions outlined in the strategic software plan
deliver the expected benefits. This test can also identify
any incompatibilities or integration problems that may
arise among legacy software and new implementations. “A
proof of concept is especially important before a customer
STEP 1
ASSESS FOR SUCCESS
Assessments focus on an organization’s existing software
environment to determine what programs are already
running, whether they’re being used effectively and how
accurately prevailing licensing contracts reflect actual usage.
“Software audits determine how much of what’s running
is authorized by the IT department and how much is
unauthorized so you can enforce policies to get compliance
under control,” says Rob Enderle, principal analyst at the
Enderle Group, an independent consulting firm. “Until you do a
sample inventory, you don’t know how bad the problem is.”
Hiring an outside consulting firm can help organizations
avoid common stumbling blocks, he adds. “The challenge is to
institutionalize the knowledge when you have somebody else
do the assessment,” Enderle notes. “A best practice when you
bring in a third party is to have your own team work alongside it.”
To ensure success, advisers should offer extensive
experience with major software platforms, such as those from
Adobe, IBM, Microsoft, Oracle, Red Hat, Symantec and VMware.
Organizations should then schedule in-depth discussions
with outside advisers, operations managers and IT stakeholders
to develop an overarching strategic software plan to determine
what additional resources are needed to support operational
goals. This strategic plan will become a guide for helping the
organization use software to achieve its long-term objectives.
But first, outside specialists should help an organization
understand the software it’s already running. The gain is
full visibility. The TSM team brings together inside account
representatives along with account managers, licensing
experts and technical product specialists who make onsite
visits to customers. “This collaborative approach ensures
that everyone understands where the customer wants
to be and how they want to get there,” Pollicove says.
AIM FOR
FULL VISIBILITY
4. 7
departments might be able to free up
one or two employees who normally
perform all these manual tasks to do
more strategic activities,” Sommer says.
“Implementing automation software can
be like hiring one or two more people,
except the software is much cheaper
than paying salaries year after year.”
The combined impact of virtualization
and personnel optimizations can
reduce the time it takes organizations
to deliver new services and products,
which further enhance the ROI of
software investments. “We encourage
organizations to put a dollar value on
what it means to launch a new web app
in a day versus the competition taking
30 days to deploy something similar,”
Sommer says. “Once the organization
quantifies what that speed means, it
can roll that into an ROI analysis.”
Finally, an ROI analysis helps to
identify the right licensing model for
a particular application. In addition to
standard enterprise-class licenses,
some vendors offer other choices. For
example, VMware offers its Enterprise
Purchasing Program (EPP), which lets
organizations purchase VMware tokens
that can be redeemed for licenses and
associated support and subscription
resources. “If you really like a new virtual
storage area network that VMware
just released, you can apply tokens to
this or any other VMware software
that’s needed,” Sommer explains.
STEP 3
DEPLOYMENT WITHOUT
DRAMA
To ensure successful deployments
of new software and maximize the
value of the technology, CDW’s TSM
team can work remotely or onsite with
organizations. “The most important
step in the deployment stage is the
first conversation we have with a
client after the contract has been
signed and the organization now
owns the software,” says Pollicove.
By having this discussion, the TSM
team helps organizations get the most
out of their software investments. For
example, when an organization buys an
enterprise-class license from Microsoft,
it receives a number of ancillary benefits,
such as discounts for other products.
Additionally, the contract may offer
vouchers for free web-based training
to help end users understand how to
use new features in the software or
to offset the costs of sending IT staff
members for training to learn how to
maintain servers more effectively.
“The TSM team makes sure the
customer understands how to activate
these benefits and fully realize what
comes with the agreement, beyond just
the software itself,” Pollicove explains.
Then, drawing from the goals outlined
in the software strategy, the TSM team
works with customers to create a
complete implementation plan to quickly
get the solution running in the existing
IT environment. The plan considers a
wide range of factors, including the
customer’s budget for launching software
and related hardware and the necessary
timeline. For example, a new application
at a retailer may need to be spun up
before the crush of holiday sales.
“Software on its own isn’t going
to help an organization. It must be
configured correctly to an organization’s
individual needs and integrated into
actually purchases a solution. They
want to be sure the technology is going
to work as expected in a particular
operational process,” Waterfield says.
“We will stand up a test environment
using the customer’s hardware, or
sometimes cloud services, so they
can get that hands-on validation.”
Also important is a return-on-investment
(ROI) analysis to validate
investments and choices about
licensing models. For example, an
organization might evaluate whether
Microsoft Office 365 or Google Apps for
Business will offer the greatest benefit.
“Customers may be deciding between
two vendors or between a cloud and an
on-premises solution,” Waterfield says.
“An ROI assessment helps our teams
demonstrate the impact of each choice.”
ROI assessments also help to validate
the impact of important trends, such
as server virtualization. For example,
many IT departments manage stable
or even shrinking budgets, while
demands for services continue to rise.
With virtualization, organizations can
consolidate the workloads of 10 physical
servers into one unit. “IT managers
avoid hardware and related costs every
time they deploy a virtual server,” says
Tim Sommer, senior systems engineer
for enterprise accounts at VMware.
Applications that automate routine
IT management and maintenance
tasks offer added ROI benefits. “IT
CDW.com/sam | 800.800.4239
WE ENCOURAGE ORGANIZATIONS TO PUT
A DOLLAR VALUE ON WHAT IT MEANS TO
LAUNCH A NEW WEB APP IN A DAY VERSUS
THE COMPETITION TAKING 30 DAYS TO DEPLOY
SOMETHING SIMILAR.
— Tim Sommer,
Senior Systems Engineer for Enterprise Accounts,
VMware
5. FEATURE | SOFTWARE MANAGEMENT
the existing environment,” Waterfield
says. “The chances are high that we’ve
already completed hundreds, if not
thousands, of projects involving the
particular software that a customer
wants to deploy. That gives the TSM
team insights into the likely hurdles that
may be encountered, as well as the pros
and cons of the different approaches
that can help ensure success.”
By closely linking the validation
process with deployment activities, an
organization can mitigate the chances of
creating any new shelfware that wastes
money and hampers productivity.
The plan also outlines how best to
integrate the new resources into existing
workflows and the training that will be
required to help end users quickly become
productive with new technology. For
example, if the project is an upgrade
to the server operating system used
throughout a data center, TSM technicians
can help the IT staff become familiar
with the latest features and utilities.
“Knowledge transfer is an important
aspect of the deployment process,”
says Pollicove. “The last thing an IT
department needs is for a partner to do
an installation by itself and then have the
internal staff step in at the last minute.
If they are not involved throughout the
entire deployment in a complete team
approach, bad things can happen.”
The TSM staff creates a detailed
record of each configuration step for
the customer’s IT staff. “This ensures
that customers aren’t dependent
on our help every time they want to
change something,” Waterfield says.
STEP 4
MANAGE FOR
LONG-TERM VALUE
Total software management doesn’t
end once an organization deploys
new technology. CDW’s TSM staff
maintains close contact with each
client to help them meet the terms
8
of licensing contracts, reduce the
burden of compliance responsibilities
and ensure that the software is
delivering the expected benefits.
TSM members also perform regular
health checks — an important service
that ensures software solutions run
optimally long after the initial launch.
To achieve these results, an
organization’s IT managers team
up with the TSM staff for quarterly
reviews. TSM members also update
IT managers about any revisions to
the software they own, track any
applications that were purchased but
have yet to be deployed and then show
anything that’s not in compliance with
prevailing licensing agreements.
“The management stage is a continuing
process designed to help customers get
the most value out of their software
agreements,” Pollicove says.
The TSM staff also routinely schedules
meetings with clients several months
before an application is up for renewal.
“We spend some time letting clients
know what’s coming in any announced
software releases that are related to
what they’re already using or their
latest goals,” says Waterfield.
Similarly, the TSM team may discuss
the differences between software
versions, such as Microsoft Office
2013 and Office 365. “Once clients
completely understand what’s in each
version, they can more easily decide
why they may want to purchase a
newer product,” Pollicove explains. “Or
maybe they decide to just renew what
they already have because there’s
no need to switch versions. The TSM
team focuses on what’s in the best
interest of the organization. It’s a full,
solution-oriented approach as opposed
to looking at just an individual order.”
In addition to these discussions, TSM
experts also encourage annual health
checks for the organization’s software
operations. “Once software is in place,
that doesn’t mean the IT environment
or organizational requirements stop
evolving,” says Waterfield. “New
variables are always being introduced
that impact the performance of the
software, which means an organization
may no longer be running the
applications in a way that gives them
the full return on their investment.”
Health checks make sure that all
of the software resources are still
achieving the performance goals
outlined in the deployment plan. “We
look at health checks as preventive
care. We identify any potential risks and
problems before they become costly
and unmanageable,” says Waterfield.
TSM members run script files
throughout the organization’s IT
environment to uncover latency issues
and find system configurations that
aren’t up to standards. The scripts also
look for software that may be used
only infrequently or not at all because
of changes to the organization.
The checkups typically occur annually,
unless an upgrade or new technology
is slated for implementation and will
alter the existing environment. “Any
time something new is being introduced
into a customer’s operations, we would
recommend the health check,” says
Waterfield. “It could mean significant
problems for an organization if it connects
a new system to an existing resource
that’s not working the way it should.”
A Winning Value Proposition
Managing today’s quickly evolving
software environments can be
challenging and risky even when
organizations have a formal plan in place.
But with a comprehensive software
strategy that formalizes every step from
assessment to on-going management,
it becomes far easier to avoid the costly
consequences of noncompliant and poorly
utilized programs as they optimize the
value of their technology investments.