Agile2019 presentation
David Norton, Executive Director, CISQ
The human aspect that has been at the heart of agile success since its inception may well be its Achilles heel when it comes to scaling, and dealing with complex mission-critical environments; indeed, this sentiment has been used by many agile detractors. However, this does not have to be the case and could be the catalyst for an enhanced form of agile that combines the best of agile values and behaviour with modern systems engineering practices.
Next-generation agile will have to leverage unprecedented levels of automation from inception to implementation, and beyond. Techniques such as Model-Based Systems Engineering (MBSE), and Continuous Quality will enable digital twins augmented with AI and IoT sensor feedback, allowing developers to work with increasing levels of complexity in a safe and secure way - without sacrificing agile principles.
This interactive session will focus on a number of interrelated topics to help delegates formulate a strategy for next-generation agile engineering practices, including the following:
Tackling the problem of quality at speed, agile at scale with the correct application of relevant guidelines and standards to form a solid foundation to build on.
Re-evaluating MBSE in the context of agile and digital twins to support complex business ecosystems from strategy to implementation.
Dealing with human factors in the engineering process as we increase automation - when do we augment and when do we remove human actor.
Learning Outcomes:
How to maximise automation within agile and the DevOps toolchain with a strategy that takes advantage of emerging standards and best practices.
How to combine human-centric approaches such as design thinking and hypothesis- driven development with AI and IoT to improve the customer experience and innovation.
How to increase velocity and reduce lead time without sacrificing quality or generating high levels of technical debt.
How engineering methods such as Model-Based Systems Engineering and Systems of Systems Engineering combined with agile can tackle complex business ecosystems.
ISG Agile Enterprise Summit presentation
October 28, 2019
Allowing teams autonomy is a key principle in digital and agile organisations, whether we call them product teams, Scrums teams, release trains, or squads it comes down to the same thing - self-directed teams. However, autonomy is fast becoming a major problem for many organisations, with issues of alignment and governance. In this session we will focus on measuring the maturity of teams to assess the level of autonomy they can be given, and how measurement can be used to Gamify the process to encourage teams to strive for greater maturity.
Key issues
- Why is autonomy becoming such a problem, and why are so many senior executives ignoring it?
- How can we assess agile and DevOps team maturity and align it to a level of autonomy they can be trusted with?
- How can system of systems governance processes be applied to autonomous agile teams to measure enterprise effectiveness?
The CMDB is the ServiceNow database that stores information about all technical services. Within the CMDB Discovery, the support information for each service offering is stored in a Configuration Item (CI) specific to that service. It enables IT teams, to better manage their infrastructure especially in the areas of business service impact analysis, asset management, and compliance. Learn how our ServiceNow experts use CMDB’s Core capabilities to assist businesses and organizations in monitoring and detecting health issues
Jade Global’s RightStart ServiceNow Discovery package is a rapid implementation service for designing and configuring ServiceNow Discovery to automatically populate ONLY the scoped Configuration Item (CI) classes and CI relationships.
InterConnect 2015 Session 2802 - CICS opening. CICS TS V5.1 became available at the end of 2012, followed by CICS TS V5.2 in mid 2014. So what does that mean for you? Perhaps you can reduce operational complexity by hosting modern application interface logic inside the Liberty profile server within CICS? Perhaps you can use the new CICS Cloud capabilities to improve application reliability and accelerate deployments? Maybe you can improve your integration with Mobile devices? Or better control your costs though policies and consolidation? Come to this CICS opening session to find out how CICS is reinventing mainframe application serving one again. And discover which sessions you should attend at this inaugural InterConnect conference to get the most value from your attendance.
Putting the Pro in Process Design with Donna Knapp - an ITSM Academy WebinarITSM Academy, Inc.
Presenter: Donna Knapp, Curriculum Development Manager, ITSM Academy
Movements such as DevOps and Site Reliability Engineering (SRE) are introducing new ways of working for IT organizations. For these movements to succeed, organizations must continuously improve and in some cases completely reengineer their IT Service Management ( ITSM) processes. This session takes a modern look at process design and improvement and managing the associated culture change. Take away five key lessons learned, and five proven process design tips.
We will review a few customers’ decision to move to the Cloud, why they made the decisions they made, how their move to the cloud went and key learnings. Lastly, with the experience gained from several migrations will explain the Silver Lining Planning Services and how Avtex can help you with a turbulence free evaluation and migration to the Cloud.
Webinar - Loyalty Reward Points Using BlockchainJK Tech
This webinar covers how Loyalty Reward Points can be stored on a Blockchain using smart contracts and its Business benefits.
Key Takeaways:
• How to read data from a json string posted by Progress Application via an API call.
• Use of Smart Contracts to write data on an Ethereum Private Network.
• Demonstration of blockchain network in loyalty program network.
Visit our Webpage link: https://jktech.com/insight/webinar/loyalty-reward-points-using-blockchain/
Follow us on:
Facebook: https://www.facebook.com/JKTechnosoftServices/
Linkedin: https://www.linkedin.com/company/jk-technosoft/
Twitter: https://twitter.com/JKTechnosoft
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...NetworkCollaborators
The document discusses digital transformation and Cisco's services to support digital transformation efforts. Some key points:
- Digital transformation is critical for companies but many lack the skills, knowledge, and technology to transform successfully.
- Cisco offers a range of services to help companies with every step of digital transformation from defining a future state to assuring the future state is achieved.
- Cisco's Business Critical Services and High Value Services work together to provide faster problem resolution, peak performance, and smoother IT transitions during digital transformation projects.
ISG Agile Enterprise Summit presentation
October 28, 2019
Allowing teams autonomy is a key principle in digital and agile organisations, whether we call them product teams, Scrums teams, release trains, or squads it comes down to the same thing - self-directed teams. However, autonomy is fast becoming a major problem for many organisations, with issues of alignment and governance. In this session we will focus on measuring the maturity of teams to assess the level of autonomy they can be given, and how measurement can be used to Gamify the process to encourage teams to strive for greater maturity.
Key issues
- Why is autonomy becoming such a problem, and why are so many senior executives ignoring it?
- How can we assess agile and DevOps team maturity and align it to a level of autonomy they can be trusted with?
- How can system of systems governance processes be applied to autonomous agile teams to measure enterprise effectiveness?
The CMDB is the ServiceNow database that stores information about all technical services. Within the CMDB Discovery, the support information for each service offering is stored in a Configuration Item (CI) specific to that service. It enables IT teams, to better manage their infrastructure especially in the areas of business service impact analysis, asset management, and compliance. Learn how our ServiceNow experts use CMDB’s Core capabilities to assist businesses and organizations in monitoring and detecting health issues
Jade Global’s RightStart ServiceNow Discovery package is a rapid implementation service for designing and configuring ServiceNow Discovery to automatically populate ONLY the scoped Configuration Item (CI) classes and CI relationships.
InterConnect 2015 Session 2802 - CICS opening. CICS TS V5.1 became available at the end of 2012, followed by CICS TS V5.2 in mid 2014. So what does that mean for you? Perhaps you can reduce operational complexity by hosting modern application interface logic inside the Liberty profile server within CICS? Perhaps you can use the new CICS Cloud capabilities to improve application reliability and accelerate deployments? Maybe you can improve your integration with Mobile devices? Or better control your costs though policies and consolidation? Come to this CICS opening session to find out how CICS is reinventing mainframe application serving one again. And discover which sessions you should attend at this inaugural InterConnect conference to get the most value from your attendance.
Putting the Pro in Process Design with Donna Knapp - an ITSM Academy WebinarITSM Academy, Inc.
Presenter: Donna Knapp, Curriculum Development Manager, ITSM Academy
Movements such as DevOps and Site Reliability Engineering (SRE) are introducing new ways of working for IT organizations. For these movements to succeed, organizations must continuously improve and in some cases completely reengineer their IT Service Management ( ITSM) processes. This session takes a modern look at process design and improvement and managing the associated culture change. Take away five key lessons learned, and five proven process design tips.
We will review a few customers’ decision to move to the Cloud, why they made the decisions they made, how their move to the cloud went and key learnings. Lastly, with the experience gained from several migrations will explain the Silver Lining Planning Services and how Avtex can help you with a turbulence free evaluation and migration to the Cloud.
Webinar - Loyalty Reward Points Using BlockchainJK Tech
This webinar covers how Loyalty Reward Points can be stored on a Blockchain using smart contracts and its Business benefits.
Key Takeaways:
• How to read data from a json string posted by Progress Application via an API call.
• Use of Smart Contracts to write data on an Ethereum Private Network.
• Demonstration of blockchain network in loyalty program network.
Visit our Webpage link: https://jktech.com/insight/webinar/loyalty-reward-points-using-blockchain/
Follow us on:
Facebook: https://www.facebook.com/JKTechnosoftServices/
Linkedin: https://www.linkedin.com/company/jk-technosoft/
Twitter: https://twitter.com/JKTechnosoft
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...NetworkCollaborators
The document discusses digital transformation and Cisco's services to support digital transformation efforts. Some key points:
- Digital transformation is critical for companies but many lack the skills, knowledge, and technology to transform successfully.
- Cisco offers a range of services to help companies with every step of digital transformation from defining a future state to assuring the future state is achieved.
- Cisco's Business Critical Services and High Value Services work together to provide faster problem resolution, peak performance, and smoother IT transitions during digital transformation projects.
VMA Company Profile update Nov 2016 v2.2 emailAditya Nugra
This company profile summarizes an Asian digital signage and automation solutions provider that has over 10 years of experience. They provide end-to-end digital signage solutions, IoT solutions, and collaboration technology solutions. Their services include project consultation, turnkey solution design and delivery, proof of concept testing, solutions auditing, and project management. They work with major manufacturers and have authorized distributor and partner relationships.
The document discusses the importance of a Configuration Management Database (CMDB) for managing IT infrastructure and services, noting that a CMDB provides a single system of record that supports IT operations, service, asset and configuration management. It describes how ServiceNow's CMDB integrates these capabilities and provides real-time data to drive automation. Examples of how a CMDB supports use cases like impact analysis, asset management, compliance and cloud management are also provided.
When IT Fails: A Business Novel - ITSM Academy WebinarITSM Academy, Inc.
This document summarizes an upcoming webinar about the book "When IT Fails: A Business Novel" by Gene Kim, Kevin Behr and George Spafford. The webinar will feature Gene Kim and Lisa Schwartz discussing the book, which tells the story of an IT organization dealing with a payroll system failure. The webinar agenda includes introductions of the author and background on the book, an overview of main characters in the story, a summary of the plot, and a discussion of prescriptive solutions presented in the book.
Adventist Health owns 19 hospitals across several western states with over 22,500 devices that needed to be centrally managed. Each hospital previously managed their own endpoints separately. Adventist Health deployed Symantec Client Management Suite to centralize management from a single console. This allowed them to reduce software applications in use from over 6,500 to 500, lower costs, improve patch compliance from 80% to 97%, and manage devices more efficiently across all locations.
Rethinking Site Reliability Engineering for ITSM - SDI virtual event "New Way...Jon Stevens-Hall
This document discusses rethinking the application of Site Reliability Engineering (SRE) principles to IT Service Management (ITSM). It notes that while SRE has innovative concepts like focusing on eliminating toil and defining service level objectives, the name "SRE" implies a specialist developer role and may not apply to many ITSM contexts. It also cautions that most organizations are not at the scale of Google and a separate production operations team may not be efficient. The document proposes rebranding the SRE concept for ITSM with a new name and identifying new ways to apply key SRE principles to reduce toil and improve reliability within common ITSM frameworks and practices.
The document discusses the concept of bimodal IT and the need for organizations to adopt both traditional ("Mode 1") and more agile ("Mode 2") approaches to software delivery. It provides context around the increasing digital demands on organizations and the limitations of conventional IT methods. The document then defines bimodal IT and contrasts the characteristics of Mode 1 versus Mode 2. It also discusses some of the challenges to adopting more agile approaches and outlines a proposed roadmap for organizations to evolve towards a bimodal model of IT.
Azul Systems has created Java for the Real Time Business, one that is standards-compliant, commercially proven and purpose-built for the demands of today’s business critical applications. Azul innovation delivers Java that is consistent, scalable, agile and self-tuning and lets you focus on creating and delivering new business value, rather than continually re-tuning your production environment.
Innovative Software is a technology service provider established in 1993 that aims to enhance business performance through optimizing technology use, increasing productivity, and providing a highly skilled team. They have a reputation for excellent customer service and recommend solutions best for each customer's needs. Their Technology Advantage Program is designed to align with business goals, optimize productivity, increase security, and reduce costs through comprehensive support and keeping worries away. Current long-term customers praise Innovative Software's ability to take IT support to a new level and solve most problems immediately.
1) Traditional supply chain visibility using EDI and hub-and-spoke connectivity provides latent and often inaccurate data that has limited benefits.
2) Real-time visibility via IoT reduces some human-induced inefficiencies but does not enable organizations to understand and predict supply chain behaviors.
3) Continuous prediction of supply chain behaviors through advanced analytics of internal and external real-time data leads to major gains like reduced inventory, increased revenues, and improved service levels.
SpringOne Platform 2016
Speaker: Brad Miller; Global Head, Digital & Cloud, Citi
Brad Miller, Head of Global Digital Technology, Consumer Digital & Cloud Technology, speaks about how Citi, a 200-year old banking institution, is transforming its technology and culture.
apidays LIVE Australia 2020 - Events are Cool Again! by Nelson Petracekapidays
apidays LIVE Australia 2020 - Building Business Ecosystems
Events are Cool Again!
Nelson Petracek, Global CTO at TIBCO and Author of "API Success: The Journey to Digital Transformation"
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Rahul Neel Mani
This document discusses how digital disruption is transforming industries and the need for companies to build digital business agility. It notes that digital technologies like the Internet of Things, cloud, mobile and big data are enabling new digital business models and increasing competitive threats. The document advocates that companies simplify processes, automate operations, use data insights to optimize decisions and build a digital ready infrastructure in order to gain agility and counter digital disruption. It provides examples of how companies in various industries can create better customer experiences through digital transformation.
How Cloud Accounting Software Enables Growthndhsshare1
How CFOs can meet overall business strategy, improve corporate performance, and enable growth. Using Cloud ERP to meet significant priorities in forecasting, period-end close, profitability analysis, and performance management dashboards.
AWS Financial Services Cloud Symposium | Hong Kong - KeynoteAmazon Web Services
AWS is hosting the first FSI Cloud Symposium in Hong Kong, which will take place on Thursday, March 23, 2017 at Grand Hyatt Hotel. The event will bring together FSI customers, industry professional and AWS experts, to explore how to turn the dream of transformation, innovation and acceleration into reality by exploiting Cloud, Voice to Text and IoT technologies. The packed agenda includes expert sessions on a host of pressing issues, such as security and compliance, as well as customer experience sharing on how cloud computing is benefiting the industry.
Speaker: Frank Fallon, Vice President, Global Financial Services, AWS
Transforming Financial Services with Event Streaming Dataconfluent
The document discusses how event streaming can transform financial services by providing real-time and scalable data. It describes how banks have become software-driven and the challenges of legacy infrastructure. The document then provides an overview of how Confluent event streaming works and its benefits. Finally, it discusses some key use cases for financial services including improving customer experiences, unlocking value from mainframes and core systems, payments, open banking, security and fraud, and regulatory compliance.
VMA Company Profile update Nov 2016 v2.2 emailAditya Nugra
This company profile summarizes an Asian digital signage and automation solutions provider that has over 10 years of experience. They provide end-to-end digital signage solutions, IoT solutions, and collaboration technology solutions. Their services include project consultation, turnkey solution design and delivery, proof of concept testing, solutions auditing, and project management. They work with major manufacturers and have authorized distributor and partner relationships.
The document discusses the importance of a Configuration Management Database (CMDB) for managing IT infrastructure and services, noting that a CMDB provides a single system of record that supports IT operations, service, asset and configuration management. It describes how ServiceNow's CMDB integrates these capabilities and provides real-time data to drive automation. Examples of how a CMDB supports use cases like impact analysis, asset management, compliance and cloud management are also provided.
When IT Fails: A Business Novel - ITSM Academy WebinarITSM Academy, Inc.
This document summarizes an upcoming webinar about the book "When IT Fails: A Business Novel" by Gene Kim, Kevin Behr and George Spafford. The webinar will feature Gene Kim and Lisa Schwartz discussing the book, which tells the story of an IT organization dealing with a payroll system failure. The webinar agenda includes introductions of the author and background on the book, an overview of main characters in the story, a summary of the plot, and a discussion of prescriptive solutions presented in the book.
Adventist Health owns 19 hospitals across several western states with over 22,500 devices that needed to be centrally managed. Each hospital previously managed their own endpoints separately. Adventist Health deployed Symantec Client Management Suite to centralize management from a single console. This allowed them to reduce software applications in use from over 6,500 to 500, lower costs, improve patch compliance from 80% to 97%, and manage devices more efficiently across all locations.
Rethinking Site Reliability Engineering for ITSM - SDI virtual event "New Way...Jon Stevens-Hall
This document discusses rethinking the application of Site Reliability Engineering (SRE) principles to IT Service Management (ITSM). It notes that while SRE has innovative concepts like focusing on eliminating toil and defining service level objectives, the name "SRE" implies a specialist developer role and may not apply to many ITSM contexts. It also cautions that most organizations are not at the scale of Google and a separate production operations team may not be efficient. The document proposes rebranding the SRE concept for ITSM with a new name and identifying new ways to apply key SRE principles to reduce toil and improve reliability within common ITSM frameworks and practices.
The document discusses the concept of bimodal IT and the need for organizations to adopt both traditional ("Mode 1") and more agile ("Mode 2") approaches to software delivery. It provides context around the increasing digital demands on organizations and the limitations of conventional IT methods. The document then defines bimodal IT and contrasts the characteristics of Mode 1 versus Mode 2. It also discusses some of the challenges to adopting more agile approaches and outlines a proposed roadmap for organizations to evolve towards a bimodal model of IT.
Azul Systems has created Java for the Real Time Business, one that is standards-compliant, commercially proven and purpose-built for the demands of today’s business critical applications. Azul innovation delivers Java that is consistent, scalable, agile and self-tuning and lets you focus on creating and delivering new business value, rather than continually re-tuning your production environment.
Innovative Software is a technology service provider established in 1993 that aims to enhance business performance through optimizing technology use, increasing productivity, and providing a highly skilled team. They have a reputation for excellent customer service and recommend solutions best for each customer's needs. Their Technology Advantage Program is designed to align with business goals, optimize productivity, increase security, and reduce costs through comprehensive support and keeping worries away. Current long-term customers praise Innovative Software's ability to take IT support to a new level and solve most problems immediately.
1) Traditional supply chain visibility using EDI and hub-and-spoke connectivity provides latent and often inaccurate data that has limited benefits.
2) Real-time visibility via IoT reduces some human-induced inefficiencies but does not enable organizations to understand and predict supply chain behaviors.
3) Continuous prediction of supply chain behaviors through advanced analytics of internal and external real-time data leads to major gains like reduced inventory, increased revenues, and improved service levels.
SpringOne Platform 2016
Speaker: Brad Miller; Global Head, Digital & Cloud, Citi
Brad Miller, Head of Global Digital Technology, Consumer Digital & Cloud Technology, speaks about how Citi, a 200-year old banking institution, is transforming its technology and culture.
apidays LIVE Australia 2020 - Events are Cool Again! by Nelson Petracekapidays
apidays LIVE Australia 2020 - Building Business Ecosystems
Events are Cool Again!
Nelson Petracek, Global CTO at TIBCO and Author of "API Success: The Journey to Digital Transformation"
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Rahul Neel Mani
This document discusses how digital disruption is transforming industries and the need for companies to build digital business agility. It notes that digital technologies like the Internet of Things, cloud, mobile and big data are enabling new digital business models and increasing competitive threats. The document advocates that companies simplify processes, automate operations, use data insights to optimize decisions and build a digital ready infrastructure in order to gain agility and counter digital disruption. It provides examples of how companies in various industries can create better customer experiences through digital transformation.
How Cloud Accounting Software Enables Growthndhsshare1
How CFOs can meet overall business strategy, improve corporate performance, and enable growth. Using Cloud ERP to meet significant priorities in forecasting, period-end close, profitability analysis, and performance management dashboards.
AWS Financial Services Cloud Symposium | Hong Kong - KeynoteAmazon Web Services
AWS is hosting the first FSI Cloud Symposium in Hong Kong, which will take place on Thursday, March 23, 2017 at Grand Hyatt Hotel. The event will bring together FSI customers, industry professional and AWS experts, to explore how to turn the dream of transformation, innovation and acceleration into reality by exploiting Cloud, Voice to Text and IoT technologies. The packed agenda includes expert sessions on a host of pressing issues, such as security and compliance, as well as customer experience sharing on how cloud computing is benefiting the industry.
Speaker: Frank Fallon, Vice President, Global Financial Services, AWS
Transforming Financial Services with Event Streaming Dataconfluent
The document discusses how event streaming can transform financial services by providing real-time and scalable data. It describes how banks have become software-driven and the challenges of legacy infrastructure. The document then provides an overview of how Confluent event streaming works and its benefits. Finally, it discusses some key use cases for financial services including improving customer experiences, unlocking value from mainframes and core systems, payments, open banking, security and fraud, and regulatory compliance.
The document discusses how digital transformation is changing businesses through social media, cloud computing, mobile devices, big data and the internet of things. It notes that 81% of customers depend on social media for purchasing advice, 62% of workloads will be cloud-based by 2016, over 1 billion smart devices were shipped in 2013, 90% of data created in the last two years, and 50 billion internet of things devices will be connected by 2020. The document advocates that businesses must break down barriers to digital transformation like organizational silos, outdated business processes, and issues with accessing and analyzing data across different environments and ecosystems. It presents IBM's solutions for helping businesses optimize decisions, embrace agile development, reinvent processes, and deliver personalized experiences
For businesses that want to stay relevant in a Digitized Market, it's imperative to consider Digital Transformation. At Cygnet we deliver 100% Agile solutions in line with your business goals
Cloud technology is no longer a new player in the market,
but it’s a mature and integral part of the IT landscape and a
key parameter in driving business growth. It is an
indispensable topic among CXOs. A research by Fraedon has
found that almost half of the banks find their legacy
systems to be the biggest hindrance in their growth.
This document discusses the business drivers and opportunities for cloud computing. It notes that CIOs are looking to cut costs and IT budgets while still driving business value. Cloud computing allows companies to leverage past IT investments and maintain security while increasing access. The cloud is seen as a way to reduce costs and gain a competitive edge. The document also summarizes analyst predictions of strong growth in cloud computing spending and adoption between now and 2012. It outlines opportunities for partners in building applications for the Windows Azure platform and migrating existing applications and customers to the cloud.
The digitalgenerationishere v5__4pagerMustafa Kuğu
The digital generation, or millennials, will soon dominate the global workforce and economy. For this new generation, cloud and mobile computing are the norm. To succeed, companies must transform their business models and processes to keep up with these digital natives. One of the quickest ways to do so is by moving resources and processes to the cloud using Microsoft and Unisys technologies and services. Their joint solution provides the building blocks needed for digital transformation and helps clients smoothly migrate in a structured and low-risk manner to take advantage of the cloud and mobile opportunities of the new digital economy.
#IBMInsight session presentation "Orchestrating a Customer-Activated Supply Chain"
Assembling the pieces of a customer-activated supply chain involves activities on three dimensions: Sharpen visibility and insight, Partner for innovation, Become customer-activated
IBM supply chain analytics solutions to leverage Big Data
More at ibm.biz/BdEPRX
This document contains a brief on Blue Bricks' 3 products - Service Guard, XPAT 2.0 and Axiom Protect. Please do have a read and we look forward to hearing from you.
Similar to Augmented Agile: Agile Behavior Meets Digital Engineering (20)
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
3. We Need Continuous Delivery Of Features To Stay Ahead
http://giphy.com/gifs/KW3nydTAyPaU0
4. Learning to Play on a VUCA Pitch
Volatility
Uncertainty
Complexity
Ambiguity
5. Understand How The Modes Relate and Interact
Stacey Model
The Theory Bit - Models Of Complexity
The Cynefin framework
6. Adjust Your Decisions Making Process To Fit The Situation
“Decisions without actions are pointless. Actions
without decisions are reckless.”
― John Boyd
26. System of Systems – Net Centric Warfare – Where it
all started
1 2
3
4
5
6
27. System of Systems – TeleHealthcare & TeleFitness
Out Patient
Mobile Device
Telecommunication
Network
Healthcare ProviderCardiovascular Monitor
Application
Local Doctor
Patient
System
Emergency Services
28. System of Systems – A Very Practical Example – Haiti
Disaster Response
OpenStreetMap
Satellite
Images
2000
Users
GPS
Aid Workers
Event
12 H
24 H
"Over just a few days, it saved me and my
driver from getting lost twice, and the alternative
would have been long delays. We are running
fast trying to help people and your work makes
it easier.“ Kjeld Jensen - Red Cross
1
2
3
4
31. The Manifesto for Agile Software Development
1.Customer satisfaction by early and continuous delivery of valuable software.
2.Welcome changing requirements, even in late development.
3.Deliver working software frequently (weeks rather than months)
4.Close, daily cooperation between business people and developers
5.Projects are built around motivated individuals, who should be trusted
6.Face-to-face conversation is the best form of communication (co-location)
7.Working software is the primary measure of progress
8.Sustainable development, able to maintain a constant pace
9.Continuous attention to technical excellence and good design
10.Simplicity—the art of maximizing the amount of work not done—is essential
11.Best architectures, requirements, and designs emerge from self-organizing teams
12.Regularly, the team reflects on how to become more effective, and adjusts
accordingly
32. When dealing with complex mission critical systems
in a system of systems environment (Smart city’s,
open banking, healthcare) it not always possible to
have daily cooperation and Face-to-face
conversation with the key stakeholders.
Not good, but reality of life
35. MBSE
TOOLS
PEOPLE
TRAININGEFFORT
Modeling is a
nice to have
We don’t
have the time
Its vendor
hype
Its too complex
Always ends
up in analysis
paralyses
Its too formal and
we need to be agile
We don’t
have the
cash
Requires
Process/Org
Change
$
$ $
$
60. 2. Treat Digital Twins and Agile MBSE as System of Systems
(SoS) Governance Challenge.
• Directed — The SoS is created and managed to fulfill specific purposes and the other
systems are subordinated to the SoS. The component systems maintain an ability to operate
independently; however, their design and operationalization are subordinated to the central
SoS goal.
• Acknowledged — The SoS has recognized and agreed objectives, joint governance
mechanism and resources for the SoS implementation; however, the supporting systems
retain their independent ownership, objectives, funding, and development and sustainment
approaches.
• Collaborative — The component systems interact more or less voluntarily to achieve agreed
upon central purposes. The central players collectively decide how to provide value and
desired outcomes.
• Virtual — The SoS has no central governance authority or a centrally agreed upon purpose
for the SoS. Large-scale behavior emerges — and may or may not be desirable.
61. Acknowledged, Collaborative & Virtual - BUT NOT Directed
Factors
beyond your
influence
Factors you
you can
influence
Factors you
control
Digital business model exist in a
complex environment.
• Pace of new technically
• More cyber-physical devices
• Ambiguity on regulation
• Uncertainty of API strategies
• Less time to respond
• Less control over the value stream.
• Lower barriers to entry allow new
entrants and fast followers.
63. 4. Adopt Architecture Runway For Major Models — Just in Time, Not
Just to Late
Core Models
Architecture
Story's Backlog
Components,
Frameworks,
Libraries,
Adaptors)
Features
Architecture
Model
Epics and
Story's
Local Sub System
Models
Product
Backlog
64. 4. Adopt Architecture Runway For Major Models — Just in Time, Not
Just to Late
SAFe has the
concept of MBSE.
You can use MBSE
without a enterprise
agile framework, but
it is harder.
73. Complex Toolchains
•Production metrics, objects and feedback
•Requirements
•Business metrics
•Update release metrics
•Release plan, timing and business case
•Security policy and requirement
•Design of the software and
configuration
•Coding including code quality
and performance
•Software build and build
performance
•Release candidate
•Acceptance testing
•Regression testing
•Security and vulnerability analysis
•Performance
•Configuration testing
•Approval/preapprovals
•Package configuration
•Triggered releases
•Release staging and holding
•Infrastructure storage,
database and network
provisioning and
configuring
•Application provision
and configuration.
•Performance of IT infrastructure
•End-user response and experience
•Production metrics and statistics
•Application monitoring
75. Greater Reliance on Suppliers
Hope is not a
strategy
Quality
Productivity
Security
Cost
76. The Nine-Digit Glitch
Board of Directors
CEO, COO, CFO
Business VPs
Corporate
Auditors
CIO
Now affect Accountable for
Governance
Risk management
Business Continuity
Brand protection
Customer
experience
Nine Digit Defects
Cyber incidents see a 1087% increase
year on year (RSM research).
77. Lets Learn From The Past
As industry's mature they automate, from robots
to fly-by-wire
80. We built this city, we built this city on rock an' roll
We Need Standards We Can Implement
81. We Need Standards We Can Implement
We built this city, we built this city on rock an' roll
82. ISO 25010 Software Quality Model
• Functionality - "A set of attributes that bear on the existence of a set of functions and their
specified properties. The functions are those that satisfy stated or implied needs."
• Reliability - "A set of attributes that bear on the capability of software to maintain its level of
performance under stated conditions for a stated period of time.”
• Usability - "A set of attributes that bear on the effort needed for use, and on the individual
assessment of such use, by a stated or implied set of users."
• Efficiency - "A set of attributes that bear on the relationship between the level of performance of
the software and the amount of resources used, under stated conditions.”
• Maintainability - "A set of attributes that bear on the effort needed to make specified
modifications."
• Portability - "A set of attributes that bear on the ability of software to be transferred from one
environment to another."
83. ISO 25010 In Structural Code Analysis
• OWASP Top 10 Vulnerabilities—most critical web application security risks – CWEs &
CVEs
• OWASP Application Security Verification Std v4.0 – 14 categories guide automated unit
& integration tests – most all verification checks have corresponding CWEs
• SANS/CWE Top 25 — most commonly encountered cyber weakness enumerators
(CWEs),
• CISQ Object Management Group (OMG) Automated Source Code Measures for
technical debt & structural quality (Security, Reliability, Performance Efficiency &
Maintainability) – all based on CWEs
84. CISQ Structural Quality Measures
Example architectural and
coding weaknesses included in
the CISQ measures
• SQL injection
• Cross-site scripting
• Buffer overflow
• Empty exception block
• Unreleased resources
• Circular dependency
• Expensive loop operation
• Un-indexed data access
• Unreleased memory
• Excessive coupling
• Dead code
• Hard-coded literals
CISQ Structural Quality Measures
Security
22
weaknesses
(Top 25 CWEs)
Reliability
29
weaknesses
Performance
Efficiency
15
weaknesses
Maintainability
20
weaknesses
An international team of experts
selected the weaknesses to include
in CISQ measures based on the
severity of their impact on
operational problems or cost of
ownership.
Only weaknesses considered severe
enough that they must be
remediated were included in the
CISQ measures.
CISQ Structural Quality measures
are currently being extended to
embedded systems software.
86. Sample RFP CISQ has been referenced by the U.S. General Services
Administration (GSA), formally citing CISQ requirements in a
Information Technology (IT) statement of work from the
Office of the CIO for the Office of Public Buildings. GSA is an
independent agency of the U.S. government that supports
general services of Federal agencies.
See page 21, section 5.9 in GSA’s document, Schedule 70
Blank Purchase Agreement for IT and Development
Services…
“PB-ITS (Project Based IT Services) is seeking to establish
code quality standards for its existing code base, as well as
new development tasks. As an emerging standard, PB-ITS
references the Consortium for IT Software Quality (CISQ) for
guidance on how to measure, evaluate and improve
software.”
Working With Suppliers
87. Standards Are Only Effective If Implemented
We have to deal with the risk link - people.
88. Focus on Culture and Behavior
• Don’t expect everyone to like
automation, some people just
like doing it the hard way
• Incentivize the behavior you
want for the individual and
team.
• Have agreed metrics and KPI
linked to automation.
• Show results
89. Develop The Correct Skills
Process
Design
Scripting
Toolchain
Integration
Standards
Definition
90. Obtain Commitment From The Team
Product
Backlog
Risk
Backlog
[Requirements, Policy's, Definition of Done]
Compliance
Officer
Team
Product
Owner
Product
Manager
GRC
Stores/Themes
Compliance Strategy [Working
software, documentation]
Risk Log / Board
Escalations
GRC Questions
Information “Radiator”
Standards, Good Practice, Regulations
91. Certify The Environment, Don’t Assume
Product
Backlog
Risk
Backlog
[Requirements, Policy's, Definition of Done]
Complianc
e Officer
Team
Product
Owner
Product
Manager
GRC
Stores/Themes
Compliance Strategy [Working
software, documentation]
Risk Log / Board
Escalations
GRC Questions
Information “Radiator”
Standards, Good Practice, Regulations
Automated
Environment
Certified
Tool
Team
Align
92. Have a virtual quality and security assistant
?
!
?
Chatbot integrated
into the toolchain
93. Gamify - Link Automation to Autonomy
Autonomy
Time of
Deployments
Intra-day
allowed
After hours and
on weekends
Frequency of
Deployments
No limits on
changes per
today
Few
changes
per week
Change
Advisory
Board
CAB for
information
purposes only
CAB for all
changes
Freeze
Periods
Only exceptional
change freeze
periods apply
All freeze
periods apply
Continuous
Integration
Environments
Quality
Assurance
Incident
Management
Release
Management
Coding
Practices
Team
A
Level of Automation
Team
B
94. Stay in Control of Quality With Agile Governance
• Communities of
Practice
• Toolchain
Consistency
• Tools Register
• Automation Best
Practice
95. Link Automation to KPI, and Set Targets
• Feature throughput
• Lead-time/Cycle-time
• IT Downtime
• Business Downtime
• Percentage of task
automated
• Refactoring rate and
cost