The document discusses using analytics to improve service assurance. It provides background on Andrew White, who has 15 years of experience designing systems monitoring and event management software. It then discusses how analytics can be used by CIOs to deliver better outcomes through techniques like big data analytics, security intelligence, mobile and cloud technologies.
Brighttalk converged infrastructure and it operations management - finalAndrew White
How Converged Infrastructure Will Change IT Operations Management
Over the past decade, Enterprises have leveraged a shared service model to make IT more cost effective. The emergence of “Converged Infrastructure” and “Fabric-Based Infrastructure” will allow IT to offer purpose driven solutions rather than the function driven solutions of the past. To do this, IT will need to evolve towards more modular designs, rely more on open standards, and rethink their approach to management frameworks.
In this session you will learn:
How converged infrastructure is used to create purpose driven solutions
Why new operational challenges are faced as this new approach is used broadly
What changes need to occur to succeed with this new paradigm
This is a high level presentation on how to develop a monitoring improvement program. The topic of what to monitor is covered in a separate presentation.
Brighttalk converged infrastructure and it operations management - finalAndrew White
How Converged Infrastructure Will Change IT Operations Management
Over the past decade, Enterprises have leveraged a shared service model to make IT more cost effective. The emergence of “Converged Infrastructure” and “Fabric-Based Infrastructure” will allow IT to offer purpose driven solutions rather than the function driven solutions of the past. To do this, IT will need to evolve towards more modular designs, rely more on open standards, and rethink their approach to management frameworks.
In this session you will learn:
How converged infrastructure is used to create purpose driven solutions
Why new operational challenges are faced as this new approach is used broadly
What changes need to occur to succeed with this new paradigm
This is a high level presentation on how to develop a monitoring improvement program. The topic of what to monitor is covered in a separate presentation.
The VictorOps 2014 State of On-call report. This report, presented as a WebCast and released as a report is the first ever study of the people, processes and emotions of being on-call for technical organizations. If you are overhauling your on-call structure there are great tips how to make that job Suck Less !
Automated decision making with predictive applications – Big Data BrusselsLars Trieloff
My slides from Dataconomy's Big Data, Brussels event in March 2015. Key topics: what are predictive applications and how can they help companies make better decisions, faster and cheaper.
Automated decision making with predictive applications – Big Data AmsterdamLars Trieloff
My slides from tonight's talk at Impact HUB in Amsterdam on big data, machine learning, cognitive biases and how to overcome them with predictive applications.
Automated decision making using Predictive Applications – Big Data ParisLars Trieloff
Predictive Applications enable automated data-driven decisions using big data, machine learning, artificial intelligence and optimization algorithms. With this, they are able to scale decision making, improve the quality of decisions and circumvent cognitive biases that cloud human decision making.
Automated Decision Making with Predictive Applications – Big Data DüsseldorfLars Trieloff
Another installment and iteration of my talk on predictive applications, automated decision making and why cognitive biases prevent us from making the best decisions at scale
Security disasters can emanate from many places but often the main contributor is the disconnect that exists between CIO’s (and executives in general) and the technical staff. This disconnect can give life to the scariest undead creature in the business world: <b>the bad idea zombie.
Automated Decision making with Predictive Applications – Big Data HamburgLars Trieloff
Most businesses are making most decisions the way Lizards do: based on very simple reflex-response patterns and let cognitive biases taint their decision making. Instead of letting gut feel and biases take over, predictive applications make decisions fast, cheap and fact-based.
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
20 years ago information security was a low corporate priority that was the realm of technical geeks. Factors such as the rapidly-evolving threat environment and increased corporate impact have elevated it to a multidisciplinary risk management discipline...which sometimes has a seat at the table. This talk explores what we're doing wrong, why it's ineffective (or worse), and better ways of thinking and doing. You will learn to question the status quo, rethink existing paradigms, and leverage better approaches from information security and other disciplines. Think different! Act different!
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy WebinarKaren Skiles
Many organizations live perceiving Knowledge Management begins and ends with a Knowledge Base. However, a more robust Knowledge Management process exists. The KM process is a pipeline to Continual Service Improvement. This presentation provides insight and methods for developing and implementing a more comprehensive Knowledge Management process leading to improvement throughout the enterprise. This presentation covers design of the KM process, DIKW and its usages, the KM-CSI connection, knowledge repositories and much more.
BSidesLondon 20th April 2011 - Chris John Riley
Chris Sumner, Arron "finux" Finnon and Frank Breedijk
---------------
Why shouting into the security echo chamber does no good! Set to interpretive YMCA dance....
--------------- for more information about the presenters follow them in twitter, @ChrisJohnRiley
TheSuggmeister, @seccubus,@F1nux
Keynote presentation delivered for the Ovum Analysts Business Process Management event in London, November 2012. Using case studies to demonstrate how emerging trends are connected and disrupting business as usual: social networks, mobile devices, big data and cloud computing. With gamification joining the party
Covid 19: Understanding the context using systems thinking techniques webinar
Thursday 22 October 2020
presented by
David Cole, Frank Curtolo, Michael Emes, Dania Issa, Phil Knights, Cesar Rendora, Brian Slaughter and Andrew Wright
The link to the write up page and resources of this webinar:
https://www.apm.org.uk/news/covid-19-understanding-the-context-using-systems-thinking-techniques-webinar/
Mathew Zaute, VP of Analytics at Rise Interactive, shares insights into the current marketing analytics landscape, common struggles marketers face, the keys to success, and more.
The VictorOps 2014 State of On-call report. This report, presented as a WebCast and released as a report is the first ever study of the people, processes and emotions of being on-call for technical organizations. If you are overhauling your on-call structure there are great tips how to make that job Suck Less !
Automated decision making with predictive applications – Big Data BrusselsLars Trieloff
My slides from Dataconomy's Big Data, Brussels event in March 2015. Key topics: what are predictive applications and how can they help companies make better decisions, faster and cheaper.
Automated decision making with predictive applications – Big Data AmsterdamLars Trieloff
My slides from tonight's talk at Impact HUB in Amsterdam on big data, machine learning, cognitive biases and how to overcome them with predictive applications.
Automated decision making using Predictive Applications – Big Data ParisLars Trieloff
Predictive Applications enable automated data-driven decisions using big data, machine learning, artificial intelligence and optimization algorithms. With this, they are able to scale decision making, improve the quality of decisions and circumvent cognitive biases that cloud human decision making.
Automated Decision Making with Predictive Applications – Big Data DüsseldorfLars Trieloff
Another installment and iteration of my talk on predictive applications, automated decision making and why cognitive biases prevent us from making the best decisions at scale
Security disasters can emanate from many places but often the main contributor is the disconnect that exists between CIO’s (and executives in general) and the technical staff. This disconnect can give life to the scariest undead creature in the business world: <b>the bad idea zombie.
Automated Decision making with Predictive Applications – Big Data HamburgLars Trieloff
Most businesses are making most decisions the way Lizards do: based on very simple reflex-response patterns and let cognitive biases taint their decision making. Instead of letting gut feel and biases take over, predictive applications make decisions fast, cheap and fact-based.
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
20 years ago information security was a low corporate priority that was the realm of technical geeks. Factors such as the rapidly-evolving threat environment and increased corporate impact have elevated it to a multidisciplinary risk management discipline...which sometimes has a seat at the table. This talk explores what we're doing wrong, why it's ineffective (or worse), and better ways of thinking and doing. You will learn to question the status quo, rethink existing paradigms, and leverage better approaches from information security and other disciplines. Think different! Act different!
Beyond the Knowledge Base: Turning Data into Wisdom - an ITSM Academy WebinarKaren Skiles
Many organizations live perceiving Knowledge Management begins and ends with a Knowledge Base. However, a more robust Knowledge Management process exists. The KM process is a pipeline to Continual Service Improvement. This presentation provides insight and methods for developing and implementing a more comprehensive Knowledge Management process leading to improvement throughout the enterprise. This presentation covers design of the KM process, DIKW and its usages, the KM-CSI connection, knowledge repositories and much more.
BSidesLondon 20th April 2011 - Chris John Riley
Chris Sumner, Arron "finux" Finnon and Frank Breedijk
---------------
Why shouting into the security echo chamber does no good! Set to interpretive YMCA dance....
--------------- for more information about the presenters follow them in twitter, @ChrisJohnRiley
TheSuggmeister, @seccubus,@F1nux
Keynote presentation delivered for the Ovum Analysts Business Process Management event in London, November 2012. Using case studies to demonstrate how emerging trends are connected and disrupting business as usual: social networks, mobile devices, big data and cloud computing. With gamification joining the party
Covid 19: Understanding the context using systems thinking techniques webinar
Thursday 22 October 2020
presented by
David Cole, Frank Curtolo, Michael Emes, Dania Issa, Phil Knights, Cesar Rendora, Brian Slaughter and Andrew Wright
The link to the write up page and resources of this webinar:
https://www.apm.org.uk/news/covid-19-understanding-the-context-using-systems-thinking-techniques-webinar/
Mathew Zaute, VP of Analytics at Rise Interactive, shares insights into the current marketing analytics landscape, common struggles marketers face, the keys to success, and more.
Remaining Competitive in an ever-changing and increasingly digital worldLee Naik
My presentation on "Remaining Competitive in an ever-changing and increasingly digital world" at the Future of HR summit held in Johannesburg from 20-21 July 2016.
Academic Integrity and Identity In Online LearningJason Rhode
slides from presentation by Acxiom titled, "Academic Integrity and Identity in Online Learning" at the March 2010 Midwest Blackboard User's Group (SLATE) Meeting at Lewis University, March 17, 2010
Across the marketing ecosystem, data fuels every interaction. How do you tie it all together? In this presentation, I reviewed the value exchange between people and business and how to better enable personalization and analytics through the use of Data Onboarding and Big Data environments to not only improve brand experience but the bottom line as well.
Everyone talks about making decisions with data; yet many are frustrated by the confusion and false promises of 'big data'. What marketers really need is the right data at the right time in the right context to engage their customers. Steve Briley, VP of Data Sciences & Analytics at Acxiom explores the trappings of engaging with the omni-channel consumer and fundamental marketing techniques to deliver deeply personal customer experiences over timAe.
Google Analytics is wereldwijd dé meest gebruikte webanalytics tool. Het mag je dus niet verbazen dat steeds meer bedrijfsbeslissingen gemaakt worden op basis van Google Analytics data. Toch staan nog veel CEO's huiverachtig tegenover het kluwen aan data dat elke dag wordt gegenereerd. Tijd om daar iets aan te doen! Deze gratis Whitepaper geeft CEO's een inzicht in dé 8 Google Analytics metrics die ze nauwlettend in de gaten moeten houden.
Overview of the Accenture Technology Vision 2016 for South AfricaLee Naik
Overview of the key trends from the Accenture Technology Vision 2016 report. Includes a perspective from over 300 stakeholders engaged during the development of the report
#MITXData 2014 - Leveraging Self-Service Business Intelligence to Drive Marke...MITX
2014 MITX Data & Analytics Summit
"Leveraging Self-Service Business Intelligence to Drive Marketing Analytics & Insight"
Speaker: Carmen Taglienti (@carmtag), Business Intelligence & Data Management Practice Lead, Slalom Consulting
Advancements in the BI technology ecosystem and the application of these capabilities to marketing analytics has enabled better, faster, and more accurate insight. In addition to the advancements in technology, marketing organizations look to embrace analytics and put the tools that support them into the hands of the decision makers in a “self-service” way. Typically organizations adopt analytics (and the supporting technology) across the enterprise according to the principles of "the analytics driven organization." This session will introduce an Analytics Maturity model that enables an analytics-driven marketing organization to assess current proficiencies, and understand the capabilities required to achieve its desired state of analytics maturity. This discussion will also cover the alignment of technology solutions at the various levels of the Analytics Maturity model, as well as the drive toward “self-service,” easy to use analytics. Finally, the presenter will demonstrate the use of real-time data acquisition and analytics to drive marketing insight.
http://blog.mitx.org/2014-data-summmit/
Digital disruption: Embracing an Integrated Digital Ecosystemaccenture
Investment banking firms are under pressure from all sides. Non-traditional competitors, commoditization and new competitive threats combine with cost-cutting that has reached the point of diminishing returns. Complex, inflexible operating and technology platforms make innovation difficult.
As the technology consumerization continues, flexible sourcing of people, infrastructure, software and information—using cloud computing and “everything as a service” (XaaS)—has converged with new design, development and deployment approaches and tools.
The central investment banking concept is changing. Big ideas come from unexpected places. A digital ecosystem is emerging—one that depends on the customers, capabilities and value proposition of each firm.
Five Steps to Digital Success in the Insurance Sectoraccenture
With global average investments in digital technologies of around US$45 million per company in the last three years, the insurance industry is lagging other industries, both in its level of digitalization and in its ability to realize financial returns on its digital investments.
Accenture cross-industry research identified a significant gap between those insurance companies with strong digital and financial performance and those that were digitally savvy but had failed to achieve the anticipated financial rewards.
Since digital technologies lie at the heart of insurance’s future growth potential, insurance leaders must make sure their digital investments multiply value creation.
THINKING ABOUT THINKING
Audience: PM & BA
Level: All
Date: May 26
Time: 11:30 AM - 12:30 PM
Description
Thinking is a big part of a Project Manager’s and Business Analyst's job. But how often have you spent time thinking about thinking? This presentation looks at thinking as a critical soft skill for project managers and how a disciplined approach to thinking improves you effectiveness as a change agent for the company in the role of project manager. The presentation will discuss the Thinking Hats, Five Types of Thinking, and brush into the entire world of Business Analytics. The presentation focuses on how the skills of Strategic Analysis, Tactical Analysis, Predictive Analysis, Data mining work together for the complete business management cycle. To add to the thinking equation, the session will explore the power of Social Media sentiment and how the way people "feel" about things is an important factor in the business equation. Think about it !!!!
1. Participants will understand the relationship between planning, analysis, problem solving, decision making and thinking.
2. Students will be able to explain an "Adapting to Whats Happening Model" that includes Data Recording, Strategic Analysis, Tactical Analysis, Predictive Analysis, and Social Media Sentiment. And how it impacts the business.
3. Students will explore various factors of human bias and how that impacts thinking. The student will understand that bias cannot not be completely eliminated, but should be embraced as a human factor in any thinking exercise. The student will understand that personal perspective/bias is a factor, but not THE factor in thinking.
Supporting innovation in insurance with randomized experimentationDomino Data Lab
Recent technological advances, a dynamic competitive landscape, and an evolving regulatory environment have led to a period of rapid innovation for many insurance providers. Here, we’ll explore how data scientists may use randomized experiments to rigorously assess the causal impact of innovations on business outcomes. Particular emphasis will be placed on experimentation in “offline” channels, with some of the challenges and mitigation strategies highlighted.
Building a Successful Organization By Mastering Failurejgoulah
The Etsy organization has grown by a significant amount over the last five years. As a company grows, more thought must be put into the techniques that it uses to communicate and deal with failures. This talk will cover several techniques that have helped foster a Just Culture, one in which an effort is made to balance both safety and accountability
Presentation made at the 4th Workshop on Strategic Crisis Management (Paris, 28-29 May 2015). For more information, visit the meeting webpage: http://www.oecd.org/gov/risk/4th-workshop-strategic-crisis-management.htm.
Critical thinking leaders as rational manager Learningade
A rational manager is about leading rational processes to maximize the critical thinking skills of people. The presentation explains about Kepner-Tregoe rational processes to maximize the critical thinking skills of people. Find out how you can maximize your critical thinking skills as a leader in a rational process of a management function through application of this tool.
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
Cybersecurity is a Team Sport: Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams.
This presentation was a discussion of issues such as:
* Who should be on the team and what should they know?
* How should the team be organized?
* Who is responsible for developing the strategy and seeing the whole playing field?
* What are the team members responsibilities?
* How do team members personalities affect their roles and performance?
* Is there a role for lawyers if the "privilege" "magic wand" turns out to be more fairy-tale than reality?
The presentation was delivered by cybersecurity and data privacy attorney Shawn Tuma, Co-Chair of the Cybersecurity and Data Privacy Practice Group of Spencer Fane LLP, on October 10, 2018, at SecureWorld - Dallas.
Developing Analytic Technique and Defeating Cognitive Bias in Securitychrissanders88
In this presentation, I discuss the evolution to the analysis era in information security and the challenges associated with it. This includes several examples of cognitive biases and the negative effects they can have on the analysis process. I also discuss different analytic techniques that can enhance analysis such as differential diagnosis and relational investigation.
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
Held February 2019
Annual Privacy and Security Conference
Workshop re: Cybersecurity, Ethics and Careers
Presentation Schedule: https://psv20th.sched.com/event/Jrtl/you-are-the-alpha-and-omega-of-a-secure-future-explore-understand-and-practice-your-role-in-advancing-a-positive-cybersecurity
"The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform" Presentation by
Benjamin Tomhave at OWASP 2010 AppSec DC Cofnerence. Uploading here for non-mac users. (http://www.owasp.org/index.php/The_Unintended_Consequences_of_Beating_Users_with_Carrot_Sticks:_Radical_Thoughts_on_Security_Reform)
Effective Cybersecurity Communication SkillsJack Whitsitt
Presentation describes the problems associated with communication with others - as an information receiver or provider - about cybersecurity and provides insights into how those problems may be overcome through structured communication, the use of positive and negative space, and the setting of perspective and context through lensing.
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
The human mind evolved to draw quick conclusions for survival. Behavioral economists, like Daniel Kahneman and Dan Ariely, are publishing research on when, why and how decision making can be consistently and predictably irrational. You could say these researchers are reverse engineering the wetware, finding bugs and race conditions and disclosing them.People are key to an organization’s information security, even if you believe in the “people, processes and technology” tripod. People define and execute processes. People decide funding for, implement, operate and/or monitor the technology. Your adversaries are people. At least until we reach the AI singularity, that is.Until then, the aim of this talk is to present some of the counter-intuitive findings of behavioral economics research and their implications for how information security is handled at the organizational and market levels. Our hope is that the audience will find they could benefit from changing established, seemingly sensible and logical actions we all do to better match how the wetware actually works.
Presented at BSides SF on Feb. 28th, 2016.
Late February presented two auspicious testing industry events: ATP's “Innovations in Testing” Conference, and the US Department of Education’s National Center for Education Statistics' “Testing Integrity Symposium.”
Join Caveon leaders John Fremer and Steve Addicott as they share the Top Ten Security Lessons Learned from the two events.
Similar to Brighttalk reason 114 for learning math - final (20)
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Brighttalk reason 114 for learning math - final
1. Reason #114 For Learning Math:
Using Analytics to Improve Service Assurance
Follow Us: #ITSMSummit!
2. Andrew White
Cloud and Smarter Infrastructure Solution Specialist
IBM Corporation
Mr. White has fifteen years of experience designing and managing the
deployment of Systems Monitoring and Event Management software. Prior
to joining IBM, Mr. White held various positions including the leader of the
Monitoring and Event Management organization of a Fortune 100 company
and developing solutions as a consultant for a wide variety of organizations,
including the Mexican Secretaría de Hacienda y Crédito Público, Telmex,
Wal-Mart of Mexico, JP Morgan Chase, Nationwide Insurance and the US
Navy Facilities and Engineering Command.
Follow Us: #ITSMSummit!
4. Ground rules for this
session…
• If you can’t tell if I am trying to be funny…
–
GO AHEAD AND LAUGH!
• Feel free to text, tweet, yammer, or whatever
to share with the rest of the attendees
• If you have a question, no need to wait until
the end. Just interrupt me. Seriously… I
don’t mind.
Follow Us: #ITSMSummit!
5. I am here today to share some of what I have learned about
6. CIO’s turn to innovative technologies to
deliver better outcomes
Big Data Analytics
§ Analyze an enormous variety of information sources
§ Real-time insights & actions on streaming data
Security
Intelligence
Mobile
Enterprise
§ Hybrid mobile "
app development
§ Multi-channel integration
§ Device management
§ Workloads on the move
Follow Us: #ITSMSummit!
Cloud & Optimized
Workloads
§ Agile provisioning
§ Elastic compute power
§ Scalable storage
resources
§ Intelligent services
§ People &
identity
§ Data &
information
§ Application
security
§ Security
analytics
IBM
CIO
Study
(2012)
7. Why is problem solving hard?
Non-transparency (lack of
clarity of the situation)
Polytely (multiple goals)
Complexity (large numbers
of items, interrelations,
and decisions)
Dynamics (time
considerations)
Follow Us: #ITSMSummit!
• commencement opacity
• continuation opacity
• inexpressiveness
• opposition
• transience
• enumerability
• connectivity (hierarchy relation, communication relation, allocation
relation)
• heterogeneity
• temporal constraints
• temporal sensitivity
• phase effects
• dynamic unpredictability
9. Predictive Modeling Timeline
Past Behavior
• The observation period
used to feed the
forecasting models
Follow Us: #ITSMSummit!
Point of
Observation
Future Behavior
• The performance
period the model is
trying to predict
10. Predictive models
harness the information
lost in past data so you
can identify discretely
identify situations and
react to them quickly.
11. Analytics 1.0
In the early days, we were just
happy to know if the network
was up or down.
We suffered from event floods
and the perpetually red event
console.
Follow Us: #ITSMSummit!
12. Analytics 2.0
Eventually the technology
allowed us to correlate based
on topology and filter
unnecessary events.
Dashboards were all the rage
and were measured in data
per square inch.
Follow Us: #ITSMSummit!
13. Evolution of Analytics
Value
What
Will
Happen?
Why
Did
It
Happen?
What
Happened?
How
Do
We
Make
It
Happen?
Prescriptive
Analytics
Predictive
Analytics
Diagnostic
Analytics
Descriptive
Analytics
Follow Us: #ITSMSummit!
Difficulty
Adapted from Gartner
16. Our Thought Process
Most primitive, seat of unconscious
Cognition
Stimulus
Perception
Limbic Center
(via the senses)***
(hypocampus and amygdala)
Conscious Choice
Pre-Frontal Cortex
(via motor centers)
Conscious, meaning, choice
Long-term memory
Follow Us: #ITSMSummit!
(hypocampus and amygdala)
Cortex
(hypocampus and amygdala)
*** not very reliable
17. Short Term Memory
Short-term memory is
where the real work of
sense-making takes place
Short-term memory
has a limited
amount of space
(The estimate is 7 ± 2)
Follow Us: #ITSMSummit!
Working Memory
Understanding
Judgement
Relationship
Your Brain
24. Models of Reasoning
Theory
Development
Theory
Interpreta@on
Hypothesis
Data
Hypothesis
Tes@ng
• Inductive
– Starts with Data Available
– Concludes with Possible
Hypotheses
– Bottom Up “Data Driven
Approach”
Follow Us: #ITSMSummit!
• Deductive
– Starts with Theoretical
Framework
– Concludes with Logical
Deductions
– Theory Driven Approach
25. Two Types of Decision Making
Programmed Decisions
–
–
–
–
Routine
Repetitive
Well-Structured
Predetermined Decision
Rules
Follow Us: #ITSMSummit!
Non-Programmed Decisions
–
–
–
–
Unique
Presence of Risk
Presence of Uncertainty
Black Swans
26. How To Improve Decision Making
• Programmed Decision
Making
–
–
–
–
Collect evidence
Identify the problem
Select a solution
Implement and evaluate the
outcome
Follow Us: #ITSMSummit!
• Non-Programmed
Decision Making
– Narrow evidence down to
the ideal level
– Apply heuristics to limit the
impact of cognitive bias
– Present options to a human
for a decision
27. Four Sources of Bad
Decisions
•
•
•
•
Failure to frame the problem correctly
Poor use of evidence
Faulty decision making process
No feedback for improvement
Follow Us: #ITSMSummit!
28. Common Logical Fallacies
•
•
•
•
•
•
•
•
•
Appeals to Authority – where you rely on an expert source to form the basis of your
argument
False Inductions – where you infer a causal relationship where none is evident
Reification – when you rely on taking a hypothesis or potential theory and present it as a
known truth
The Slippery Slope – when you base an argument on the thinking that once one action is
taken, it will trigger a sequence of events that will result in the direst of consequences
The Band Wagon – when you present an argument as true on the basis of its popularity
The False Dichotomy – when you provide only two options and force a choice to be made
The Straw Man – when you create a false argument and refute it implying that the counter
argument is true
Observational Selection – when you draw attention to the positive aspects of an idea and
ignore the negatives
Statistics of Small Numbers – when you take one (or a very small sample) and use it to draw
a general conclusion
Follow Us: #ITSMSummit!
29. The problem is not that
there are no silver bullets…
the problem is that there are
no werewolves.
- Jim Tussing, CTO, Nationwide Insurance
30.
31. Global Warming and Inflation
Global warming
Inflation
Follow Us: #ITSMSummit!
35. Boyd’s Loop
Observe
Orient
Decide
Act
Implicit Guidance & Control
Unfolding
Circumstances
Cultural
Norms
Observation
Feed
Forward
Knowledge
Life Cycle
New
Information
Outside
Information
Cognitive
Abilities
Feed
Forward
Decision
(Hypothesis)
Feed
Forward
Action
(Test)
Prior
Wisdom
Feedback
Feedback
Unfolding Interaction With Environment
•
Note how observation shapes orientation, shapes decision, shapes action, and in turn is shaped by the
feedback and other phenomena coming into our sensing or observing window.
•
Also note how the entire “loop” (not just orientation) is an ongoing many-sided implicit cross-referencing
process of projection, empathy, correlation, and rejection.
Follow Us: #ITSMSummit!
From “The Essence of Winning and Losing,” John R. Boyd, January 1996.
36. Where the Breakdown
Occurs
Systemic Influences!
• System Capability!
• Interface Design!
• Stress & Workload!
• Complexity!
• Automation!
Current State!
Feedback!
Situational Awareness!
Perception of
Elements in
Current Situation!
!
Level 1!
Observe!
Comprehension
of Current
Situation!
!
Level 2!
Projection of
Future Status!
!
!
Level 3!
Orient!
• Goals & Objectives!
• Preconceptions!
• Expectations!
Decision!
Decide!
Individual Influences!
Adapted from Endsley, M.R. (1995b). Toward a theory of situation awareness
Follow Us: #ITSMSummit!
in dynamic systems. Human Factors 37(1), 32–64.!
Act!
Cognitive Processes!
Long Term
Memory!
• Abilities!
• Experience!
• Training!
Performance
of Actions!
Automaticity!
37. Sometimes We Miss What
is Going On
Say… what’s a mountain
goat doing all the way up
here in these clouds?
Follow Us: #ITSMSummit!
39. The Gaussian Bell Curve
Mean
-1σ
+1σ
-2σ
-3σ
+2σ
67%
95%
Follow Us: #ITSMSummit!
99.5%
+3σ
40. The trick is not to spend our
time trying to get better at
predicting this world, or
making it more predictable, for
both of these strategies are
bound to fail.
- Nassim Nicholas Taleb, Author and Philosopher
41. Normative Decision
Making Model
• Limited Information Collection
– 7 +/- 2
– Tendency to acquire manageable rather than optimal amounts of
information
– Difficulty identifying all possible options
• Judgmental Heuristics
– Judgmental heuristics - rules of thumb or shortcuts that people use to
reduce information processing demands
– Availability heuristic - tendency to base decisions on information
readily available in memory
– Representativeness heuristic - tendency to assess the likelihood of an
event occurring based on impressions about similar occurrences
• Satisficing
– Choosing a solution that meets a minimum standard of acceptance
Follow Us: #ITSMSummit!
42. The Analytics Focus…
In addition to handling monitoring and performance alerts, it
helps drive improved availability.
The Formula:
1.
Continually collect, categorize, and analyze all events from as many
sources as possible
2.
Correlate events and analyze them using previous outages as patterns
to identify situations worth investigating
3.
Notify a support team so the situation can be mitigated before
becoming an outage
4.
Automate responses that have well established situational fingerprints
and proven resolution steps
Follow Us: #ITSMSummit!
43. Most Common Modeling Tasks
•
•
•
•
•
•
•
Classification: predicting an item class, “decision tree”
Clustering: finding natural groups or clusters in data
Association: finding things that occur together
Deviation: finding changes or outliers
Estimation: predicting values
Linkage: finding relationships among actors
Mining: extracting information from data
Follow Us: #ITSMSummit!
44. Types of Analytical Algorithms
Algorithm
Description
Decision Tree
Calculating the odds of an outcome
Association Rules
Identifying the relationships between elements
Naïve Bayes
Clearly showing the differences in a particular variable
Sequence Clustering
Grouping data based on a sequence of events
Time Series
Analyze and forecast time-based data
Neural Networks
Seek to uncover non-intuitive relationships in data
Text Mining
Analyze unstructured text data looking for context and meaning
Linear Regression
Determine the relationship between columns to predict an
outcome
Logistic Regression
Evaluate the relationship between columns in order to evaluate
the probability that a column will contain a specific state
Follow Us: #ITSMSummit!
45. Questions Answered by Analytics
Business Question
What is the best that can happen?
Optimization
What will happen next?
Predictive
What if this trend continues?
Predictive/Forecasting
Why is this happening?
Variance analysis/Root Cause
Is some action needed?
Alerts
Where is the problem?
Query/Drill Down
How many, how often, when?
Value
Method
Ad hoc reports
What happened?
Standard reports
Follow Us: #ITSMSummit!
47. Detection Time
Response Time
Repair Time
Recovery Time
Down Time
Observe
Follow Us: #ITSMSummit!
Orient
Decide
Restore
Recover
Repair
Diagnosis
Outage
Detection
Incident Life Cycle
Act
48. Anatomy of an Outage
!2!
!
5:45-ish pm: CICS ABENDS
start flooding the console but
not high enough to ticket!
6:00-ish pm: MQ flows start are interrupted
and are alerting in Flow Diagnostics!
!1!
!
Database!
WAS!
Load Balancer!
zOS!
CICS!
Firewall!
6:04pm: Synthetic transactions fail at
and 6:14 the Ops Center confirms the
issue Follow Us: #ITSMSummit!
and creates a P0 Incident!
Message!
Queue!
WAS!
Database!
6:54pm: Support teams
investigate the interrupted
flows and determine it is a
“back-end” problem!
!
!
!
!
!
!
!
!
!
!
3!
Web!
Servers!
4!
!
!
!
!
Corporate!
LANs & VPNs!
DB2!
5!
zOS!
MQ!
10:29pm: Support teams
investigate MQ and ultimately
and rule it out and ultimately
decide to reset CICS to resolve
the issue!
49. Why did this happen?!
hKp://www.ithakabound.com/wp-‐content/uploads/2010/02/DC-‐Snow-‐men-‐pushing-‐car.jpg
Follow Us: #ITSMSummit!
50. The Problem
Why aren’t operations teams preventative today?
§ Too much data to analyze manually
§ Existing analytic techniques, such as standard thresholds, are not up to the task
§ They cannot detect problems while they are emerging (before business impact)
§ Set threshold too high, insufficient warning before total failure.
§ Set threshold too low, too much noise, everything is ignored
If no there is no ‘early detection’ before the outage, operations teams can only react
while outage is already in effect and already losing money...
Follow Us: #ITSMSummit!
51. Processing Streams
Real-Time
Event Streams
Situational
Awareness
Engine
Patterns from
Historical Data
Follow Us: #ITSMSummit!
Detected and
Predicted Situations
Causal Relationship
from Past RCAs
Adapted from http://www.slideshare.net/TimBassCEP/getting-started-in-cephow-to-build-an-event-processing-application-presentation-717795
52. Complex Event Processing
Event Queries
A
Data Events
Control Event
Other Events
B
C
Event Filter
Time Window
Feedback Loop
Event Pipeline
Follow Us: #ITSMSummit!
Event Intelligence
Scenarios
Action Events
53. One Integrated Environment
CMDB
Paging
Presentation Framework
Service Desk
Knowledge
3rd Party Providers
Asset Mgmt
Enrichment & Correlation
Event API
Event Pool
Predictive
Business Telemetry
Mainframe
Distributed
Follow Us: #ITSMSummit!
Database
Network
Middleware
Storage
Operational!
Data Warehouse!
Event Catalog
54. Integrate Your Processes
Audit Information and Suspicious Activity
Automated
Discovery
Status Indications
Trend-Related Faults
Discovered Problems
Availability
Management
Performance
Management
Asset Management
& Topology
Database
Configuration
Management
Change
Management
Topology Snapshots
Historical Data
Configuration Discrepancies
Security
Management
Incidents
Change Activity
Aggregation
and Analysis
“Enriched” Events
Enrichment Data
Enterprise Data
Sources
Business Activity Data
Business
Telemetry
Information
Business Activity Data
Enrichment Data
Follow Us: #ITSMSummit!
Presentation
Framework
55. Service Provider
Managed Monitoring
System!
Vendor Managed
Monitoring System!
Automated Action!
KM
Entries!
Triage!
Archive and Report!
Notification and
Escalation!
Business Impact
Analysis!
Root Cause Analysis!
Automated
Provisioning
System!
Correlation and
Event Suppression!
Predictive
Analysis!
Automated
Action Tools!
Meta-Data Integration Bus!
Distributed Collectors!
Automated
Change
Reconciliation!
Enrichment!
Element
Manager!
Service Center
and Enterprise
Notification Tool!
Topology And
Relationship
Database!
Common Event
Format!
Element
Manager!
Distributed Collectors!
Element
Manager!
Business
Telemetry Data!
Distributed Collectors!
LOB Managed
Monitoring System!
Follow Us: #ITSMSummit!
Service
Center!
Security
Management!
Yammer!
CMDB!
CVOL!
APM!
Visualization!
Framework!
xMatters!
56. Optimized
Performance
Track,
Op3mize,
and
Predict
capacity
and
performance
needs
over
3me
Perform
• Track capacity and
performance of applications and
services in classic and cloud
environments
• Optimize resource deployment
with what-if and best fit
planning tools
• Escalate capacity and
performance problems before
they cause critical failures
Predictive Outage
Avoidance
Ensure
availability
of
applica3ons
and
services
Predict
• Use learning tools to
augment custom best
practices
• Leverage statistical
methods to
maximize
predictive warning
• Improve problem
detection across IT silos
Faster Problem
Resolution
Find
&
correct
problems
faster
with
tools
that
determine
ac3ons
required
to
resolve
issues
Resolve
• Identify problems quicker with
insight to large unstructured
repositories
• Isolate problems quicker by
bringing relevant unstructured
data into problem investigations
• Repair problems quicker with
the right details quickly to hand.
Automated Analytics helps lower IT Administration Costs:
Improved Insight
Enhance
visibility
into
systems
resource
rela3onships
while
increasing
customer
sa3sfac3on
Know
• Determine what resources
are interdependent to assess
impact of failures
• Gain insight into what is
important to your customer
• Decrease customer churn
and acquisition costs while
increasing customer
retention and satisfaction
• Performance and Capacity planning tools monitor appropriately and escalate, reducing
time consuming report browsing
• Learning tools reduce customization and best practices investment on initial deployment
• Log Analysis helps speed problem resolution to be able to do more with less
Follow Us: #ITSMSummit!