A brief introduction to Design Science for Information Systems by Paul Johannesson at KTH/Stockholm University. The presentation builds on the work by Alan Hevner and others.
Your Challenge:
At every organization, every day, employees at various levels make decisions on how IT is used in building, transforming, and operating the enterprise.
These decisions affect enterprise performance, both short and long term.
Our Advice:
Critical Insight
IT policies assign authority and accountability for making key IT decisions and outline mandatory process steps, but don’t say what should guide the decision-making process.
Naturally, employees in different departments and at different levels have different, often competing priorities.
Moreover, employees tend to make decisions leaning on their own assumptions as to how IT should be used by the organization. IT decisions, guided by foundational beliefs that differ, lack cohesiveness in achieving enterprise goals and require an increased IT governance effort to achieve policy compliance and realize desired business outcomes.
Impact and Result
EA principles succinctly communicate the organization’s intent as to the use of IT in building, transforming, and operating the enterprise and provide a foundation of shared beliefs that guide IT decision making across the organization.
EA principles represent a key component of IT governance and should guide the development of domain-specific policies (e.g. security policy, procurement policy) that elaborate on particular implications of principles in specific process areas.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Your Challenge:
At every organization, every day, employees at various levels make decisions on how IT is used in building, transforming, and operating the enterprise.
These decisions affect enterprise performance, both short and long term.
Our Advice:
Critical Insight
IT policies assign authority and accountability for making key IT decisions and outline mandatory process steps, but don’t say what should guide the decision-making process.
Naturally, employees in different departments and at different levels have different, often competing priorities.
Moreover, employees tend to make decisions leaning on their own assumptions as to how IT should be used by the organization. IT decisions, guided by foundational beliefs that differ, lack cohesiveness in achieving enterprise goals and require an increased IT governance effort to achieve policy compliance and realize desired business outcomes.
Impact and Result
EA principles succinctly communicate the organization’s intent as to the use of IT in building, transforming, and operating the enterprise and provide a foundation of shared beliefs that guide IT decision making across the organization.
EA principles represent a key component of IT governance and should guide the development of domain-specific policies (e.g. security policy, procurement policy) that elaborate on particular implications of principles in specific process areas.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Systems Engineering is a very broad , overarching, and generally applicable engineering discipline. Many types of systems are developed using SE. These include biomedical systems, space vehicle systems, weapon systems, transportation systems, and so on.
Systems Engineering involves the coordination of work performed by engineers from all other engineering disciplines (electrical, mechanical, computer, software, etc.) as required to complete the engineering work on the project/program.
Research methods for engineering students (v.2020)Minh Pham
Beginning students who start doing research may face to many difficulties from choosing a good research topic to start, how to develop new ideas to how to implement models to test their ideas and write papers. Research skill is a craft skill. You only learn it by doing. However, it is good to learn know-how in doing research. In this lecture, I share information of how-to-do research for engineering students with the hope that it will help students to save time at the beginning state of doing research.
Slides from a webinar that I did recently for TIBCO. Full webinar replay with audio available at http://www.tibco.com/mk/2007/wsemtbpdesign08-aug-07usarc.jsp
It is well known that an effective PMO is key to successful and efficient program and project execution. In other words, doing things “right”. Enterprise Architecture is the discipline that plans and monitors enterprise transformation and aligns the business strategy with information technology capabilities. In other words, doing the “right things” to support the business.
Why is it organizations despite having both of these disciplines still struggle with effective enterprise transformation? What can we done to use these disciplines more effectively to effect better business outcomes? What are the roles of each discipline and how do they work together to create business value?
In this presentation, Riaz will address these questions and will provide real life examples that can help build a strong relationship between the PMO and Enterprise Architecture.
Learning Objectives:
• How to build a strong relationship between the PMO and Enterprise Architecture (EA) to deliver positive outcomes for your organization
• Identify the different roles and functions of the PMO and EA as well as their similarities
Solution Architecture And Solution SecurityAlan McSweeney
This describes an approach to embedding security within the technology solution landscape. It describes a security model that encompasses the range of individual solution components up to the entire solution landscape. The solution security model allows the security status of a solution and its constituent delivery and operational components to be tracked wherever those components are located. This provides an integrated approach to solution security across all solution components and across the entire organisation topology of solutions. It allows the solution architect to validate the security of an individual solution. It enables the security status of the entire solution landscape to be assessed and recorded. Solution security is a wicked problem because there is no certainly about when the problem has been resolved and a state of security has been achieved. The security state of a solution can just be expressed along a subjective spectrum of better or worse rather than a binary true or false. Solution security can have negative consequences: prevents types of access, limits availability in different ways, restricts functionality provided, makes solution harder to use, lengthens solution delivery times, increases costs along the entire solution lifecycle, leads to loss of usability, utility and rate of use.
Digital strategy is a statement about the organisation’s digital positioning, competitors and customer and collaborator needs and behaviour to achieve a direction for innovation, communication, transaction and promotion.
This describes facets of exploring the options for digital to ensure that the resulting strategy is realistic, achievable and will deliver a return.
Enterprise Architecture needs to be involved in the development of digital architecture. Digital architecture needs to be at the core of the organisation’s wider Enterprise Architecture.
Technology generally accelerates existing business momentum rather than being the originator of momentum. Digital is not a panacea. Digital interactions with third parties gives rise to expectations
Digital will make weaknesses in business processes and underlying technology very evident very quickly. Iterate through digital initiatives, starting small and focussed, learning from experience.
This article describes 10 Architecture Solution Design principles to help organization focus their solution architecture teams around simple but effective design criteria.
A presentation on the Industry 5.0 evolution which builds upon Industry 4.0 and Society 5.0 to reintroduce the lost social, environment and human dimensions.
Systems Engineering is a very broad , overarching, and generally applicable engineering discipline. Many types of systems are developed using SE. These include biomedical systems, space vehicle systems, weapon systems, transportation systems, and so on.
Systems Engineering involves the coordination of work performed by engineers from all other engineering disciplines (electrical, mechanical, computer, software, etc.) as required to complete the engineering work on the project/program.
Research methods for engineering students (v.2020)Minh Pham
Beginning students who start doing research may face to many difficulties from choosing a good research topic to start, how to develop new ideas to how to implement models to test their ideas and write papers. Research skill is a craft skill. You only learn it by doing. However, it is good to learn know-how in doing research. In this lecture, I share information of how-to-do research for engineering students with the hope that it will help students to save time at the beginning state of doing research.
Slides from a webinar that I did recently for TIBCO. Full webinar replay with audio available at http://www.tibco.com/mk/2007/wsemtbpdesign08-aug-07usarc.jsp
It is well known that an effective PMO is key to successful and efficient program and project execution. In other words, doing things “right”. Enterprise Architecture is the discipline that plans and monitors enterprise transformation and aligns the business strategy with information technology capabilities. In other words, doing the “right things” to support the business.
Why is it organizations despite having both of these disciplines still struggle with effective enterprise transformation? What can we done to use these disciplines more effectively to effect better business outcomes? What are the roles of each discipline and how do they work together to create business value?
In this presentation, Riaz will address these questions and will provide real life examples that can help build a strong relationship between the PMO and Enterprise Architecture.
Learning Objectives:
• How to build a strong relationship between the PMO and Enterprise Architecture (EA) to deliver positive outcomes for your organization
• Identify the different roles and functions of the PMO and EA as well as their similarities
Solution Architecture And Solution SecurityAlan McSweeney
This describes an approach to embedding security within the technology solution landscape. It describes a security model that encompasses the range of individual solution components up to the entire solution landscape. The solution security model allows the security status of a solution and its constituent delivery and operational components to be tracked wherever those components are located. This provides an integrated approach to solution security across all solution components and across the entire organisation topology of solutions. It allows the solution architect to validate the security of an individual solution. It enables the security status of the entire solution landscape to be assessed and recorded. Solution security is a wicked problem because there is no certainly about when the problem has been resolved and a state of security has been achieved. The security state of a solution can just be expressed along a subjective spectrum of better or worse rather than a binary true or false. Solution security can have negative consequences: prevents types of access, limits availability in different ways, restricts functionality provided, makes solution harder to use, lengthens solution delivery times, increases costs along the entire solution lifecycle, leads to loss of usability, utility and rate of use.
Digital strategy is a statement about the organisation’s digital positioning, competitors and customer and collaborator needs and behaviour to achieve a direction for innovation, communication, transaction and promotion.
This describes facets of exploring the options for digital to ensure that the resulting strategy is realistic, achievable and will deliver a return.
Enterprise Architecture needs to be involved in the development of digital architecture. Digital architecture needs to be at the core of the organisation’s wider Enterprise Architecture.
Technology generally accelerates existing business momentum rather than being the originator of momentum. Digital is not a panacea. Digital interactions with third parties gives rise to expectations
Digital will make weaknesses in business processes and underlying technology very evident very quickly. Iterate through digital initiatives, starting small and focussed, learning from experience.
This article describes 10 Architecture Solution Design principles to help organization focus their solution architecture teams around simple but effective design criteria.
A presentation on the Industry 5.0 evolution which builds upon Industry 4.0 and Society 5.0 to reintroduce the lost social, environment and human dimensions.
Design science, systems thinking and ontologies summary-upward a-v1.0Antony Upward
For my York University / Schulich School of Business Graduate Degree in Environmental Studies / Graduate Diploma in Business and the Environment.
This presentation describes the sources of my epistemological and hence methodological approach, and then presents an overview of my research design.
I note SlideShare doesn't do a very good job of the PowerPoint animations which makes some of the slides more comprehendable - so suggest you download it. Also allows you to see the speakers notes on many of the slides.
My methodology will be fully written up in my final thesis document.
For more details about the background on Strongly Sustainable Business Models please see http://slab.ocad.ca/SSBMs_Defining_the_Field and http://www.EdwardJames.biz/Research.
If you would like to know something more about the content of my work - the Strongly Sustainable Business Model Ontology - please contact me
Lugović, S., Čolić, M., & Dunđer, I. (2014, January), Znanstveni pristup dizajnu informacijskih sustava, Design Science and Information Systems, Overview of Design Science models over the years presented @ International Scientific Conference On Printing & Design 2014
Palestra sobre "Ciências do Artificial" e como fazer pesquisa (research) neste paradigma epistemológico. Discutimos noções sobre ciência, epistemologia, método, empiria. Apresentamos uma pesquisa em Design Science Research. Terminamos com a proposição de um modelo sobre como estruturar a pesquisa na abordagem da Ciência com Design (ou Projeto).
Palestra proferida na disciplina "Metodologia de Pesquisa Científica" do programa de pós-graduação em Música da UNIRIO, em 28 de março de 2016.
Palestrantes: Mariano Pimentel e Denise Fillipo
Laurie Paolicelli, director of the Orange County Visitors Bureau and Stephanie Perri, account manager at Clean Design, made a presentation to the Economic Development & Public Policy Committee on the new marketing campaign, "The Edge of the Triangle."
At Active Development, we are tackling all issues regarding Social Media engagement and the new frontiers in technology. Here we present to you some of the most important Social Media platforms we use, as well as some analysis and metrics programs we use to understand our followers fully and create a better relationship. For more info on all of our Social Media platforms, feel free to follow us in all of our accounts and send us an email to info@activede.com!
En Active Development estamos atacando todos los recursos de las Redes Sociales y las nuevas tecnologías al porvenir. Aquí les presentamos algunas de las plataformas de Redes Sociales más importante que utilizamos, como también los programas de análisis y métricas que usamos para entender completamente a nuestros seguidores para mejorar nuestra relación. Para más información sobre nuestras Redes Sociales, ¡síguenos y envíanos un email a info@activede.com!
Quien se cree demasiado pequeño como para no dar la pelea, es porque nunca ha tenido que pasar una noche entera encerrado con un mosquito!
La Estrategia del Mosquito es un ciclo de talleres de marketing digital dirigido a empresarios que no son expertos ni en marketing, ni en temas digitales.
Está dividido en 5 talleres, y se ofrece con una lógica que va desde el análisis de competidores en la web, hasta la gestión de redes sociales y posicionamiento seo, pasando por la creación de contenido digital y por la creación de estrategias de EmailMarketing.
Gracias al apoyo de la Universidad Nacional Abierta y a Distancia UNAD, CEAD Ibagué, y a la Cámara de Comercio de Ibagué, este taller se dictará en varios ciclos de manera gratuita para los empresarios de diferentes clústers.
El autor de los talleres es el Ing. Oscar Valbuena, docente universitario, consultor en marketing digital, cuenta con 3 casos de éxito en Microsoft Openness, y dos certificaciones CIW.
Análisis de la viabilidad a nivel económica–financiera de una empresa de nueva creación dedicada a la producción, distribución y venta de un túnel de lavado estandarizado específico de bicicletas. También el diseño y análisis del sistema de producción y cadena de suministros al igual que la política comercial, de marketing y estrategia de la empresa.
Para los que nos visitasteis y para aquellos que os lo perdisteis os dejamos con nuestra presentación del entrenamiento de “claves de aceleración comercial” que presentó nuestro CEO, Joan Riera, en la pasada edición del BizBarcelona 2014.
Emprendimientos de Base Tecnológica Garagoa - BoyacáOscar Valbuena
Gracias a la invitación de la UNAD CERES Garagoa en el departamento de Boyacá, se llevó a cabo este evento enfocado en el emprendimiento, sobre todo de base tecnológica. El ejercicio de este proyecto, obedece a la creación del Centro de Innovación y Emprendimiento para la Ciudad de Tunja, y este ocurre dado que el emprendimiento se ha convertido en la alternativa necesaria y prácticamente obligada de nuestros jóvenes universitarios, ya que las condiciones de empleo (o desempleo), la baja calidad tanto de empleos como de salarios, y la necesidad ávida de sacar adelante los sueños personales han creado la necesidad de ubicarse por si mismo en la sociedad, buscando su suficiencia financiera, sus propios negocios, dejar de ser empleados y cambiar a ser dueños de negocio.
A perspective on the evolving field of design and suggestion of "design leading" as a future aspirational practice and answer to the question "What comes after Design Thinking?".
FROM BRAINSTORMING TO C-SKETCH TO PRINCIPLES OF HISTORICAL INNOVATORS: IDEATI...FaelXC
This Paper is Submitted to Fulfill The English 2 Task Study Program Software Engineering 4th Semester Buddhi Dharma University, Tangerang. Lecturer: Dra. Harisa Mardiana, M.Pd.
The Innovation Engine for Team Building – The EU Aristotele Approach From Ope...ARISTOTELE
ARISTOTELE approach has been presented at the Innovation Adoption Forum for Industry and Public Sector within the 6th IEEE International Conference on Digital Ecosystem Technologies (IEEE DEST - CEE 2012). The presentation about ARISTOTELE has been held by Paolo Ceravolo and Ernesto Damiani (University of Milan) during the keynote "The Innovation Engine for Team Building – The EU Aristotele Approach". Learn more on http://www.aristotele-ip.eu/
The overlaps between Action Research and Design ResearchSandeep Purao
Cole, R. , Purao, S., Rossi, M., Sein, M. 2005. Being Proactive: Where Action Research meets Design Research. International Conference on Information Systems. (ICIS) Las Vegas, NV, December 11-14. Originally presented at ICIS.
Systemic Design Principles & Methods (Royal College of Art)Peter Jones
For a guest lecture for Qian Sun and the RCA Service Design program, April 29, 2015, Talk based on the 10 shared design principles for complex social systems, related to the 2014 paper: https://ocad.academia.edu/PeterJones and http://designdialogues.com/publications/
Generating and justifying design theoryNauman Shahid
This paper applies Simon’s (1996) sciences of the artificial to elaborate a set of structures and processes for
developing design theory. Goals, kernel theory, and artifacts inform an inter-related prototyping cycle of
design, evaluation, and appropriation / generation to produce strategic design theory. The paper identifies DSR
project types to provide signposts for starting and ending the cycle, artifact and evaluation iteration to
facilitate the process and provide a chain of evidence, a simplified format for representing design theory
iterations, and stopping rules to end the cycle. We use a detailed example to illustrate the ideas, discuss related
work, and identify limitations and future research opportunities.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host