SlideShare a Scribd company logo
Information Overload: Not a Problem Here! Jeffrey M. Brooks  MSCIS, MBA, MCP, HDM, ITIL
About Peak 10 Peak 10 owns and operates data centers and provides managed services for small, medium and large enterprises. Twelve enterprise-class data centers, nine markets 24 X 7 Customer Support Data Center Services: Managed Colocation, Enterprise Hosting, Reliable Bandwidth and Metro Ethernet Managed Services: Security, Managed Storage (local & remote), Disaster Recovery, Enterprise Messaging, Monitoring, System Administration, Remote Hands, Managed Servers and Virtual Private Lines
What’s On The Agenda? Support Structure Communication Monitoring VOIP Networking Business Continuity Tools Tour Data Center Tour
Setting the Stage Peak 10 leverages our technology, tools and, most importantly, our communication infrastructure to provide outstanding support 24x7x365.
Information Overload It is the abundance and availability of information that allows Peak 10 to reach the level of customer success we have achieved.
How are We Different? Not our equipment (Mostly) Monitoring Security Alarms Facility Alerts
How are We the Same? External & Internal Customers Ticket System Phones People Metrics Escalations
Providing Structure Centralized vs. Decentralized
Peak 10 Support Structure Centralized Helpdesk in Charlotte Local Support – 9 Physical Locations (Markets) Managed Services (Providing Internal Services)
Escalations 1st Line Support – Phone, Email, Portal Help Desk in Charlotte 2nd Line Support Local Market or Managed Services 3rd Line Support Senior Engineers or Managed Services
Centralized Processing 1 Ticketing System 1 Set of SOP’s 1 Set of Processes
Communication is the Core Centralization only works when the communication channels are open, clear and operate both in both directions!
Centralized Monitoring & Support Peak 10 Central Support – Information/Communication Hub Consistency People Phone script Process Ticketing Customer Experience MTTR Abandon Rate
VOIP Phones are core to the distributed component of our support structure Internal Communication is crucial Warm handovers essential Business Continuity Call center efficiency Flexibility Metrics Extension Mobility!!!
VOIP Continuity The main reason the VOIP works is we are not dependent on any one provider, such as a Telco. Peak  10’s redundant network ensures our phone systems is always available.
Core Services Monitoring Networking Power Security Managed Services Environment
Proactive Support – Am I Dreaming?
SNMP Monitoring The Simple Network Management Protocol (SNMP) forms part of the internet protocol suite as defined by the Internet Engineering Task Force (IETF). SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an Application Layer protocol, a database schema, and a set of data objects.
How Is It Used at Peak 10 SNMP Monitoring accounts for 65% of our tickets Almost Proactive Monitored Customers Managed Customers Trending of Issues Root Cause Analysis
Networking SNMP Monitoring is dependent on the network The Network is monitored through SNMP Redundancy is crucial Peak 10 Network Web The criticality of our network is essential for our customers as well as to our infrastructure and provision of services.
Peak 10 Network Diagram
When Trouble StrikesPro-activity Prevails BGP - The Border Gateway Protocol (BGP) is an interautonomous system routing protocol. An autonomous system is a network or group of networks under a common administration and with common routing policies. BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP). FCP – Flow Control Protocol Dynamically measure the end-to-end performance of your applications, including performance over the public Internet. It  quickly and easily implements changes based on those measures. reports on network performance and cost, perform forensic analysis, and when problems do occur, manage service providers to their SLAs.
Power Redundant Power is Key But not everybody subscribes Loss of Commercial Power Alerts/Tickets UPS Issues What does a UPS do Transitions/Load Bearing Clean Power Generators Start/Stop Alerts/Tickets We can rely on generator power indefinitely. But customer communication, and internal communication is still essential.
Security Physical Security Authorized Contacts Q&A Badge, Pin and Biometric Alarms create alerts/tickets Centralization of alerts/tickets
Managed Services Storage & Backups Hosting Virtualization Patch Management Virus Protection Constant communication ensures efficient service and reduction of extraneous work. Tape Rotations require coordination among several groups and Patch Management can be the difference between 500 extra tickets.
Environment Fires Alerts/Tickets Central management Temperature Monitoring Alerts/Tickets Humidity Monitoring Alerts/Tickets
Peak 10 Alert Emergencies are about communication & information Internal Communications Conference Bridge Phone tree Email Text Alerts External Communications Email Text Alerts
Change Management Change Management Process Change Management Meetings CMR’s Types of Changes Emergency Priority Scheduled Routine Customer communication and expectation setting Email Pathfinder Completion Notices – CRUCIAL!!!
Business Continuity Peak 10 is in the business of ensuring continual services to our customers. But what happens when we suffer problems?
Picking Up the Pieces Network Redundancy Phones Redundancy Process Personnel Redundancy Relocate Work from home (Phones) Agility Mobile offices & services
Outsourcing!
We Are Not Evil! By allowing our customers to outsource specific technology and facilities to us, we allow our customers to better focus on providing their customers with the best service possible. We also allow them  to focus on people and processes, the core of every business.
Consider Your Critical Infrastructure Can you afford a generator? Do you monitor the temperature & humidity? Need a reboot at 2 am? Need a tape rotation? Vendor needs to repair your equipment?
Imagine
Technology Tour EM7 Monitoring Ticketing Pathfinder Multitude of Information! Sherpa Intranet SOP Policies
Data Center Tour
Jeff’s Final Thought Providing excellent service to Peak 10’s customers  requires a coordination of vast amounts of information and communication between multiple parties while keep focus on what the customer’s expectation is!
Questions?
Thank You Jeffrey M Brooks Senior Manager, Support  Services Peak 10 8910 Lenox Point Dr Suite A Charlotte, NC 28273 Main: 1-704-264-1027 Mobile: 1-803-554-3838 www.peak10.com

More Related Content

What's hot

Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
Kaseya
 
About Marcum 0915 V2
About Marcum 0915 V2About Marcum 0915 V2
About Marcum 0915 V2
JeffTMartin
 
Kaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT Directors
Kaseya
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader ppt
BimadRajSinha1
 
Infrastructure Management Services
Infrastructure Management ServicesInfrastructure Management Services
Infrastructure Management Services
Netmagic Solutions Pvt. Ltd.
 
infrastructure_mgmt_services
infrastructure_mgmt_servicesinfrastructure_mgmt_services
infrastructure_mgmt_servicesRavi Verdes
 
Noc outsourcing
Noc outsourcingNoc outsourcing
Noc outsourcing
concordantone
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
lynotts
 
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks
 
Bab 6 (understanding it infrastructure)
Bab 6 (understanding  it infrastructure)Bab 6 (understanding  it infrastructure)
Bab 6 (understanding it infrastructure)
Siti Mustiani
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
Schneider Electric
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by Miradore
Miradore
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
HelpSystems
 
URMS
URMSURMS

What's hot (20)

IT Portfolio
IT PortfolioIT Portfolio
IT Portfolio
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
About Marcum 0915 V2
About Marcum 0915 V2About Marcum 0915 V2
About Marcum 0915 V2
 
Kaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT Directors
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader ppt
 
Infrastructure Management Services
Infrastructure Management ServicesInfrastructure Management Services
Infrastructure Management Services
 
infrastructure_mgmt_services
infrastructure_mgmt_servicesinfrastructure_mgmt_services
infrastructure_mgmt_services
 
Noc outsourcing
Noc outsourcingNoc outsourcing
Noc outsourcing
 
Abhishek Kumar
Abhishek Kumar Abhishek Kumar
Abhishek Kumar
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Welcome to heart technologies h sv
Welcome to heart technologies h svWelcome to heart technologies h sv
Welcome to heart technologies h sv
 
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
 
It msp white paper
It msp white paperIt msp white paper
It msp white paper
 
Bab 6 (understanding it infrastructure)
Bab 6 (understanding  it infrastructure)Bab 6 (understanding  it infrastructure)
Bab 6 (understanding it infrastructure)
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by Miradore
 
AFIS as SaaS - 8-5-2015
AFIS as SaaS - 8-5-2015AFIS as SaaS - 8-5-2015
AFIS as SaaS - 8-5-2015
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
Resume
ResumeResume
Resume
 
URMS
URMSURMS
URMS
 

Viewers also liked

Information overload
Information overloadInformation overload
Information overload
manere
 
Information Overload
Information OverloadInformation Overload
Information Overloadjeiseman
 
Information Overload
Information OverloadInformation Overload
Information Overload
Bob Larrivee
 
Guide to Information Overload
Guide to Information OverloadGuide to Information Overload
Guide to Information Overload
Hope Harms
 
Information Explosion - Erik Moller
Information Explosion - Erik MollerInformation Explosion - Erik Moller
Information Explosion - Erik MollerHPDutchWorld
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communication
Namrata Jadhav
 
2011 02-26, managing information overload, slideshare
2011 02-26, managing information overload, slideshare2011 02-26, managing information overload, slideshare
2011 02-26, managing information overload, slideshare
William Jones
 
Information Overload is the Devil
Information Overload is the DevilInformation Overload is the Devil
Information Overload is the Devil
Sarah Houghton
 
Connecting Classrooms via Global Collaborative Projects - #globaled15
Connecting Classrooms via Global Collaborative Projects - #globaled15Connecting Classrooms via Global Collaborative Projects - #globaled15
Connecting Classrooms via Global Collaborative Projects - #globaled15
Kim Caise
 
Drive project with essence
Drive project with essenceDrive project with essence
Drive project with essence
Sebastien Plisson
 
The Essence of Design for Startups
The Essence of Design for StartupsThe Essence of Design for Startups
The Essence of Design for Startups
Arun
 
Motivation and productivity in the workplace
Motivation and productivity in the workplaceMotivation and productivity in the workplace
Motivation and productivity in the workplace
Jorge Gawad
 
Surviving the Web Explosion: Keeping in touch with RSS
Surviving the Web Explosion: Keeping in touch with RSSSurviving the Web Explosion: Keeping in touch with RSS
Surviving the Web Explosion: Keeping in touch with RSS
Sukhdev Singh
 
2 Communication Barriers
2 Communication Barriers2 Communication Barriers
2 Communication Barriers
Deepak
 
Job Satisfaction & Dissatisfaction
Job Satisfaction & DissatisfactionJob Satisfaction & Dissatisfaction
Job Satisfaction & DissatisfactionMoumita Roy
 
100+ Bullet Points from the #WOMMASummit by @jessedee
100+ Bullet Points from the #WOMMASummit by @jessedee100+ Bullet Points from the #WOMMASummit by @jessedee
100+ Bullet Points from the #WOMMASummit by @jessedeeJesse Desjardins - @jessedee
 

Viewers also liked (20)

Information overload
Information overloadInformation overload
Information overload
 
Information Overload
Information OverloadInformation Overload
Information Overload
 
Information Overload
Information OverloadInformation Overload
Information Overload
 
Guide to Information Overload
Guide to Information OverloadGuide to Information Overload
Guide to Information Overload
 
Information Explosion - Erik Moller
Information Explosion - Erik MollerInformation Explosion - Erik Moller
Information Explosion - Erik Moller
 
Barriers to communication
Barriers to communicationBarriers to communication
Barriers to communication
 
2011 02-26, managing information overload, slideshare
2011 02-26, managing information overload, slideshare2011 02-26, managing information overload, slideshare
2011 02-26, managing information overload, slideshare
 
Information Overload is the Devil
Information Overload is the DevilInformation Overload is the Devil
Information Overload is the Devil
 
Hmaria1
Hmaria1Hmaria1
Hmaria1
 
Connecting Classrooms via Global Collaborative Projects - #globaled15
Connecting Classrooms via Global Collaborative Projects - #globaled15Connecting Classrooms via Global Collaborative Projects - #globaled15
Connecting Classrooms via Global Collaborative Projects - #globaled15
 
Drive project with essence
Drive project with essenceDrive project with essence
Drive project with essence
 
The Essence of Design for Startups
The Essence of Design for StartupsThe Essence of Design for Startups
The Essence of Design for Startups
 
Motivation and productivity in the workplace
Motivation and productivity in the workplaceMotivation and productivity in the workplace
Motivation and productivity in the workplace
 
Surviving the Web Explosion: Keeping in touch with RSS
Surviving the Web Explosion: Keeping in touch with RSSSurviving the Web Explosion: Keeping in touch with RSS
Surviving the Web Explosion: Keeping in touch with RSS
 
2 Communication Barriers
2 Communication Barriers2 Communication Barriers
2 Communication Barriers
 
management information system
management information systemmanagement information system
management information system
 
Job satisfaction
Job satisfactionJob satisfaction
Job satisfaction
 
Job Satisfaction & Dissatisfaction
Job Satisfaction & DissatisfactionJob Satisfaction & Dissatisfaction
Job Satisfaction & Dissatisfaction
 
Unit v
Unit vUnit v
Unit v
 
100+ Bullet Points from the #WOMMASummit by @jessedee
100+ Bullet Points from the #WOMMASummit by @jessedee100+ Bullet Points from the #WOMMASummit by @jessedee
100+ Bullet Points from the #WOMMASummit by @jessedee
 

Similar to Information Overload Powerpoint

Remote Infrastructure Management Services
Remote Infrastructure Management ServicesRemote Infrastructure Management Services
Remote Infrastructure Management Services
Kryptos Technologies
 
First Communication Company Overview
First Communication Company OverviewFirst Communication Company Overview
First Communication Company Overview
Rgutowski85
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
Jorge Sebastiao
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
Confisio Group
 
Experience the Windstream Advantage
Experience the Windstream AdvantageExperience the Windstream Advantage
7df1c46f-90f5-4d0f-af18-d34ce2108ca6-160108121804
7df1c46f-90f5-4d0f-af18-d34ce2108ca6-1601081218047df1c46f-90f5-4d0f-af18-d34ce2108ca6-160108121804
7df1c46f-90f5-4d0f-af18-d34ce2108ca6-160108121804Akshat Gupta
 
Contact Center Capabilities
Contact Center CapabilitiesContact Center Capabilities
Contact Center Capabilities
service007
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
ftculotta27
 
LNL Company Profile-NEW
LNL Company Profile-NEWLNL Company Profile-NEW
LNL Company Profile-NEWJayesh Unadkat
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
Gabe Schurman
 
Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services MarketingShahzad Khan
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
ssuser41d278
 
Sme Tech2010
Sme Tech2010Sme Tech2010
Sme Tech2010
Jojo Colina
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
lynotts
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
ScottBreadmore
 
Security operations services
Security operations servicesSecurity operations services
Security operations servicesS&T GROUP
 

Similar to Information Overload Powerpoint (20)

Remote Infrastructure Management Services
Remote Infrastructure Management ServicesRemote Infrastructure Management Services
Remote Infrastructure Management Services
 
First Communication Company Overview
First Communication Company OverviewFirst Communication Company Overview
First Communication Company Overview
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
 
Experience the Windstream Advantage
Experience the Windstream AdvantageExperience the Windstream Advantage
Experience the Windstream Advantage
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
 
7df1c46f-90f5-4d0f-af18-d34ce2108ca6-160108121804
7df1c46f-90f5-4d0f-af18-d34ce2108ca6-1601081218047df1c46f-90f5-4d0f-af18-d34ce2108ca6-160108121804
7df1c46f-90f5-4d0f-af18-d34ce2108ca6-160108121804
 
Mieux Technologies
Mieux TechnologiesMieux Technologies
Mieux Technologies
 
Contact Center Capabilities
Contact Center CapabilitiesContact Center Capabilities
Contact Center Capabilities
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
COMPANY PROFILE
COMPANY PROFILECOMPANY PROFILE
COMPANY PROFILE
 
LNL Company Profile-NEW
LNL Company Profile-NEWLNL Company Profile-NEW
LNL Company Profile-NEW
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services Marketing
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 
Sme Tech2010
Sme Tech2010Sme Tech2010
Sme Tech2010
 
Ef Technology Profile
Ef Technology ProfileEf Technology Profile
Ef Technology Profile
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Security operations services
Security operations servicesSecurity operations services
Security operations services
 

More from HDI Atlanta

HDIAU Breakout 202 - Defusing the irate customer
HDIAU Breakout 202 - Defusing the irate customerHDIAU Breakout 202 - Defusing the irate customer
HDIAU Breakout 202 - Defusing the irate customer
HDI Atlanta
 
HDIAU Lab A - Building the service desk training plan
HDIAU Lab A - Building the service desk training planHDIAU Lab A - Building the service desk training plan
HDIAU Lab A - Building the service desk training plan
HDI Atlanta
 
HDIAU Breakout 203 - Managing Up
HDIAU Breakout 203 - Managing UpHDIAU Breakout 203 - Managing Up
HDIAU Breakout 203 - Managing Up
HDI Atlanta
 
HDIAU Breakout 201 - Motivating employees myths and realities
HDIAU Breakout 201 - Motivating employees myths and realitiesHDIAU Breakout 201 - Motivating employees myths and realities
HDIAU Breakout 201 - Motivating employees myths and realities
HDI Atlanta
 
HDIAU Breakout 102 - Are you down with epp?
HDIAU Breakout 102 - Are you down with epp?HDIAU Breakout 102 - Are you down with epp?
HDIAU Breakout 102 - Are you down with epp?
HDI Atlanta
 
HDIAU Breakout 101 - Giving great customer service-event when you don't want to
HDIAU Breakout 101 - Giving great customer service-event when you don't want toHDIAU Breakout 101 - Giving great customer service-event when you don't want to
HDIAU Breakout 101 - Giving great customer service-event when you don't want to
HDI Atlanta
 
HDIAU Orientation - Story Warriors
HDIAU Orientation - Story WarriorsHDIAU Orientation - Story Warriors
HDIAU Orientation - Story Warriors
HDI Atlanta
 

More from HDI Atlanta (8)

HDIAU Breakout 202 - Defusing the irate customer
HDIAU Breakout 202 - Defusing the irate customerHDIAU Breakout 202 - Defusing the irate customer
HDIAU Breakout 202 - Defusing the irate customer
 
HDIAU Welcome
HDIAU WelcomeHDIAU Welcome
HDIAU Welcome
 
HDIAU Lab A - Building the service desk training plan
HDIAU Lab A - Building the service desk training planHDIAU Lab A - Building the service desk training plan
HDIAU Lab A - Building the service desk training plan
 
HDIAU Breakout 203 - Managing Up
HDIAU Breakout 203 - Managing UpHDIAU Breakout 203 - Managing Up
HDIAU Breakout 203 - Managing Up
 
HDIAU Breakout 201 - Motivating employees myths and realities
HDIAU Breakout 201 - Motivating employees myths and realitiesHDIAU Breakout 201 - Motivating employees myths and realities
HDIAU Breakout 201 - Motivating employees myths and realities
 
HDIAU Breakout 102 - Are you down with epp?
HDIAU Breakout 102 - Are you down with epp?HDIAU Breakout 102 - Are you down with epp?
HDIAU Breakout 102 - Are you down with epp?
 
HDIAU Breakout 101 - Giving great customer service-event when you don't want to
HDIAU Breakout 101 - Giving great customer service-event when you don't want toHDIAU Breakout 101 - Giving great customer service-event when you don't want to
HDIAU Breakout 101 - Giving great customer service-event when you don't want to
 
HDIAU Orientation - Story Warriors
HDIAU Orientation - Story WarriorsHDIAU Orientation - Story Warriors
HDIAU Orientation - Story Warriors
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Information Overload Powerpoint

  • 1. Information Overload: Not a Problem Here! Jeffrey M. Brooks MSCIS, MBA, MCP, HDM, ITIL
  • 2. About Peak 10 Peak 10 owns and operates data centers and provides managed services for small, medium and large enterprises. Twelve enterprise-class data centers, nine markets 24 X 7 Customer Support Data Center Services: Managed Colocation, Enterprise Hosting, Reliable Bandwidth and Metro Ethernet Managed Services: Security, Managed Storage (local & remote), Disaster Recovery, Enterprise Messaging, Monitoring, System Administration, Remote Hands, Managed Servers and Virtual Private Lines
  • 3. What’s On The Agenda? Support Structure Communication Monitoring VOIP Networking Business Continuity Tools Tour Data Center Tour
  • 4. Setting the Stage Peak 10 leverages our technology, tools and, most importantly, our communication infrastructure to provide outstanding support 24x7x365.
  • 5. Information Overload It is the abundance and availability of information that allows Peak 10 to reach the level of customer success we have achieved.
  • 6. How are We Different? Not our equipment (Mostly) Monitoring Security Alarms Facility Alerts
  • 7. How are We the Same? External & Internal Customers Ticket System Phones People Metrics Escalations
  • 9. Peak 10 Support Structure Centralized Helpdesk in Charlotte Local Support – 9 Physical Locations (Markets) Managed Services (Providing Internal Services)
  • 10. Escalations 1st Line Support – Phone, Email, Portal Help Desk in Charlotte 2nd Line Support Local Market or Managed Services 3rd Line Support Senior Engineers or Managed Services
  • 11. Centralized Processing 1 Ticketing System 1 Set of SOP’s 1 Set of Processes
  • 12. Communication is the Core Centralization only works when the communication channels are open, clear and operate both in both directions!
  • 13. Centralized Monitoring & Support Peak 10 Central Support – Information/Communication Hub Consistency People Phone script Process Ticketing Customer Experience MTTR Abandon Rate
  • 14. VOIP Phones are core to the distributed component of our support structure Internal Communication is crucial Warm handovers essential Business Continuity Call center efficiency Flexibility Metrics Extension Mobility!!!
  • 15. VOIP Continuity The main reason the VOIP works is we are not dependent on any one provider, such as a Telco. Peak 10’s redundant network ensures our phone systems is always available.
  • 16. Core Services Monitoring Networking Power Security Managed Services Environment
  • 17. Proactive Support – Am I Dreaming?
  • 18. SNMP Monitoring The Simple Network Management Protocol (SNMP) forms part of the internet protocol suite as defined by the Internet Engineering Task Force (IETF). SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an Application Layer protocol, a database schema, and a set of data objects.
  • 19. How Is It Used at Peak 10 SNMP Monitoring accounts for 65% of our tickets Almost Proactive Monitored Customers Managed Customers Trending of Issues Root Cause Analysis
  • 20. Networking SNMP Monitoring is dependent on the network The Network is monitored through SNMP Redundancy is crucial Peak 10 Network Web The criticality of our network is essential for our customers as well as to our infrastructure and provision of services.
  • 21. Peak 10 Network Diagram
  • 22. When Trouble StrikesPro-activity Prevails BGP - The Border Gateway Protocol (BGP) is an interautonomous system routing protocol. An autonomous system is a network or group of networks under a common administration and with common routing policies. BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP). FCP – Flow Control Protocol Dynamically measure the end-to-end performance of your applications, including performance over the public Internet. It quickly and easily implements changes based on those measures. reports on network performance and cost, perform forensic analysis, and when problems do occur, manage service providers to their SLAs.
  • 23. Power Redundant Power is Key But not everybody subscribes Loss of Commercial Power Alerts/Tickets UPS Issues What does a UPS do Transitions/Load Bearing Clean Power Generators Start/Stop Alerts/Tickets We can rely on generator power indefinitely. But customer communication, and internal communication is still essential.
  • 24. Security Physical Security Authorized Contacts Q&A Badge, Pin and Biometric Alarms create alerts/tickets Centralization of alerts/tickets
  • 25. Managed Services Storage & Backups Hosting Virtualization Patch Management Virus Protection Constant communication ensures efficient service and reduction of extraneous work. Tape Rotations require coordination among several groups and Patch Management can be the difference between 500 extra tickets.
  • 26. Environment Fires Alerts/Tickets Central management Temperature Monitoring Alerts/Tickets Humidity Monitoring Alerts/Tickets
  • 27. Peak 10 Alert Emergencies are about communication & information Internal Communications Conference Bridge Phone tree Email Text Alerts External Communications Email Text Alerts
  • 28. Change Management Change Management Process Change Management Meetings CMR’s Types of Changes Emergency Priority Scheduled Routine Customer communication and expectation setting Email Pathfinder Completion Notices – CRUCIAL!!!
  • 29. Business Continuity Peak 10 is in the business of ensuring continual services to our customers. But what happens when we suffer problems?
  • 30. Picking Up the Pieces Network Redundancy Phones Redundancy Process Personnel Redundancy Relocate Work from home (Phones) Agility Mobile offices & services
  • 32. We Are Not Evil! By allowing our customers to outsource specific technology and facilities to us, we allow our customers to better focus on providing their customers with the best service possible. We also allow them to focus on people and processes, the core of every business.
  • 33. Consider Your Critical Infrastructure Can you afford a generator? Do you monitor the temperature & humidity? Need a reboot at 2 am? Need a tape rotation? Vendor needs to repair your equipment?
  • 35. Technology Tour EM7 Monitoring Ticketing Pathfinder Multitude of Information! Sherpa Intranet SOP Policies
  • 37. Jeff’s Final Thought Providing excellent service to Peak 10’s customers requires a coordination of vast amounts of information and communication between multiple parties while keep focus on what the customer’s expectation is!
  • 39. Thank You Jeffrey M Brooks Senior Manager, Support Services Peak 10 8910 Lenox Point Dr Suite A Charlotte, NC 28273 Main: 1-704-264-1027 Mobile: 1-803-554-3838 www.peak10.com