Service Management is becoming increasingly pervasive as a key ingredient in the fabric of the business and IT. Explore how Service Management must integrate with all aspects of the IT environment, including project and infrastructure management, and take a close look at a real-life example at a major healthcare organization.
To learn more about Service Management solutions from CA Technologies, please visit: http://bit.ly/1wEnPhz
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarITSM Academy, Inc.
To successfully achieve IT Service Management (ITSM) best practices, organizations need to adopt multiple ITSM frameworks and standards.
This presentation describes when and how to integrate the most widely used ITSM frameworks and standards, such as ITIL®, COBIT, ISO/IEC 20000 and Microsoft Operations Framework (MOF).
Transforming An Organisations IT Service ManagementMichael Moyal
This short case study illustrates how we helped a multi-national organisation transform its IT Service Management (ITSM) capabilities in only eight weeks utilising the our BPMA (Business Process Modelling and Analysis) methodology and the Process Master tool
Your take-away from the IT Service Management (ITSM) presentation are:
• A clear understanding of PM practices used in the implementation of ITSM
• Planning tips to successfully deliver an ITSM process improvement project
• Marketing ideas to socialize the message to the organization
• Testing techniques to achieve organic improvements along the way
• Ways to achieve buy-in from stakeholders
The ITIL v4 Foundation course aims to introduce participants to the management of modern ITenabled services, to provide them with an understanding of the common language and key concepts and to show them how they can improve their work and the work of their organization with ITIL 4 guidance.
Integrating ITSM Frameworks, Standards and Processes - ITSM Academy WebinarITSM Academy, Inc.
To successfully achieve IT Service Management (ITSM) best practices, organizations need to adopt multiple ITSM frameworks and standards.
This presentation describes when and how to integrate the most widely used ITSM frameworks and standards, such as ITIL®, COBIT, ISO/IEC 20000 and Microsoft Operations Framework (MOF).
Transforming An Organisations IT Service ManagementMichael Moyal
This short case study illustrates how we helped a multi-national organisation transform its IT Service Management (ITSM) capabilities in only eight weeks utilising the our BPMA (Business Process Modelling and Analysis) methodology and the Process Master tool
Your take-away from the IT Service Management (ITSM) presentation are:
• A clear understanding of PM practices used in the implementation of ITSM
• Planning tips to successfully deliver an ITSM process improvement project
• Marketing ideas to socialize the message to the organization
• Testing techniques to achieve organic improvements along the way
• Ways to achieve buy-in from stakeholders
The ITIL v4 Foundation course aims to introduce participants to the management of modern ITenabled services, to provide them with an understanding of the common language and key concepts and to show them how they can improve their work and the work of their organization with ITIL 4 guidance.
Mario Vivas, CEO, River Horse
ITIL4 is out and everyone is eager to learn about the updates this release introduces. This session will summarize the key changes that ITIL4 presents with a focus on the more operational processes that organizations deliver on a day to day basis (Incident, Problem, Change and so on). The ServiceNow platform has a powerful set of baseline features and optional plugin functions that can help an organization align with the recommendations of ITIL4.
Please join us and Mario to learn about how you can start applying ITIL4 concepts in your ServiceNow implementations!
ITIL, formally an acronym for Information Technology Infrastructure Library, is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL V3),
Information Technology Service Management (ITSM) Implementation Methodology B...Waqas Tariq
This paper is intended to cover the concept of IT Infrastructure Library (ITIL) v3 and how to implement it in order to increase the efficiency of any Egyptian IT corporate and to help the corporate employees to do their work easily and its clients to feel the quality of services provided to them. ITIL is considered now as the de facto standard for IT Service Management (ITSM) in organizations which operate their business based on IT infrastructure and services. ITIL v3 was implemented in western organizations but still it is a new framework for the Egyptian and Arabian environment. The best proof of the lack of ITSM in the Arab region and not Egypt alone is that the percentage of the companies which have ISO/IEC 20000 are less than 2% of the total certified companies in the whole world and in Egypt no company has it until now as stated on APMG ISO/IEC 20000 website[1]. Accordingly this paper investigates an implementation methodology of ITIL in an Egyptian organization taking into consideration the cultural factors and how it will affect the success of this implementation. We have already implemented this methodology in three Egyptian companies and it succeeded to increase the level of process maturity from level one to level four according the PMF
Introducing our content ready ITIL Incident Management Workflow PowerPoint Presentation Slides. Talk about the need for implementing incident management processes such as maintaining service levels, meeting service availability requirements and so on. The topic-specific incident resolution workflow PowerPoint presentation contains twenty-two editable PPT slides to serve all your business needs. Take advantage of the professionally designed problem management best practices PPT slideshow to discuss with your team the key issues of ITIL workflow like lack of transparency, decreased customer satisfaction, high risk of business etc. Demonstrate best practice of ITIL management like creating and maintaining a knowledge base and handling major incidents etc. Utilize the visually appealing ITIL framework PowerPoint compete deck to showcase benefits of ITIL e.g. maintain dashboard and reports etc. You can also use the PPT slides to represent stages of the IT incident management lifecycle. Thus, download the informative and interactive PowerPoint templates to list down the key performance indicators of IT incident management. From this day forward you won't look back. Our ITIL Incident Management Workflow PowerPoint Presentation Slides keep you focused ahead. https://bit.ly/2So2pXt
Boost your ITSM maturity with a service catalogAxios Systems
View the full recorded webinar here:
http://forms.axiossystems.com/spalding_september_reg_en
In this webinar, George Spalding, Executive VP at Pink Elephant, talks about how a service catalog can help you increase your ITSM maturity, and shares some of the secrets of a successful implementation.
Joe Beighley, Business Solutions Consultant at Axios Systems, shows you how a service catalog works from the business perspective, and how IT can quickly deploy a catalog that takes strain off the service desk and releases IT resources for innovation.
ITIL History
ITIL Transition from V3 to V4
Key Concept of ITSM
ITIL Dimensions and Principles
Service Value System (SVS)
ITIL Practices
ITIL Certification Schema
This presentation was delivered by Pierre Gleize, head of the Service Management Practice at Orange Business Services, at the ServiceNow Forum on 8 October in Paris. More information on Customized Infrastructure Care is available here: http://oran.ge/19zNUP8
Mario Vivas, CEO, River Horse
ITIL4 is out and everyone is eager to learn about the updates this release introduces. This session will summarize the key changes that ITIL4 presents with a focus on the more operational processes that organizations deliver on a day to day basis (Incident, Problem, Change and so on). The ServiceNow platform has a powerful set of baseline features and optional plugin functions that can help an organization align with the recommendations of ITIL4.
Please join us and Mario to learn about how you can start applying ITIL4 concepts in your ServiceNow implementations!
ITIL, formally an acronym for Information Technology Infrastructure Library, is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL V3),
Information Technology Service Management (ITSM) Implementation Methodology B...Waqas Tariq
This paper is intended to cover the concept of IT Infrastructure Library (ITIL) v3 and how to implement it in order to increase the efficiency of any Egyptian IT corporate and to help the corporate employees to do their work easily and its clients to feel the quality of services provided to them. ITIL is considered now as the de facto standard for IT Service Management (ITSM) in organizations which operate their business based on IT infrastructure and services. ITIL v3 was implemented in western organizations but still it is a new framework for the Egyptian and Arabian environment. The best proof of the lack of ITSM in the Arab region and not Egypt alone is that the percentage of the companies which have ISO/IEC 20000 are less than 2% of the total certified companies in the whole world and in Egypt no company has it until now as stated on APMG ISO/IEC 20000 website[1]. Accordingly this paper investigates an implementation methodology of ITIL in an Egyptian organization taking into consideration the cultural factors and how it will affect the success of this implementation. We have already implemented this methodology in three Egyptian companies and it succeeded to increase the level of process maturity from level one to level four according the PMF
Introducing our content ready ITIL Incident Management Workflow PowerPoint Presentation Slides. Talk about the need for implementing incident management processes such as maintaining service levels, meeting service availability requirements and so on. The topic-specific incident resolution workflow PowerPoint presentation contains twenty-two editable PPT slides to serve all your business needs. Take advantage of the professionally designed problem management best practices PPT slideshow to discuss with your team the key issues of ITIL workflow like lack of transparency, decreased customer satisfaction, high risk of business etc. Demonstrate best practice of ITIL management like creating and maintaining a knowledge base and handling major incidents etc. Utilize the visually appealing ITIL framework PowerPoint compete deck to showcase benefits of ITIL e.g. maintain dashboard and reports etc. You can also use the PPT slides to represent stages of the IT incident management lifecycle. Thus, download the informative and interactive PowerPoint templates to list down the key performance indicators of IT incident management. From this day forward you won't look back. Our ITIL Incident Management Workflow PowerPoint Presentation Slides keep you focused ahead. https://bit.ly/2So2pXt
Boost your ITSM maturity with a service catalogAxios Systems
View the full recorded webinar here:
http://forms.axiossystems.com/spalding_september_reg_en
In this webinar, George Spalding, Executive VP at Pink Elephant, talks about how a service catalog can help you increase your ITSM maturity, and shares some of the secrets of a successful implementation.
Joe Beighley, Business Solutions Consultant at Axios Systems, shows you how a service catalog works from the business perspective, and how IT can quickly deploy a catalog that takes strain off the service desk and releases IT resources for innovation.
ITIL History
ITIL Transition from V3 to V4
Key Concept of ITSM
ITIL Dimensions and Principles
Service Value System (SVS)
ITIL Practices
ITIL Certification Schema
This presentation was delivered by Pierre Gleize, head of the Service Management Practice at Orange Business Services, at the ServiceNow Forum on 8 October in Paris. More information on Customized Infrastructure Care is available here: http://oran.ge/19zNUP8
Information Technology Infrastructure LibraryYatish Bathla
Growing dependency of Bussiness world to IT services leads to need of quality that is matched to business needs and User requirements as they emerge ITIL(Information Technology Infrastructure Library) can improve the quality of the service, but at the same time they will be trying to reduce the costs or, at a minimum, maintain costs at the current level. ITIL provides a framework to place existing methods and activities in a structured context.
It provides comprehensive, consistent and coherent set of best practices for IT Management processes.It also promote quality approach to achieve business effectiveness and efficiency in the use of information systems.
Did you know? Implementing ITSM can improve the effectiveness of IT functions by over 62%.
As there continues to be a global shift towards managing more and more data, and housing data in the cloud, many companies are looking to manage their IT budgets closer and sustaining their infrastructure operations. Many studies have provided data on how IT Operational costs eventually decrease over time, but there are still initial costs, and costs to upgrade, scale and sustain.
Until recently, most technical infrastructure components, devices, applications, etc. resided within the organization in which they served. Since the industry has moved to a more virtual model, data, technology, infrastructure services and even applications can now exist in the cloud. With that, there is a need to clearly understand exactly what is being stored in the cloud and how is it being managed.
Areas covered:
1. Understanding importance of ITSM
2. Delivering and managing IT services
3. The value of IT to the business and the service provider
4. Maintaining stability while allowing for change
5. Organizing to improve IT support operations
6. The processes underlying Service Operations
7. What to manage when interfacing with Cloud Service Providers
About Invensis Learning
Invensis Learning is a leading training and professional development solutions provider. We deliver globally-recognized training and certifications to individuals and enterprises to aid key business transformations and help to stay relevant by closing skill gaps and cultivate an environment that fosters continuous learning. We have trained 10000+ professionals over wide portfolio of training and certification courses. We are a trusted partner of many Fortune 500 companies for training and development
For more details please visit: https://www.invensislearning.com/
The Power and Promise of SaaS: CA Cloud Service Management Case StudyCA Technologies
As we move to the application economy, companies are increasingly reviewing their portfolio of solutions to help ensure that they are deriving the promised efficiencies and value.
This presentation provides an informative look at how one company is leveraging cloud-based solutions to improve the overall effectiveness of their IT service management operations.
For more information on Management Cloud solutions from CA Technologies, please visit: http://bit.ly/1wEnPhz
Effective change management provides organizations with a mechanism whereby value is added and realized through reduced costs. Cost reductions are realized because change is implemented more effectively, causes fewer disruptions, and customer confidence is raised.
The purpose of this webinar is to give a clear picture of change management and its role in the organization. This webinar will explain the importance of change management, give an overview of how it works, and how it creates and adds value to the organization.
Additionally, this webinar seeks to demonstrate the extent to which change management can enhance organizational objectives and goals, how properly implemented change management enables the furtherance of the organizational strategy, and how it contributes to organizational planning.
This webinar will explain how change management is an essential part of a holistic, results-driven approach that reflects business initiatives. It also seeks to show the inter-relatedness between change management and varied business activities as well as the value-add it brings by enabling organizations to respond to needed business changes.
Areas covered:
1. Purpose, Objectives and Definitions
2. Value to the business
3. Change Authorities
4. Strategic-tactical-operational change
- 7 R’s of change management
5. Change processes, Roles, Activities, Interfaces
6. Change Management is the authority
- Service Asset & Configuration Management (SACM) works to assist in administering change
- Configuration Management is key
- Release & Deployment Management (RDM) executes change
7. RDM is the operational side of change
8. Assessment and Evaluation occurs at multiple points and levels
9. Change Advisory Board
10. Interfaces (Change is multi-faceted and multidisciplinary)
- Interrelatedness of change management
11. Measuring change from different perspectives
12. Challenges and Summary
About Invensis Learning:
Invensis Learning is a pioneer in providing globally-recognized certification training courses for individuals and enterprises worldwide. We have trained and certified 15,000+ professionals from 50+ courses through multiple training delivery modes. This ITIL® Foundation training from Invensis Learning is ideal for professionals who are looking to gain a deep understanding of the globally-recognized ITSM framework and clear your ITIL Foundation exam in the first attempt.
For more information on Change Management Certification Training and other courses, please visit our website: https://www.invensislearning.com
Shared services - A Strategic Cost Management PlatformSanjay Chaudhuri
Shared Services Platform (as self defining as it can be) promotes the idea of 'sharing' within an organization or group or may also be provided as 3rd party SBU services.
Creating a Single point of contact for all service deliveries, enabling Cost effective solutions, leverage Automation, optimize workforce and the Speed to fulfillment is the key to success of such organizations.
More and more companies are moving to such platforms and the success rate is very high.
IT Transformation is quickly becoming one of the primary responses from Enterprises are seeking to convert IT from an Operational Asset to a Tactical and Strategic Asset.
The paper describes the methodology created by Action Research Foundation for Practical ITSM transformation
APM Center of Excellence Drives Improved Business Results at Itau UnibancoCA Technologies
Improving the quality of applications and the overall customer experience is a key focus for Itau. This presentation will discuss the APM Center of Excellence
process and how this approach lead to better response times using fewer resources and improved business results while delighting both clients and applications support teams.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Similar to Integrated IT Service Management: From Strategy to Implementing to User Adoption (20)
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
In this keynote session, hear from Ashok Reddy, GM for CA Mainframe to learn how you can establish digital trust using the power of the new IBM Z and the Modern Software Factory to become a digital enterprise. CIO’s can deliver better economics and TCO. IT operations teams can enable self-driving mainframe data centers to deliver 100% SLA’s. CISO’s and auditors can protect sensitive data to avoid fines tied to GDPR and regulations. Enterprise Architects and Developers can use the same open, modern DevSecOps toolset, mobile-to-mainframe. And, get a sneak peek at new innovations: Mainframe as a Service and Blockchain which can put you in the driver’s seat to transform the way your company does business. Joining Ashok will be key leaders from IBM, General Motors, and Southwest Gas who will share their perspectives on digital transformation.
Stay connected at http://ow.ly/4NOy50g63Ji
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
Integrated IT Service Management: From Strategy to Implementing to User Adoption
1. Integrated IT Service Management: From
Strategy to Implementing to User Adoption
Michael Christiansen
ICT15S #CAWorld
Intermountain Healthcare
Sr. Application Systems Technical Analyst
ca Intellicenter
2. 2
Abstract
Service Management is becoming increasingly pervasive as a key ingredient in the fabric of the business and IT. This session explores how Service Management must integrate with all aspects of the IT environment, including project and infrastructure management, and takes a close look at a real life example at a major healthcare organization.
Michael Christiansen
Intermountain Healthcare
3. 3
Agenda
INTRO TO INTERMOUNTAIN HEALTHCARE
STATE OF THE UNION PRE-IMPLEMENTATION
SUMMARY
REQUIRED CHANGES
SERVICE MANAGEMENT TEAM
INTEGRATION WITH PMO AND INFRASTRUCTURE
1
2
3
4
5
6
4. 4
State of the Union
Pre-Implementation
Executive Support
Executive support for the outlined process areas was spotty at best.
Continuity
Some support teams fully participated in their own brand of what they thought was best for each of the process areas where most support groups simply didn’t participate.
Documentation
There existed no formal process documentation for any of the identified areas except for those processes written by individual support teams for their team members.
6. 6
Strategy
ITIL is a registered trademark of AXELOS Limited.
Require all employees to become ITIL™ foundation certified
Instill a corporate culture with a deep focus on IT-as-a-Service
Establish a full time Service Management organization
Create a Change Advisory Board
7. Intermountain Healthcare
Fortunately, our AVP of Information Systems Operations understood the need to have a consolidated, integrated set of ITIL oriented Service Management tools, including
an Enterprise Monitoring Solution.
8. 8
ITIL Education
Unanimous executive decision to implement ITIL framework
Certify 1,200 people
Certify 2 trainers in house
This allowed the combination of the training and vision
In May, 2014 we had our 100th Foundation Class
We have trained 90% of our staff - approximately 1200 people
In Oct, 2013 we expanded the training to include Intermediate classes
9. 9
Requirements for Success
New Service Management Org
Managed coordination
Standardize/Simplify products/services delivered
Improved financial transparency
Direct association of costs to consumption
Increased IT operational efficiency resulting from comparing price of internally products external
Change Advisory Board
Procedure-driven supply chain
Made of leaders from 5-6 different organizations to coordinate change
Led by change manager
Coordinate all change
Forum for feedback
Heavily uses workflow
Detailed email for quick decisions
New Culture
Deep focus on IT as a Service (ITAAS)
Standardize/Simplify products/services delivered
Improved financial transparency
Direct association of costs to consumption
Increased IT operational efficiency resulting from comparing price of internally products external
Common Nomenclature
ITIL adoption
Unanimous executive decision to train all IS employees at ITIL foundation level
Brought training in house
May 2014 100th course
Trained 90% of staff
Expanded training
Combined training with vision
10. 10
Consolidate and Integrate Intermountain’s set of ITIL Oriented Service Management Tools
Service Desk
Change and Problem Management
Asset Management
Configuration Management Database
Enterprise Monitoring Solution
Service Management Tools
12. 12
What Factors Made Change Possible?
New AVP of Information Systems Operations
Economy – requiring more efficiency
Large projects (Cerner) requiring more of our resources - thus requiring more efficiency with resources we had left after Cerner project assignments
Confluence of Events
13. 13
Knowledge Management
Initial assessment of the state of knowledge found that there was not a standardized or effective method to record, manage, transfer and share the knowledge.
Efforts to remedy leveraged ITIL and Knowledge Centered Support (KCSSM) from the Consortium for Service Innovation™
14. 14
Knowledge Management
Established a Knowledge Management Review Board
Knowledge Management roles developed
IS Knowledge Manager
Support Group Knowledge Manager
Service Desk Knowledge Manager
Knowledge Publisher
Support Group Knowledge Analyst
15. 15
Problem Management
Maturing from a distributed Service Desk model, the Service Desk now process more than 24,000 calls and 5,000 email requests monthly
16. 16
Problem Management
Employees’ increased engagement with ITSM promoted a culture of buy- in rather than conscription
After ITIL, implementation process steps were formalized
Goal: Eliminate recurring incidents and minimize effect
Root Cause Analysis template
Diagrammed work flow
18. Baselines & Trends
CA Performance Management provides real-time and historical data. It is an intelligent visualization tool that trends the data and provides event flags notating when they occur.
21. 21
Request Management
15-month process to implementation and publication
New use case evaluations decreased from 3 weeks to 1 week
Phone requests decreased from 3 weeks to 3-day average
Service Catalog
22. 22
PMO Integration
Service Catalog – create projects
Central location
Templates
Required fields
Service Catalog
24. 24
Reporting
Processes were developed to move data to the data warehouse and three primary reporting tools have been adopted, enabling the fulfillment of the requirements. One tool enables parameterized reports, both scheduled and on-demand. Another provides BI/analytics capability (slice, dice, drill-in, drill-out), data mining, and discovery. The third tool provides dashboard/scorecard functionality as well as quick custom reporting.
The data warehouse is updated daily and is the primary reporting source for non-real time reporting. The service management tool’s production database is source for real-time reporting.
The benefits realized include the following:
Significantly reduced the number of one-off reporting requests
Improved visibility into processes
Ability to pinpoint and address process issues and drive results
Service improvements based on actual results
26. 26
Summary
There have been many positive effects as a result of the organizational shift towards following these established processes. Some of the benefits experienced are:
Changes are now more thoroughly communicated and more effectively executed
Change collisions are now identified and avoided
Status of requests can be tracked from initial request to closure resulting in fewer items falling between the cracks
Problem review meetings are held where root cause analysis is performed resulting in fewer repeat Incidents for the same root cause
Known errors are identified and workarounds documented for quicker resolution of Incidents
Knowledge has been centralized allowing the support desk to improve first call resolution
Incidents and changes have CIs attached to help in identifying trends and improving communication for scheduled changes
27. 27
For More Information
To learn more about Management Cloud, please visit: http://bit.ly/1wEnPhz
Insert appropriate screenshot and text overlay from following “More Info Graphics” slide here; ensure it links to correct page
Management Cloud