The document provides biographical information about Augustus Rey N. De Guzman, a computer support technician for the province of Agusan del Sur, Philippines. It summarizes his job responsibilities, personality, plans for the future, hobbies, and thoughts on challenges he faces. It also provides details about his role in training municipal treasurers on the new eTOMS financial management system and his section's involvement in a computerization project for barangays.
IT\'s Importance in Proper ESI ManagementKellyKubacki
The document discusses the importance of IT professionals and legal teams working together on electronically stored information (ESI) management strategies. Specifically:
1) Due to economic and technological changes, corporations are increasingly responsible for managing their own ESI, requiring close cooperation between IT and legal teams.
2) Developing an ESI management strategy is important for litigation preparedness, though less than 50% of corporations report having one.
3) Creating an ESI strategy requires resources but allows for a more efficient response compared to reacting to ESI requests without a plan. Close cooperation between IT and legal is needed.
This document provides an overview of SMART Holdings USA's efforts to promote economic development in Vermont through their SMARTvt initiative. It discusses how SMARTvt helped bring an IT innovator, Dan Eyers, from Virginia to Vermont to work for Rose Computer Technology Services. It also summarizes SMARTvt's visit to Ward Lumber Corporation, a sawmill operation in New York, and efforts to maximize the utilization and marketing of lumber and wood byproducts. Additionally, it announces the appointment of Scott Decker as Editor-in-Chief of SMARTvt Magazine to expand the publication's readership and role in economic development.
IBM mainframe sales reps and distributors don't enjoy the pleasures and satisfaction of the whole
world's anticipation, speculation, or even the organized illicit intelligence gathering, which seems to be
common in Apple's i-world these days. There was a time, beyond the memories of most of the IT
community, when they did, but the world has changed and new technologies have driven the focus to a
broader audience that is less sophisticated in many respects. As a consequence, the “fun stuff” has shifted
a good deal from what's the biggest and fastest, toward what is the latest, and usually smaller, innovation
– the new gotten have. Computing, if you will, now is more personal and portable. Does anyone care
what all this stuff is connected to and what holds it together anymore? Not so much, apparently.
ICT provides the opportunity to develop both technical and creative skills through studying how information is transferred and presented using technology. Over two years, students explore practical problem solving and the digital world, as well as the use of ICT in organizations and practical project implementation. Assessment includes exams on yearly themes and a final practical project. ICT careers range from technical roles in data transfer to user interface design, depending on individual strengths and interests.
The document discusses how constraints and limitations in emerging countries are shaping innovation in information technology. It provides examples of how open-source solutions and mobile networks are enabling new forms of digital services and infrastructure in places like Brazil and Sri Lanka. The author argues that governments like Denmark's should embrace open-source approaches and long-term thinking to avoid falling behind global IT developments of the future that will be led by more constrained environments.
The document summarizes the agenda for the Global Forum 2012 Session #3 on big data, social media, systemic models, and governance. The session includes presentations from leaders in government, non-profits, and technology on topics related to how large amounts of digital data can be used to address challenges in various sectors such as transportation, renewable energy, livestock, and governance. Presenters will provide examples of how their organizations are leveraging big data through techniques including streaming analysis, data warehousing, and open data to improve decision-making and outcomes. The session aims to discuss both current applications of big data as well as future directions and transformations enabled by new technologies and patterns of data usage.
IT\'s Importance in Proper ESI ManagementKellyKubacki
The document discusses the importance of IT professionals and legal teams working together on electronically stored information (ESI) management strategies. Specifically:
1) Due to economic and technological changes, corporations are increasingly responsible for managing their own ESI, requiring close cooperation between IT and legal teams.
2) Developing an ESI management strategy is important for litigation preparedness, though less than 50% of corporations report having one.
3) Creating an ESI strategy requires resources but allows for a more efficient response compared to reacting to ESI requests without a plan. Close cooperation between IT and legal is needed.
This document provides an overview of SMART Holdings USA's efforts to promote economic development in Vermont through their SMARTvt initiative. It discusses how SMARTvt helped bring an IT innovator, Dan Eyers, from Virginia to Vermont to work for Rose Computer Technology Services. It also summarizes SMARTvt's visit to Ward Lumber Corporation, a sawmill operation in New York, and efforts to maximize the utilization and marketing of lumber and wood byproducts. Additionally, it announces the appointment of Scott Decker as Editor-in-Chief of SMARTvt Magazine to expand the publication's readership and role in economic development.
IBM mainframe sales reps and distributors don't enjoy the pleasures and satisfaction of the whole
world's anticipation, speculation, or even the organized illicit intelligence gathering, which seems to be
common in Apple's i-world these days. There was a time, beyond the memories of most of the IT
community, when they did, but the world has changed and new technologies have driven the focus to a
broader audience that is less sophisticated in many respects. As a consequence, the “fun stuff” has shifted
a good deal from what's the biggest and fastest, toward what is the latest, and usually smaller, innovation
– the new gotten have. Computing, if you will, now is more personal and portable. Does anyone care
what all this stuff is connected to and what holds it together anymore? Not so much, apparently.
ICT provides the opportunity to develop both technical and creative skills through studying how information is transferred and presented using technology. Over two years, students explore practical problem solving and the digital world, as well as the use of ICT in organizations and practical project implementation. Assessment includes exams on yearly themes and a final practical project. ICT careers range from technical roles in data transfer to user interface design, depending on individual strengths and interests.
The document discusses how constraints and limitations in emerging countries are shaping innovation in information technology. It provides examples of how open-source solutions and mobile networks are enabling new forms of digital services and infrastructure in places like Brazil and Sri Lanka. The author argues that governments like Denmark's should embrace open-source approaches and long-term thinking to avoid falling behind global IT developments of the future that will be led by more constrained environments.
The document summarizes the agenda for the Global Forum 2012 Session #3 on big data, social media, systemic models, and governance. The session includes presentations from leaders in government, non-profits, and technology on topics related to how large amounts of digital data can be used to address challenges in various sectors such as transportation, renewable energy, livestock, and governance. Presenters will provide examples of how their organizations are leveraging big data through techniques including streaming analysis, data warehousing, and open data to improve decision-making and outcomes. The session aims to discuss both current applications of big data as well as future directions and transformations enabled by new technologies and patterns of data usage.
Is your IT aligned to your Business needs? Getting it to Think Like the Busin...HCL Technologies
Jean-Marc Chicco became the CIO of Lafarge after having a career managing businesses, giving him a fresh perspective on IT challenges. When he started, Lafarge had an inconsistent IT infrastructure with different versions of applications across its many sites. Chicco launched standardization initiatives and a project to consolidate 15 data centers in Europe into a single dual-site center in Paris. The consolidation will reduce costs by 25% and standardization will make applications cheaper and easier to use. However, large consolidation projects require extensive preparation and come with increased responsibility to ensure high service levels and robust disaster recovery.
The document provides a history of the evolution of the IT industry and the development of project management, business analysis, and service management methodologies to address challenges over time.
In the early days, IT was viewed as strange priests and a cost center, and methods were homemade with a lack of integration. Over decades, views shifted as technologies advanced but also caused new problems. Maturing methodologies evolved to align with business needs and address issues like integration. Going forward, success requires continual improvement through collaboration of all disciplines informed by lessons of the past.
This document provides a history of the evolution of IT, project management, business analysis, and service management from the pre-1980s to present. It discusses how each has matured over time in response to business needs and challenges. Key events and frameworks like the PMBOK, BABOK, SOX Act, and formation of groups like PMI and IIBA are mentioned. The overall message is that while past failures and unmet promises occurred, the methodologies and practices in place now are the result of constant change and lessons learned, and will continue adapting to integrate approaches and meet future business demands.
Keynote phaedra boinodiris serious games beyond training from process optim...IBMGovernmentCA
Keynote from the Smarter Defence Summit with Phaedra Boinodiris. Serious games beyond training from process optimization to complex problem solving in defence.
The document discusses a 7-step approach to aligning business processes with application development. The steps include: 1) Committing IT resources to participate in process improvement projects. 2) Educating IT on current processes before detailed process mapping sessions. 3) Conducting value stream mapping sessions with IT to extract requirements and improve understanding. 4) Involving IT in root cause analysis. 5) Creating an ideal "to-be" process without constraints. 6) Using agile development methods to quickly build prototypes. 7) Continuing the cycle of process and technology improvements. The approach aims to close knowledge gaps and reduce communication issues between business and IT.
From now on it will not support the business - it will be the businessStoneseed Ltd
IT will no longer just support businesses but will become the driving force behind business change and innovation. As social, mobile, analytics and cloud technologies become more prevalent, IT will play a central role in growing customer value and transforming business models. This disruption will see many current market leaders challenged by more agile competitors who leverage new digital technologies. Businesses must optimize their service delivery to remain competitive in this changing landscape.
The document debunks the myth that CIOs of SMBs are the primary decision makers for IT purchases. It summarizes that:
1) Most SMBs have fewer than 1,000 employees and lack dedicated CIO roles. IT decisions are made by generalists and staff within small IT departments.
2) Understanding the scale and needs of SMB segments (1-10 employees, 10-250, 250-500, 501-1000) is important for targeting marketing correctly.
3) Influencing IT staff who provide recommendations to management is key, as they can prevent vendors from reaching actual decision makers. Focusing solely on CIOs risks missing the majority of SMB opportunities.
The document debunks the myth that CIOs of SMBs are the primary decision makers for IT purchases. It summarizes that:
1) Most SMBs have fewer than 1,000 employees and lack dedicated CIO roles. IT decisions are made by generalists and department heads with influence over annual IT budgets of $800 billion worldwide.
2) IT purchases in small SMBs are influenced by friends and family, while medium and large SMBs rely on VARs, MSPs, and IT staff for recommendations and purchases.
3) To effectively market to SMBs, tech companies should engage IT professionals instead of solely targeting rare CIO roles, as these professionals have influence over or make
Talk at Stanford HAI Workshop on "Measurement in AI Policy: Opportunities and Challenges", October 30, 2019, Stanford, USA
When we procure Machine Translation vendors for the multi-vendor MT solutions we build for enterprises, we run a lot of MT evaluation projects. We evaluate commercial MT systems on public and private data to find the best system for a specific language pair and domain. These evaluations are quite different from what you see in WMT benchmarks, as we evaluate commercial systems, which are optimized for economic efficiency and real-time performance.
[AIIM16] Leaning into the Future: What the h*** is an information professiona...AIIM International
The document discusses the changing technology landscape from 1996 to the present. In 1996, the internet and web were in early stages, with few users and limited capabilities compared to today. The role of information professionals is described as focusing on automating complex business processes using early enterprise content management systems. By 2006, ECM solutions had become more standardized but still required specialized expertise. Recent disruptions from cloud, mobile, and internet of things have decentralized technology usage and given business users more autonomy. This has blurred traditional roles and created new challenges around security, automation, and insight. Information professionals are discussed as bridging people, processes, and technology by providing education and guidance during this ongoing period of radical change.
Third presentation in our seminar on business intelligence dashboards. Derek Murphy works for National Grid and related learning points from over 30 years experience of delivering business intelligence projects
Presentation also available on YouTube https://www.youtube.com/watch?v=Er90qIA2S7U
The document summarizes the New Year's resolutions of several MIS personnel for the year 2010. Some resolutions included improving time management, getting married, and quitting bad habits like being late or drinking too much. It also recapped the systems and projects completed by MIS in 2009, including an e-raffle draw system, salary adjustment utility, and tabulation system for contests. Overall, MIS rendered services costing an estimated 6.9 million pesos while their appropriated budget was 4.4 million, resulting in imputed savings of 2.5 million pesos.
MINI CASECustomer Service at Datatronics5Matt Rubenzahl .docxaltheaboyer
MINI CASE
Customer Service at Datatronics5
Matt Rubenzahl winced as the all-too-familiar, soothing machine voice crooned in his
ear: “All our operators are busy. Your call is important to us. Please stay on the line as
our calls are being answered in priority sequence.…” He glanced at his watch. Only
fifteen minutes left of his lunch break before the big meeting, and he had to resolve this
QSPCMFN�XJUI�UIF�CBOL��i8IZ�EP�UIFZ�DBMM�UIJT�UIF�A$VTUPNFS�)FMQ�MJOF� u�IF�HSVNCMFE��
“It seems like it’s there to help them, not us!”
As the Muzak droned on in the background, punctuated briefly by a hopeful click
and then the machine voice again, Matt’s mind wandered to the upcoming meeting.
As the development manager of E-Z RP, an end-to-end, fully integrated CRM/ERP/
service management suite for small- and medium-size enterprises (SMEs), he’d had his
dream job. Leading a small team of developers and working actively with both the sales
and service group, E-Z RP had made quite a name for itself, carving out a profitable
business in the SME niche that the bigger players hadn’t (until now) wanted to touch.
E-Z RP was everything they weren’t—user friendly, integrated, flexible, and intuitive.
A service-based product, E-Z RP modules were accessed over the Web and hosted at the
E-Z RP data center. Online training and friendly service completed the package, making
E-Z RP one of the fastest growing service-based products on the market.
That was the good news, but it was also the bad news because E-Z RP’s success
had attracted the corporate vultures, and the company had been taken over a few
weeks ago by Datatronics. Of course, the party line had been “business as usual,” but
today they were going to find out what the takeover would really mean for the people
who worked there. Matt worried about his little development team. The seven of them
had been together for a while now, and they liked and respected each other’s skills.
More important, they knew their product and understood how it helped their custom-
ers, thanks to Bill Blatherwick, their CEO. Bill had taken over E-Z RP as a start-up from
its innovative founder, Todd Wylie, and had grown it into the successful enterprise it
was today. It had been Bill who had made sure that Matt and his team went out on sales
calls, sat in with the customer service reps (CSRs), and got to know the needs of the
businesses firsthand.
Matt’s reverie was interrupted by a cheery voice, “This is Tanya. How may I help
ZPV�UPEBZ u�.BUU�HMBODFE�BU�IJT�XBUDI�UFO�NJOVUFT�PG�XBJUJOH�GPS�IJN
�[FSP�GPS�UIF�
bank. Quickly he explained that the electronic transfer of funds from his checking
account into his money market account had gone the other way, and now he had twice
as much money in his checking account. He had the confirmation number right here in
GSPOU�PG�IJN��)PX�DPVME�UIJT�IBQQFO �i0I
�*�DBO�FYQMBJO�UIBU
�TJS
u�DIJSQFE�5BOZB��i:PV�
see, when you transfer funds, the request gets printed out here at ...
A world of adventure awaits you within every app's lifetime, none greater than when the managers decide it is looking a bit long in the tooth.
The realm is a tricky one, your cause may be just but how to you justify you opinion to the grand council of the Elder PMs?
Hunt for the hidden forest where backing from the business is said to dwell.
Visit the fantasy lands of 'bolting on the latest tech'
Face the dark overlord of Rip and Replace
Your challenges will not just be technical, but political & economic, can you defeat evil forever or will it rise stronger in 5 years time?
Let us be your Gandalf, and take you on a journey where you are the hero
The Future of Work in the Information AgeTrefor Smith
The document discusses 10 key trends to watch in the future of work from 2016 onwards. It covers topics like automation, intelligent assistants, virtual reality, wearables, and generational shifts. Specifically, it discusses how automation will impact jobs through tasks becoming automated rather than entire roles. It also explores how intelligent assistants can anticipate needs and deliver information across devices. Virtual reality is presented as improving training and collaboration. The use of wearables in the workplace and their potential benefits are outlined. Generational shifts and their effects on employee strengths, the gig economy, and work-life balance are also summarized.
Work 2.0 or how Cloudcomputing is affecting businessBizcamp Belgium
Work 2.0 refers to changes in how work is done due to technologies like cloud computing. It involves less rigid structures and more freedom, diversity, flexibility and empowerment for employees. Cloud computing provides scalable and secure applications without the need for on-premise servers, technical staff, upgrades or licenses. It allows for fast implementation of tools that support collaboration, communication and information sharing across teams.
Information Management on Mobile SteroidsJohn Mancini
The document discusses how mobility is driving major changes in information management. It notes that the world is reaching the dramatic change phase described in Moore's Chessboard fable. Mobile access has grown enormously and is becoming the primary access point for many. However, most organizations have not optimized their processes and systems for mobile. The document argues that information professionals will need to have a range of specialized skills and knowledge to help organizations manage information holistically across systems in this new environment driven by mobility and engagement.
This document provides a review and recommendations for Top Secret Incorporated's (TSI) operating system (TSI/OS). It finds that while TSI/OS was initially successful for TSI's clients, it is no longer suitable for TSI's own backend needs. The summary identifies key issues with TSI/OS including a lack of multiprogramming, security vulnerabilities, outdated device drivers, and susceptibility to deadlocks. It recommends that TSI transition to Windows 10 to address these challenges, improve functionality for employees, and ensure the company's continued success.
This document discusses trends in strategic IT solutions for businesses in a tough economy. It recommends focusing on customer care, smart spending, and innovation through strategic uses of technology like open source software, cloud computing, and virtualization. These approaches can help businesses cut costs while improving customer relationships and processes to survive and even excel during difficult economic times.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Is your IT aligned to your Business needs? Getting it to Think Like the Busin...HCL Technologies
Jean-Marc Chicco became the CIO of Lafarge after having a career managing businesses, giving him a fresh perspective on IT challenges. When he started, Lafarge had an inconsistent IT infrastructure with different versions of applications across its many sites. Chicco launched standardization initiatives and a project to consolidate 15 data centers in Europe into a single dual-site center in Paris. The consolidation will reduce costs by 25% and standardization will make applications cheaper and easier to use. However, large consolidation projects require extensive preparation and come with increased responsibility to ensure high service levels and robust disaster recovery.
The document provides a history of the evolution of the IT industry and the development of project management, business analysis, and service management methodologies to address challenges over time.
In the early days, IT was viewed as strange priests and a cost center, and methods were homemade with a lack of integration. Over decades, views shifted as technologies advanced but also caused new problems. Maturing methodologies evolved to align with business needs and address issues like integration. Going forward, success requires continual improvement through collaboration of all disciplines informed by lessons of the past.
This document provides a history of the evolution of IT, project management, business analysis, and service management from the pre-1980s to present. It discusses how each has matured over time in response to business needs and challenges. Key events and frameworks like the PMBOK, BABOK, SOX Act, and formation of groups like PMI and IIBA are mentioned. The overall message is that while past failures and unmet promises occurred, the methodologies and practices in place now are the result of constant change and lessons learned, and will continue adapting to integrate approaches and meet future business demands.
Keynote phaedra boinodiris serious games beyond training from process optim...IBMGovernmentCA
Keynote from the Smarter Defence Summit with Phaedra Boinodiris. Serious games beyond training from process optimization to complex problem solving in defence.
The document discusses a 7-step approach to aligning business processes with application development. The steps include: 1) Committing IT resources to participate in process improvement projects. 2) Educating IT on current processes before detailed process mapping sessions. 3) Conducting value stream mapping sessions with IT to extract requirements and improve understanding. 4) Involving IT in root cause analysis. 5) Creating an ideal "to-be" process without constraints. 6) Using agile development methods to quickly build prototypes. 7) Continuing the cycle of process and technology improvements. The approach aims to close knowledge gaps and reduce communication issues between business and IT.
From now on it will not support the business - it will be the businessStoneseed Ltd
IT will no longer just support businesses but will become the driving force behind business change and innovation. As social, mobile, analytics and cloud technologies become more prevalent, IT will play a central role in growing customer value and transforming business models. This disruption will see many current market leaders challenged by more agile competitors who leverage new digital technologies. Businesses must optimize their service delivery to remain competitive in this changing landscape.
The document debunks the myth that CIOs of SMBs are the primary decision makers for IT purchases. It summarizes that:
1) Most SMBs have fewer than 1,000 employees and lack dedicated CIO roles. IT decisions are made by generalists and staff within small IT departments.
2) Understanding the scale and needs of SMB segments (1-10 employees, 10-250, 250-500, 501-1000) is important for targeting marketing correctly.
3) Influencing IT staff who provide recommendations to management is key, as they can prevent vendors from reaching actual decision makers. Focusing solely on CIOs risks missing the majority of SMB opportunities.
The document debunks the myth that CIOs of SMBs are the primary decision makers for IT purchases. It summarizes that:
1) Most SMBs have fewer than 1,000 employees and lack dedicated CIO roles. IT decisions are made by generalists and department heads with influence over annual IT budgets of $800 billion worldwide.
2) IT purchases in small SMBs are influenced by friends and family, while medium and large SMBs rely on VARs, MSPs, and IT staff for recommendations and purchases.
3) To effectively market to SMBs, tech companies should engage IT professionals instead of solely targeting rare CIO roles, as these professionals have influence over or make
Talk at Stanford HAI Workshop on "Measurement in AI Policy: Opportunities and Challenges", October 30, 2019, Stanford, USA
When we procure Machine Translation vendors for the multi-vendor MT solutions we build for enterprises, we run a lot of MT evaluation projects. We evaluate commercial MT systems on public and private data to find the best system for a specific language pair and domain. These evaluations are quite different from what you see in WMT benchmarks, as we evaluate commercial systems, which are optimized for economic efficiency and real-time performance.
[AIIM16] Leaning into the Future: What the h*** is an information professiona...AIIM International
The document discusses the changing technology landscape from 1996 to the present. In 1996, the internet and web were in early stages, with few users and limited capabilities compared to today. The role of information professionals is described as focusing on automating complex business processes using early enterprise content management systems. By 2006, ECM solutions had become more standardized but still required specialized expertise. Recent disruptions from cloud, mobile, and internet of things have decentralized technology usage and given business users more autonomy. This has blurred traditional roles and created new challenges around security, automation, and insight. Information professionals are discussed as bridging people, processes, and technology by providing education and guidance during this ongoing period of radical change.
Third presentation in our seminar on business intelligence dashboards. Derek Murphy works for National Grid and related learning points from over 30 years experience of delivering business intelligence projects
Presentation also available on YouTube https://www.youtube.com/watch?v=Er90qIA2S7U
The document summarizes the New Year's resolutions of several MIS personnel for the year 2010. Some resolutions included improving time management, getting married, and quitting bad habits like being late or drinking too much. It also recapped the systems and projects completed by MIS in 2009, including an e-raffle draw system, salary adjustment utility, and tabulation system for contests. Overall, MIS rendered services costing an estimated 6.9 million pesos while their appropriated budget was 4.4 million, resulting in imputed savings of 2.5 million pesos.
MINI CASECustomer Service at Datatronics5Matt Rubenzahl .docxaltheaboyer
MINI CASE
Customer Service at Datatronics5
Matt Rubenzahl winced as the all-too-familiar, soothing machine voice crooned in his
ear: “All our operators are busy. Your call is important to us. Please stay on the line as
our calls are being answered in priority sequence.…” He glanced at his watch. Only
fifteen minutes left of his lunch break before the big meeting, and he had to resolve this
QSPCMFN�XJUI�UIF�CBOL��i8IZ�EP�UIFZ�DBMM�UIJT�UIF�A$VTUPNFS�)FMQ�MJOF� u�IF�HSVNCMFE��
“It seems like it’s there to help them, not us!”
As the Muzak droned on in the background, punctuated briefly by a hopeful click
and then the machine voice again, Matt’s mind wandered to the upcoming meeting.
As the development manager of E-Z RP, an end-to-end, fully integrated CRM/ERP/
service management suite for small- and medium-size enterprises (SMEs), he’d had his
dream job. Leading a small team of developers and working actively with both the sales
and service group, E-Z RP had made quite a name for itself, carving out a profitable
business in the SME niche that the bigger players hadn’t (until now) wanted to touch.
E-Z RP was everything they weren’t—user friendly, integrated, flexible, and intuitive.
A service-based product, E-Z RP modules were accessed over the Web and hosted at the
E-Z RP data center. Online training and friendly service completed the package, making
E-Z RP one of the fastest growing service-based products on the market.
That was the good news, but it was also the bad news because E-Z RP’s success
had attracted the corporate vultures, and the company had been taken over a few
weeks ago by Datatronics. Of course, the party line had been “business as usual,” but
today they were going to find out what the takeover would really mean for the people
who worked there. Matt worried about his little development team. The seven of them
had been together for a while now, and they liked and respected each other’s skills.
More important, they knew their product and understood how it helped their custom-
ers, thanks to Bill Blatherwick, their CEO. Bill had taken over E-Z RP as a start-up from
its innovative founder, Todd Wylie, and had grown it into the successful enterprise it
was today. It had been Bill who had made sure that Matt and his team went out on sales
calls, sat in with the customer service reps (CSRs), and got to know the needs of the
businesses firsthand.
Matt’s reverie was interrupted by a cheery voice, “This is Tanya. How may I help
ZPV�UPEBZ u�.BUU�HMBODFE�BU�IJT�XBUDI�UFO�NJOVUFT�PG�XBJUJOH�GPS�IJN
�[FSP�GPS�UIF�
bank. Quickly he explained that the electronic transfer of funds from his checking
account into his money market account had gone the other way, and now he had twice
as much money in his checking account. He had the confirmation number right here in
GSPOU�PG�IJN��)PX�DPVME�UIJT�IBQQFO �i0I
�*�DBO�FYQMBJO�UIBU
�TJS
u�DIJSQFE�5BOZB��i:PV�
see, when you transfer funds, the request gets printed out here at ...
A world of adventure awaits you within every app's lifetime, none greater than when the managers decide it is looking a bit long in the tooth.
The realm is a tricky one, your cause may be just but how to you justify you opinion to the grand council of the Elder PMs?
Hunt for the hidden forest where backing from the business is said to dwell.
Visit the fantasy lands of 'bolting on the latest tech'
Face the dark overlord of Rip and Replace
Your challenges will not just be technical, but political & economic, can you defeat evil forever or will it rise stronger in 5 years time?
Let us be your Gandalf, and take you on a journey where you are the hero
The Future of Work in the Information AgeTrefor Smith
The document discusses 10 key trends to watch in the future of work from 2016 onwards. It covers topics like automation, intelligent assistants, virtual reality, wearables, and generational shifts. Specifically, it discusses how automation will impact jobs through tasks becoming automated rather than entire roles. It also explores how intelligent assistants can anticipate needs and deliver information across devices. Virtual reality is presented as improving training and collaboration. The use of wearables in the workplace and their potential benefits are outlined. Generational shifts and their effects on employee strengths, the gig economy, and work-life balance are also summarized.
Work 2.0 or how Cloudcomputing is affecting businessBizcamp Belgium
Work 2.0 refers to changes in how work is done due to technologies like cloud computing. It involves less rigid structures and more freedom, diversity, flexibility and empowerment for employees. Cloud computing provides scalable and secure applications without the need for on-premise servers, technical staff, upgrades or licenses. It allows for fast implementation of tools that support collaboration, communication and information sharing across teams.
Information Management on Mobile SteroidsJohn Mancini
The document discusses how mobility is driving major changes in information management. It notes that the world is reaching the dramatic change phase described in Moore's Chessboard fable. Mobile access has grown enormously and is becoming the primary access point for many. However, most organizations have not optimized their processes and systems for mobile. The document argues that information professionals will need to have a range of specialized skills and knowledge to help organizations manage information holistically across systems in this new environment driven by mobility and engagement.
This document provides a review and recommendations for Top Secret Incorporated's (TSI) operating system (TSI/OS). It finds that while TSI/OS was initially successful for TSI's clients, it is no longer suitable for TSI's own backend needs. The summary identifies key issues with TSI/OS including a lack of multiprogramming, security vulnerabilities, outdated device drivers, and susceptibility to deadlocks. It recommends that TSI transition to Windows 10 to address these challenges, improve functionality for employees, and ensure the company's continued success.
This document discusses trends in strategic IT solutions for businesses in a tough economy. It recommends focusing on customer care, smart spending, and innovation through strategic uses of technology like open source software, cloud computing, and virtualization. These approaches can help businesses cut costs while improving customer relationships and processes to survive and even excel during difficult economic times.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Issue3volume1
1. US December 2009
OC Let’s be conversant with REY…. Issue 03
allaboutIT
IN F
Technically HE is a computer What does the future hold for again….) “Seriously the problem
support technician; a specialist who you? Any exciting plans? am dealing with now is the
installs or removes software, Developments? defective timekeeping machine at
troubleshoots technical issues, Hopefully get promoted. Say five Libarnes building, hopefully it will
configures LAN and responsible for be replaced soon …aron hapsay na The Official Publication of Management Information Services
years from now probably I would
ang pag-download sa data kun
information security and privacy. still be working here at MIS. I love
my job here and am happy working ting-payroll na…” eTOMS – consolidate and manage LGU finances
Personally HIS colleagues describe for the province of Agusan del Sur
him as a very reliable person, cause this is where I have used my eTOMS is an acronym for Electronic Treasury Operations Management
competent, patient, approachable, expertise as a computer technician; System. It is a revenue support system developed to recognize the
and simple; somebody who really this is where I started. importance of consolidating and managing LGU finances. By automating
knows his job well. the LGU's collection and disbursement operations, eTOMS adds to the fiscal
benefits already being derived from the implementation of Real Property
Tax Information System (RPTIS) and Business Permits Licensing System
We were able to corner him for a What do you do on your free
(BPLS), the other two income-generating developed system.
certain time to fathom his effective- time?
ness. Games….Before when our net usage eTOMS particularly used in treasury office to generate all the reports
was still not restricted, I became required and prescribed by the Bureau of Local Government Finance
What do you love about your fond of “Farmville” (grins….) (BLGF). Examples of such report are Statement of Receipt Sources,
job? Statement of Expenditures, Statement of Receipt Sources and Expenditures
The “challenge” that my job entails If you encounter job-related FAST FACTS:
FAST FACTSC (SRE), and a lot more.
issues and had a hard time Full Name: Augustus Rey N. De As it was implemented in the 14 municipalities of Agusan Del Sur a
What would you say makes you coping, what superpower Guzman seminar/workshop was conducted by our very own MIS chief of office; Eng’r.
different from your colleagues? would help you in the course of Age: 29 Nephtali Morgado with Mr. Roy Sabuero; Prosperidad Municipal Treasurer.
I would say I got “initiative”. If a that encounter? Why? Birth date: August 2, 1980 Both are key personnel who realized the development of the system.
certain PC problem is encountered I would like to mimic marvel Little Darling: Steffanie Lyka
and the rest of the team members superhero Jamie Madrox; “Multiple (2 yrs old) The three days seminar last November 16-18, 2009 was held at Rosalinda’s
won’t be able to solve it, I would try Man”. (Grins….) Hopefully I could Position: CO II – ICT Maintenance Restaurant, San Francisco participated by all Municipal Treasurer’s and
my best to find ways to tackle the replicate myself so I can handle Section some personnel from the Provincial Treasurer’s Office.
- msov
issue. issues at hand all at once. (Grins
ia MIS-ICT Maintenance Section’s significance in the “Pagtuon
h Triv Inspiration behind the “apple logo” Sp ot
Tec Re-alignment of Office....
Hot
Project & Barangay Computerization Program”
and who designed it Computerization is practically synonymous with modernization. As we computerize the
We are graced with the presence of
Believe it or not, by eating an apple barangay units, we are giving them the means to modernize the delivery of public services to
Mr. Ferdinand “Tata” Perez, who their own residents. This drives the formalization of issuing barangay clearances and permits.
the current Apple he had laced with was the Coordinator when ITU was That is a task that they have to do on their own, they were just being given the tools to make it
logo, which an cyanide. Turing is created. He reminds us to review happen.
image of a bit regarded as one of our vision and work together to
apple, wasn't the the fathers of the aim for that. He very well said that It all started with a vision that will soon be realized by the starting initiative of PGAS thru the
first logo to be computer. The rainbow colors of the effort of our Gov. Ma. Valentina “Tina” G. Plaza by turning over 80 units of complete set of PC
small activities like what we’re to chosen barangays and schools.
used by Apple Inc. logo are rumored to be a reference having is essential to continuously
The first Apple logo was designed by to the rainbow flag, as homage to motivate all of us as member of the Our very own ICT Maintenance technicians, plays a vital role in the said project as they were
Steve Jobs himself together with Turing's homosexuality. team. responsible in checking if the PC that’s going to be distributed works well and in its best. They
Ronald Wayne -- one of Apple's were also in-charge in setting up the technical set up of the venue upon PC turn-over.
co-founders. It depicts an image of The Rainbow Apple's base structure
Isaac Newton sitting under an apple became the template for Apple's The formal activity was ended with Re-alignment of Office Functions Activity held at Masao
tree; current and more conservative logos a get together happening to
This logo was eventually Information Technology Unit (ITU) was created as a unit, year 2001 under the Provincial Governor’s Office thru Ordinance No.
(color-wise). celebrate the small wins that we 22 Series 2001. On March of this year Ordinance No. 36, Series 2009 was created entitled “An Ordinance Reorganizing the Provincial
replaced by Rob Janoff's had for the present year. Alls well Government of Agusan Del Sur”. Thru this ordinance ITU now named Management Information Services (MIS) was transferred under the
Rainbow Apple logo that ends well… Provincial Administrator’s Office. There is a proposed plan of transferring its existence under the Provincial Planning and Development Office
during the late 1970's. It
is believed uo te - msov by next year.
With the units’ constant transfer under the wings of different offices we had come up with several objectives to re-aligned our
that the Rainbow Apple is the
Te chQ function and staff responsibilities. A one day activity was held last 27th day of November 2009 1)To re-align office functions now that the
entire office is under the Provincial Administrators Office; 2) To ensure that individual employees responsibilities are in accordance to MIS core
company's tribute to Isaac Newton's
agenda and objective as it was created in 2001; 3)To assess how far the office has gone since its inception; and 4) To review and realign official
discoveries on gravity and light "Life would be so much easier if we only had the source code." MIS Mission, Vision, Core values and Objectives in accordance to future transfer of MIS under the Provincial Planning and Development
prisms. Office. Cont. to page 4
Interestingly***
While [The Rainbow Apple] is
generally accepted to have referred
Management Information Services
to Isaac Newton, another explana- 3rd Floor, Executive Bldg.
tion exists that the bitten apple pays D.O. Plaza Government Center
homage to the mathematician Alan Patin-ay, Prosperidad, Agusan del Sur
p4 p1
Turing, who committed suicide Phone: 085 3437955
2. h Talk10 ways IT department waste money
10 ways IT .....
Tec It makes more sense to carefully evaluate as a new OS, it’s often smart to roll it out the same training may be available on
how the systems and software are being with a pilot group first so you can work DVD or through live online instruction at a
used and whether there’s a real need to out any unanticipated problems before fraction of the cost. Is the department
IT is often a popular target for corporate the plan that they never use at all. on how your company operates and what upgrade. You can save the cost of new deploying across the entire organization. paying for certifications that may not be
cost-cutting. So the more you can identify its specific needs are. If you do find that licenses and administrative overhead costs necessary? Certification provides
and control unnecessary spending, the 3. Not allowing employees to work you need to bring in a consultant, check — and often, make users happier and 8.Overspending on hardware While assurance of a certain level of knowledge
better you’ll be able to fend off the from home. Company managers credentials and references carefully. There avoid deployment headaches — by buying new hardware can save you and in some cases, having certified
budget axe. Here are a few areas where IT sometimes fail to recognize the significant are many good, hard-working IT sticking with what you have now if it’s still money, too much of a good thing can employees on staff enhances the
budgets often go to waste. cost benefits — to both employer and consultants. The field is also a great target working fine for your company’s purposes. waste it. Some companies are still not company’s reputation or allows it to
employee — of allowing employees to for rip-off artists who talk over your head utilizing virtualization to the extent that participate in vendor partner programs.
Back in the golden days of IT, when telecommute all or part of the time. One about specialized technologies and try to This applies to servers, too. It’s nice to have they could to reduce both capital and But some IT professionals collect multiple
companies had plenty of money to throw reason they oppose such an arrangement push the latest and greatest on you — the latest and greatest running on the operating expenditures. Instead of buying certifications — at company expense —
around, it didn’t matter so much if there is that they won’t have as much control whether you need it or not — or attempt most powerful machines, but will it make multiple mid-priced servers to run Web that may not benefit the company at all
was a little wastage here and there. over workers who aren’t on site. IT to sell you on specific products that you a real difference in terms of productivity, services, mail services, collaboration and (although they may benefit the employee
Today, however, budgets are tight and departments sometimes support this may not really need. security, and other important factors or do communications services, etc., you may be in looking for a new job).
there aren’t many cash to spare. That position for fear that remote workers will you just want it so you’ll have a new toy to able to save substantially by purchasing
means IT departments need to take a present a security threat. However, with 5.Hiring full-time employees when play with? one or two more powerful machines and Ongoing training is important, and having
good, hard look at where the money is modern technologies such as NAP/NAC contractors would be more cost consolidating servers with virtualization well-trained personnel can save a
going and where cuts can be made — and DirectAccess, you can ensure that effective. The flip side of the previous 7.Failing to upgrade old, inefficient technologies. Not only is the total capital company money in the long run. But
before someone higher up does it for you. remote systems connecting to the item involves being afraid to use equipment. On the other hand, some outlay often less, but you reduce the cost when budgets are tight, it’s also important
Some of these may seem to be just company LAN are properly configured consultants or contractors when it’s companies are going overboard when it of extended warranties and maintenance to get the most for every training budget
common sense, but there are organiza- and protected and that the connections appropriate. Hiring full-time employees comes to squeezing every last drop of use contracts since they apply to fewer and cut out the waste.
tions out there right now that are wasting are secure. Allowing more employees to to handle a workload that’s likely to be out of their current systems. If the machines, and operating costs are often
money in all these ways. work from home enables the company to temporary leaves you with idle workers computers are getting so old that they lower because the total power usage is 10. Wasting money on travel expenses
save money on office space and air who end up costing you money because regularly break down and require repairs, less. Training isn’t the only reason employees
1. Wasting Energy Despite some conditioning. Employees save money on there’s not enough for them to do to if your servers go down so often that users travel on the company dime. Members of
reduction in power costs over the last year, clothes, lunches, and transportation. They warrant their salaries — or forcing you to of the network can’t get their work done Another way some companies waste the IT department may be called upon to
rates appear to be headed back up. The also often enjoy work more, so they end go through the pains (to those employees or customers can’t access your site, if you’re money is by purchasing equipment for a attend meetings at company headquar-
electric bill is still a large expense for most up putting in extra hours that raise as well as to the company) of layoffs. In putting sensitive data at risk because project that requires very intensive ters or give presentations at another
companies — and the IT department is a productivity and benefit the company. these situations, when you don’t have the you’re depending on old software that’s computing resources — but only for a branch office or go to a different location
big user of energy. You can save more Many IT-related jobs, such as those of current manpower or expertise on staff to full of vulnerabilities, if the hardware costs limited time. When the project is over, to help set up equipment or troubleshoot
money than you might suspect by in-house developers and Web designers, get the job done, it’s often more cost considerably more to operate than more you’re stuck with the expensive software problems. In a tight economy, it’s
adopting some energy-saving policies. can be done from home. effective to hire independent contractors. modern machines because it’s so energy equipment. smart to examine whether this things can
With the power settings available in Not only can you limit the duration of the inefficient, it may be time to think about be done online or through remote control
modern operating systems, there’s really 4.Using consultants when the job could commitment, but you don’t generally investing some capital to lower operating 9.Not using the training budget software.
no excuse for it, but some IT pros turn off be done by staff. It’s a common scenario: have to pay for fringe benefits, such as costs and save money over the long run. effectively. Technology is always
power-saving features in favor of higher Employees have been telling vacation and sick leave. You also don’t changing and it’s important for IT Sometimes, though, travel can’t be
performance. management for months or years that have the administrative overhead of Remember that neither software nor personnel to stay current, but some avoided. In those cases, you can still save
changes need to be made, but they’ve withholding taxes and filing the hardware upgrades have to be an “all or departments waste money on training money by staying in more reasonably
How about the practice of leaving lights been ignored. Then the company hires a paperwork that’s associated with regular nothing” proposition. Some departments that could be done as effectively for much priced hotels, putting a limit on meals
on in offices and server rooms when no one consultant, who charges tens or even employees. or individuals may need to be upgraded less. Do employees really need to travel to reimbursements or instituting a per diem,
is there? Most people don’t think about hundreds of thousands of cash to do a while others can get along for a while a distant site for training or can it be done and even taking buses instead of cabs for
the cost, but it can add up. “study” and arrives at the same 6. Making unnecessary upgrades longer with what they have. And when on-site less expensively? Perhaps instead small savings that add up.
conclusion, providing the same advice There are good reasons to upgrade your you’re considering a major upgrade, such of sending several employees, one can
2.Spending too much on mobile staff members were trying to give away software and/or hardware. When new attend and then come back and share
technology Mobile phones and devices free. operating systems or applications provide what he/she learned with the others. Or - http://blogs.techrepublic.com
tes
are “fun toys” for IT pros, but company- functionality that your users need or that
s By ADS LGIS Enhancement takes-off
provided equipment and plans may be If you have people on staff who have can help them get their jobs done more
New
costing more than necessary. A recent expertise in a particular area and have easily or more rapidly, it makes sense to
survey showed that only one out of four the time to do a job, it’s generally more upgrade. When existing hardware won’t
employees uses 75% or more of the voice cost effective to allow them to do it than run those programs you need, it may be
The Provincial Government of Agusan Del 2009) was done at the MIS conference
minutes that their companies are paying to bring in an outsider who has to spend necessary to buy new computers.
Sur embarked on a computerization room for them to be able to understand
for and almost half (48%) have services on many (billable) hours getting up to speed .
or
Cont. to Page 3. how the project came into being and
program that aimed to increase revenue
um collection for the five pilot LGU’s namely understand the office business process and
Te chH Sibagat, Bayugan, Prosperidad, San system operation. They were also given a
Official Publication of Management Information Services
Nephtali F. Morgado A man is flying in a hot air balloon and realizes he Francisco and Trento. From the time the one day Basic PC Troubleshooting and
Editor In Chief is lost. He reduces height and spots a man down system was used, major changes were Maintenance Seminar last November 12,
allaboutIT
below. He lowers the balloon further and shouts: considered upon the recommendation of 2009 as essential tool to perform their
the stakeholders and with the new duties.
Jumar V. Boniza
"Excuse me, can you tell me where I am?" implementation of newly adopted tax
Ass’t. Editor The man below says: "yes you're in a hot air Resource speakers for the orientation
collection adjustments, it encountered
balloon, hovering 30 feet above this field." bugs and errors thus necessary to fix them include Mr. Roy Sabuero, Municipal Sir Nep with his welcome message to the whole
Eng’r. Warren E. Lagat "You must work in Information Technology" says accordingly and enhance to fit their needs. Treasurer of Prosperidad, Mr. Jose team on the 1st day of Orientation
News Correspondent the balloonist. Sanchez, Municipal Assessor also from
"I do" replies the man. "How did you know?" The system consists of RPTIS (Real Prosperidad, Eng’r. Romeo Restor from
"Well" says the balloonist, "everything you have Property Tax Information System), BPLS PASSTO, our very own Eng’r. Jumar
Michelle O. Villasis
told me is technically correct, but it's no use to (Business Permit and Licensing System Boniza, Eng’r. Rogelio Dellola and Eng’r.
Head Writter/ Layout Editor anyone." Warren Lagat. The week long activity was
and RCS (Revenue Collection System). A
team was formed for the purpose of concluded with a closing program which
Andrew Bryan A. Mondejar The man below says "you must work in business." enhancement. Members were divided into was graced by the Municipal treasusrer’s
Graphics/Layout Artist "I do" reply the balloonist, "but how did you know?" "Well", says the man, the Steering group, Programmers group from the five pilot municipalities, PASSTO
"you don't know where you are, or where you're going, but you expect me to and the Implementor’s group. As there Chairperson; Ms. Celsa Sanchez who gave
be able to help. You're in the same position you were before we met, but now were two additional programmers hired a short speech to formally accept the
Eddie S. Miladona it's my fault." for this purpose and implementors to focus team members and our Provincial
Circulations Supervisor Administrator, Mr. Jesusimo Ronquillo who
on problems with in each municipality, a
week long orientation (November 3 – 6, render a message of encouragement to Newly hired programmers and implementors
after their 1-day seminar on Basic PC
everyone.
p2 p3
Troubleshooting and Maintenance
- msov