Your Challenge
Organizations have to adapt to a growing number of trends, putting increased pressure on IT to move at the same speed as the business.
The business, seeing that IT is slower to react, looks to external solutions to address its challenges and capitalize on opportunities.
IT and business leaders don’t have a clear and unified understanding or definition of an operating model.
Our Advice
Critical Insight
The IT operating model is not a static entity and should evolve according to changing business needs.
However, business needs are diverse, and the IT organization must recognize that the business includes groups that consume technology in different patterns. The IT operating model needs to support and enable multiple groups, while continuously adapting to changing business conditions.
Impact and Result
Determine how each technology consumer group interacts with IT. Use consumer experience maps to determine what kind of services consumer groups use and if there are opportunities to improve the delivery of those services.
Identify how changing business conditions will affect the consumption of technology services. Classify your consumers based on business uncertainty and reliance on IT to plan for the future delivery of services.
Optimize the IT operating model. Create a target IT operating model based on the gathered information about technology service consumers. Select different implementations of common operating model elements: governance, sourcing, process, and structure.
Request to Fulfill Presentation (IT4IT)Rob Akershoek
The Request to Fulfill (R2F) value stream presentation. R2F is one of the four value streams of the IT4IT Reference Architecture of The Open Group.
How to manage your IT organization as a professional IT shop? Provide a self service portal for end-users and IT staff to order IT services and IT resources. Automate the entire process from request to actual deployment and provisioning.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Your Challenge
Organizations have to adapt to a growing number of trends, putting increased pressure on IT to move at the same speed as the business.
The business, seeing that IT is slower to react, looks to external solutions to address its challenges and capitalize on opportunities.
IT and business leaders don’t have a clear and unified understanding or definition of an operating model.
Our Advice
Critical Insight
The IT operating model is not a static entity and should evolve according to changing business needs.
However, business needs are diverse, and the IT organization must recognize that the business includes groups that consume technology in different patterns. The IT operating model needs to support and enable multiple groups, while continuously adapting to changing business conditions.
Impact and Result
Determine how each technology consumer group interacts with IT. Use consumer experience maps to determine what kind of services consumer groups use and if there are opportunities to improve the delivery of those services.
Identify how changing business conditions will affect the consumption of technology services. Classify your consumers based on business uncertainty and reliance on IT to plan for the future delivery of services.
Optimize the IT operating model. Create a target IT operating model based on the gathered information about technology service consumers. Select different implementations of common operating model elements: governance, sourcing, process, and structure.
Request to Fulfill Presentation (IT4IT)Rob Akershoek
The Request to Fulfill (R2F) value stream presentation. R2F is one of the four value streams of the IT4IT Reference Architecture of The Open Group.
How to manage your IT organization as a professional IT shop? Provide a self service portal for end-users and IT staff to order IT services and IT resources. Automate the entire process from request to actual deployment and provisioning.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
Overview of the IT4IT tooling market in 2022.
Key trends in the IT4IT / DevOps tooling market are:
- Strategic portfolio management / portfolio backlog management (scaling agile on the enterprise level integrating with Enterprise architecture and Application / Product Portfolio Management)
- On-line collaboration & communication tools supporting team of team planning, problem solving, etc.
- Value stream management (an emerging tooling category) providing visibility across the end-to-end IT value streams
- Multi-cloud discovery & visibility on usage, costs and compliance
- Integrating DevOps tool chain (e.g. CICD pipeline) with the ITSM platform and CMDB
- Integrating security, risk and compliance management into the DevOps tool chain
- AIOps and observability management, consoliding metrics, logs, events mapped to a real-time service model
- Security operations, integrating security monitoring, vulnerability scanning, etc. into end-to-end detect to correct value streams
- Enterprise Service Management (ITSM vendors providing omni-channel services across IT, HR, Facilities, Finance, etc.)
- Leveraging AI/ML in various capabilities such test management, security operations, incident management, etc.
- Sustainability management integrated in IRM/GRC platforms
And last but not least:
- Service / Product portfolio management (managing the portfolio of service/applications, supporting product centric operating models, linked to business capabilities, product owners and teams)
History of IT Service Management Practices and StandardsRob Akershoek
Evolution of IT service management practices and standards from Top Gun 1 (around 1990) to Top Gun Maverick (2022)
How did the IT management evolve since 1990? When were key standards and practices introduced?
The IT management market has significantly evolved over the last few years e.g. introducing DevOps, Continuous Delivery, Agile Development, SRE and IT4IT. Managing this new multi-vendor ecosystem consisting of cloud, containers and micro-services.
Managing this new digital reality requires you to combine various practices into one integrated Digital Operating Model, to optimize end-to-end IT value streams.
Architecting Next Generatio IT Operating Models Using IT4IT and SFIASukumar Daniel
A case study of a Transformation Initiative to move a Third Party from Traditional Mechanic Shop Mentality to a Customisation Studio Mentality by causing a paradigm Shift in Ways of Working
According to Gartner, "The stongest performing IT organizations are distinguished by strong strategy practices. The weak performing IT organizations are distinguished by weak delivery practices."
Having an IT strategy and executing it are important.
This brief presentation covers:
1. Why IT Strategy?
2. What does a great IT Strategy look like?
3. How to create a great IT Strategy
4. How to make the IT Strategy real
Creating Enterprise Value from Business Architectureiasaglobal
This presentation will cover the Why (Value) and How (Execution) of a Business Architecture program. You will understand how you can lead your enterprise towards its vision by planning for key Business Capabilities that will get you there.
IT4IT and DevOps Tools Landscape (2020).Rob Akershoek
Complete overview of the IT management tooling landscape 2020. Key market players / vendors in the IT4IT and DevOps tooling ecosystem. Automate and streamline your end-to-end DevOps tool chain.
This webinar features two IT4IT™ experts: Jim Hietala, VP Business Development at The Open Group and Michael Fulton, President Americas Division of CC and C Solutions, co-chair IT4IT Adoption Workgroup and Lead Author ITpreneurs IT4IT courseware.
Training and consulting providers looking to help your clients improve IT efficiency will enjoy this webinar. You will:
-Gain insight on how IT4IT serves the digital enterprise
-Discover its relation with Cloud, Agile, and DevOps
-Learn how it complements TOGAF®, Archimate® and ITIL®
-Find out what the training opportunities are for IT4IT
The Open Group IT4IT Reference Architecture provides prescriptive guidance on how to design, procure and implement the functionality needed to run IT. The training content of IT4IT will be available for licensing in the ITpreneurs courseware soon.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
IT Function critical capabilities are key areas where the IT function needs to maintain significant levels of competence, skill and experience and practise in order to operate and deliver a service. There are several different IT capability frameworks. The objective of these notes is to assess the suitability and applicability of these frameworks. These models can be used to identify what is important for your IT function based on your current and desired/necessary activity profile.
Capabilities vary across organisation – not all capabilities have the same importance for all organisations. These frameworks do not readily accommodate variability in the relative importance of capabilities.
The assessment approach taken is to identify a generalised set of capabilities needed across the span of IT function operations, from strategy to operations and delivery. This generic model is then be used to assess individual frameworks to determine their scope and coverage and to identify gaps.
The generic IT function capability model proposed here consists of five groups or domains of major capabilities that can be organised across the span of the IT function:
1. Information Technology Strategy, Management and Governance
2. Technology and Platforms Standards Development and Management
3. Technology and Solution Consulting and Delivery
4. Operational Run The Business/Business as Usual/Service Provision
5. Change The Business/Development and Introduction of New Services
In the context of trends and initiatives such as outsourcing, transition to cloud services and greater platform-based offerings, should the IT function develop and enhance its meta-capabilities – the management of the delivery of capabilities? Is capability identification and delivery management the most important capability? Outsourced service delivery in all its forms is not a fire-and-forget activity. You can outsource the provision of any service except the management of the supply of that service.
The following IT capability models have been evaluated:
• IT4IT Reference Architecture https://www.opengroup.org/it4it contains 32 functional components
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL V4 https://www.axelos.com/best-practice-solutions/itil has 34 management practices
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
• APQC Process Classification Framework - https://www.apqc.org/process-performance-management/process-frameworks version 7.2.1 has 44 major IT management processes
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
The following model has not been evaluated
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
The latest version of the TOGAF standard has special emphasis on Business Architecture, Digital Trends, and Business Transformation beyond IT. Stuart Macgregor takes us through some of these changes to the TOGAF® 9.2 standard and discuss how they will benefit us.
Overview of the IT4IT tooling market in 2022.
Key trends in the IT4IT / DevOps tooling market are:
- Strategic portfolio management / portfolio backlog management (scaling agile on the enterprise level integrating with Enterprise architecture and Application / Product Portfolio Management)
- On-line collaboration & communication tools supporting team of team planning, problem solving, etc.
- Value stream management (an emerging tooling category) providing visibility across the end-to-end IT value streams
- Multi-cloud discovery & visibility on usage, costs and compliance
- Integrating DevOps tool chain (e.g. CICD pipeline) with the ITSM platform and CMDB
- Integrating security, risk and compliance management into the DevOps tool chain
- AIOps and observability management, consoliding metrics, logs, events mapped to a real-time service model
- Security operations, integrating security monitoring, vulnerability scanning, etc. into end-to-end detect to correct value streams
- Enterprise Service Management (ITSM vendors providing omni-channel services across IT, HR, Facilities, Finance, etc.)
- Leveraging AI/ML in various capabilities such test management, security operations, incident management, etc.
- Sustainability management integrated in IRM/GRC platforms
And last but not least:
- Service / Product portfolio management (managing the portfolio of service/applications, supporting product centric operating models, linked to business capabilities, product owners and teams)
History of IT Service Management Practices and StandardsRob Akershoek
Evolution of IT service management practices and standards from Top Gun 1 (around 1990) to Top Gun Maverick (2022)
How did the IT management evolve since 1990? When were key standards and practices introduced?
The IT management market has significantly evolved over the last few years e.g. introducing DevOps, Continuous Delivery, Agile Development, SRE and IT4IT. Managing this new multi-vendor ecosystem consisting of cloud, containers and micro-services.
Managing this new digital reality requires you to combine various practices into one integrated Digital Operating Model, to optimize end-to-end IT value streams.
Architecting Next Generatio IT Operating Models Using IT4IT and SFIASukumar Daniel
A case study of a Transformation Initiative to move a Third Party from Traditional Mechanic Shop Mentality to a Customisation Studio Mentality by causing a paradigm Shift in Ways of Working
According to Gartner, "The stongest performing IT organizations are distinguished by strong strategy practices. The weak performing IT organizations are distinguished by weak delivery practices."
Having an IT strategy and executing it are important.
This brief presentation covers:
1. Why IT Strategy?
2. What does a great IT Strategy look like?
3. How to create a great IT Strategy
4. How to make the IT Strategy real
Creating Enterprise Value from Business Architectureiasaglobal
This presentation will cover the Why (Value) and How (Execution) of a Business Architecture program. You will understand how you can lead your enterprise towards its vision by planning for key Business Capabilities that will get you there.
IT4IT and DevOps Tools Landscape (2020).Rob Akershoek
Complete overview of the IT management tooling landscape 2020. Key market players / vendors in the IT4IT and DevOps tooling ecosystem. Automate and streamline your end-to-end DevOps tool chain.
This webinar features two IT4IT™ experts: Jim Hietala, VP Business Development at The Open Group and Michael Fulton, President Americas Division of CC and C Solutions, co-chair IT4IT Adoption Workgroup and Lead Author ITpreneurs IT4IT courseware.
Training and consulting providers looking to help your clients improve IT efficiency will enjoy this webinar. You will:
-Gain insight on how IT4IT serves the digital enterprise
-Discover its relation with Cloud, Agile, and DevOps
-Learn how it complements TOGAF®, Archimate® and ITIL®
-Find out what the training opportunities are for IT4IT
The Open Group IT4IT Reference Architecture provides prescriptive guidance on how to design, procure and implement the functionality needed to run IT. The training content of IT4IT will be available for licensing in the ITpreneurs courseware soon.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
IT Function critical capabilities are key areas where the IT function needs to maintain significant levels of competence, skill and experience and practise in order to operate and deliver a service. There are several different IT capability frameworks. The objective of these notes is to assess the suitability and applicability of these frameworks. These models can be used to identify what is important for your IT function based on your current and desired/necessary activity profile.
Capabilities vary across organisation – not all capabilities have the same importance for all organisations. These frameworks do not readily accommodate variability in the relative importance of capabilities.
The assessment approach taken is to identify a generalised set of capabilities needed across the span of IT function operations, from strategy to operations and delivery. This generic model is then be used to assess individual frameworks to determine their scope and coverage and to identify gaps.
The generic IT function capability model proposed here consists of five groups or domains of major capabilities that can be organised across the span of the IT function:
1. Information Technology Strategy, Management and Governance
2. Technology and Platforms Standards Development and Management
3. Technology and Solution Consulting and Delivery
4. Operational Run The Business/Business as Usual/Service Provision
5. Change The Business/Development and Introduction of New Services
In the context of trends and initiatives such as outsourcing, transition to cloud services and greater platform-based offerings, should the IT function develop and enhance its meta-capabilities – the management of the delivery of capabilities? Is capability identification and delivery management the most important capability? Outsourced service delivery in all its forms is not a fire-and-forget activity. You can outsource the provision of any service except the management of the supply of that service.
The following IT capability models have been evaluated:
• IT4IT Reference Architecture https://www.opengroup.org/it4it contains 32 functional components
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL V4 https://www.axelos.com/best-practice-solutions/itil has 34 management practices
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
• APQC Process Classification Framework - https://www.apqc.org/process-performance-management/process-frameworks version 7.2.1 has 44 major IT management processes
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
The following model has not been evaluated
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
The latest version of the TOGAF standard has special emphasis on Business Architecture, Digital Trends, and Business Transformation beyond IT. Stuart Macgregor takes us through some of these changes to the TOGAF® 9.2 standard and discuss how they will benefit us.
Ever wondered why you need a blueprint to make sense of it all. We breakdown the needs for a winning architecture technique with a template example based approach. Feel free to reach out to and if more details are required or you have an opportunity to explore
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...Ken Blunt
A Study to Compare the Introduction of typical New IT Services within a Single Tower and Multi-Tower SIAM Model using a mature set of ‘Plan-Build-Run’ project tasks
Conlcusion
The conclusions of this study for the introduction of New IT Services via Simple and Complex SIAM Models are:
Single Tower model is more efficient than a Muti-Tower Model
Due to security issues, more Design project tasks are required for New hosted cloud services than On-premise hosted services
This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here:
http://flevy.com/browse/business-document/it-strategy-209
This is a comprehensive document on Information Technology (IT) / Management Information Systems (MIS) Strategy.
This document includes IT strategy frameworks, critical success factors, detailed project approach and organizational structure, sample deliverables, and more.
Enterprise Architecture - An Introduction Daljit Banger
The Slides are from my session at "An Evening of Enterprise Architecture Awareness" held at theUniversity of Sussex Hosted by the BCS Local Chapter and facilitated by the BCS EA Specialist Group.
Conig® v1.5 Converged Information GovernanceYalcin Gerek
CONIG® (Converged Information Governance) is a governance framework developed by TAC A.S. addressing information and related technologies. Its main focus is INFORMATION. CONIG® is based on models that are widely used for Information Technologies, Corporate Governance as well as Business Governance.
Any network or IT system administrator needs many skills not only technological and technical skills but also working skills, planning as a decisive factor towards the success of the IT occupation as well as bringing about efficiency and value to enterprises. We create the IT administrator skills aimed at equipping learners with the core planning skills to support their IT job.
The training course is designed based on our extensive experience after many years working in the IT field of IT manager, CTO of financial groups, trade and production multinational companies in Vietnam, America, Europe, and Japan with research on other famous training materials of foreign CTO in IT daily activities management field.
Architecture thinking series W001 - present architecture discipline including integrated domains ( business strategy , business architecture and enterprise architecture)
and basic concepts behind Architecture Thinking
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
4. Course Content
▷ Overview
▷ IT4IT™ Standard Introduction
▷ Basic Concepts
▷ IT4IT™ Core
▷ Strategy to Portfolio (S2P) Value Stream
▷ Requirement to Deploy (R2D) Value Stream
▷ Request to Fulfill (R2F) Value Stream
▷ Detect to Correct (D2C) Value Stream
▷ IT4IT Implementation Approach
5. 5 Strategy to Portfolio (S2P) Value Stream
▷ S2P Objectives
▷ S2P Current Limitation
▷ S2P Value Proposition
▷ S2P Reference Architecture Level 2
▷ S2P Functional Components & Data Objects
6. Strategy to Portfolio - Objective
create IT portfolio framework that allows IT organizations to optimize services provided to business
Provide holistic views of IT portfolio activities through data integrations within multiple areas.
7. Strategy to Portfolio – Current Limitations
Poor data consistency and quality
Poor tracking and correlation of service lifecycle across
conceptual, logical, and physical domains
No holistic IT portfolio view across the IT PMO and the Enterprise
Architecture and Service Portfolio
8. Strategy to Portfolio – Value Proposition
IT portfolio decisions based on business priorities
Accurate visibility of business and IT demand
IT portfolio data consistency
Holistic IT portfolio view across the IT PMO and the Enterprise
Architecture and Service Portfolio
12. 1. Enterprise Architecture – Overview
Create and manage long-term IT investment and execution plan-of-action
that are critical to business strategic objectives.
Purpose
Key Data Objects
Enterprise Architecture (data object):
A data object within the S2P Value Stream managed by the Enterprise Architecture
functional component. It includes references to collateral in the target state
architecture landscape representing planned and deployed IT services
17. 2. Service Portfolio – Overview
- Manage the portfolio of services in plan, transition, production, and retirement
- Any IT service within the Service Portfolio functional component often
corresponds to one or more entries in the Offer Catalog.
Purpose
Key Data Objects
Conceptual Service (data object):
- Represents the business perspective of the service.
- Abstracted from any technical detail and described in terms that are understood
by CxO-level including business value, investment history , value earned, and
return on investment.
22. 3. Portfolio Demand – Overview
- Log, maintain, and evaluate all demands (new service, enhancements, defects)
coming into IT through a single funnel (demand channels).
- Correlate incoming demand to similar existing demand or create new demand.
Purpose
Key Data Objects
Portfolio Backlog Item (data object):
Represent the repository of all incoming demands including but not limited to
new requests, enhancement requests, and defect fix requests.
27. 4. Proposal – Overview
- Manage portfolio of IT proposals (proposed, approved, active, deferred, or rejected).
- Create a Scope Agreement from rationalized Portfolio Backlog Items.
Purpose
Key Data Objects
Scope Agreement (data object):
- Authoritative source for the list of all IT proposals requested over a given time
period
- Reflect budget, cost/benefit projections, scope, status, and other key attributes
of proposed work.
- Used for building the IT investment plan
32. 5. Policy – Overview
Manage creation, review, approval, and audit of all IT policies.
Align and map IT Policies to Enterprise Architecture.
Purpose
Key Data Objects
Policy (data object):
Central repository for storing and organizing all types of IT policies based on
various templates and classification criteria
38. 6. IT Investment Portfolio (Auxiliary) – Overview
- Manage the portfolio of all authorized IT investments through entire lifecycle.
- Assess proposal feasibility for cost, value, etc. and obtain required approval
from finance
Purpose
Key Data Objects
IT Budget Item (data object):
- An authoritative list of approved IT investment related to a service.
- Help to identify approved budget over different time periods
e.g., by financial year, by Conceptual Service
40. 6. IT Investment Portfolio – Real world example
Family Budget Investment Example
41. 6 Requirement to Deploy (S2P) Value Stream
▷ R2D Objectives
▷ R2D Current Limitation
▷ R2D Value Proposition
▷ R2D Reference Architecture Level 2
▷ R2D Functional Components & Data Objects
42. Requirement to Deploy - Objective
Ensure that Service Release is high quality, fit-for-purpose, and meets customer expectations
Promoting high levels of re-use, flexibility, speed, and collaboration across IT
43. Requirement to Deploy – Challenges
Development build and test services in a silo
& “surprise” IT operations by “throwing release packages over the fence”
for immediate delivery.
High IT staff turnover. Which means knowledge is lost and
schedules are impacted.
44. Requirement to Deploy – Value Proposition
Maximize pipeline of projects & smaller demand requests for
faster time-to-market in service realization
Accelerate the sourcing and delivery of applications and services
through best practices (Re-use , Automation , Collaboration)
Relate applications and services with business value by
creating and maintaining the service blueprint.
Increased management information for traceability between teams.
46. Requirement to Deploy Level 2 – Main Data Objects Relations
IT Initiative Requirement
Source
Logical
Service
Test
Case
Defect
Service
Release
Service
Release
Blueprint
Build Build
Package
From Proposal
S2P
From Demand S2P
48. 1. Project – Overview
- Coordinate creation and provide ongoing execution oversight of IT Initiatives.
- Aim at creation of new or enhancements to existing services.
- Create IT Initiatives based on the specifications outlined in the Scope Agreement,
- Aggregate, track, and report status, resources consumed against project plan
- Maintain traceability between Scope Agreements, IT Initiatives, and Service
Releases.
Purpose
Key Data Objects
IT Initiative (data object):
Details the scope of the work to be performed and created from and associated
with the Scope Agreement ( Proposal Functional Component).
50. 1. Project – Real world example
Natural Weight Loss project plan Example
51. 1. Project – Sample Tool Repository
- Project Portfolio Management (PPM) tool
(to manage project tasks, risks, plans, etc.)
- Agile development tools for tracking all activities and related
- plans such as release and sprint plans
53. 2. Requirement – Overview
- Manage Requirements through the lifecycle of a service.
- Service-level requirements are captured as Requirements.
- Maintain traceability of each Requirement to the original source
(demand, IT or business standard or policy, and/or requestor).
Purpose
Key Data Objects
Requirements (data object):
Record which details the needs or conditions to meet for a new or altered service.
56. 2. Requirement – Real world example
Requirement Gathering Example
57. 2. Requirement – Sample Tool Repository
- Requirements management system (part of an ALM system)
e.g., to manage requirements, themes, epics, user stories
- Also design tools (e.g., mockup and story-boarding tools)
59. 3.Service Design – Overview
Leverage the Conceptual Service and Portfolio Backlog Items from S2P Value Stream
along with requirements to produce a Logical Service that describes the
service structure and behavior considering both the service system
and the service offer.
Create various architectural artifacts (data flow diagrams, technical schematics, etc.)
that comply with the IT Initiative specifications and boundaries
Create the service design specification document (Logical Service Blueprint)
Purpose
60. 3.Service Design – Overview
- Leverage the Conceptual Service and Portfolio Backlog Items from the S2P Value
Stream along with Requirements to produce a Logical Service.
- Represents the bridge between the service interaction and service system.
- Represents the grouping of logical components necessary to provide the expected
outcome or service interaction.
Key Data Objects
Logical Service (data object):
61. 3.Service Design – Overview
Auxiliary Data Objects
- Represents the design of the logical service which details the components and
how those components relate to one another.
- May exist multiple Logical Service Blueprints for a single Logical Service based
on new versions of the Logical Service.
- Introduces the “how” details; i.e., technology delivery methods (on-premise versus
cloud) and the technical interfaces to access service functionality.
Logical Service Blueprint (data object):
66. 4. Source Control – Overview
- Develop source code or infrastructure based on the Logical Service Blueprint,
Service Design Package, and IT Initiative priorities.
- Manage the development backlog of Requirements and Defects.
- Create automated test scripts including unit testing.
- Run security tests on core code to identify existing security issue
- Manage source artifacts and store them in a Source repository
Purpose
67. 4. Source Control – Overview
Key Data Objects
Source (data object):
- The created or purchased solution to meet the requirements for
a particular Service Release
- Source does not always equal “source code” , Consider all use-cases such as
“source code”, to contracts or entitlements for services simply subscribed to, to
purchase and implementation of a Commercial Off-The-Shelf (COTS)
application
69. 4. Source Control – Real world example
Metro Line Tunnel Development Example
70. 4. Source Control – Sample Tool Repository
- Integrated Development Environment (IDE)
- Code editors, debuggers, and compilers
- Source control repositories (SCM) system
72. 5. Build – Overview
- Receive the Source data object from the Source Control and manage creation,
implementation, automation, and security and storage of all Builds.
- Manage Builds and versioning in a Definitive Media Library (DML).
- Develop automated Build storage procedures and automated
compilation techniques and tools.
- Monitor and report on the results of each integration Build.
Purpose
Key Data Objects
Build (data object):
Build Created from Source and versioned
77. 6. Build Package – Overview
- Create a deployable package made up of one or many Builds.
- Manage the Build Packages and relationships to the Service Release Blueprints
Purpose
Key Data Objects
Build Package (data object):
A compilation of one or many Builds in a deployable package.
82. 7. Test – Overview
- Trace to Requirements.
- Plan and execute tests that ensure the IT service will meet customer’s requirements
at the agreed service levels.
- Create Defect data objects that are consumed by the Defect functional component
- Plan and design tests, including automated test scripts.
- Execute tests, including functionality, usability, acceptance, risk-based security,
performance, and stress testing.
Purpose
Key Data Objects
Test Case (data object):
Used to validate that the Service Release is fit for purpose.
88. 8. Release Composition – Overview
- Manage the Release Package, Service Release, Service Release Blueprints.
- Manage overall Service Release for developing and delivering new or changed
services to the R2F (Fulfillment Execution).
- Centralizing all elements of the Service Release Blueprint :
Purpose
- Requirements per Release Package
- Source Control & maintenance scripts & documentation
- Build Package
- Test & automated tests for validation post deployment
- issues/defects
89. 8. Release Composition – Overview
Key Data Objects
Service Release (data object) - Planned release
- Represents a planned release of a version of the service system
- Relates to a single Logical Service
- represents the packaging of the service source and other key artifacts
required to fully support the service system version
Service Release Blueprint (data object) - Planned design
Configuration
- Provides the planned design/configuration of the components of service
system
- Contains the description and procedures in order to activate, deploy,
and operate a service.
94. 9. Defect – Overview
- Keep track of all Defects
- Include origin, status, importance, and relation to Requirements and Known Errors.
- Analyze Defects and find resolution
- Convert Defects not resolved by service development to Known Errors
Purpose
Key Data Objects
Defect (data object):
An issue with the Service Release Blueprint which should be remediated
to fulfill the associated Requirements
98. 9. Defect – Sample Tool Repository
- Defect management system
(often part of a test management tool)
99. 7 Request to Fulfill (R2F) Value Stream
▷ R2F Objectives
▷ R2F Current Limitation
▷ R2F Value Proposition
▷ R2F Reference Architecture Level 2
▷ R2F Functional Components & Data Objects
100. Request to Fulfill - Objective
Modern, consumption-driven engagement model goes beyond traditional IT service request
Connecting various consumers with goods and services they need to drive productivity and innovation
101. Request to Fulfill – Current Limitations
Lack of service Subscription, Usage, and chargeback traceability
Multiple catalogs required for consumers to navigate
in order to find and request available services.
Too many customer service requests ; resulting in delays
and an unfavorable experience overall.
102. Request to Fulfill – Value Proposition
Provides holistic visibility and traceability across service Subscription,
Usage, and chargeback to improve IT Financial Management
Increased cost optimization; for example, by canceling expired Subscriptions
and reclaiming resources, Subscriptions
Facilitating a service consumption experience that allows consumers
to easily find and subscribe to goods and services through
a self-service engagement model.
104. Request to Fulfill Level 2 – Main Data Objects Relations
Shopping
Card
Fulfillment
Request
Desired
Service
Offer
Service Catalog
Entry
Usage
Record
Chargeback
Contract
Chargeback
Record
Subscription
Request
User
Profile
From Service
Release
Blueprint
>>
106. 1. Engagement Experience Portal – Overview
- Based on system of engagement integration patterns where consumers access
different IT functions and capabilities in a single place, unifying the experience.
- Consumers manage certain aspects of their profile; for example, localization,
preferred method of communication, user interface settings, and so on
- Facilitate service consumption by connecting any potential consumer with the right
information, goods, services, or capability at the right time.
- Available to all users that desire to consume IT services
Purpose
107. 1. Engagement Experience Portal – Overview
Key Data Objects
User Profile (data object):
- Personal data associated with a specific user and the explicit digital
representation of a person's identity
- User Profile attributes must be secure, protected, and access restricted
based on roles (e.g., HR Manager) or system
109. 1. Engagement Experience Portal – Sub-Components
1. Service Catalog :
Engage with and consume services through the Offer Consumption
2. Collaboration :
User front end for an enterprise collaboration experience, such as a chat capability
3. Knowledge :
Search and read Knowledge data of all types (technical briefs, training videos , etc.)
4. Self-Service Support :
- Reduces load on IT support by enabling and promoting self-help & self-healing
behavior
- Enable self-service support like issues support tickets , track them , route to use
knowledge data , collaboration with IT Staff
112. 1. Engagement Experience Portal – Sample Tool Repository
- Request management system
- IT Service Management (ITSM) system
- Self-service portal (web shop)
- Content Management System (CMS)
- Knowledge base
- Collaboration and communication tools
114. 2. Offer Consumption – Overview
- Present service offers to various service consumers.
- Facilitate consumption/management of and payment for IT services rendered.
- Manipulate Subscriptions information , ordering services or view and updates status.
Purpose
Key Data Objects
Shopping Cart (data object):
- Contains the IT services that the user wants to order.
- exists during the actual shopping session.
- Upon submission, a request is generated that is comprised of the
content contained in the Shopping Cart.
119. 3. Offer Management– Overview
- Aggregate all Catalog Composition items and external supplier catalogs into
consumable Offers that users can order through the Offer Consumption
- Build and publish the various offerings into Offer Catalogs for various
populations to consume.
- Enable Offers to be grouped into an Offer Catalog to expose them as a
collection of consumable items
- Fulfill each Offer through numerous underlying Catalog Compositions.
Purpose
120. 3. Offer Management– Overview
Key Data Objects
Offer (data object):
Defines how a Service Catalog Entry will be instantiated and under what terms and
conditions – price, deployment, approval, workflow, service level (contract), etc.
Auxiliary Data Objects
Offer Catalog (data object):
A set or collection of Offers that are grouped together as something that can
be consumed by certain consumers or consumer groups.
125. 4. Catalog Composition – Overview
- Create and publish the Service Catalog Entries, including all of their dependencies.
- presented as Offers in the Offer Management Component.
- Created from the Service Release Blueprint in the Release Composition.
- Services, as well as their dependencies and details, are accurately defined,
including supplying necessary information for the service to be instantiated.
- Also include configurable options of service (e.g., pricing, subscription terms,
bundles, service level, support conditions, etc.).
Purpose
126. 4. Catalog Composition – Overview
Key Data Objects
- Authoritative source for the consolidated set of technical capabilities and specific
options available that can be delivered by the service provider.
- Serves as the bridge between the service system and the service offer.
Service Catalog Entry (data object):
132. 5. Request Rationalization – Overview
- Rationalize, break down, and route “clean order” requests (ready for
fulfillment) to appropriate Fulfillment Execution engines.
- May breaking down a single order/ request into multiple Fulfillment
Requests.
- Ensure appropriate fulfillment-related Subscription information is
kept up-to-date.
- create Subscriptions for selected services upon their successful
fulfillment.
Purpose
133. 5. Request Rationalization – Overview
Key Data Objects
Contains all Offers from the Shopping Cart which have been
consumed and need to be fulfilled.
Request (data object):
- Represents the rights to access a service that has been provided to a
consumer.
- Managed by the Request Rationalization Component.
Subscription (data object):
138. 6. Chargeback/Showback – Overview
Provide chargeback or Showback for internal and external services
based on Subscription, Service Contract, and/or Usage information of IT Services.
Purpose
139. 6. Chargeback/Showback – Comparison
Chargeback Showback
- This bill need to be pay back.
- Usually used with customer
- This bill for analytics of the IT costs
- Usually used with internal departments
(due to each department usage)
Generate bill that are directly associated subscription record usage to the
infrastructure, data transfer, application licenses, training, etc.
140. 6. Chargeback/Showback – Overview
Key Data Objects
Chargeback Contract (data object):
- Details the contract for financial obligations between the service consumer
and provider(s) as defined at the time of Subscription.
- Defines the billing rule and billing frequency used to price a given service.
Chargeback Record (data object):
- Represents the actual charge to the subscriber based on the Usage of
subscribed services in a given time period.
- Computes the charge using the billing rule, with the input being the
Usage Records collected for the period
147. 7. Fulfillment Execution – Overview
- Orchestrate delivery of various requests among fulfillment engines in order to
deliver the IT service.
- Fulfillers may be systems that perform actions directly, or engage other
systems in order to perform actions. They may also include external providers.
- Manage a registry of the available fulfillers ( What Capabilities provided & How
to engage them).
- Update the IT asset inventory as they are ordered by customer.
- Request standard changes and update the Configuration Management if
needed.
Purpose
148. 7. Fulfillment Execution – Overview
Key Data Objects
- Describes all fulfillment aspects of an IT service. Includes items such as
provisioning, deploying, modifying, actions (i.e., start, stop, etc.),
decommissioning and so on.
Fulfillment Request (data object):
- Specification of an instance of a service as required to meet the fulfillment
requirements detailed in the consumer order (Request) .
- It contains the relevant parameters that determine how a service will be
deployed/fulfilled which supported by a single Service Release Blueprint.
Desired Service (data object):
153. 8. Usage – Overview
- Track and manage actual usage of subscribed IT services and their associated costs.
- May collect service Usage metrics from the Service Monitoring.
- Process and break down “Categorize” Usage information for each Subscription,
service consumers (singular, group), provider, etc.
Purpose
Key Data Objects
Usage Record (data object):
- Represent the measured use of a particular service or service component.
- Usage Record can be composed of (internal) hours, system usage
(capacity, CPUs, etc.), or external supplier usage.
158. 9. Knowledge & Collaboration – Overview
- Provide knowledge in the form of content and Conversations that help to
address the needs of IT service consumers.
- Knowledge includes structured IT/supplier produced articles, or unstructured
Conversations from business/IT users, webinars, videos, training materials, etc.
- Knowledge searchable by the IT service consumers.
- Reduce the number of requests for information/knowledge that arrive at
the IT service desk.
Purpose
159. 9. Knowledge & Collaboration – Overview
Key Data Objects
Knowledge (data object):
Structured and unstructured Knowledge from Knowledge & Collaboration Component
Conversation (data object):
User Conversations from Knowledge & Collaboration Component (e.g. chat
capability).
161. 9. Knowledge & Collaboration – Real world example
Based on information at right time , the right person help in decision making
162. 8 Detect to Correct (D2C) Value Stream
▷ D2C Objectives
▷ D2C Current Limitation
▷ D2C Value Proposition
▷ D2C Reference Architecture Level 2
▷ D2C Functional Components & Data Objects
163. Detect to Correct - Objective
Provides a framework for the work of IT operations integrating its Functions
Overview of business IT operations and services delivered by this Value Stream.
164. Detect to Correct – Current Limitation
Timely identification of an issue before users of the service are impacted
Prioritization that understands business, IT operations, and technology impacts.
No end-to-end management of the service lifecycle across domains
- Poor linkage of Incidents and Problems to the R2D ( Defect Information)
- Poor linkage of Problems to the S2P ( Demand Loop back )
165. Detect to Correct – Value Proposition
Increasing sharing of information and reduce multiple entry of the same data
Knowledge management and self-service linkage
Focusing response based on priority, and business impact
Creating a prescriptive data flow between Event, Incident,
Problem, and Change Control
169. 1. Service Level – Overview
- Enable the design and creation of Service Contracts (SLAs)
- Manage the Service Contract lifecycle (create, store, and maintain).
- Monitor compliance with the terms specified in the Service Contract.
- Exposing collected data that reflects that actual performance against the defined
Service-Level Objectives
- These documents (usually created and managed by the legal department and not in
IT).
Purpose
170. 1. Service Level – Overview
Key Data Objects
- Describes the service characteristics and supports service measurement tracking,
governance, and audit
- Service Contracts related to logical services are known as Service Contract
templates.
- Service Contracts related to physical services are known as Service Contract
instances.
Service Contract (data object):
- Definition of an objective that is measured.
- Request threshold and mathematical method in which measurement data items
are used in order to calculate the KPI measurements.
Key Performance Indicator (data object):
173. 1. Service Level – Real world example
30 Minutes Delivery agreement ( SLA)
174. 1. Service Level – Real world example
Comply VS Not Comply with SLA Scenarios
175. 1. Service Level – Sample Tool Repository
- IT Service Management (ITSM) system
(covering an incident management tool)
- CMDB or contract management system
- Service monitoring tool
- Reporting system/Business Intelligence (BI)
177. 2. Service Monitoring – Overview
- Create, run, and manage monitors which measure all aspects/layers of a service.
- Store all measurement results and calculating compound measurements.
- Fulfillment Execution responsible for Monitor definition , which originated from
service release blueprint. ( Release Package)
Purpose
Key Data Objects
Service Monitor (data object):
Performs the operational measurement aspects of a CI or an IT service in order to
understand the current operational status of that CI or IT service.
183. 3. Event – Overview
- Manage Events through the Event lifecycle for events that occur on any IT service.
- Manage the correlation between Events.
- Some categories of Events can serve as initiators of Incidents and for diagnostics
and remediation activities
Purpose
Key Data Objects
Event (data object):
Represents an alert/notification signifying a change of state of a monitored CI
189. 4. Incident – Overview
- Facilitate normal service operations restoration as quickly as possible.
- Minimize the impact on business operations thus optimizing service quality
and availability.
- Manage the state escalation paths and general lifecycle of the Incident.
Purpose
Key Data Objects
- Unplanned interruption to an IT service or reduction in the quality of an IT
service as defined within the Service Contract
- Data object Hosts and manages Incident data.
Incident (data object):
190. 4. Incident – Overview
Auxiliary Data Objects
- Record of any end-user contact with the service desk agent.
- In some cases, either the service desk agent or self-service knowledge can
resolve the Interaction without creating and managing an Incident.
Interaction (data object):
197. 5. Problem – Overview
- Managing the lifecycle of all Problems.
- solve severe/repeating Incidents
- Prevent Incidents from happening, and minimize the impact of Incidents that cannot
be prevented.
- Create Known Error instances from unsolved Problems.
Purpose
Key Data Objects
Problem, Known Error (data object):
Defines the Problem or Known Error and manages the Problem and
Known Error lifecycle
199. 5. Problem – Real world example
Visible Past is (Incident) , Invisible part is the root cause (Problem)
200. 5. Problem – Real world example
Investigation result display adapter root cause error ( Blue screen Error)
201. 5. Problem – Sample Tool Repository
- Problem management tool (part of the ITSM system)
- Predictive analytic tools (including big data solutions)
- Operations log analytics
- CMDB systems (for impact and investigation)
203. 6. Change Control – Overview
- Managing the lifecycle of all the RFCs in the IT environment.
- Ensure changes are done in a standardized & auditable way so business risk is
minimized
- Facilitate communication with stakeholders
- Enable notification of all affected change stakeholders.
- Enable RFC management against a change calendar and avoid change collisions.
Purpose
Key Data Objects
RFC (data object):
- Change data to manage the change lifecycle.
- Includes details of the proposed change and may be recorded on paper or
electronically
209. 7. Configuration Management – Overview
- Focused on tracking inventories of Actual Services and associated relationships
- Identify, control, record, report, audit, and verify service items , including versions,
components, their attributes, and relationships
Purpose
Key Data Objects
Actual Service (data object):
- Represents the realized deployment of the service.
- Includes Configuration Items that represent implemented service components
- Should be kept in sync with the Desired Service , but includes specific
implementation characteristics and details.
213. 7. Configuration Management VS Asset Management
Configuration Item
Item where you need to track
incidents and problems related to it
&
Track its relationship with other similar items
for planning changes,
an application server is a CI since
it’s essential to track any issues with it
and all the devices linked to it.
All CIs are controlled by Change Management
214. 7. Configuration Management VS Asset Management
Asset
Item has some financial value & You need to track its financial or contractual aspect
Value of an asset might depreciate over time
and eventually get to zero.
The building where your office is located
is an asset until its lease is up. (contract finished)
All Assets are controlled by Asset Management
215. 7. Configuration Management – Sample Tool Repository
- Discovery/automated inventory (& configuration auditing tools)
- Configuration Management System (CMS)
- Configuration Management Database (CMDB)
- Desktop management tools
- Element managers such as network, database, storage, and
- system management tools
217. 8. Diagnostics & Remediation – Overview
- Provide diagnostics information and/or remediation steps to shorten the MTTR ,
through the use of manual and automated Run Books.
- Help streamline diagnosis and remediation for service functions.
- Manage the Run Book lifecycle.
Purpose
Key Data Objects
Run Book (data object):
- A routine compilation of the procedures and operations which the administrator
or operator of the system carries out.
- A Run Book can be either a manual process or an automated script.
231. Define IT Management Vision, Mission, and Strategy
[Step 4]
Define overall mission and vision of the IT organization and its required IT management capabilities
- New business plans and direction
- New goals for the IT organization, such as to reduce cost , improve cost transparency
- New sourcing strategies (outsource or insource)
- Move applications to the cloud (such as SaaS) or building a hybrid cloud environment
- HR strategy for IT (including new skills and competences)
- Target direction of the innovative technologies (DevOps , Big data , IOT , Containerization , … )
Key Inputs
232. Define the Target IT4IT Architecture
Recommended to use TOGAF Architecture Development Method (ADM)
in design and realization of target architecture
[Step 5]
239. Set Up an IT4IT Model Office
[Step 8]
IT4IT Model Office Modeling Layers
240. Execute the IT4IT Transformation Roadmap
[Step 9]
IT4IT Delivery Model
241. “
References
IT4IT™ for Managing the Business of IT
IT4IT™ Reference Architecture 2.1
ITIL Process Infographic Videos
Chargeback/Showback 1 - 2
Mickael Fulton Articles
تجوزيني يا سعاد
---
مين عليه الشقة والأجهزة ووووو
هذا هوا
proposal
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Foreign Policy :
كوريا
المكسيك
....
Foreign Policy :
كوريا
المكسيك
....
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
also promoting high levels of re-use, flexibility, speed, and collaboration across IT
Ensure predictable, cost-effective, high quality results to the business
Standardize service development and delivery to the point where re-use of service components is the norm
Fence سياج – حاجز
TurnOver : Particularly in low-cost labor markets where employers are suffering high employee turnover rates
collaboration of teams involved in the development lifecycle to expedite releases, and reduce incidents
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Bursar أمين صندوق
Bursar أمين صندوق
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Entitlements استحقاقات استهلاك الخدمة
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
A Definitive Media Library
is a secure Information Technology repository in which an organization's definitive, authorized versions of software media are stored and protected
#
https://en.wikipedia.org/wiki/Definitive_Media_Library
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Remediated تعالج
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Provide holistic views of portfolio activities through data integrations within multiple areas.
PMO
EAIT Strategy
Service Portfolio
Too many customer service requests requiring creation of fulfillment incidents, projects, and/or human intervention resulting in delays and an unfavorable experience overall.
A service consumption experience that exposes technology resources and/or IT capabilities rather than valued services.
Multiple catalogs required for consumers to navigate in order to find and request available services.
Lack of service Subscription, Usage, and chargeback traceability
collaboration of teams involved in the development lifecycle to expedite releases, and reduce incidents
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Same as menu in resultant , Coffee shop with cup size
Same as menu in resultant , Coffee shop with cup size
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
obligations التزامات
Analogy تشابة جزئي
Analogy تشابة جزئي
رحت كلت في المطعم بعد كدا دفعت
--------------
او باقات المفوتر مشغلي الاتصالات
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Provisioning = supplyingتزويد
Decommissioning الإنسحاب من الخدمة وتركها – فك التعاقد
Analogy تشابة جزئي
Update IT Asset for Pizza resutrant , that we use ingredient for customer order . Update inventory
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Metering القياس
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Metering القياس
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Metering القياس
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Metering القياس
Analogy تشابة جزئي
Analogy تشابة جزئي
May initiate the creation of a Defect when Incident diagnostics determines that an emergency fix is required from development for resolution
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Metering القياس
Analogy تشابة جزئي
Analogy تشابة جزئي
مثال اخر الكشف علي المريض
Incident : الأعراض الظاهرة
Problem : Root cause يظهر عن طريق نتيجة الأشعة
Analogy تشابة جزئي
Metering القياس
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Metering القياس
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Analogy تشابة جزئي
Metering القياس
MTTR : Mean Time To Return
متوسط الفترةالازمة لعودة الخدمة للعمل مجددا بعد حدوث مشاكل
Analogy تشابة جزئي
Subject matter expert can automate the process for me > to reduce the steps of my manual runbook
Analogy تشابة جزئي
Metering القياس
Follow a “product” or “service” from beginning to end, and draw a visual representation of
every process in the material and information flow