This webinar features two IT4IT™ experts: Jim Hietala, VP Business Development at The Open Group and Michael Fulton, President Americas Division of CC and C Solutions, co-chair IT4IT Adoption Workgroup and Lead Author ITpreneurs IT4IT courseware.
Training and consulting providers looking to help your clients improve IT efficiency will enjoy this webinar. You will:
-Gain insight on how IT4IT serves the digital enterprise
-Discover its relation with Cloud, Agile, and DevOps
-Learn how it complements TOGAF®, Archimate® and ITIL®
-Find out what the training opportunities are for IT4IT
The Open Group IT4IT Reference Architecture provides prescriptive guidance on how to design, procure and implement the functionality needed to run IT. The training content of IT4IT will be available for licensing in the ITpreneurs courseware soon.
Request to Fulfill Presentation (IT4IT)Rob Akershoek
The Request to Fulfill (R2F) value stream presentation. R2F is one of the four value streams of the IT4IT Reference Architecture of The Open Group.
How to manage your IT organization as a professional IT shop? Provide a self service portal for end-users and IT staff to order IT services and IT resources. Automate the entire process from request to actual deployment and provisioning.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
As we head into a new year, one thing is for sure, the world of technology and IT will continue to evolve and be disrupted at a frightening pace. The role of the modern IT organisation will thus need to adapt and be agile in order to keep pace with this changing landscape and to continue to be valuable to the organisations that they service. As IT estates become more complex, internal IT functions will need to become more mature and efficient in the way they operate in order to be perceived as a valued asset to the business. The release of IT4IT at the end of last year provides an interesting and potentially highly valuable reference architecture for IT organisations to use to help achieve this level of maturity and efficiency.
The IT4IT standard has really started to pick up momentum as we start 2016 and it is great to see the increase in the membership of the IT4IT forum as well as the general interest that is being seen in the industry for this new standard. I recently co-presented a webinar in collaboration with the Open Group where we looked at the potential real-world application and benefits that IT4IT can offer. Mandate and mindset will be critical to the successful use of IT4IT but I am confident that this approach has the potential to be very beneficial for many organisations as the role of the IT function continues to be redefined.
Future Proofing Your IT Operating Model for DigitalDavid Favelle
Having worked with Operating Model for over 10 years, Dave has new adopted DevOps, IT4IT and Continuous Delivery alongside traditional frameworks. The concept of the value stream is central to the thinking. The presentation was delivered as a Keynote at the Open Group in Amsterdam October 2017 -https://www.youtube.com/watch?v=Y7yH1JJKvqc&t=1969s
Note that Dave and the ValueFlow team deliver Operating Model on the ServiceNow platform.
Request to Fulfill Presentation (IT4IT)Rob Akershoek
The Request to Fulfill (R2F) value stream presentation. R2F is one of the four value streams of the IT4IT Reference Architecture of The Open Group.
How to manage your IT organization as a professional IT shop? Provide a self service portal for end-users and IT staff to order IT services and IT resources. Automate the entire process from request to actual deployment and provisioning.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
As we head into a new year, one thing is for sure, the world of technology and IT will continue to evolve and be disrupted at a frightening pace. The role of the modern IT organisation will thus need to adapt and be agile in order to keep pace with this changing landscape and to continue to be valuable to the organisations that they service. As IT estates become more complex, internal IT functions will need to become more mature and efficient in the way they operate in order to be perceived as a valued asset to the business. The release of IT4IT at the end of last year provides an interesting and potentially highly valuable reference architecture for IT organisations to use to help achieve this level of maturity and efficiency.
The IT4IT standard has really started to pick up momentum as we start 2016 and it is great to see the increase in the membership of the IT4IT forum as well as the general interest that is being seen in the industry for this new standard. I recently co-presented a webinar in collaboration with the Open Group where we looked at the potential real-world application and benefits that IT4IT can offer. Mandate and mindset will be critical to the successful use of IT4IT but I am confident that this approach has the potential to be very beneficial for many organisations as the role of the IT function continues to be redefined.
Future Proofing Your IT Operating Model for DigitalDavid Favelle
Having worked with Operating Model for over 10 years, Dave has new adopted DevOps, IT4IT and Continuous Delivery alongside traditional frameworks. The concept of the value stream is central to the thinking. The presentation was delivered as a Keynote at the Open Group in Amsterdam October 2017 -https://www.youtube.com/watch?v=Y7yH1JJKvqc&t=1969s
Note that Dave and the ValueFlow team deliver Operating Model on the ServiceNow platform.
Architecting Next Generatio IT Operating Models Using IT4IT and SFIASukumar Daniel
A case study of a Transformation Initiative to move a Third Party from Traditional Mechanic Shop Mentality to a Customisation Studio Mentality by causing a paradigm Shift in Ways of Working
Overview of the IT4IT tooling market in 2022.
Key trends in the IT4IT / DevOps tooling market are:
- Strategic portfolio management / portfolio backlog management (scaling agile on the enterprise level integrating with Enterprise architecture and Application / Product Portfolio Management)
- On-line collaboration & communication tools supporting team of team planning, problem solving, etc.
- Value stream management (an emerging tooling category) providing visibility across the end-to-end IT value streams
- Multi-cloud discovery & visibility on usage, costs and compliance
- Integrating DevOps tool chain (e.g. CICD pipeline) with the ITSM platform and CMDB
- Integrating security, risk and compliance management into the DevOps tool chain
- AIOps and observability management, consoliding metrics, logs, events mapped to a real-time service model
- Security operations, integrating security monitoring, vulnerability scanning, etc. into end-to-end detect to correct value streams
- Enterprise Service Management (ITSM vendors providing omni-channel services across IT, HR, Facilities, Finance, etc.)
- Leveraging AI/ML in various capabilities such test management, security operations, incident management, etc.
- Sustainability management integrated in IRM/GRC platforms
And last but not least:
- Service / Product portfolio management (managing the portfolio of service/applications, supporting product centric operating models, linked to business capabilities, product owners and teams)
Your Challenge
Organizations have to adapt to a growing number of trends, putting increased pressure on IT to move at the same speed as the business.
The business, seeing that IT is slower to react, looks to external solutions to address its challenges and capitalize on opportunities.
IT and business leaders don’t have a clear and unified understanding or definition of an operating model.
Our Advice
Critical Insight
The IT operating model is not a static entity and should evolve according to changing business needs.
However, business needs are diverse, and the IT organization must recognize that the business includes groups that consume technology in different patterns. The IT operating model needs to support and enable multiple groups, while continuously adapting to changing business conditions.
Impact and Result
Determine how each technology consumer group interacts with IT. Use consumer experience maps to determine what kind of services consumer groups use and if there are opportunities to improve the delivery of those services.
Identify how changing business conditions will affect the consumption of technology services. Classify your consumers based on business uncertainty and reliance on IT to plan for the future delivery of services.
Optimize the IT operating model. Create a target IT operating model based on the gathered information about technology service consumers. Select different implementations of common operating model elements: governance, sourcing, process, and structure.
TABLE OF CONTENTS
1. What is IT4IT framework
2. The benefits of implementation of the IT4IT framework
3. IT4IT framework components
4. IT4IT Value Streams
5. IT4IT Reference Architecture
6. About Architecture Center Ltd
7. References
IT4IT and DevOps Tools Landscape (2020).Rob Akershoek
Complete overview of the IT management tooling landscape 2020. Key market players / vendors in the IT4IT and DevOps tooling ecosystem. Automate and streamline your end-to-end DevOps tool chain.
History of IT Service Management Practices and StandardsRob Akershoek
Evolution of IT service management practices and standards from Top Gun 1 (around 1990) to Top Gun Maverick (2022)
How did the IT management evolve since 1990? When were key standards and practices introduced?
The IT management market has significantly evolved over the last few years e.g. introducing DevOps, Continuous Delivery, Agile Development, SRE and IT4IT. Managing this new multi-vendor ecosystem consisting of cloud, containers and micro-services.
Managing this new digital reality requires you to combine various practices into one integrated Digital Operating Model, to optimize end-to-end IT value streams.
Running the Business of IT on ServiceNow using IT4ITcccamericas
In this presentation, Michael Fulton, President of CC&C Americas, shares his perspective on the new IT4IT industry standard and how you can use a combination of IT4IT and ServiceNow to transform how you run the business of IT.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle.
ITIL® 4 will be hitting shelves in February 2019, but how is it different from ITIL V3? We joined forces with AXELOS in this webinar to break down what's changing with ITIL 4, how this can benefit you and your organisation, and how you can book onto a course.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
ValueFlowIT: A new IT Operating Model EmergesDavid Favelle
ValueFlow IT has synthesised the old and the new of IT management frameworks into a multi-speed operating model. This accommodates the different pace layers (thanks Gartner) of the portfolio and tunes the IT organisational structures processes and tools.
ITIL 4 service value chain data flows (input and outputs)Rob Akershoek
High level overview of the Service value chain activities and information flows (input/outputs) based upon ITIL 4 from AXELOS (ITIL 4 Foundation).
Mapping of the ITIL value chain activities to the IT4IT value streams as defined by The Open Group IT4IT Standard.
How to Articulate the Value of Enterprise Architecturecccamericas
Ever struggled with the question, What is the Value of Enterprise Architecture? In this facilitated conversation, Michael Fulton will share his perspective on Enterprise Architecture and the value it provides to the CIO, to IT, and to the business.
Come ready to engage, because in the conversation we will discuss:
•The EA 7-year itch
•Several External Perspectives on EA Value
•The CC&C perspective on a simplified approach to EA Value
•Ensuring your perspective on EA Value is relevant for your stakeholders
At the end of this conversation, you should walk away with:
•A new perspective on the value of EA
•Tips and tricks on how to articulate and quantify EA Value for your key stakeholders.
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
IT Function critical capabilities are key areas where the IT function needs to maintain significant levels of competence, skill and experience and practise in order to operate and deliver a service. There are several different IT capability frameworks. The objective of these notes is to assess the suitability and applicability of these frameworks. These models can be used to identify what is important for your IT function based on your current and desired/necessary activity profile.
Capabilities vary across organisation – not all capabilities have the same importance for all organisations. These frameworks do not readily accommodate variability in the relative importance of capabilities.
The assessment approach taken is to identify a generalised set of capabilities needed across the span of IT function operations, from strategy to operations and delivery. This generic model is then be used to assess individual frameworks to determine their scope and coverage and to identify gaps.
The generic IT function capability model proposed here consists of five groups or domains of major capabilities that can be organised across the span of the IT function:
1. Information Technology Strategy, Management and Governance
2. Technology and Platforms Standards Development and Management
3. Technology and Solution Consulting and Delivery
4. Operational Run The Business/Business as Usual/Service Provision
5. Change The Business/Development and Introduction of New Services
In the context of trends and initiatives such as outsourcing, transition to cloud services and greater platform-based offerings, should the IT function develop and enhance its meta-capabilities – the management of the delivery of capabilities? Is capability identification and delivery management the most important capability? Outsourced service delivery in all its forms is not a fire-and-forget activity. You can outsource the provision of any service except the management of the supply of that service.
The following IT capability models have been evaluated:
• IT4IT Reference Architecture https://www.opengroup.org/it4it contains 32 functional components
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL V4 https://www.axelos.com/best-practice-solutions/itil has 34 management practices
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
• APQC Process Classification Framework - https://www.apqc.org/process-performance-management/process-frameworks version 7.2.1 has 44 major IT management processes
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
The following model has not been evaluated
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
How Finance is Adopting Analytics, and Reacting to Changes in the Marketplace Emtec Inc.
Emtec Finance and Technology Summit Presentation: Keynote with Jack Berkowitz
Vice President, Product Management, Business Analytics,
Oracle Corporation
Every part of a business needs technology to deliver new products and services, to make use of data, or to provide better experiences for customers, partners, and employees. In order to deliver this, IT can no longer function as the sole technology to the business; it must transform into an adaptive, responsive and nimble organization that can keep up with the pace of the digital era.
This presentation will show you how to create that transformation, suggest roles and functions for the modern IT organization, and provide a real-world case study of one major company that made the shift.
Architecting Next Generatio IT Operating Models Using IT4IT and SFIASukumar Daniel
A case study of a Transformation Initiative to move a Third Party from Traditional Mechanic Shop Mentality to a Customisation Studio Mentality by causing a paradigm Shift in Ways of Working
Overview of the IT4IT tooling market in 2022.
Key trends in the IT4IT / DevOps tooling market are:
- Strategic portfolio management / portfolio backlog management (scaling agile on the enterprise level integrating with Enterprise architecture and Application / Product Portfolio Management)
- On-line collaboration & communication tools supporting team of team planning, problem solving, etc.
- Value stream management (an emerging tooling category) providing visibility across the end-to-end IT value streams
- Multi-cloud discovery & visibility on usage, costs and compliance
- Integrating DevOps tool chain (e.g. CICD pipeline) with the ITSM platform and CMDB
- Integrating security, risk and compliance management into the DevOps tool chain
- AIOps and observability management, consoliding metrics, logs, events mapped to a real-time service model
- Security operations, integrating security monitoring, vulnerability scanning, etc. into end-to-end detect to correct value streams
- Enterprise Service Management (ITSM vendors providing omni-channel services across IT, HR, Facilities, Finance, etc.)
- Leveraging AI/ML in various capabilities such test management, security operations, incident management, etc.
- Sustainability management integrated in IRM/GRC platforms
And last but not least:
- Service / Product portfolio management (managing the portfolio of service/applications, supporting product centric operating models, linked to business capabilities, product owners and teams)
Your Challenge
Organizations have to adapt to a growing number of trends, putting increased pressure on IT to move at the same speed as the business.
The business, seeing that IT is slower to react, looks to external solutions to address its challenges and capitalize on opportunities.
IT and business leaders don’t have a clear and unified understanding or definition of an operating model.
Our Advice
Critical Insight
The IT operating model is not a static entity and should evolve according to changing business needs.
However, business needs are diverse, and the IT organization must recognize that the business includes groups that consume technology in different patterns. The IT operating model needs to support and enable multiple groups, while continuously adapting to changing business conditions.
Impact and Result
Determine how each technology consumer group interacts with IT. Use consumer experience maps to determine what kind of services consumer groups use and if there are opportunities to improve the delivery of those services.
Identify how changing business conditions will affect the consumption of technology services. Classify your consumers based on business uncertainty and reliance on IT to plan for the future delivery of services.
Optimize the IT operating model. Create a target IT operating model based on the gathered information about technology service consumers. Select different implementations of common operating model elements: governance, sourcing, process, and structure.
TABLE OF CONTENTS
1. What is IT4IT framework
2. The benefits of implementation of the IT4IT framework
3. IT4IT framework components
4. IT4IT Value Streams
5. IT4IT Reference Architecture
6. About Architecture Center Ltd
7. References
IT4IT and DevOps Tools Landscape (2020).Rob Akershoek
Complete overview of the IT management tooling landscape 2020. Key market players / vendors in the IT4IT and DevOps tooling ecosystem. Automate and streamline your end-to-end DevOps tool chain.
History of IT Service Management Practices and StandardsRob Akershoek
Evolution of IT service management practices and standards from Top Gun 1 (around 1990) to Top Gun Maverick (2022)
How did the IT management evolve since 1990? When were key standards and practices introduced?
The IT management market has significantly evolved over the last few years e.g. introducing DevOps, Continuous Delivery, Agile Development, SRE and IT4IT. Managing this new multi-vendor ecosystem consisting of cloud, containers and micro-services.
Managing this new digital reality requires you to combine various practices into one integrated Digital Operating Model, to optimize end-to-end IT value streams.
Running the Business of IT on ServiceNow using IT4ITcccamericas
In this presentation, Michael Fulton, President of CC&C Americas, shares his perspective on the new IT4IT industry standard and how you can use a combination of IT4IT and ServiceNow to transform how you run the business of IT.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle.
ITIL® 4 will be hitting shelves in February 2019, but how is it different from ITIL V3? We joined forces with AXELOS in this webinar to break down what's changing with ITIL 4, how this can benefit you and your organisation, and how you can book onto a course.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
Judith Jones received the Open Group award for Outstanding Contributions to the development of TOGAF 9 at 19th Open Group Enterprise Architecture Practitioners Conference Chicago - July 21-23, 2008. Former CEO of Architecting the Enterprise which has been a member of The Open Group for 6 years, she is personnally involved since 1997. As an active member of The Open Group and she is a major contributor and an editor of TOGAF 7, 8 and 9 as well as leading TOGAF projects for localisation, case studies, ADML, synergy and collaboration projects.
http://www.opengroup.org/member/member-spotlight-jones.htm
ValueFlowIT: A new IT Operating Model EmergesDavid Favelle
ValueFlow IT has synthesised the old and the new of IT management frameworks into a multi-speed operating model. This accommodates the different pace layers (thanks Gartner) of the portfolio and tunes the IT organisational structures processes and tools.
ITIL 4 service value chain data flows (input and outputs)Rob Akershoek
High level overview of the Service value chain activities and information flows (input/outputs) based upon ITIL 4 from AXELOS (ITIL 4 Foundation).
Mapping of the ITIL value chain activities to the IT4IT value streams as defined by The Open Group IT4IT Standard.
How to Articulate the Value of Enterprise Architecturecccamericas
Ever struggled with the question, What is the Value of Enterprise Architecture? In this facilitated conversation, Michael Fulton will share his perspective on Enterprise Architecture and the value it provides to the CIO, to IT, and to the business.
Come ready to engage, because in the conversation we will discuss:
•The EA 7-year itch
•Several External Perspectives on EA Value
•The CC&C perspective on a simplified approach to EA Value
•Ensuring your perspective on EA Value is relevant for your stakeholders
At the end of this conversation, you should walk away with:
•A new perspective on the value of EA
•Tips and tricks on how to articulate and quantify EA Value for your key stakeholders.
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
IT Function critical capabilities are key areas where the IT function needs to maintain significant levels of competence, skill and experience and practise in order to operate and deliver a service. There are several different IT capability frameworks. The objective of these notes is to assess the suitability and applicability of these frameworks. These models can be used to identify what is important for your IT function based on your current and desired/necessary activity profile.
Capabilities vary across organisation – not all capabilities have the same importance for all organisations. These frameworks do not readily accommodate variability in the relative importance of capabilities.
The assessment approach taken is to identify a generalised set of capabilities needed across the span of IT function operations, from strategy to operations and delivery. This generic model is then be used to assess individual frameworks to determine their scope and coverage and to identify gaps.
The generic IT function capability model proposed here consists of five groups or domains of major capabilities that can be organised across the span of the IT function:
1. Information Technology Strategy, Management and Governance
2. Technology and Platforms Standards Development and Management
3. Technology and Solution Consulting and Delivery
4. Operational Run The Business/Business as Usual/Service Provision
5. Change The Business/Development and Introduction of New Services
In the context of trends and initiatives such as outsourcing, transition to cloud services and greater platform-based offerings, should the IT function develop and enhance its meta-capabilities – the management of the delivery of capabilities? Is capability identification and delivery management the most important capability? Outsourced service delivery in all its forms is not a fire-and-forget activity. You can outsource the provision of any service except the management of the supply of that service.
The following IT capability models have been evaluated:
• IT4IT Reference Architecture https://www.opengroup.org/it4it contains 32 functional components
• European e-Competence Framework (ECF) http://www.ecompetences.eu/ contains 40 competencies
• ITIL V4 https://www.axelos.com/best-practice-solutions/itil has 34 management practices
• COBIT 2019 https://www.isaca.org/resources/cobit has 40 management and control processes
• APQC Process Classification Framework - https://www.apqc.org/process-performance-management/process-frameworks version 7.2.1 has 44 major IT management processes
• IT Capability Maturity Framework (IT-CMF) https://ivi.ie/critical-capabilities/ contains 37 critical capabilities
The following model has not been evaluated
• Skills Framework for the Information Age (SFIA) - http://www.sfia-online.org/ lists over 100 skills
How Finance is Adopting Analytics, and Reacting to Changes in the Marketplace Emtec Inc.
Emtec Finance and Technology Summit Presentation: Keynote with Jack Berkowitz
Vice President, Product Management, Business Analytics,
Oracle Corporation
Every part of a business needs technology to deliver new products and services, to make use of data, or to provide better experiences for customers, partners, and employees. In order to deliver this, IT can no longer function as the sole technology to the business; it must transform into an adaptive, responsive and nimble organization that can keep up with the pace of the digital era.
This presentation will show you how to create that transformation, suggest roles and functions for the modern IT organization, and provide a real-world case study of one major company that made the shift.
In November, IT4IT(TM) 2.0 was released to the IT industry. In this webinar, Michael Fulton, President, CC&C Americas and member of Open Group IT4IT Forum Steering Committee, will share his perspective on IT4IT and what it means to the IT industry and how you as an individual can take advantage of it within your career
IT4IT: Realize a Digital Strategy with ServiceNowZenoss
ServiceNow's Senior Product Manager, Mark Bodman, presents IT4IT: Realize a Digital Strategy with ServiceNow.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Frameworks to drive value from your investment in Information TechnologyJohn Halliday
This PDF presentation aims to assist the C-Suite (CEO, CIO, CRO, CSO), Board Members and Audit and Risk Committees to be aware of good IT governance frameworks and references and thereby have Value conversations with IT professionals (and assist IT professionals to drive, and prepare for these conversations). It will cover a wide range of frameworks and references. Enjoy!
Speed, agility and reduced time to market are becoming increasingly important for Technology organizations. As more business moves online, existing business models and industries are disrupted and new ones are enabled. Technology organizations are facing the challenge of how to transition to agile ways of working. Transform the existing team? Build a separate digital team? Or do both?
For more information, contact vicki.shillington@northhighland.com or kim.clarke@northhighland.com.
Will They Blend? - Agile, TOGAF and Enterprise ArchitectureITpreneurs
Do you offer TOGAF / EA / Agile training or consulting?
Is TOGAF really the best approach for enterprise architecture? Danny Greefhorst will provide insight into these questions by showing how agile, enterprise architecture and TOGAF relate and overlap.
Content by Danny Greefhorst
What's covered:
- The TOGAF Approach to EA
- Do Agile, EA and TOGAF Relate?
- Do Agile, EA and TOGAF Overlap?
- When to Use Which Framework
- How to Generate More Business by using Agile, EA and TOGAF
Want to boost governance, compliance, and intellectual property protection throughout your enterprise application lifecycle? You are not alone if you do. The 2015 Gartner research report “CIO’s Questions about Governance” states that “most enterprises do not govern well.” Many implement governance as an afterthought, and the formal governance process is often “unclear, inflexible and cumbersome.”
Watch the CollabNet webinar “Integrating Governance into the Enterprise Application Lifecycle” to learn how you can automate governance, streamline regulatory compliance, safeguard IP, and improve organizational efficiency.
Daniel Jasník - ITSMF pro cloudové služby - AID2019ALVAO
Daniel Jasník má více než 15 let zkušeností v oblasti IT, z toho 7 let v ITSM. Nyní poskytuje své konzultantské služby Enterprise zákazníkům Microsoftu v EMEA region s cílem umožnit jim dosáhnout všech výhod, které Microsoft Cloud přináší, a to aplikováním Microsoft Modern Service Management přístupu.
Prezentacja autorstwa Aleksandra Wyki przedstawiona na I Panelu BizDevOps. Omawia:
- Business Architecture - jak Business Capabilities, Value Streams, Business Model I Operating Model mogą wspomóc wdrażanie koncepcji BizDevOps
- Agile Architecture a koncepcja BizDevOps
Scaling Application Development & Delivery across the EnterpriseCollabNet
Software and applications are core to your business. Agile project planning and management have gone mainstream and the rest of the delivery chain has yet to catch up. According to Forrester 87% of organizations have not connected their Agile project planning to their downstream delivery processes. Organizations who are successful at the workgroup level are further challenged with scaling these successes across an entire enterprise.
Imagine yourself just a couple of years from now, in 2020. Experts believe by then the Internet of Things (IoT) will consist of an estimated 30 billion objects. Though the exact number is up for discussion, there is no doubt that the connectivity of things will grow. This implies the number of people needing to understand how IoT works will also grow. Thus there is a need to teach professionals what IoT is, how to use it to their advantage, and what challenges to expect.
TOGAF Premium Courseware is now available from ITpreneurs! The Premium courseware is an upgrade of the existing TOGAF offering. We have extended this offering with additional content and a completely self-paced eLearning program.
Review the slides to learn more about ITpreneurs updated TOGAF Portfolio. You can also view the portfolio on our website: https://www.itpreneurs.com/it-training-products/it-architecture/togaf/
TOGAF is the world's leading certification for Architects. The TOGAF certification market continues to grow each year. Countries with current demand for TOGAF include the USA, Netherlands, India, France, Canada, UK and Australia.
How ITpreneurs enables training providers to offer quality DevOps training pr...ITpreneurs
This presentation is relevant for professional training providers and consultative training organizations who are considering the inclusion of DevOps to their training portfolio, and specifically DASA. If your organization currently offers Software development, testing, or service management (ITIL) programs and are looking for a quality portfolio extension - this could be for you.
Computer hacking forensic investigation refers to the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. EC-Council's CHFI v9 program incorporates input from experts and practitioners and has been developed following thorough research into current market requirements, job tasks in security and industry needs.
CHFI v9
- Covers the latest forensics examination techniques, including Linux and MAC Forensics.
- Includes new modules on digital forensics laws and standards
- Added more than 40% new labs on anti-forensics techniques, database, cloud, and malware forensics
Why SDN Skills is a Big Boost to Networking CareersITpreneurs
Dr. Levi Perigo shared his experience on how SDN training has enabled his students to become more marketable in the job market; and how SDN education has helped seasoned networking professionals move ahead in their careers. This webinar features Dr. Perigo’s real life case on how SDN education gives a big boost to networking careers. He also elaborated on the benefits of acquiring vendor-neutral ONF SDN certification to complement vendor-specific networking certifications.
The ECSA is a highly interactive, comprehensive, standards-based and methodology intensive training program which teaches information security professionals to conduct real life penetration tests. It provides learners with a real world hands-on penetration testing experience. It is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments. And they learn to document and write a penetration testing report.
The ECSA program takes the tools and techniques learned in the Certified Ethical Hacker course (CEH) and elevates learners' ability into full exploitation by teaching how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology.
ITpreneurs has formed a partnership with EC-Council to provide a diverse portfolio of IT Security training and certifications in the Middle East (Kingdom of Saudi Arabia, United Arab Emirates, Kuwait, Oman, Bahrain, Qatar, Lebanon, Jordan) and Turkey. EC Council (International Council of E-Commerce Consultants) is one of the world’s largest certification bodies for information security professionals and e-business. ITpreneurs partners can provide unique offerings to help their clients in these countries to manage the emerging challenges posed by cyber security related threats.
Contact us today on info@itpreneurs.com and find out how you can bring EC-Council training to your clients.
The Ultimate Certification for Network Administrators
A vendor-neutral, hands-on, instructor-led, comprehensive network security certification training program.
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth Network security preparedness.
Enterprise Architecture Courseware by ITpreneursITpreneurs
ITpreneurs is a provider of courseware and services to IT training and consulting organizations. Using a pay-per-use model, organizations can easily expand their training portfolio without investing in upfront content development and maintenance. Contact us on info@itpreneurs.com for details.
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...ITpreneurs
Your customer organizations are operating in a competitive, high pressure environment. When problems and incidents arise, organizations are under double pressure: first to understand what caused the problem; and then to swiftly, reliably manage the issue.
In partnership with Kepner-Tregoe®, ITpreneurs offers the Kepner-Tregoe (KT) Courses & Certification which introduce a systematic approach to troubleshooting and resolving customer issues faster and more effectively for improved customer satisfaction. No more time-consuming, expensive 'trial and error': with Kepner-Tregoe courses you can offer structured critical thinking techniques to your customers, helping them them to make better decisions and proactively analyze and avoid problems.
See the top reasons why IT organizations should adopt Kepner-Tregoe.
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...ITpreneurs
Your customer organizations are operating in a competitive, high pressure environment. When problems and incidents arise, organizations are under double pressure: first to understand what caused the problem; and then to swiftly, reliably manage the issue.
In partnership with Kepner-Tregoe®, ITpreneurs offers the Kepner-Tregoe (KT) Courses & Certification which introduce a systematic approach to troubleshooting and resolving customer issues faster and more effectively for improved customer satisfaction. No more time-consuming, expensive 'trial and error': with Kepner-Tregoe courses you can offer structured critical thinking techniques to your customers, helping them them to make better decisions and proactively analyze and avoid problems.
See the top reasons why you should become a licensed Kepner-Tregoe training provider.
[Infographic] How Simulations accelerate change management (5 stages).ITpreneurs
Experiential learning via business simulations helps create bigger impact and ongoing engagement throughout the entire change process. They help you and your clients realize optimal business outcomes from change management.
EC-Council Certified Secure Computer User C|SCU ProgramITpreneurs
Responsible Cyber Users, Safer Organizations. Over 95% of end users is not receiving adequate cyber security training across organizations. Hackers target the weaker point and through the end user they gain access to critical data centers.
EC-Council Certified Secure Computer User (C|SCU) is a comprehensive Cyber Security Awareness program that offers employees and end users a fundamental understanding of various computer and network security threats.
ITpreneurs has formed a partnership with EC-Council to provide a diverse portfolio of IT Security training and certifications in the Middle East (Kingdom of Saudi Arabia, United Arab Emirates, Kuwait, Oman, Bahrain, Qatar, Lebanon, Jordan) and Turkey. EC Council (International Council of E-Commerce Consultants) is one of the world’s largest certification bodies for information security professionals and e-business. ITpreneurs partners can provide unique offerings to help their clients in these countries to manage the emerging challenges posed by cyber security related threats.
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
EC-Council Certified Ethical Hacker (CEH) program is the worlds most advanced ethical hacking course. Help information security professionals master hacking technologies. They will become a hacker, but an ethical one!
ITpreneurs has formed a partnership with EC-Council to provide a diverse portfolio of IT Security training and certifications in the Middle East (Kingdom of Saudi Arabia, United Arab Emirates, Kuwait, Oman, Bahrain, Qatar, Lebanon, Jordan) and Turkey. EC Council (International Council of E-Commerce Consultants) is one of the world’s largest certification bodies for information security professionals and e-business. ITpreneurs partners can provide unique offerings to help their clients in these countries to manage the emerging challenges posed by cyber security related threats.
Contact us today on info@itpreneurs.com and find out how you can bring EC-Council training to your clients.
EC-Council Cyber Security Training and CertificationsITpreneurs
ITpreneurs is a strategic partner of EC-Council for the Middle East and Turkey. Through this partner, training and consulting providers in the region can leverage the EC-Council cyber security training and certifications to help their customers bridge the skills gaps.
ITpreneurs offers quality training content for licensing, along with valuable services to enable training providers to deliver a vast portfolio of courses in a cost-effective, convenient and efficient manner.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.