SlideShare a Scribd company logo
Implementation of Lean Methods on
Management of IT Infrastructure
Monitoring System
By :
Dio Pratama | Rizal F. Aji | Setiadi Yazid
ICACSIS 2018
Faculty of Computer Science
Universitas Indonesia
Brief Description
Currently IT manage so many Infrastructure devices :
Faculty of Computer Science
Universitas Indonesia
Problem Analysis
There is an incident alarm which
completeion duration takes hundreds
to thousands of hours
Too many alarm notifications,
difficult to distinguish which really
shows the problem
There are many redundant
alarms
There are many red nodes, but in
reality there are no disrupted
services
1
2
3
4
Faculty of Computer Science
Universitas Indonesia
Problem Analysis (Cont’d)
11367
1735
58
13050
281
2540
0
2000
4000
6000
8000
10000
12000
14000
IT Support ERP Internal Apps IT
Infrastructure
IT
Collaboration
IT Security
Total Incident Each Departement - 2017
Faculty of Computer Science
Universitas Indonesia
Problem
The monitoring system cannot provide
accurate information regarding the
condition of the IT infrastructure
Faculty of Computer Science
Universitas Indonesia
Root Cause Analysis
Faculty of Computer Science
Universitas Indonesia
06
01
02
03
04
05
• Lean method is used to manage
and improve business processes
efficiently (Pillai, Pundir, &
Ganapathy, 2014)
• IT infrastructure is one of
the key operational services
of IT (Peppard & Ward,
2016)
• Business is rely on IT, systems must
be monitored 24x7 (Hernantes,
Gallardo, & Serrano, 2015)
• The monitoring aspect becomes
more complicated, notifications
accumulate, which makes
difficult to track problems
(Turnbull, 2016)
Literature Review
• Need a method to manage
monitoring system properly
• IT become more complex, services and
tools that need to be monitored are
increasingly and varied (Turnbull,
2016)
• One of popular process
management methode is lean
(Vieira, 2015)
• The management philosophy is
to emphasize the elimination of
waste (Plenert, 2012)
Faculty of Computer Science
Universitas Indonesia
Literature Review (Lean Implementation)
Loader & Janssen (2015) in his book “Lean IT
Foundation Increasing Value Of IT” explains that the
principle of implementing lean are through five stages
as shown by the following figure:
Transportation
Inventory
Motion
Waiting
Over Production
Over Processing
Defect
The management philosophy is to emphasize the
elimination of waste (Plenert, 2012), and the waste
is categorized as TIMWOOD (Bell & Orzen, 2011).
Faculty of Computer Science
Universitas Indonesia
Literature Review (Lean Toos)
Steven C. Bell and Michael A. Orzan (2011) explained that lean offers a variety of tools to eliminate process waste,
including:
Value Stream Mapping (VSM)
SIPOC (Supplier/Input/Process/Output/Customer)Gemba Walk (Go and see analysis)
Voice of Customer (VoC)
Work Standarization
5S (Seiri/Seiton/Seisho/Seiketsu/Shitsuke)
Pull Logistic
Continues Improvement (Kaizen)
Faculty of Computer Science
Universitas Indonesia
Research Methodology
• Research Design: Qualitative
• Research Methode: Case Study & Action Research
• Data Collection : Interview, Observation, FGD
1
Problem Identification
3 5
2 4
Literature Review
Observation Phase
Design Phase
Implementation Phase
Faculty of Computer Science
Universitas Indonesia
Lean Implementation (Value Identification)
Value Identification  Voice Of Customer (VoC) :
No Identified Values Achievment
Yes No
1 Technicians able to quickly see and responds to every occured
problems
O
2 Management able to quickly find out which services are
interrupted
O
3 Executives can quickly learn which business processes are
disrupted
O
4 Able to provide accurate alarm information O
5 Able to monitor the use of resources to maximize the use of the
service O
6 There are rules in the use of each feature on the monitoring
system
O
7 There is a clear workflow in handling every alarm O
8 Self service monitoring for IT service owners O
9 Simple display that can be directly understood by ordinary users O
Faculty of Computer Science
Universitas Indonesia
Lean Implementation (Value Stream Mapping)
Faculty of Computer Science
Universitas Indonesia
1
3
2
Waste Identification (Information Collection)
• There are resources that
are not being used and are
still monitored by the
system
• There is a function of resources
that are not owned by the
device, but monitored by the
system
• There are resources that are not
enabled by the device, but
monitored by the system
Waste  Inventory
Faculty of Computer Science
Universitas Indonesia
Waste Identification (Information Processing)
Alerting Waste Process :
1. Event Trigerred  Over Processing
2. Alert Logged  Over Production
3. Predefined Rules  Defect
4. Review The Alert  Over Production
Source : (Nand & Chaganty, 2008)
Faculty of Computer Science
Universitas Indonesia
Lean Implementation (Create New Flow by Elemeninate Waste)
Remove Unecessary Thing
• Stop monitoring of devices that are not in use.
• Stop monitoring of resources that are not being used
by the device.
• Stop monitoring of the resource function that the
device does not have.
• Stop monitoring of resources that are not enabled
by the device.
• Removing unnecessary alarm configuration.
Arrange Placements and Mark / Label on All Things
• Organize categorization and mark devices
based on area, city, region, service name,
and service owner.
• Organize grouping and marking devices
based on service function.
• Self service access to monitoring system
based on ownership of device or service.
• Remove the unnecessary dashboard
view and add another more informative
view by creating a single dashboad
view(Next Slide)
Cleaning and Tidying Up Display
Create Working Standard
• Making standard operational procedure (SOP)
Make sure SOP is running
• A reward system is applied for operators who perform every
month, with the assessment category being compliance with
SOPs.
• It has been proposed that the activity in the SOP be the
engineer performance assessment criteria which listed in the
Individual Work Plan (RKI).
• It has been proposed that adherence to this SOP be the point
of disciplinary Final Assessment (PA) of the engineer.
Faculty of Computer Science
Universitas Indonesia
Create Pull System
Aiming for the system to be only produce information when it is needed by customers at the right time, right amount and
right destination.
• Set the sending of alarms
according to working hours on
certain devices or services
• Make maintenance
scheduling arrangements if
there is downtime scheduled
• Send an alarm to a person
who is responsible for a
service
• Determine the parent and child of
the devices so that, if there are
problems with the parent device,
the child device will not send an
alarm
Faculty of Computer Science
Universitas Indonesia
Make Perfection
Continues Improvement (Kaizen)
Make procedures for using the
monitoring system
Implement best practice management
monitoring system (next slide)
Faculty of Computer Science
Universitas Indonesia
Make Perfection (Device Inventory)
Faculty of Computer Science
Universitas Indonesia
Make Perfection (Business View)
Faculty of Computer Science
Universitas Indonesia
Implementation Result
• Quantitatively after implementation, the
number of devices monitored increases while
alarms and events decreases
• Qualitatively, remains expected value
has been achieved
No Identified Values Caused Waste Activty Achievement
Yes No
1 Technicians able to quickly
see and respond to
problems that occur
 Inventory
 Motion
 Waiting
 Defect
 Short
 Shine
 Create pull
system
O
2 Management able to
quickly find out which
services are interrupted
 Motion
 Waiting
 Set in order
 Perfection
(Create
business
view)
O
3 Executives able to quickly
learn which business
processes are disrupted
 Motion
 Waiting
 Set in order
 Perfection
(Create
business
view)
O
4 Able to provide accurate
alarm information
 Inventory
 Defect
 Over
Production
 Over
Processing
 Short
 Create pull
system
O
5 Able to monitor the use of
resources to maximize the
use of the service - - O
6 There are rules in the use of
each feature on the
monitoring system
 Not directly
impact by
waste
 Standarize
O
7 There is a clear workflow in
handling every alarm
 Not directly
impact by
waste
 Perfection
(Create SOP) O
8 Self service monitoring for
IT service owners
 Not directly
impact by
waste
 Set in order
O
9 Simple display that can be
directly understood by
ordinary users
 Motion
 Waiting
 Shine
 Make
Perfection
(Create
business
view)
O
Network
Elements
Nodes Interfaces Alerts Events
Amount
Before
Lean
7683 639 6613 111 348172
Amount
After Lean
10705 1308 6683 26 177343
Percentage
Ratio
39% 105% 1% -77% -49%
Faculty of Computer Science
Universitas Indonesia
Summary
• After the lean method is implemented,
the system can convey the expected value
of the customer
• Waste in the monitoring system can be
reduced so that there is an increase in
accuracy related to information on the
condition of the IT infrastructure
Lean method can be applied to manage monitoring system through the steps of applying lean principle as follows:
VoC (Voice of Customer)
SIPOC of Monitoring
System
Remove Monitoring
Waste
Send alert on the right
time, right amount, right
destination
Implement Kaizen
Faculty of Computer Science
Universitas Indonesia
Source: xxx
Thank You

More Related Content

Similar to Lean Implementation on IT Infrastructure Monitoring System

Dss.13.endang ripmiatin-uai.2014
Dss.13.endang ripmiatin-uai.2014Dss.13.endang ripmiatin-uai.2014
Dss.13.endang ripmiatin-uai.2014
Ambo Dalle
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
IJMIT JOURNAL
 
IRJET- Paper on Proposed System for Managing Viva Examinations
IRJET- Paper on Proposed System for Managing Viva ExaminationsIRJET- Paper on Proposed System for Managing Viva Examinations
IRJET- Paper on Proposed System for Managing Viva Examinations
IRJET Journal
 
Appraisal Management System.pptx
Appraisal Management System.pptxAppraisal Management System.pptx
Appraisal Management System.pptx
AyoguBlossomIsrael
 
Geek Sync I In Depth Look At Application Performance Monitoring
Geek Sync I In Depth Look At Application Performance MonitoringGeek Sync I In Depth Look At Application Performance Monitoring
Geek Sync I In Depth Look At Application Performance Monitoring
IDERA Software
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET Journal
 
Map-Based Attendance Monitoring System
Map-Based Attendance Monitoring SystemMap-Based Attendance Monitoring System
Map-Based Attendance Monitoring System
IRJET Journal
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
Showkot Usman
 
sdlc-170822024656.pdf
sdlc-170822024656.pdfsdlc-170822024656.pdf
sdlc-170822024656.pdf
NagavelliMadhavi
 
Lesson 9 system develpment life cycle
Lesson 9 system develpment life cycleLesson 9 system develpment life cycle
Lesson 9 system develpment life cycle
Oneil Powers
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps Adoption
IRJET Journal
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
university of education,Lahore
 
INDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATION
INDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATIONINDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATION
INDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATION
PRIYA DARSHINI A/P VEJAN
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
Nigah Mathour
 
Systems Lifecycle workbook
Systems Lifecycle workbookSystems Lifecycle workbook
Systems Lifecycle workbookMISY
 
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU LtdNetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NCU Ltd
 
1603960041059_20 Six Sigma Good Tools.pptx
1603960041059_20 Six Sigma Good Tools.pptx1603960041059_20 Six Sigma Good Tools.pptx
1603960041059_20 Six Sigma Good Tools.pptx
Mimmaafrin1
 

Similar to Lean Implementation on IT Infrastructure Monitoring System (20)

Dss.13.endang ripmiatin-uai.2014
Dss.13.endang ripmiatin-uai.2014Dss.13.endang ripmiatin-uai.2014
Dss.13.endang ripmiatin-uai.2014
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
IRJET- Paper on Proposed System for Managing Viva Examinations
IRJET- Paper on Proposed System for Managing Viva ExaminationsIRJET- Paper on Proposed System for Managing Viva Examinations
IRJET- Paper on Proposed System for Managing Viva Examinations
 
Appraisal Management System.pptx
Appraisal Management System.pptxAppraisal Management System.pptx
Appraisal Management System.pptx
 
Geek Sync I In Depth Look At Application Performance Monitoring
Geek Sync I In Depth Look At Application Performance MonitoringGeek Sync I In Depth Look At Application Performance Monitoring
Geek Sync I In Depth Look At Application Performance Monitoring
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
Map-Based Attendance Monitoring System
Map-Based Attendance Monitoring SystemMap-Based Attendance Monitoring System
Map-Based Attendance Monitoring System
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
sdlc-170822024656.pdf
sdlc-170822024656.pdfsdlc-170822024656.pdf
sdlc-170822024656.pdf
 
Lesson 9 system develpment life cycle
Lesson 9 system develpment life cycleLesson 9 system develpment life cycle
Lesson 9 system develpment life cycle
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps Adoption
 
Sdlc 4
Sdlc 4Sdlc 4
Sdlc 4
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
INDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATION
INDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATIONINDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATION
INDUSTRIAL TRAINING EVALUATION MANAGEMENT SYSTEM (IT-EMS) PRESENTATION
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 
Systems Lifecycle workbook
Systems Lifecycle workbookSystems Lifecycle workbook
Systems Lifecycle workbook
 
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU LtdNetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
 
1603960041059_20 Six Sigma Good Tools.pptx
1603960041059_20 Six Sigma Good Tools.pptx1603960041059_20 Six Sigma Good Tools.pptx
1603960041059_20 Six Sigma Good Tools.pptx
 

Recently uploaded

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Lean Implementation on IT Infrastructure Monitoring System

  • 1. Implementation of Lean Methods on Management of IT Infrastructure Monitoring System By : Dio Pratama | Rizal F. Aji | Setiadi Yazid ICACSIS 2018
  • 2. Faculty of Computer Science Universitas Indonesia Brief Description Currently IT manage so many Infrastructure devices :
  • 3. Faculty of Computer Science Universitas Indonesia Problem Analysis There is an incident alarm which completeion duration takes hundreds to thousands of hours Too many alarm notifications, difficult to distinguish which really shows the problem There are many redundant alarms There are many red nodes, but in reality there are no disrupted services 1 2 3 4
  • 4. Faculty of Computer Science Universitas Indonesia Problem Analysis (Cont’d) 11367 1735 58 13050 281 2540 0 2000 4000 6000 8000 10000 12000 14000 IT Support ERP Internal Apps IT Infrastructure IT Collaboration IT Security Total Incident Each Departement - 2017
  • 5. Faculty of Computer Science Universitas Indonesia Problem The monitoring system cannot provide accurate information regarding the condition of the IT infrastructure
  • 6. Faculty of Computer Science Universitas Indonesia Root Cause Analysis
  • 7. Faculty of Computer Science Universitas Indonesia 06 01 02 03 04 05 • Lean method is used to manage and improve business processes efficiently (Pillai, Pundir, & Ganapathy, 2014) • IT infrastructure is one of the key operational services of IT (Peppard & Ward, 2016) • Business is rely on IT, systems must be monitored 24x7 (Hernantes, Gallardo, & Serrano, 2015) • The monitoring aspect becomes more complicated, notifications accumulate, which makes difficult to track problems (Turnbull, 2016) Literature Review • Need a method to manage monitoring system properly • IT become more complex, services and tools that need to be monitored are increasingly and varied (Turnbull, 2016) • One of popular process management methode is lean (Vieira, 2015) • The management philosophy is to emphasize the elimination of waste (Plenert, 2012)
  • 8. Faculty of Computer Science Universitas Indonesia Literature Review (Lean Implementation) Loader & Janssen (2015) in his book “Lean IT Foundation Increasing Value Of IT” explains that the principle of implementing lean are through five stages as shown by the following figure: Transportation Inventory Motion Waiting Over Production Over Processing Defect The management philosophy is to emphasize the elimination of waste (Plenert, 2012), and the waste is categorized as TIMWOOD (Bell & Orzen, 2011).
  • 9. Faculty of Computer Science Universitas Indonesia Literature Review (Lean Toos) Steven C. Bell and Michael A. Orzan (2011) explained that lean offers a variety of tools to eliminate process waste, including: Value Stream Mapping (VSM) SIPOC (Supplier/Input/Process/Output/Customer)Gemba Walk (Go and see analysis) Voice of Customer (VoC) Work Standarization 5S (Seiri/Seiton/Seisho/Seiketsu/Shitsuke) Pull Logistic Continues Improvement (Kaizen)
  • 10. Faculty of Computer Science Universitas Indonesia Research Methodology • Research Design: Qualitative • Research Methode: Case Study & Action Research • Data Collection : Interview, Observation, FGD 1 Problem Identification 3 5 2 4 Literature Review Observation Phase Design Phase Implementation Phase
  • 11. Faculty of Computer Science Universitas Indonesia Lean Implementation (Value Identification) Value Identification  Voice Of Customer (VoC) : No Identified Values Achievment Yes No 1 Technicians able to quickly see and responds to every occured problems O 2 Management able to quickly find out which services are interrupted O 3 Executives can quickly learn which business processes are disrupted O 4 Able to provide accurate alarm information O 5 Able to monitor the use of resources to maximize the use of the service O 6 There are rules in the use of each feature on the monitoring system O 7 There is a clear workflow in handling every alarm O 8 Self service monitoring for IT service owners O 9 Simple display that can be directly understood by ordinary users O
  • 12. Faculty of Computer Science Universitas Indonesia Lean Implementation (Value Stream Mapping)
  • 13. Faculty of Computer Science Universitas Indonesia 1 3 2 Waste Identification (Information Collection) • There are resources that are not being used and are still monitored by the system • There is a function of resources that are not owned by the device, but monitored by the system • There are resources that are not enabled by the device, but monitored by the system Waste  Inventory
  • 14. Faculty of Computer Science Universitas Indonesia Waste Identification (Information Processing) Alerting Waste Process : 1. Event Trigerred  Over Processing 2. Alert Logged  Over Production 3. Predefined Rules  Defect 4. Review The Alert  Over Production Source : (Nand & Chaganty, 2008)
  • 15. Faculty of Computer Science Universitas Indonesia Lean Implementation (Create New Flow by Elemeninate Waste) Remove Unecessary Thing • Stop monitoring of devices that are not in use. • Stop monitoring of resources that are not being used by the device. • Stop monitoring of the resource function that the device does not have. • Stop monitoring of resources that are not enabled by the device. • Removing unnecessary alarm configuration. Arrange Placements and Mark / Label on All Things • Organize categorization and mark devices based on area, city, region, service name, and service owner. • Organize grouping and marking devices based on service function. • Self service access to monitoring system based on ownership of device or service. • Remove the unnecessary dashboard view and add another more informative view by creating a single dashboad view(Next Slide) Cleaning and Tidying Up Display Create Working Standard • Making standard operational procedure (SOP) Make sure SOP is running • A reward system is applied for operators who perform every month, with the assessment category being compliance with SOPs. • It has been proposed that the activity in the SOP be the engineer performance assessment criteria which listed in the Individual Work Plan (RKI). • It has been proposed that adherence to this SOP be the point of disciplinary Final Assessment (PA) of the engineer.
  • 16. Faculty of Computer Science Universitas Indonesia Create Pull System Aiming for the system to be only produce information when it is needed by customers at the right time, right amount and right destination. • Set the sending of alarms according to working hours on certain devices or services • Make maintenance scheduling arrangements if there is downtime scheduled • Send an alarm to a person who is responsible for a service • Determine the parent and child of the devices so that, if there are problems with the parent device, the child device will not send an alarm
  • 17. Faculty of Computer Science Universitas Indonesia Make Perfection Continues Improvement (Kaizen) Make procedures for using the monitoring system Implement best practice management monitoring system (next slide)
  • 18. Faculty of Computer Science Universitas Indonesia Make Perfection (Device Inventory)
  • 19. Faculty of Computer Science Universitas Indonesia Make Perfection (Business View)
  • 20. Faculty of Computer Science Universitas Indonesia Implementation Result • Quantitatively after implementation, the number of devices monitored increases while alarms and events decreases • Qualitatively, remains expected value has been achieved No Identified Values Caused Waste Activty Achievement Yes No 1 Technicians able to quickly see and respond to problems that occur  Inventory  Motion  Waiting  Defect  Short  Shine  Create pull system O 2 Management able to quickly find out which services are interrupted  Motion  Waiting  Set in order  Perfection (Create business view) O 3 Executives able to quickly learn which business processes are disrupted  Motion  Waiting  Set in order  Perfection (Create business view) O 4 Able to provide accurate alarm information  Inventory  Defect  Over Production  Over Processing  Short  Create pull system O 5 Able to monitor the use of resources to maximize the use of the service - - O 6 There are rules in the use of each feature on the monitoring system  Not directly impact by waste  Standarize O 7 There is a clear workflow in handling every alarm  Not directly impact by waste  Perfection (Create SOP) O 8 Self service monitoring for IT service owners  Not directly impact by waste  Set in order O 9 Simple display that can be directly understood by ordinary users  Motion  Waiting  Shine  Make Perfection (Create business view) O Network Elements Nodes Interfaces Alerts Events Amount Before Lean 7683 639 6613 111 348172 Amount After Lean 10705 1308 6683 26 177343 Percentage Ratio 39% 105% 1% -77% -49%
  • 21. Faculty of Computer Science Universitas Indonesia Summary • After the lean method is implemented, the system can convey the expected value of the customer • Waste in the monitoring system can be reduced so that there is an increase in accuracy related to information on the condition of the IT infrastructure Lean method can be applied to manage monitoring system through the steps of applying lean principle as follows: VoC (Voice of Customer) SIPOC of Monitoring System Remove Monitoring Waste Send alert on the right time, right amount, right destination Implement Kaizen
  • 22. Faculty of Computer Science Universitas Indonesia Source: xxx Thank You

Editor's Notes

  1. Good morning everyone, my name is Dio Pratama from University of Indonesia. I’m here today going to share and describe about my research, it’s about “Tittle”
  2. As a brief, Kalbe Farma is one of largest Health Care & Phrameutical company in South East Asia. We have about ….
  3. Just explain
  4. It proven by auto generate ticketing system, that IT Infra department has produce the most total incident. And actually that incidents is mostly produced by our monitoring system.
  5. By literature review, everyone agree that IT Infrastructure is one of key operational services that need to be monitored in proper management. One of of popular process of management methode is lean. Lean…