Lean methods were implemented on an IT infrastructure monitoring system to improve accuracy and reduce waste. Key steps included identifying customer values, mapping the current monitoring process and waste, removing unnecessary monitoring activities, creating standard operating procedures, and implementing continuous improvement. After lean implementation, the system provided more accurate information with fewer alarms and events, while monitoring more devices. Lean reduced waste and helped achieve the expected values of quickly identifying problems, disrupted services and impacted business processes.
SDLC Models(Process Models)
Usage, Advantages/Disadvantages of each
1. Big Bang Model
2. Waterfall model
3. V-Model
4. Iterative Model
5. Prototyping Model
6. Spiral Model
“Requirements” ? - According to IEEE standard 729
Importance of Requirement Specification
Boundary of two worlds
Why is it so Hard?
Building the right system right
Requirement may solve the dual function
Requirements
Type of Requirements
Types of System/Software Requirements
Requirement Engineering
Problems with natural language
The Requirements Engineering Process
Feasibility Study
Feasibility study issues
Requirements Elicitation
Requirements Analysis
Requirements Specifications
Requirements Validation and Verification
Validation Vs. Verification
SDLC Models(Process Models)
Usage, Advantages/Disadvantages of each
1. Big Bang Model
2. Waterfall model
3. V-Model
4. Iterative Model
5. Prototyping Model
6. Spiral Model
“Requirements” ? - According to IEEE standard 729
Importance of Requirement Specification
Boundary of two worlds
Why is it so Hard?
Building the right system right
Requirement may solve the dual function
Requirements
Type of Requirements
Types of System/Software Requirements
Requirement Engineering
Problems with natural language
The Requirements Engineering Process
Feasibility Study
Feasibility study issues
Requirements Elicitation
Requirements Analysis
Requirements Specifications
Requirements Validation and Verification
Validation Vs. Verification
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
At the present time to getting a good job is very intricate task for any job seekers. The same problem also a company can face to acquire intelligent and qualified employees. Therefore, to minimize the problem, there are many management systems were applied and out of them, computer based management system is one of an appropriate elucidation for this problem. In the computer management system, software are made for jobseekers to find their suitable companies and as well as made for companies for finding their suitable employees. However, the available software in the market are not intelligent based, and to make privacy, security and robustness, the software should made with the application of expert system. In this proposed study, an attempt has been made for finding the solution for job seekers and the companies with the application of expert systems.
Geek Sync I In Depth Look At Application Performance MonitoringIDERA Software
You can watch the replay for this Geek Sync webcast in the IDERA Resource Center: http://ow.ly/5QP850A5qwa
As applications become more and more critical and valuable in today’s business world, the importance of monitoring the efficiency of those applications has greatly increased. Poor application performance can negatively impact user satisfaction and subsequently cause loss in revenue for your company.
NetIQ Solutions for the Data Center
IT Operations Management Solution
IT Infrastructure & Operations Executives
NetIQ AppManager
AppManager helps with:
• Monitoring all the hardware, infrastructure, systems and
applications used to deliver IT services to the business.
• Troubleshooting and resolving IT problems faster
• Reducing monitoring gaps
• Tackling IT problems before they impact service
NetIQ Operations Center: Getting the “big picture”
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
At the present time to getting a good job is very intricate task for any job seekers. The same problem also a company can face to acquire intelligent and qualified employees. Therefore, to minimize the problem, there are many management systems were applied and out of them, computer based management system is one of an appropriate elucidation for this problem. In the computer management system, software are made for jobseekers to find their suitable companies and as well as made for companies for finding their suitable employees. However, the available software in the market are not intelligent based, and to make privacy, security and robustness, the software should made with the application of expert system. In this proposed study, an attempt has been made for finding the solution for job seekers and the companies with the application of expert systems.
Geek Sync I In Depth Look At Application Performance MonitoringIDERA Software
You can watch the replay for this Geek Sync webcast in the IDERA Resource Center: http://ow.ly/5QP850A5qwa
As applications become more and more critical and valuable in today’s business world, the importance of monitoring the efficiency of those applications has greatly increased. Poor application performance can negatively impact user satisfaction and subsequently cause loss in revenue for your company.
NetIQ Solutions for the Data Center
IT Operations Management Solution
IT Infrastructure & Operations Executives
NetIQ AppManager
AppManager helps with:
• Monitoring all the hardware, infrastructure, systems and
applications used to deliver IT services to the business.
• Troubleshooting and resolving IT problems faster
• Reducing monitoring gaps
• Tackling IT problems before they impact service
NetIQ Operations Center: Getting the “big picture”
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Lean Implementation on IT Infrastructure Monitoring System
1. Implementation of Lean Methods on
Management of IT Infrastructure
Monitoring System
By :
Dio Pratama | Rizal F. Aji | Setiadi Yazid
ICACSIS 2018
2. Faculty of Computer Science
Universitas Indonesia
Brief Description
Currently IT manage so many Infrastructure devices :
3. Faculty of Computer Science
Universitas Indonesia
Problem Analysis
There is an incident alarm which
completeion duration takes hundreds
to thousands of hours
Too many alarm notifications,
difficult to distinguish which really
shows the problem
There are many redundant
alarms
There are many red nodes, but in
reality there are no disrupted
services
1
2
3
4
4. Faculty of Computer Science
Universitas Indonesia
Problem Analysis (Cont’d)
11367
1735
58
13050
281
2540
0
2000
4000
6000
8000
10000
12000
14000
IT Support ERP Internal Apps IT
Infrastructure
IT
Collaboration
IT Security
Total Incident Each Departement - 2017
5. Faculty of Computer Science
Universitas Indonesia
Problem
The monitoring system cannot provide
accurate information regarding the
condition of the IT infrastructure
7. Faculty of Computer Science
Universitas Indonesia
06
01
02
03
04
05
• Lean method is used to manage
and improve business processes
efficiently (Pillai, Pundir, &
Ganapathy, 2014)
• IT infrastructure is one of
the key operational services
of IT (Peppard & Ward,
2016)
• Business is rely on IT, systems must
be monitored 24x7 (Hernantes,
Gallardo, & Serrano, 2015)
• The monitoring aspect becomes
more complicated, notifications
accumulate, which makes
difficult to track problems
(Turnbull, 2016)
Literature Review
• Need a method to manage
monitoring system properly
• IT become more complex, services and
tools that need to be monitored are
increasingly and varied (Turnbull,
2016)
• One of popular process
management methode is lean
(Vieira, 2015)
• The management philosophy is
to emphasize the elimination of
waste (Plenert, 2012)
8. Faculty of Computer Science
Universitas Indonesia
Literature Review (Lean Implementation)
Loader & Janssen (2015) in his book “Lean IT
Foundation Increasing Value Of IT” explains that the
principle of implementing lean are through five stages
as shown by the following figure:
Transportation
Inventory
Motion
Waiting
Over Production
Over Processing
Defect
The management philosophy is to emphasize the
elimination of waste (Plenert, 2012), and the waste
is categorized as TIMWOOD (Bell & Orzen, 2011).
9. Faculty of Computer Science
Universitas Indonesia
Literature Review (Lean Toos)
Steven C. Bell and Michael A. Orzan (2011) explained that lean offers a variety of tools to eliminate process waste,
including:
Value Stream Mapping (VSM)
SIPOC (Supplier/Input/Process/Output/Customer)Gemba Walk (Go and see analysis)
Voice of Customer (VoC)
Work Standarization
5S (Seiri/Seiton/Seisho/Seiketsu/Shitsuke)
Pull Logistic
Continues Improvement (Kaizen)
10. Faculty of Computer Science
Universitas Indonesia
Research Methodology
• Research Design: Qualitative
• Research Methode: Case Study & Action Research
• Data Collection : Interview, Observation, FGD
1
Problem Identification
3 5
2 4
Literature Review
Observation Phase
Design Phase
Implementation Phase
11. Faculty of Computer Science
Universitas Indonesia
Lean Implementation (Value Identification)
Value Identification Voice Of Customer (VoC) :
No Identified Values Achievment
Yes No
1 Technicians able to quickly see and responds to every occured
problems
O
2 Management able to quickly find out which services are
interrupted
O
3 Executives can quickly learn which business processes are
disrupted
O
4 Able to provide accurate alarm information O
5 Able to monitor the use of resources to maximize the use of the
service O
6 There are rules in the use of each feature on the monitoring
system
O
7 There is a clear workflow in handling every alarm O
8 Self service monitoring for IT service owners O
9 Simple display that can be directly understood by ordinary users O
12. Faculty of Computer Science
Universitas Indonesia
Lean Implementation (Value Stream Mapping)
13. Faculty of Computer Science
Universitas Indonesia
1
3
2
Waste Identification (Information Collection)
• There are resources that
are not being used and are
still monitored by the
system
• There is a function of resources
that are not owned by the
device, but monitored by the
system
• There are resources that are not
enabled by the device, but
monitored by the system
Waste Inventory
14. Faculty of Computer Science
Universitas Indonesia
Waste Identification (Information Processing)
Alerting Waste Process :
1. Event Trigerred Over Processing
2. Alert Logged Over Production
3. Predefined Rules Defect
4. Review The Alert Over Production
Source : (Nand & Chaganty, 2008)
15. Faculty of Computer Science
Universitas Indonesia
Lean Implementation (Create New Flow by Elemeninate Waste)
Remove Unecessary Thing
• Stop monitoring of devices that are not in use.
• Stop monitoring of resources that are not being used
by the device.
• Stop monitoring of the resource function that the
device does not have.
• Stop monitoring of resources that are not enabled
by the device.
• Removing unnecessary alarm configuration.
Arrange Placements and Mark / Label on All Things
• Organize categorization and mark devices
based on area, city, region, service name,
and service owner.
• Organize grouping and marking devices
based on service function.
• Self service access to monitoring system
based on ownership of device or service.
• Remove the unnecessary dashboard
view and add another more informative
view by creating a single dashboad
view(Next Slide)
Cleaning and Tidying Up Display
Create Working Standard
• Making standard operational procedure (SOP)
Make sure SOP is running
• A reward system is applied for operators who perform every
month, with the assessment category being compliance with
SOPs.
• It has been proposed that the activity in the SOP be the
engineer performance assessment criteria which listed in the
Individual Work Plan (RKI).
• It has been proposed that adherence to this SOP be the point
of disciplinary Final Assessment (PA) of the engineer.
16. Faculty of Computer Science
Universitas Indonesia
Create Pull System
Aiming for the system to be only produce information when it is needed by customers at the right time, right amount and
right destination.
• Set the sending of alarms
according to working hours on
certain devices or services
• Make maintenance
scheduling arrangements if
there is downtime scheduled
• Send an alarm to a person
who is responsible for a
service
• Determine the parent and child of
the devices so that, if there are
problems with the parent device,
the child device will not send an
alarm
17. Faculty of Computer Science
Universitas Indonesia
Make Perfection
Continues Improvement (Kaizen)
Make procedures for using the
monitoring system
Implement best practice management
monitoring system (next slide)
18. Faculty of Computer Science
Universitas Indonesia
Make Perfection (Device Inventory)
19. Faculty of Computer Science
Universitas Indonesia
Make Perfection (Business View)
20. Faculty of Computer Science
Universitas Indonesia
Implementation Result
• Quantitatively after implementation, the
number of devices monitored increases while
alarms and events decreases
• Qualitatively, remains expected value
has been achieved
No Identified Values Caused Waste Activty Achievement
Yes No
1 Technicians able to quickly
see and respond to
problems that occur
Inventory
Motion
Waiting
Defect
Short
Shine
Create pull
system
O
2 Management able to
quickly find out which
services are interrupted
Motion
Waiting
Set in order
Perfection
(Create
business
view)
O
3 Executives able to quickly
learn which business
processes are disrupted
Motion
Waiting
Set in order
Perfection
(Create
business
view)
O
4 Able to provide accurate
alarm information
Inventory
Defect
Over
Production
Over
Processing
Short
Create pull
system
O
5 Able to monitor the use of
resources to maximize the
use of the service - - O
6 There are rules in the use of
each feature on the
monitoring system
Not directly
impact by
waste
Standarize
O
7 There is a clear workflow in
handling every alarm
Not directly
impact by
waste
Perfection
(Create SOP) O
8 Self service monitoring for
IT service owners
Not directly
impact by
waste
Set in order
O
9 Simple display that can be
directly understood by
ordinary users
Motion
Waiting
Shine
Make
Perfection
(Create
business
view)
O
Network
Elements
Nodes Interfaces Alerts Events
Amount
Before
Lean
7683 639 6613 111 348172
Amount
After Lean
10705 1308 6683 26 177343
Percentage
Ratio
39% 105% 1% -77% -49%
21. Faculty of Computer Science
Universitas Indonesia
Summary
• After the lean method is implemented,
the system can convey the expected value
of the customer
• Waste in the monitoring system can be
reduced so that there is an increase in
accuracy related to information on the
condition of the IT infrastructure
Lean method can be applied to manage monitoring system through the steps of applying lean principle as follows:
VoC (Voice of Customer)
SIPOC of Monitoring
System
Remove Monitoring
Waste
Send alert on the right
time, right amount, right
destination
Implement Kaizen
Good morning everyone, my name is Dio Pratama from University of Indonesia. I’m here today going to share and describe about my research, it’s about “Tittle”
As a brief, Kalbe Farma is one of largest Health Care & Phrameutical company in South East Asia. We have about ….
Just explain
It proven by auto generate ticketing system, that IT Infra department has produce the most total incident. And actually that incidents is mostly produced by our monitoring system.
By literature review, everyone agree that IT Infrastructure is one of key operational services that need to be monitored in proper management.
One of of popular process of management methode is lean. Lean…