The document discusses how to justify increased budgets for facilities monitoring to prevent disasters. It recommends using a three step process: 1) Explain why monitoring is important based on the organization's mission, 2) Describe how downtime could impact goals and how monitoring prevents this, 3) Provide a specific proposal outlining monitoring equipment and costs. A case study shows how the University of Northern Colorado used this approach to get approval for a leak detection system that quickly identified a problem and prevented major downtime costs and issues.
Downtime refers to the unavailability of websites, applications, or online services. It is a costly problem for businesses, with small companies losing up to $6,900 per hour and mid-sized companies losing up to $74,000 per hour during downtime. The main causes of downtime include hardware failures, human errors, software failures, security breaches, and natural disasters. Downtime costs businesses money through lost revenue, lost productivity, business disruption, recovery costs, and potential damage to reputation. Outages of more than a few seconds can cause customers to abandon websites.
A small section of the course ECP-901, Business Continuity & Resiliency Management, by the Institute for Business Continuity Training, https://www.ibct.com
Nucleus Research Study - Leave Management Cutting Labour CostsPatrick Ryan
Nucleus Research found that without leave management automation tools, the average employee takes 1.25 extra unearned days off per year, costing organizations in excess compensation. Leave automation tools can accurately track employee leave balances and avoid excess time off being granted by automating leave policies, accrual rules, and attendance policies. These tools increase manager productivity by automating complex leave-related tasks like processing requests, researching balances, and updating records. For organizations with existing time and attendance systems, extending automation to leave management can provide significant cost savings through improved accuracy and reduced excess compensation.
You’ve Experienced a Critical Event. What Do You Do Now?
In the event of a critical business disruption, what will you do?
Typically, the first step is for your senior executive or risk manager to call your insurance broker.
Netreo whitepaper 5 ways to avoid it management becoming shelfwarePeter Reynolds
This document provides 5 ways to keep IT management software from becoming shelfware or unused after purchase. The top reasons software becomes shelfware are: 1) Too many unnecessary alerts that are ignored; 2) Having to access information from multiple sources; 3) Complex interfaces that are difficult to use; 4) High maintenance and administration needs; 5) Purchasing more licenses than needed. The document recommends focusing on minimizing unnecessary alerts, providing a single dashboard, simplifying the interface, reducing administration through automation, and subscription-based purchasing to avoid shelfware.
Reporting, Tracking and Resolving Near MissesGarrett Foley
According to the National Safety Council, warning signs, or near miss incidents precedes most loss-producing events in the workplace. Is your organization paying attention to those warning signs? Are your safety managers adjusting processes and procedures, systems and setups to prevent those “narrow escapes” from becoming tragic consequences or costly mistakes?
Incentive programs aimed at safety performance can have unintended consequences if not carefully designed. Some programs may discourage reporting of injuries in order to receive rewards. Proper investigation of incidents is important to identify root causes such as fatigue, pressure to work quickly, or lack of training, rather than solely blaming individual worker error. A positive approach focusing on near miss reporting and proactive identification of hazards may better promote a strong safety culture.
Downtime refers to the unavailability of websites, applications, or online services. It is a costly problem for businesses, with small companies losing up to $6,900 per hour and mid-sized companies losing up to $74,000 per hour during downtime. The main causes of downtime include hardware failures, human errors, software failures, security breaches, and natural disasters. Downtime costs businesses money through lost revenue, lost productivity, business disruption, recovery costs, and potential damage to reputation. Outages of more than a few seconds can cause customers to abandon websites.
A small section of the course ECP-901, Business Continuity & Resiliency Management, by the Institute for Business Continuity Training, https://www.ibct.com
Nucleus Research Study - Leave Management Cutting Labour CostsPatrick Ryan
Nucleus Research found that without leave management automation tools, the average employee takes 1.25 extra unearned days off per year, costing organizations in excess compensation. Leave automation tools can accurately track employee leave balances and avoid excess time off being granted by automating leave policies, accrual rules, and attendance policies. These tools increase manager productivity by automating complex leave-related tasks like processing requests, researching balances, and updating records. For organizations with existing time and attendance systems, extending automation to leave management can provide significant cost savings through improved accuracy and reduced excess compensation.
You’ve Experienced a Critical Event. What Do You Do Now?
In the event of a critical business disruption, what will you do?
Typically, the first step is for your senior executive or risk manager to call your insurance broker.
Netreo whitepaper 5 ways to avoid it management becoming shelfwarePeter Reynolds
This document provides 5 ways to keep IT management software from becoming shelfware or unused after purchase. The top reasons software becomes shelfware are: 1) Too many unnecessary alerts that are ignored; 2) Having to access information from multiple sources; 3) Complex interfaces that are difficult to use; 4) High maintenance and administration needs; 5) Purchasing more licenses than needed. The document recommends focusing on minimizing unnecessary alerts, providing a single dashboard, simplifying the interface, reducing administration through automation, and subscription-based purchasing to avoid shelfware.
Reporting, Tracking and Resolving Near MissesGarrett Foley
According to the National Safety Council, warning signs, or near miss incidents precedes most loss-producing events in the workplace. Is your organization paying attention to those warning signs? Are your safety managers adjusting processes and procedures, systems and setups to prevent those “narrow escapes” from becoming tragic consequences or costly mistakes?
Incentive programs aimed at safety performance can have unintended consequences if not carefully designed. Some programs may discourage reporting of injuries in order to receive rewards. Proper investigation of incidents is important to identify root causes such as fatigue, pressure to work quickly, or lack of training, rather than solely blaming individual worker error. A positive approach focusing on near miss reporting and proactive identification of hazards may better promote a strong safety culture.
2002 ibc - Assessing the safety of staffing arrangementsAndy Brazier
This document describes a staffing assessment methodology developed for the HSE to help duty holders in the chemical and allied industries evaluate the adequacy of their staffing arrangements, particularly regarding loss of containment events. The methodology examines both physical staffing arrangements and individual/organizational factors through a series of decision trees and rating ladders. Case studies are provided showing how the methodology can be applied to evaluate proposed changes in staffing levels or organization. Common issues uncovered unrelated to specific changes are also noted.
A presentation given by Mark Williams of the JISC Access management Outrach Team at an RSC South east event at West Kent College on 16th May 2007. It looks at the key concepts of identity management as well as the technical benefits, issues of technical readiness and the choices available to learning providers.
This document discusses human factors in aviation maintenance. It explains that human conditions like fatigue, complacency and stress contribute to many maintenance errors and accidents. Ten disciplines related to human factors are described: clinical psychology, experimental psychology, anthropometrics, computer science, cognitive science, safety engineering, medical science, organizational psychology, educational psychology, and industrial engineering. The document emphasizes that considering human factors through approaches like these can improve safety and performance in aviation maintenance.
This document discusses the top 10 human and organizational factors issues relevant to high-hazard industries according to the UK Health and Safety Executive. It provides an overview of these issues and examples from the UK oil and gas industry of improvements made in these areas. A case study is presented analyzing human errors in isolation incidents using human factors analysis tools. Recommendations are provided for reducing isolation errors and violations.
Mastering disaster a data center checklistChris Wick
50% of businesses that experience data loss for 10 days or more file for bankruptcy and 93% fail within a year. But with a Disaster Recovery plan, you don't have to worry visit https://goo.gl/Ba1J9e.
6 Steps to Getting Your Nonprofit to Embrace New TechnologyAbby Curcio
Dealing with a stubborn Board of Directors? Follow this step-by-step guide and learn how to convince your Nonprofit's Board of Directors that new technology will improve your staff's overall efficiency
Uk Data Centre Cleaning commercial cleaning technicians have a reputation for being highly professional, pleasant and very efficient in the way they perform their duties.
This document discusses the importance of disaster recovery and business continuity plans for businesses that rely on technology. It notes that 43% of businesses without plans never reopen after a disaster. The document outlines key elements that should be included in plans such as employee training, data protection, compliance, 24/7 system monitoring, and documentation. It recommends hiring an IT company specialized in business support to help with creating and maintaining plans.
2005 Energy Institute - Staffing arrangements for automated plantAndy Brazier
The document discusses staffing arrangements for automated plants. It introduces a ladder for assessing automation with rungs for technical and human factors considerations. A case study applies the ladder to an offshore operator's plant:
- The plant relies heavily on automation and operates automatically most of the time, but staff are able to switch some equipment to manual.
- Applying the ladder assessment, the plant passes the top rungs for performance during normal operations but fails the lowest rung because human factors were not fully considered in the original automation design.
- The overall assessment places the plant's automation just below the line of minimum acceptability due to gaps in considering human factors from a socio-technical perspective.
Find ways to prevent Disaster from knocking on your company door! Make sure your plan is in place as we anticipate a weekend storm - sales@telehouse.com
Human Factors in a Safety
Management System – Breaking the
Chain
A safety management system (SMS) goes
beyond the health and safety concerns
usually associated with the mining or
building and construction disciplines. Ever
thought about the aerospace and defence
industries?
This presentation includes understanding
the human factors and cultural growth that
need to occur within any industry wanting
to implement a successful SMS.
This document discusses human factors in major hazard safety and outlines the top ten human factor issues according to a UK regulator. It begins with the author's biography and defines human factors. It then lists and briefly explains the top ten human factor topics, such as managing human failures, procedures, training and competence, and fatigue. It describes how organizations can use the top ten list to assess their capabilities and improve performance. An example is given of how addressing human factors led to a reduction in errors. The document concludes by providing references for further reading on applying human factors in industries like oil and gas.
Human Factors (HF) covers a variety of issues that relate primarily to the individual and workforce, their behavior and attributes. Human error is still poorly understood by many stakeholders and so the risk assessments of operations or process often fall short in their capture of potential failures. There is little consideration of human factors in the engineering design of equipment, operating systems and the overall process, procedures and specific work tasks. Operational human factor issues are often treated on an ad-hoc basis in response to individual situations rather than as part of an overarching and comprehensive safety management strategy. The role that human factors play in the rate of incidents, equipment failure and hydrocarbon releases is poorly understood and underdeveloped.
Accident investigation and Root Cause Analysis - by www.oyetrade.comNarendra Jayas
The presentation we at Oye Trade www.oyetrade.com prepared is for the HSE professionals and trainees to gain knowledge to conduct Accident Investigation and Root Cause Analysis activities at workplace.
This document discusses security system monitoring in healthcare facilities. It defines a security command center and outlines important considerations for their design and operation, including officer selection and training, physical and psychological limitations of monitors, and how ergonomics can impact performance. Effective security command centers require defining the role and selecting trained officers, understanding human limitations, and optimizing the work environment through lighting, temperature, noise control and more.
Accidents are caused by multiple interacting factors including human error, equipment failures, and environmental conditions. Major causes of workplace injuries in the US include overexertion, impacts, falls, and exposure to chemicals and extreme temperatures. Legislation like Workers' Compensation aims to provide benefits to injured workers while encouraging safety. Government agencies like OSHA and NIOSH were established to set and enforce safety standards in industries. Accidents result from interactions between human, job, equipment, and environmental factors.
Data centers are mission critical sites with complex components that are susceptible to a wide range of risks and hazards. When a data center outage occurs at another organization it is a "lesson learned." When it happens to you - it is a DISASTER. Watch the webinar: http://go.italerting.com/data-center-risks.html?trk=jimnelson_social
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015Gary Jennings
This document discusses improving workers' compensation claim defensibility. It begins by defining defensibility as the ability to successfully defend, protect, and justify actions. Common issues with claim outcomes like mediation, hearings and trials are then examined. The document suggests that thorough pre-incident planning, clear roles and responsibilities, and disciplined claims handling processes can help improve defensibility. Specific areas like reporting, investigating, and managing claims are identified as ones that require assertive execution to achieve the best results.
Human Error & Risk Factor Affecting Reliability & SafetyDushyant Kalchuri
Many system reliability predictive methods are based solely on equipment failures, neglecting the human component of man–machine systems (MMS). These methods do not consider the identification of the root causes of human errors.
Accelerating technological development leads to an increased importance of safety aspects for organizations as well as for their environment. Therefore, especially in the case of high hazard organizations an expanded view of safety – system safety including human factors is needed. These organizations need appropriate structures as well as rules for the treatment of safety relevant actions or tasks. The system safety approach is reflected in the recent developmental stage in safety research, which started with a focus on technology and its extension to human errors, socio-technical systems and recently to the inter-organizational perspective. Accident causation theories as well as approaches to organizational learning are the theoretical background. Nevertheless, the majority of measurements (methods) and interventions remain in the former stages, i.e. technical or human error orientation. This problem will be discussed by the means of examples. The contribution will end with an outlook to possible future ways of integrating the new developments in safety research.
This document summarizes a presentation about environmental monitoring technologies for facilities. It discusses the advantages and disadvantages of wired and wireless monitoring systems. Wired systems are reliable but difficult to scale and maintain, while wireless systems are easier to deploy but had concerns about battery life, interference and security. However, wireless technologies have improved with longer battery life, energy harvesting, better signals and encryption. The presentation concludes that the best solution depends on the specific facility and monitoring needs, and recommends researching technologies, vendors and determining key threat factors.
1. The document discusses best practices for implementing an effective employee service desk using Salesforce, including consolidating help requests, centralizing information, customizing the service desk interface, and outsourcing non-core functions.
2. Plum Benefits deployed Salesforce to create a centralized employee service desk, achieving significant cost savings, faster resolution times, and higher employee satisfaction compared to their previous fragmented systems.
3. The presentation outlines several best practices for an effective employee service desk based on Plum Benefits' experience, including creating consistent resolution processes, providing a productive agent environment, customizing for business needs, and measuring the right metrics.
2002 ibc - Assessing the safety of staffing arrangementsAndy Brazier
This document describes a staffing assessment methodology developed for the HSE to help duty holders in the chemical and allied industries evaluate the adequacy of their staffing arrangements, particularly regarding loss of containment events. The methodology examines both physical staffing arrangements and individual/organizational factors through a series of decision trees and rating ladders. Case studies are provided showing how the methodology can be applied to evaluate proposed changes in staffing levels or organization. Common issues uncovered unrelated to specific changes are also noted.
A presentation given by Mark Williams of the JISC Access management Outrach Team at an RSC South east event at West Kent College on 16th May 2007. It looks at the key concepts of identity management as well as the technical benefits, issues of technical readiness and the choices available to learning providers.
This document discusses human factors in aviation maintenance. It explains that human conditions like fatigue, complacency and stress contribute to many maintenance errors and accidents. Ten disciplines related to human factors are described: clinical psychology, experimental psychology, anthropometrics, computer science, cognitive science, safety engineering, medical science, organizational psychology, educational psychology, and industrial engineering. The document emphasizes that considering human factors through approaches like these can improve safety and performance in aviation maintenance.
This document discusses the top 10 human and organizational factors issues relevant to high-hazard industries according to the UK Health and Safety Executive. It provides an overview of these issues and examples from the UK oil and gas industry of improvements made in these areas. A case study is presented analyzing human errors in isolation incidents using human factors analysis tools. Recommendations are provided for reducing isolation errors and violations.
Mastering disaster a data center checklistChris Wick
50% of businesses that experience data loss for 10 days or more file for bankruptcy and 93% fail within a year. But with a Disaster Recovery plan, you don't have to worry visit https://goo.gl/Ba1J9e.
6 Steps to Getting Your Nonprofit to Embrace New TechnologyAbby Curcio
Dealing with a stubborn Board of Directors? Follow this step-by-step guide and learn how to convince your Nonprofit's Board of Directors that new technology will improve your staff's overall efficiency
Uk Data Centre Cleaning commercial cleaning technicians have a reputation for being highly professional, pleasant and very efficient in the way they perform their duties.
This document discusses the importance of disaster recovery and business continuity plans for businesses that rely on technology. It notes that 43% of businesses without plans never reopen after a disaster. The document outlines key elements that should be included in plans such as employee training, data protection, compliance, 24/7 system monitoring, and documentation. It recommends hiring an IT company specialized in business support to help with creating and maintaining plans.
2005 Energy Institute - Staffing arrangements for automated plantAndy Brazier
The document discusses staffing arrangements for automated plants. It introduces a ladder for assessing automation with rungs for technical and human factors considerations. A case study applies the ladder to an offshore operator's plant:
- The plant relies heavily on automation and operates automatically most of the time, but staff are able to switch some equipment to manual.
- Applying the ladder assessment, the plant passes the top rungs for performance during normal operations but fails the lowest rung because human factors were not fully considered in the original automation design.
- The overall assessment places the plant's automation just below the line of minimum acceptability due to gaps in considering human factors from a socio-technical perspective.
Find ways to prevent Disaster from knocking on your company door! Make sure your plan is in place as we anticipate a weekend storm - sales@telehouse.com
Human Factors in a Safety
Management System – Breaking the
Chain
A safety management system (SMS) goes
beyond the health and safety concerns
usually associated with the mining or
building and construction disciplines. Ever
thought about the aerospace and defence
industries?
This presentation includes understanding
the human factors and cultural growth that
need to occur within any industry wanting
to implement a successful SMS.
This document discusses human factors in major hazard safety and outlines the top ten human factor issues according to a UK regulator. It begins with the author's biography and defines human factors. It then lists and briefly explains the top ten human factor topics, such as managing human failures, procedures, training and competence, and fatigue. It describes how organizations can use the top ten list to assess their capabilities and improve performance. An example is given of how addressing human factors led to a reduction in errors. The document concludes by providing references for further reading on applying human factors in industries like oil and gas.
Human Factors (HF) covers a variety of issues that relate primarily to the individual and workforce, their behavior and attributes. Human error is still poorly understood by many stakeholders and so the risk assessments of operations or process often fall short in their capture of potential failures. There is little consideration of human factors in the engineering design of equipment, operating systems and the overall process, procedures and specific work tasks. Operational human factor issues are often treated on an ad-hoc basis in response to individual situations rather than as part of an overarching and comprehensive safety management strategy. The role that human factors play in the rate of incidents, equipment failure and hydrocarbon releases is poorly understood and underdeveloped.
Accident investigation and Root Cause Analysis - by www.oyetrade.comNarendra Jayas
The presentation we at Oye Trade www.oyetrade.com prepared is for the HSE professionals and trainees to gain knowledge to conduct Accident Investigation and Root Cause Analysis activities at workplace.
This document discusses security system monitoring in healthcare facilities. It defines a security command center and outlines important considerations for their design and operation, including officer selection and training, physical and psychological limitations of monitors, and how ergonomics can impact performance. Effective security command centers require defining the role and selecting trained officers, understanding human limitations, and optimizing the work environment through lighting, temperature, noise control and more.
Accidents are caused by multiple interacting factors including human error, equipment failures, and environmental conditions. Major causes of workplace injuries in the US include overexertion, impacts, falls, and exposure to chemicals and extreme temperatures. Legislation like Workers' Compensation aims to provide benefits to injured workers while encouraging safety. Government agencies like OSHA and NIOSH were established to set and enforce safety standards in industries. Accidents result from interactions between human, job, equipment, and environmental factors.
Data centers are mission critical sites with complex components that are susceptible to a wide range of risks and hazards. When a data center outage occurs at another organization it is a "lesson learned." When it happens to you - it is a DISASTER. Watch the webinar: http://go.italerting.com/data-center-risks.html?trk=jimnelson_social
Defensibility of Workers’ Compensation Claims GA PRIMA Apr2015Gary Jennings
This document discusses improving workers' compensation claim defensibility. It begins by defining defensibility as the ability to successfully defend, protect, and justify actions. Common issues with claim outcomes like mediation, hearings and trials are then examined. The document suggests that thorough pre-incident planning, clear roles and responsibilities, and disciplined claims handling processes can help improve defensibility. Specific areas like reporting, investigating, and managing claims are identified as ones that require assertive execution to achieve the best results.
Human Error & Risk Factor Affecting Reliability & SafetyDushyant Kalchuri
Many system reliability predictive methods are based solely on equipment failures, neglecting the human component of man–machine systems (MMS). These methods do not consider the identification of the root causes of human errors.
Accelerating technological development leads to an increased importance of safety aspects for organizations as well as for their environment. Therefore, especially in the case of high hazard organizations an expanded view of safety – system safety including human factors is needed. These organizations need appropriate structures as well as rules for the treatment of safety relevant actions or tasks. The system safety approach is reflected in the recent developmental stage in safety research, which started with a focus on technology and its extension to human errors, socio-technical systems and recently to the inter-organizational perspective. Accident causation theories as well as approaches to organizational learning are the theoretical background. Nevertheless, the majority of measurements (methods) and interventions remain in the former stages, i.e. technical or human error orientation. This problem will be discussed by the means of examples. The contribution will end with an outlook to possible future ways of integrating the new developments in safety research.
This document summarizes a presentation about environmental monitoring technologies for facilities. It discusses the advantages and disadvantages of wired and wireless monitoring systems. Wired systems are reliable but difficult to scale and maintain, while wireless systems are easier to deploy but had concerns about battery life, interference and security. However, wireless technologies have improved with longer battery life, energy harvesting, better signals and encryption. The presentation concludes that the best solution depends on the specific facility and monitoring needs, and recommends researching technologies, vendors and determining key threat factors.
1. The document discusses best practices for implementing an effective employee service desk using Salesforce, including consolidating help requests, centralizing information, customizing the service desk interface, and outsourcing non-core functions.
2. Plum Benefits deployed Salesforce to create a centralized employee service desk, achieving significant cost savings, faster resolution times, and higher employee satisfaction compared to their previous fragmented systems.
3. The presentation outlines several best practices for an effective employee service desk based on Plum Benefits' experience, including creating consistent resolution processes, providing a productive agent environment, customizing for business needs, and measuring the right metrics.
Class,Im providing a recently example of a critical analysis wr.docxclarebernice
Class,
I'm providing a recently example of a critical analysis written by Dr. Valorie King. This example is based on the 1st case study for this class, CSIA 350.
I think most of you have a good idea of what's required for the case studies, but use the information as you need. I will continue to grade appropriate.
A Critical Analysis (CA) is a discussion response that has an introductory paragraph, an analysis section (around 3 paragraphs or so), and a brief summary. For Case Study #1, a really good CA would have looked something like this:
There are many reasons why a business should invest in cybersecurity products and services. In [her / his] essay, [student name] addressed ethical principles which drive such investments. While ethics are important, the business needs and requirements for IT security must also be considered. In this critical analysis response, I would like to take a deeper look at three important points which drive businesses to invest in IT security.
First, consider the question of the Business Benefits of IT Security products and services. Businesses exist to make a profit (Vitez, 2016). Making a profit requires that losses and unnecessary costs be avoided. This is where the business benefit of IT security products comes into play. An anti-virus product can prevent a malware infection (Drew, 2011). Spending some money to buy an anti-virus product to prevent malware will save money in the long run since the business will not have to pay to cleanup malware infections on laptops, workstations, and servers.
Second, consider the question of Why an organization should invest in IT security technologies. This is very similar to the first question. But, in addition to the financial benefits (cost avoidance) there are also legal and regulatory reasons why an organization should invest in IT security technologies (Smedinghoff, 2005). Many laws require that companies use encryption to protect private information (HIPAA, FERPA, etc.). This is an IT security technology that a company may be legally required to purchase (invest in).
Third, consider Where an organization should focus its attention & why. Technology is only one type of investment that a company should make when it comes to IT security. Investing in people by hiring well qualified security professionals and then providing ongoing training is another area where a company needs to spend money to protect information, information systems, and information infrastructures (ISACA, 2009). Even the best IT security products need people who understand how to configure, test, and operate those products. For this reason, an organization should also focus its attention on hiring the best security professionals that it can afford. Then, the company should keep these people the best by investing in training.
In summary, there are many reasons why a business should invest in IT security and why those investments should include both people and products (technologies). But, the b ...
The document discusses insider threats and cybersecurity. It notes that the biggest threat companies face is from insiders like employees and vendors. While doing nothing on cybersecurity risks costly data breaches and fines, companies should implement regular employee training, vet vendors thoroughly, and create a risk management plan to address vulnerabilities. The presentation provides tools to assess risks like DREAD and STRIDE models and recommends prioritizing the highest impact risks with mitigation strategies and an incident response plan.
The document discusses designing effective cybersecurity risk management and education programs. It provides an overview of the objectives of the workshop, which are to assess risks and gaps, understand what needs to be done to address them, and create an enterprise-level risk management program. It also discusses scenarios involving a data breach, system outage, and malware outbreak to demonstrate potential costs. The document emphasizes measuring cybersecurity maturity levels and prioritizing the highest risks and most important strategic drivers for an organization.
[Webinar Slides] Put an End to Manual Data Processing AIIM International
This document summarizes a presentation on putting an end to manual data processing. It introduces the speaker, George Dunn, president of Cre8 Independent Consultants. Dunn has extensive experience in business process improvement, workflow, and paperless technologies planning. The presentation addresses challenges with manual processes, including providing poor customer service and errors. It also discusses challenges to removing paper, such as staff resistance to change and a lack of management initiatives. The presentation argues for developing an enterprise-level business case and mandates to support process improvements and deployment of new technologies.
This document discusses business continuity and disaster recovery. It defines key terms, noting that business continuity focuses on restoring business processes while disaster recovery focuses on restoring IT infrastructure. A business impact analysis is identified as the first step in developing a business continuity strategy. This involves assessing critical business processes, resources, impacts of downtime, and recovery time objectives. Finally, the document outlines developing a business continuity plan, including identifying recovery locations, procedures, and resources as well as the importance of testing plans.
The document discusses how plagiarism, piracy, and lack of proper etiquette online are harming creativity. Plagiarism involves stealing others' work by passing it off as one's own. Piracy refers to illegally distributing copyrighted material like software without permission. Improper online etiquette can compromise one's integrity and make them more prone to plagiarism or piracy. These issues are interrelated and their negative consequences like monetary losses and damaged reputations are justified. Upholding ethical standards online through respecting others' work and being civil is important for society and creativity to progress.
8 steps to Successful Accounts System Selection - Xledger WhitepaperXledger UK
Looking at a new Finance or Accounts system?
Perhaps your current system is no longer supported or your business has simply outgrown it and needs something more suitable to support future growth.
What steps can you take to ensure your business makes the right choice and derives all the business benefits associated with a modern finance system?
With over 6,000 successful accounts system implementations behind us we outline our 8 Steps to Successful System Selection.
Presentation on DR testing featuring quotes by Robert Nardella in an intervie...Robert Nardella
This document provides an overview and guidance for developing an effective disaster recovery (DR) test plan. It discusses the benefits of DR testing such as reducing downtime and improving organizational preparedness. Regular DR testing ensures an organization's DR plan stays up-to-date as IT infrastructure changes and validates the effectiveness of recovery procedures. The document outlines a 4-phase process for creating a DR test plan and provides tools and templates to help with planning, execution, and incorporating lessons learned from tests. It also offers options for guided or onsite assistance to help organizations develop and implement their DR test plan.
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
1) Natural disasters and outages cost businesses billions annually. Virtualization allows businesses to run multiple operating systems and applications on a single machine, increasing efficiency. It also enables easy copying of "virtual machines" for offsite backup and fast disaster recovery.
2) With virtualization, applications and data can be restored in hours versus days for tape-based systems. Backup copies of virtual machines are fully maintained for quick failover.
3) Adopting a virtualization solution with a solid recovery plan can help businesses survive disasters by restoring systems within hours instead of closing due to extended outages.
Your firm needs to be committed to protecting information assets, including personal data and client documents. As a trusted advisor to our clients, the expectation is that we are aware of threats and are guarding their data. Data privacy and information security are fundamental components of doing business today, no matter how large your firm is.
In this paper we will look at three specific ways of protecting our clients:
1. Protection through our ability to research and improve intellectual capital
2. Protection through policies, procedures and processes
3. Protection by securing client data
Planning and implementing a VMware disaster recovery (DR) plan is not a task to be taken lightly. Download this new white paper that will function as a checklist, that can guide you on the creation of a top-notch VMware disaster recovery plan.
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...31West Global Services
The document outlines 10 essentials for a successful offshore transition: 1) thorough knowledge transfer between client and vendor, 2) providing access to relevant systems, 3) establishing a single point of contact, 4) ensuring prompt responses, 5) implementing a quality assurance system, 6) utilizing reporting structures, 7) maintaining security and compliance, 8) defining clear escalation protocols, 9) building trust between parties, and 10) exercising patience during the transition process. Adhering to these 10 factors is said to help mitigate issues that may arise and facilitate a smooth transition.
The audit cycle performance consists of planning, preliminary survey, understanding the entity, identifying key areas and objectives, determining audit criteria, collecting evidence, generating working papers, and preparing audit findings. The initial stages involve obtaining general information on the company and identifying important areas to focus on. Later stages are testing evidence, documenting results, and communicating findings to the audited entity in a clear and understandable manner.
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
White-Collar Crime Fighter Newsletter Subscribe Now at No Cost!
FraudResourceNet has made the premier Anti-Fraud newsletter, White-Collar Crime Fighter freely available to all. All this is required is to complete the registration form with your work email address!
The widely read newsletter, White-Collar Crime Fighter brings you expert strategies and actionable advice from the most prominent experts in the fraud-fighting business. Every two months you'll learn about the latest frauds, scams and schemes... and the newest and most effective fraud-fighting tools, techniques and technologies to put to work immediately to protect your organization.
When it comes to fraud, knowledge of the countless schemes, how they work and red flags to look for will help keep you, your organization and your clients safe.
At FraudResourceNet we understand this and take great pride in providing our FREE White Collar Crime Fighter newsletter -- filled with exclusive articles and tips to provide the knowledge you need.
Make sure you stay informed. Sign up for White Collar Crime Fighter newsletter and we’ll keep you up-to-date on special promos, training opportunities, and other news and offers from FraudResourceNet!
Signing up is easy and FREE. If you have not already subscribed to our newsletter, please sign up to get started!
Sign up for the White Collar Crime Fighter Newsletter (a $99 value ... now completely FREE)
Similar to Pay Me Now or Pay Me A Lot More Later (20)
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Pay Me Now or Pay Me A Lot More Later
1. Pay Me Now Or Pay Me a
Lot More Later:
How To Get the Budget You Need To
Prevent Catastrophes, Not Clean
Them Up
Jeremy Swanner, Executive Vice President,
RLE Technologies
2. MANAGING CEUs AND CFM® MAINTENANCE POINTS
You are eligible to receive Continuing Education Units and Certified Facility Manager®
maintenance points for attending sessions at IFMA's World Workplace.
To receive 20 CFM maintenance points:
Record your attendance on your CFM Recertification Worksheet.
At recertification time, submit your completed CFM Recertification Worksheet.
To receive CEUs:
Pay the US$15 processing fee via registration
Log into the Attendee Service Center http://tinyurl.com/mwo9zxj
Your log in information was sent to you when you registered for the conference.
Complete the session evaluation then take the five question CEU assessment. After
passing the assessment, you will receive your certificate of completion. CEUs can only be
earned upon successful completion of the assessment.
Individuals seeking CEUs or LUs from other organizations must contact those
organizations for instructions on self-reporting credit hours.
3. Your Feedback is Valued!
Please take the time to Evaluate Sessions
Log into the Attendee Service Center
http://tinyurl.com/mwo9zxj
4. Meet Our Presenter:
Critical facilities monitoring utilizes ever-evolving technology,
and the field requires management that can adapt to an
increased demand for resources and security. Like you, data
center and critical facility expert Jeremy Swanner has adapted
to - and predicted - the changes. With more than 25 years (and
counting) of in-the-trenches experience in the critical facilities
space, Jeremy has intimate knowledge from a variety of
perspectives, with a focus on how to better protect sensitive facilities from threats.
RLE Technologies is a leading global provider of critical facility environment oversight and
notification. For more than 30 years, RLE has delivered reliable, cost-effective facility
monitoring and leak detection technologies with the sole purpose of preventing disasters,
providing peace of mind, and preserving its customer’s reputations. Thousands of
businesses worldwide rely on RLE products to detect environmental threats, notify
stakeholders, and mitigate risks to their critical sensitive facilities. RLE products are
manufactured in the United States. www.RLETech.com
5. Review Session Learning Objectives
1. Recognize why making a case for comprehensive facility
monitoring to the people holding the purse strings is so
important.
2. Discuss the multiple ways that facility downtime impacts the
performance of your business.
3. Understand how facility downtime impacts your reputation
and job security.
4. Learn how to quantify and justify the needed budget and
staffing to fully protect your facility.
6. To Reach Our Learning Objectives…
We will explore:
Basic causes and costs of downtime in your facility
Resulting costs from intangible concerns you may
not have considered
A three step, proven process for getting the
environmental monitoring budget you need
Review resources you can use to make your case
6 www.rletech.com Protecting facilities, people, and reputations
7. Continuing the Conversation
Have a thought during the presentation? Live-tweet
us your idea @RLETechnologies and we’ll
continue the conversation.
We also set aside time for your
questions at the end/Please jump
in with your questions as they arise
7 www.rletech.com Protecting facilities, people, and reputations
8. Why is Facilities Monitoring Important?
First, A Few Obvious Answers
Monitoring helps avoid:
Damage to mission critical data
and assets
Interrupted organizational productivity
The need to replacement or repair
of equipment and
other assets
Clean up
8 www.rletech.com Protecting facilities, people, and reputations
9. Typical Causes of Downtime
9 www.rletech.com Protecting facilities, people, and reputations
10. Another Source for Causes of Downtime
10 www.rletech.com Protecting facilities, people, and reputations
11. “Little” Problems Can Cost You BIG
Example: 2013 Cost of Data Center Outages
Average cost of outage: $7,900 per minute, up by
41% from 2010
Average reported incident length: 86 minutes,
equating to an average cost per incident of nearly
$680,000
Total data center outage statistics:
• Average recovery time of 119 minutes
• Cost of about $900,000
*Source: Ponemon Institute report “2013 Cost of Data Center Outages”
11 www.rletech.com Protecting facilities, people, and reputations
12. And It Gets Worse
Certain industries are even higher
• Hospitality sector (129% increase)
• Public sector (116%)
• Transportation (108%)
• Media organizations (104%)
• Financial (no data but… OH BOY)
Impact on reputation/loyalty and the loss of data
*Source: Ponemon Institute report “2013 Cost of Data Center Outages”
12 www.rletech.com Protecting facilities, people, and reputations
13. 2013 Downtime Costs by Industry
*Source: IT Performance Engineering and Measurement Strategies
13 www.rletech.com Protecting facilities, people, and reputations
14. 2013 Downtime Costs by Industry
Do you know the cost of downtime for your firm? If not,
*Source: Emerson 2013 Study on Data Center outages
that’s step one!
14 www.rletech.com Protecting facilities, people, and reputations
15. Slow Inflation? Not in Downtime Recovery
Change in cost of downtime by category
$53,608
$118,080
$140,543
$183,724
Business Disruption
Lost Revenue
End-User Productivity
15 www.rletech.com Protecting facilities, people, and reputations
$238,717
$42,530
$96,226
$179,827
$0 $50,000 $100,000 $150,000 $200,000 $250,000 $300,000
IT Productivity
2010 2013
*Source: Ponemon Institute report “2013 Cost of Data Center Outages”
16. Now For Some Not So Obvious Impacts
Legal and regulatory impact
Lost confidence and trust among key stakeholders
• Shareholders
• Customers
• The management team
• Your employees
Diminishment of marketplace
brand and reputation
16 www.rletech.com Protecting facilities, people, and reputations
17. The Intangible Costs
Decreased
customer
loyalty
Damage
to your
company's
reputation
Clean up
Employee
morale
issues
Ammunition
for your
competitors
“Morale is seriously affected by system
downtime, because IT lives in dread of
failures.”
-Robert McFarlane, principal and data center
design expert, Shen Milsom Wilke Inc.
“An outage can also erode a company's
competitive edge, like loss of business
reputation within the industry and/or customer
base.”
-Matt Stansberry, director of content and
publications, Uptime Institute
“There are tangible and intangible costs of
downtime. It can be expensive, but beyond the
financial implications, there is also a loss of
credibility and trust. When you are down, both
of these erode fast and take much longer to
rebuild.”
-Chuck Goolsbee, data center manager and
SearchDataCenter.com blogger
All quotes from a SearchDataCenter.com article.
17 www.rletech.com Protecting facilities, people, and reputations
18. What’s Your Cost of Downtime?
Insert question mark
Need a starting point? Download our
Cost of Downtime Calculator at
http://rletech.com/cost-of-doing-nothing-
calculator/
18 www.rletech.com Protecting facilities, people, and reputations
21. And What about You… Personally
The resulting impact on a career can be
significant:
A surprising 1 in 5 companies fired an IT employee
when a network downtime incident occurred
The ratio was more dramatic for some industries
1 in 3 companies in the natural resources, utilities &
telecoms sector sacked IT staff due to downtime
When downtime occurs, management
is going to be looking at YOU
*March 2014 Avaya survey
21 www.rletech.com Protecting facilities, people, and reputations
22. Making Your Case
Try using a Why How What case
Simon Sinek’s Golden Circle*
People make decisions based on emotion
Understand the core of WHY the company exists
Present HOW a business disruption would
impact the WHY
Show HOW to avoid the disruption
Detail WHAT will be needed to execute the HOW
*Simon Sinek’s Ted Talk located here http://www.youtube.com/watch?v=fMOlfsR7SMQ
22 www.rletech.com Protecting facilities, people, and reputations
23. Start With “Why”
Far too many business cases start
with WHAT needs to be done
NOT why we need to implement monitoring:
• Why does your company exist?
• Look to the company mission statement for guidance
• Consider the WHY from the perspective of the decision
maker
Get management passionate about monitoring’s
impact on the company WHY
Consider these BEFORE making
the case with facts and figures.
23 www.rletech.com Protecting facilities, people, and reputations
24. Once You Know “Why”, Move to “How”
HOW would downtime caused by controllable
environmental issues impact the WHY?
HOW can the company mitigate the risk to the
WHY?
The answer typically includes:
• Create and implement an action plan
• Deploy monitoring equipment
• Review procedures
24 www.rletech.com Protecting facilities, people, and reputations
25. Support the “How” with Facts
Case studies Probabilities
25 www.rletech.com Protecting facilities, people, and reputations
Impacts
Metrics
ROI
Cost of Doing Nothing
Calculations
26. HOW Can Be the Hardest Part
Be prepared to
challenge your boss
Give them what
they need and not just what they think they want
You must help them think beyond the “Threat de jour”
“The worst culture you can ingrain within a business is an
atmosphere of saying yes to everything. When you are debating a
new idea, those who disagree are crucial to getting the right result in
the end. Yes men will only ever get so far.”
Richard Branson, Founder of Virgin Group
26 www.rletech.com Protecting facilities, people, and reputations
27. “Top of Mind” ≠ “Good Priority”
It’s easy to get caught up in what just
happened…
Active shooter
Hurricane
Tornado
Earthquake
27 www.rletech.com Protecting facilities, people, and reputations
28. “Top of Mind” ≠ “Good Priority”
But it’s the less dramatic threats that can cause
the biggest problems:
Water Leaks
Chemical Leaks
Overheating
Power surges
Air Quality (pressure,
composition, etc.)
Excessive humidity
Vermin
28 www.rletech.com Protecting facilities, people, and reputations
29. Probability vs. Impact
Credit: High Stakes Business: People, Property and Services Report
For more information attend session 5.02, 8:00 am Friday Morning, IFMA
Research: Perspectives on Business Continuity, Management Skills
Learning Lab for more information
29 www.rletech.com Protecting facilities, people, and reputations
30. Finally, Provide the “WHAT”
Build out a candid, honest proposal to execute
the HOW
Do your homework
Present a comprehensive proposal protect the
WHAT
30 www.rletech.com Protecting facilities, people, and reputations
31. An Example For Leak Detection
This worksheet is available for free download at
http://rletech.com/system-design-worksheet/
31 www.rletech.com Protecting facilities, people, and reputations
32. Case Study: University of Northern Colorado
Director of IT Services, Marcus McCutchen,
identified vulnerabilities in the telephone and
computing centers
32 www.rletech.com Protecting facilities, people, and reputations
33. Step 1: WHY
Knowing UNC’s Vision statement provided the basis
The University of Northern Colorado strives to be a
leading student-centered university that promotes
effective teaching, lifelong learning, the advancement
of knowledge, research, and a commitment to
service.
This enabled Marcus to focus on the
student experience in his argument for
sufficient facilities monitoring
33 www.rletech.com Protecting facilities, people, and reputations
34. Step 2: HOW
• HOW would an environmental disaster impact the
student experience and ability to effectively learn?
• Reduce student effectiveness
• Impact student confidence in the university
• Jeopardize student security
• Calculated the cost of forecasted downtime, $92,000
conservatively
• HOW to limit the risk to the student experience?
• Implement a disaster mitigation and recovery plan
• Deploy leak detection equipment
• Schedule annual reviews of the plan
34 www.rletech.com Protecting facilities, people, and reputations
35. Step 3: WHAT
• Marcus started with a mitigation plan and review
process
• He then worked with RLE to design a leak detection
system
– Fluid sensing cable
– Distance read controller
– Spot detectors
– Automated notifications of key personnel
• Presented a final proposal including
– Cost of downtime
– Cost of new system
– ROI Calculation
35 www.rletech.com Protecting facilities, people, and reputations
36. Results
The administration at University of Northern
Colorado fast tracked the approval of the facilities
monitoring plan
Staff at UNC integrated a proactive, cost effective
and user-friendly monitoring system in just six weeks
36 www.rletech.com Protecting facilities, people, and reputations
37. Epilogue
Less than three months later, a “small” problem
occurred
Moisture in the telephone switch room was detected
Upon inspection, moisture was found along a section
of monitoring cable as well as a ceiling tile
The problem was eventually traced one story higher
to a cracked floor sink, which was located directly
above a critical piece of telecommunication
equipment.
Had the leak gone undetected, tens of thousands of
dollars in downtime would have resulted
37 www.rletech.com Protecting facilities, people, and reputations
38. Conclusion and Questions
“Prevent Catastrophes, Not Clean Them Up”
Further thoughts or questions after the presentation?
Contact Jeremy Swanner
jswanner@RLEtech.com
@RLETechnologies
RLE Mission
We exist to prevent disasters, preserve our clients’ reputation, and provide peace of mind.
38 www.rletech.com Protecting facilities, people, and reputations
39. Thank You!
Be sure to evaluate the session online at
the Attendee Service Center
http://tinyurl.com/mwo9zxj