These are slides from my talk on March 28, 2018 at the LA SCALE tech Meetup, graciously hosted at TicketMaster's office. (https://www.meetup.com/scalela/events/248904126/)
From Principles to Strategies for Systems EngineeringGlen Alleman
From Principles to Strategies How to apply Principles, Practices, and Processes of Systems Engineering to solve complex technical, operational,
and organizational problems
Short presentation delivered at Product Camp Austin 24 in Austin, TX on 22 Feb 2020. Intended to educate product management professionals on the fundamentals of model-based systems engineering for safety-critical and complex systems.
How to Enable LoB IT to Be Self-Sufficient with IntegrationMuleSoft
Requests for integration are increasing while resourcing remains the same. The only way to meet the growing demand is to better enable more IT professionals to become self-sufficient with integration by providing streamlined access to the technology, enabling easy onboarding, and ensuring fast onramp and project success. Learn the fundamentals and leave with resources you can use immediately to enable LoB to be successful while maintaining control and governance.
The modern IT stack has become diverse and distributed, and it’s increasingly challenging to manage heterogeneous platforms and multi-vendor devices. Customers are looking to the cloud and APM to help address these hurdles, as well as accelerate IT transformation.
But migrating to the cloud will take time, it won’t make infrastructure ‘just disappear’, and legacy workloads are going to remain part of the enterprise reality for many. In addition, while APM will continue to be increasingly important, all applications are not the same and an application is still not equal to a digital business service.
Watch this webinar as John Worthington, a service management expert and Director of Product Marketing for eG Innovations, continues our Shift-Left series. You can learn:
• Why domain expertise is important when defining monitoring requirements
• What analytics are useful from a monitoring and observability context
• How end-to-end monitoring with converged application and infrastructure performance can drive ITSM and DevOps integration
The Future of Microsoft Project Portfolio Management (PPM) for Delivering Val...OnePlan Solutions
For years, Microsoft’s Project Online has been a relied upon by organizations as its primary project and portfolio management solution. However, as Microsoft evolves, so do its platforms and the solutions. Dive in with us to explore the exciting innovations with Microsoft’s Project for the web and the OnePlan’s AI Strategic Portfolio Management Platform. With enhanced collaboration, data, workflow and reporting capabilities, this latest iteration is set to reshape the way teams operate and deliver value to the organization.
Five Common Mistakes made when Conducting a Software FMECAAnn Marie Neufelder
The software FMECA is a powerful tool for identifying software failure modes but there are 5 common mistakes that can derail the effectiveness of the analysis.
With special guests Ron Ratovsky and Darrel Miller from the OpenAPI Initiative's Technical Steering Committee, this SmartBear webinar session covered the history of Swagger and the OpenAPI Specification, and all the latest changes in OAS 3.1.
From Principles to Strategies for Systems EngineeringGlen Alleman
From Principles to Strategies How to apply Principles, Practices, and Processes of Systems Engineering to solve complex technical, operational,
and organizational problems
Short presentation delivered at Product Camp Austin 24 in Austin, TX on 22 Feb 2020. Intended to educate product management professionals on the fundamentals of model-based systems engineering for safety-critical and complex systems.
How to Enable LoB IT to Be Self-Sufficient with IntegrationMuleSoft
Requests for integration are increasing while resourcing remains the same. The only way to meet the growing demand is to better enable more IT professionals to become self-sufficient with integration by providing streamlined access to the technology, enabling easy onboarding, and ensuring fast onramp and project success. Learn the fundamentals and leave with resources you can use immediately to enable LoB to be successful while maintaining control and governance.
The modern IT stack has become diverse and distributed, and it’s increasingly challenging to manage heterogeneous platforms and multi-vendor devices. Customers are looking to the cloud and APM to help address these hurdles, as well as accelerate IT transformation.
But migrating to the cloud will take time, it won’t make infrastructure ‘just disappear’, and legacy workloads are going to remain part of the enterprise reality for many. In addition, while APM will continue to be increasingly important, all applications are not the same and an application is still not equal to a digital business service.
Watch this webinar as John Worthington, a service management expert and Director of Product Marketing for eG Innovations, continues our Shift-Left series. You can learn:
• Why domain expertise is important when defining monitoring requirements
• What analytics are useful from a monitoring and observability context
• How end-to-end monitoring with converged application and infrastructure performance can drive ITSM and DevOps integration
The Future of Microsoft Project Portfolio Management (PPM) for Delivering Val...OnePlan Solutions
For years, Microsoft’s Project Online has been a relied upon by organizations as its primary project and portfolio management solution. However, as Microsoft evolves, so do its platforms and the solutions. Dive in with us to explore the exciting innovations with Microsoft’s Project for the web and the OnePlan’s AI Strategic Portfolio Management Platform. With enhanced collaboration, data, workflow and reporting capabilities, this latest iteration is set to reshape the way teams operate and deliver value to the organization.
Five Common Mistakes made when Conducting a Software FMECAAnn Marie Neufelder
The software FMECA is a powerful tool for identifying software failure modes but there are 5 common mistakes that can derail the effectiveness of the analysis.
With special guests Ron Ratovsky and Darrel Miller from the OpenAPI Initiative's Technical Steering Committee, this SmartBear webinar session covered the history of Swagger and the OpenAPI Specification, and all the latest changes in OAS 3.1.
Using Models for Incident, Change, Problem and Request Fulfillment ManagementITSM Academy, Inc.
Using Models for Incident, Change, Problem and Request Fulfillment Management
Developing pre-defined, proceduralized models for different types of Incidents, Change, Problems and Requests make processes more efficient and effective. This webinar will take a look at the different types of models and how they can be a powerful tool for managing services.
The vital role of AIOps in overcoming IT operational challenges - DEM07-SR - ...Amazon Web Services
Digital transformation has sparked an IT service availability crisis in the enterprise, driven by unprecedented levels of infrastructure scale and complexity, rendering the traditional, rules-driven approach to incident management obsolete. Artificial intelligence for IT Operations, or AIOps, is a new direction for assuring service availability via operational data. In this talk, we show how AIOps gives enterprises a critical advantage and paves the way for the future of service assurance. We examine how adopting AIOps yields greater business agility while improving customer service, lowering operation costs, and boosting IT Ops teams’ productivity. This presentation is brought to you by AWS partner, Moogsoft Inc.
ITSM is one of the most popular and globally acknowledge IT service management certification for IT professionals. ITSM certification is offered to professionals who qualify in the ISO/IEC 20000 exam. To make this certification achievable, Simplilearn brings to you online ITSM training that lets you prepare for the ISO/IEC 20000 exam at your pace and from your own place. This presentation on ITSM includes all important topics based on the ISO/IEC 20000 exam. Each slide is prepared by our certified and experienced ITSM trainers. Understand all the service management processes including resolution process, control process, release process, service delivery process and relationship process through this ITSM training reference material. Improve your knowledge and enhance your confidence towards attaining the ITSM certification with Simplilearn.
Sacamos la bola de cristal para conocer la estrategia y el roadmap de MuleSoft. Juan José Rodríguez nos guiará sobre las grandes líneas de desarrollo del producto de Anypoint, así como las novedades ya disponibles (¡incluyendo demo de Universal API Management!).
El evento lo realizaremos de forma tanto presencial en las oficinas de NTT DATA, en Castellana 77, Planta 12 (salas 6 a 9), como virtual. Para los que atiendan presencialmente tendremos algunas sorpresas 🙌🏻
E Roger Pressman Bruce Maxim Software Engineering_ A Practitioner's Approach 8e.
Chapter 5:
5.1 What is Agility?
5.3 What is an Agile Process?
5.3.1 Agility Principles.
5.3.2 The Politics of Agile Development
5.4 Extreme Programming
5.4.1 The XP process
5.5 Other Agile process Models
5.5.1 Scrum
CapellaDays2022 | ThermoFisher - ESI TNO | A method for quantitative evaluati...Obeo
Development of high-tech systems is a complex task done by diverse specialists distributed across the globe. Reference architectures including a clear functional breakdowns can support them and support their decisions. This presentation proposes an approach to improve the development of advanced electron microscopes by using Capella as an authoritative source of information. To support design decisions, a Capella AddOn has been developed to obtain quantitative information, such as throughput numbers, for a particular workflow. First, we will illustrate how functional and system decompositions can be captured and serve as company-wide architecting assets to inform design decisions. Next, we will outline how simulating Capella models can bring valuable insights to modelers. During a demo, we’ll simulate Capella’s Functional chains using the open-source simulation tool POOSL (https://github.com/eclipse/poosl) , and visualize results using the freely available TRACE4CPS tool (https://www.eclipse.org/trace4cps/). Re-using functions from the reference architecture allows us reason about design aspects such as the relation between throughput and design choices about function allocation and parallelism.
***
The open-source code of the solution is available at https://github.com/TNO/capella-workflow-dse
Is There a Return on Investment from Model-Based Systems Engineering?Elizabeth Steiner
See our latest webinar “Is There a Return on Investment from MBSE?” This question is one that many people ask. In fact, the International Council on Systems Engineering (INCOSE) has that as one of its tasks for their Value Proposition Initiative. A group of systems engineers is trying to find evidence to prove that MBSE has value. However, that becomes very difficult for a concept that has only been around for a dozen years, when the lifecycle of many of the systems of interest are measured in several decades. Your host Dr. Steven Dam will walk you through a method of finding a case for MBSE in this webinar.
https://youtu.be/NnQDinanhJU
Competency is a measure of an individual’s ability in terms of knowledge, skills, and behaviour to perform a given role in the Systems Engineering processes. The competency planning and deployment of Systems Engineering competencies are considered as one key factor in the successful re-industrialisation and digital transformation of Europe.
ISECF can be applied in the context of any application, project, organisation or enterprise for both individual and/or organisational assessment and/or development.
The rapid rise in technology has certainly transformed the way organizations work. In this digitized era, businesses have started aligning their processes with abundance technologies. There is a constant battle between organizations to prove their worth and attain a stable position. The race towards success is so high, and of course, the digital revolution makes it even more interesting. But, installing technology and upgrading software needs a lot of maintenance too. If one wants to run their organization smoothly, every software must be maintained and secured regularly. This is why corporate sectors take the help of vendors who provide them with their best services. Presenting our professionally designed Software Maintenance Project Proposal PowerPoint Presentation Slides, which helps you land more clients. With the help of this software development proposal PPT slide, you can showcase your advanced tools that secure the clients’ applications and systems easily. The proposal PowerPoint template comes up with ample space where you can jot down the information that makes your proposal more interactive. Utilizing this compelling software maintenance proposal PPT theme, you can display your company logo that adds more style to your proposal. Take the assistance of our software up-gradation project proposal PowerPoint template and talk about your accomplished previous projects that leave your clients awestruck. There are high-grade icons and lucrative designs present in the slide, which makes your content extraordinary. Jot down all the information related to your company and hold the clients’ attention by using this engaging proposal PPT layout. Incorporate this pre-designed software security proposal PPT presentation slide to state your company’s accomplishments over the years. Strike a chord with the clients by talking about your client testimonials. Create a jaw-dropping cover letter and make your relationship with clients stronger by downloading our ready-to-use software maintenance project proposal PowerPoint presentation slide.https://bit.ly/38gyqcL
"To be tested a system has to be designed to be tested"
Eberhardt Rechtin, The Art Of System Architecting
Testing is one of the main activities through which we gather data to assess the quality of our software; this makes testability an important attribute of software--not only for development, but also for maintenance and bug fixing.
Design for testability is a term that has its origin in hardware design, where the concept was introduced in order to make it easier testing circuits while reducing the costs of doing so.
In this talk I'll show how to translate this concept to the software domain along with the consequences on various aspects of the development activities, both from the technical point of view (e.g., design, code quality, choice of frameworks, etc.), and the product management point of view (e.g., management of team dependencies, delivery time, costs, etc.). I'll provide examples based on real world experience, both for the technical and the management aspects.
Using Models for Incident, Change, Problem and Request Fulfillment ManagementITSM Academy, Inc.
Using Models for Incident, Change, Problem and Request Fulfillment Management
Developing pre-defined, proceduralized models for different types of Incidents, Change, Problems and Requests make processes more efficient and effective. This webinar will take a look at the different types of models and how they can be a powerful tool for managing services.
The vital role of AIOps in overcoming IT operational challenges - DEM07-SR - ...Amazon Web Services
Digital transformation has sparked an IT service availability crisis in the enterprise, driven by unprecedented levels of infrastructure scale and complexity, rendering the traditional, rules-driven approach to incident management obsolete. Artificial intelligence for IT Operations, or AIOps, is a new direction for assuring service availability via operational data. In this talk, we show how AIOps gives enterprises a critical advantage and paves the way for the future of service assurance. We examine how adopting AIOps yields greater business agility while improving customer service, lowering operation costs, and boosting IT Ops teams’ productivity. This presentation is brought to you by AWS partner, Moogsoft Inc.
ITSM is one of the most popular and globally acknowledge IT service management certification for IT professionals. ITSM certification is offered to professionals who qualify in the ISO/IEC 20000 exam. To make this certification achievable, Simplilearn brings to you online ITSM training that lets you prepare for the ISO/IEC 20000 exam at your pace and from your own place. This presentation on ITSM includes all important topics based on the ISO/IEC 20000 exam. Each slide is prepared by our certified and experienced ITSM trainers. Understand all the service management processes including resolution process, control process, release process, service delivery process and relationship process through this ITSM training reference material. Improve your knowledge and enhance your confidence towards attaining the ITSM certification with Simplilearn.
Sacamos la bola de cristal para conocer la estrategia y el roadmap de MuleSoft. Juan José Rodríguez nos guiará sobre las grandes líneas de desarrollo del producto de Anypoint, así como las novedades ya disponibles (¡incluyendo demo de Universal API Management!).
El evento lo realizaremos de forma tanto presencial en las oficinas de NTT DATA, en Castellana 77, Planta 12 (salas 6 a 9), como virtual. Para los que atiendan presencialmente tendremos algunas sorpresas 🙌🏻
E Roger Pressman Bruce Maxim Software Engineering_ A Practitioner's Approach 8e.
Chapter 5:
5.1 What is Agility?
5.3 What is an Agile Process?
5.3.1 Agility Principles.
5.3.2 The Politics of Agile Development
5.4 Extreme Programming
5.4.1 The XP process
5.5 Other Agile process Models
5.5.1 Scrum
CapellaDays2022 | ThermoFisher - ESI TNO | A method for quantitative evaluati...Obeo
Development of high-tech systems is a complex task done by diverse specialists distributed across the globe. Reference architectures including a clear functional breakdowns can support them and support their decisions. This presentation proposes an approach to improve the development of advanced electron microscopes by using Capella as an authoritative source of information. To support design decisions, a Capella AddOn has been developed to obtain quantitative information, such as throughput numbers, for a particular workflow. First, we will illustrate how functional and system decompositions can be captured and serve as company-wide architecting assets to inform design decisions. Next, we will outline how simulating Capella models can bring valuable insights to modelers. During a demo, we’ll simulate Capella’s Functional chains using the open-source simulation tool POOSL (https://github.com/eclipse/poosl) , and visualize results using the freely available TRACE4CPS tool (https://www.eclipse.org/trace4cps/). Re-using functions from the reference architecture allows us reason about design aspects such as the relation between throughput and design choices about function allocation and parallelism.
***
The open-source code of the solution is available at https://github.com/TNO/capella-workflow-dse
Is There a Return on Investment from Model-Based Systems Engineering?Elizabeth Steiner
See our latest webinar “Is There a Return on Investment from MBSE?” This question is one that many people ask. In fact, the International Council on Systems Engineering (INCOSE) has that as one of its tasks for their Value Proposition Initiative. A group of systems engineers is trying to find evidence to prove that MBSE has value. However, that becomes very difficult for a concept that has only been around for a dozen years, when the lifecycle of many of the systems of interest are measured in several decades. Your host Dr. Steven Dam will walk you through a method of finding a case for MBSE in this webinar.
https://youtu.be/NnQDinanhJU
Competency is a measure of an individual’s ability in terms of knowledge, skills, and behaviour to perform a given role in the Systems Engineering processes. The competency planning and deployment of Systems Engineering competencies are considered as one key factor in the successful re-industrialisation and digital transformation of Europe.
ISECF can be applied in the context of any application, project, organisation or enterprise for both individual and/or organisational assessment and/or development.
The rapid rise in technology has certainly transformed the way organizations work. In this digitized era, businesses have started aligning their processes with abundance technologies. There is a constant battle between organizations to prove their worth and attain a stable position. The race towards success is so high, and of course, the digital revolution makes it even more interesting. But, installing technology and upgrading software needs a lot of maintenance too. If one wants to run their organization smoothly, every software must be maintained and secured regularly. This is why corporate sectors take the help of vendors who provide them with their best services. Presenting our professionally designed Software Maintenance Project Proposal PowerPoint Presentation Slides, which helps you land more clients. With the help of this software development proposal PPT slide, you can showcase your advanced tools that secure the clients’ applications and systems easily. The proposal PowerPoint template comes up with ample space where you can jot down the information that makes your proposal more interactive. Utilizing this compelling software maintenance proposal PPT theme, you can display your company logo that adds more style to your proposal. Take the assistance of our software up-gradation project proposal PowerPoint template and talk about your accomplished previous projects that leave your clients awestruck. There are high-grade icons and lucrative designs present in the slide, which makes your content extraordinary. Jot down all the information related to your company and hold the clients’ attention by using this engaging proposal PPT layout. Incorporate this pre-designed software security proposal PPT presentation slide to state your company’s accomplishments over the years. Strike a chord with the clients by talking about your client testimonials. Create a jaw-dropping cover letter and make your relationship with clients stronger by downloading our ready-to-use software maintenance project proposal PowerPoint presentation slide.https://bit.ly/38gyqcL
"To be tested a system has to be designed to be tested"
Eberhardt Rechtin, The Art Of System Architecting
Testing is one of the main activities through which we gather data to assess the quality of our software; this makes testability an important attribute of software--not only for development, but also for maintenance and bug fixing.
Design for testability is a term that has its origin in hardware design, where the concept was introduced in order to make it easier testing circuits while reducing the costs of doing so.
In this talk I'll show how to translate this concept to the software domain along with the consequences on various aspects of the development activities, both from the technical point of view (e.g., design, code quality, choice of frameworks, etc.), and the product management point of view (e.g., management of team dependencies, delivery time, costs, etc.). I'll provide examples based on real world experience, both for the technical and the management aspects.
In today's increasingly digitalised world, software defects are enormously expensive. In 2018, the Consortium for IT Software Quality reported that software defects cost the global economy $2.84 trillion dollars and affected more than 4 billion people. The average annual cost of software defects on Australian businesses is A$29 billion per year. Thus, failure to eliminate defects in safety-critical systems could result in serious injury to people, threats to life, death, and disasters. Traditionally, software quality assurance activities like testing and code review are widely adopted to discover software defects in a software product. However, ultra-large-scale systems, such as, Google, can consist of more than two billion lines of code, so exhaustively reviewing and testing every single line of code isn't feasible with limited time and resources. This project aims to create technologies that enable software engineers to produce the highest quality software systems with the lowest operational costs. To achieve this, this project will invent an end-to-end explainable AI platform to (1) understand the nature of critical defects; (2) predict and locate defects; (3) explain and visualise the characteristics of defects; (4) suggest potential patches to automatically fix defects; (5) integrate such platform as a GitHub bot plugin.
How do organizations build secure applications, given today's rapidly moving and evolving DevOps practices? Join Black Duck and our customer experts on best practices for application security in DevOps.
You’ll learn:
-New security challenges facing today’s popular DevOps and Continuous Integration (CI) practices, including managing custom code and open source risks with containers and traditional environments
-Best practices for designing and incorporating an automated approach to application security into your existing development environment
-Future development and application security challenges organizations will face and what they can do to prepare
#DOAW16 - DevOps@work Roma 2016 - Testing your databasesAlessandro Alpi
In these slides we will speak about how to unit test our programmability in SQL Server and how to move from a manual process to an automated one in order to achieve the goals of DevOps
Production Readiness Strategies in an Automated WorldSean Chittenden
Production Ready. What does it mean? And to whom? Does that term factor in post-launch concerns such as debugability and ownership? What are the lifecycle phases for moving an idea into a hardened production system?
As the world continues its furious adoption of automation, Foo-as-a-Service, and ever changing tools, what are the baseline assumptions, risks, checklists, and processes required to support the evolving landscape of "production ready." In this talk we will deploy a sample application and build both a checklist and scorecard to evaluate the readiness of a system and an organization's practices.
Presentation for Harvard's ABCD Technology in Education group:
The Institute for Quantitative Social Science (IQSS) is a unique entity at Harvard - it combines research, software development, and specialized services to provide innovative solutions to research and scholarship problems at Harvard and beyond. I will talk about the software projects that IQSS is currently working on (Dataverse, Zelig, Consilience, and OpenScholar), including the research and development processes, the benefits provided to the Harvard community, and the impacts on research and scholarship.
The field of machine programming — the automation of the development of software — is making notable research advances. This is, in part, due to the emergence of a wide range of novel techniques in machine learning. In today’s technological landscape, software is integrated into almost everything we do, but maintaining software is a time-consuming and error-prone process. When fully realized, machine programming will enable everyone to express their creativity and develop their own software without writing a single line of code. Intel realizes the pioneering promise of machine programming, which is why it created the Machine Programming Research (MPR) team in Intel Labs. The MPR team’s goal is to create a society where everyone can create software, but machines will handle the “programming” part.
Similar to Resilience Engineering: A field of study, a community, and some perspective shifting. (20)
Velocity EU 2012 Escalating Scenarios: Outage Handling PitfallsJohn Allspaw
When things go wrong, our judgement is clouded at best, blinded at worst.
In order to successfully navigate a large-scale outage, being aware of potentials gaps in knowledge and context can help make for a better outcome. The Human Factors and Systems Safety community have been studying how people situate themselves, coordinate amongst a team, use tooling, make decisions, and keep their cool under sometimes very stressful and escalating scenarios. We can learn from this research in order to adopt a more mature stance when the s*#t hits the fan.
We’re going to look closely at how people behave under these circumstances using real-world examples and scan what we can learn from High Reliability Organizations(HROs) and fields such as aviation, military, and trauma-driven healthcare.
Anticipation: What Could Possibly Go Wrong?John Allspaw
This is a talk I gave at the first Velocity Europe Conference, in November 2011. The slides won't make too much sense without the video, which should be here:
10+ Deploys Per Day: Dev and Ops Cooperation at FlickrJohn Allspaw
Communications and cooperation between development and operations isn't optional, it's mandatory. Flickr takes the idea of "release early, release often" to an extreme - on a normal day there are 10 full deployments of the site to our servers. This session discusses why this rate of change works so well, and the culture and technology needed to make it possible.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
7. http://stella.report
Year-long project
Researchers analyzed 3 incidents, at:
Six themes
•Postmortems as re-calibration
•Blameless v. sanctionless after action actions
•Controlling the costs of coordination
•Visualizations during anomaly management
•Strange Loops
•Dark Debt
8. What You Are In For
1. Resilience Engineering: a field and a community
2. Accentuating the positive
3. Avoidance of shallow data
4. Some food for thought
9. Resilience Engineering
• A field of study that emerged largely from Cognitive Systems Engineering,
early 2000s.
• 7 symposia over 12 years
10. Resilience Engineering
Community
is largely made up of practitioners and researchers from….
working in these domains…
Aviation/ATM
Rail
Maritime
Space
Surgery Power Plants
Intelligence
Agencies
Law Enforcement
Mining
Construction
Explosives
Firefighting
Anesthesia
Pediatrics
Power Grid &
Distribution
Military
Agencies
Software Engineering
Human Factors & Ergonomics Cognitive Systems Engineering Cybernetics Complexity Science Engineering*
Psychology Sociology Ecology Safety Science
11. Some of the cast of characters
David Woods
CSEL/OSU
Shawna Perry
Univ of Florida
Emergency Medicine
Dr. Richard Cook
Anesthesiologist
Researcher
Ivonne Andrade Herrera
SINTEF
Erik Hollnagel
Univ of S. Denmark
Anne-Sophie Nyssen
University de Liege Johan Bergström
Lund University
Sidney Dekker
Griffith University
Asher Balkin
CSEL/OSU
Laura Maguire
CSEL/OSU
12. Sample of Research
Experiences in Fukushima Dai-ichi nuclear power plant in light of resilience engineering
Unmanned Aircraft Systems in (Inter)national Airspace: Resilience as a Lever in the Debate
Sociotechnical Networks for Power Grid Resilience: South Korean Case Study
Limits on adaptation: Modeling Resilience and Brittleness in Hospital Emergency Departments
18. code repositories
macro
descriptions
testing/validation
suites
code
code stuff
meta
rules
scripts,
rules, etc.
test cases
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
externally sourced
code (e.g. DB)
results
the using
world
delivery
technology
stack
internally sourced code
results
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
systemsystem framing
doing
code repositories
macro
descriptions
testing/validation
suites
code
code stuff
meta
rules
scripts,
rules, etc.
test cases
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
externally sourced
code (e.g. DB)
results
the using
world
delivery
technology
stack
internally sourced code
results
19. deploy organization/
“monitoring”
Adding stuff
to the running
system
Getting stuff
ready to be part
of the running
system
architectural
& structural
framing
keeping track
of what “the
system” is
doing
code deploy
organization/
20. code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
Adding stuff
to the running
system
Getting stuff
ready to be part
of the running
system
architectural
& structural
framing
keeping track
of what “the
system” is
doing
code repositories
macro
descriptions
testing/validation
suites
code
code stuff
meta
rules
scripts,
rules, etc.
test cases
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
externally sourced
code (e.g. DB)
results
the using
world
delivery
technology
stack
internally sourced code
results
The Work Is Done
Here
Your Product Or
Service
The Stuff You Build and
Maintain With
21. code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
Adding stuff
to the running
system
Getting stuff
ready to be part
of the running
system
architectural
& structural
framing
keeping track
of what “the
system” is
doing
code repositories
macro
descriptions
testing/validation
suites
code
code stuff
meta
rules
scripts,
rules, etc.
test cases
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
externally sourced
code (e.g. DB)
results
the using
world
delivery
technology
stack
internally sourced code
results
24. What matters. Why what matters matters.
code deploy
organization/
encapsulation “monitoring”
Why is it doing that?
hat needs to change?
What does it mean?
How should this work?
What’s it doing?
What does it mean?
What is happening?
What should be happening
What does it mean?
Adding stuff
to the running
system
Getting stuff
ready to be part
of the running
system
architectural
& structural
framing
keeping track
of what “the
system” is
doing
go
purp
ris
cogn
act
intera
spe
ges
cli
sig
represe
What matters. Why what matters matters.
code deploy
organization/
encapsulation “monitoring”
Why is it doing that?
hat needs to change?
What does it mean?
How should this work?
What’s it doing?
What does it mean?
What is happening?
What should be happening
What does it mean?
Adding stuff
to the running
system
Getting stuff
ready to be part
of the running
system
architectural
& structural
framing
keeping track
of what “the
system” is
doing
go
purp
ris
cogn
act
intera
spe
ges
cli
sig
represe
observing
inferring
anticipating
planning
troubleshooting
diagnosing
correcting
modifying
reacting
25. code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
Adding stuff
to the running
system
Getting stuff
ready to be part
of the running
system
architectural
& structural
framing
keeping track
of what “the
system” is
doing
code repositories
macro
descriptions
testing/validation
suites
code
code stuff
meta
rules
scripts,
rules, etc.
test cases
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
externally sourced
code (e.g. DB)
results
the using
world
delivery
technology
stack
internally sourced code
results
Time
…and things are
changing here
things are
changing
here…
26. “above the line”
…is not “management”
…is not “organization design” or reporting structures
…is how people work (detect/diagnose/solve problems, both acute and
chronic) alongside and with technology and each other, under continual
trade-off scenarios, that provide the audacity to build and sustain adaptive
capacity.
28. “Resilience is an expression of how people,
alone or together,
cope with everyday situations – large and small –
by adjusting their performance to the conditions.
An organization’s performance is resilient if it can function as required
under expected and unexpected conditions alike
(changes/disturbances/opportunities).”
Hollnagel, Erik. Safety-II in Practice: Developing the Resilience Potentials
31. If you haven’t found people responsible for
outcomes, you haven’t “seen” the system.
32. Humans are predominantly seen as a liability or hazard.
They are a problem to be fixed.
Traditional view on the role of people (“Safety-I”)
Humans are seen as a resource necessary for system flexibility and resilience.
They provide flexible solutions to many potential problems.
RE view on the role of people in complex systems (“Safety-II”)
33. How does our software work, really?
How does our software break, really?
What do we do to keep it all working?
34. explanations of accidents
Safety-I
Accidents are caused by failures and malfunctions. The purpose of an
investigation is to identify causes and contributory factors.
Safety-II
Things go well and fail in basically the same ways, regardless of outcome.
The purpose of an investigation is to understand how things usually go right
as a basis for explaining how things occasionally go wrong.
39. code repositories
macro
descriptions
testing/validation
suites
code
code stuff
meta
rules
scripts,
rules, etc.
test cases
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
above
the line
below
the line externally sourced
code (e.g. DB)
results
the using
world
delivery
technology
stack
internally sourced code
results
code repositories
macro
descriptions
testing/validation
suites
code
code stuff
meta
rules
scripts,
rules, etc.
test cases
code
generating
tools
testing
tools
deploy
tools
organization/
encapsulation
tools
“monitoring”
tools
above
the line
below
the line externally sourced
code (e.g. DB)
resultsdelivery
technology
stack
internally sourced code
results
incidents as…
drivers of software design
- “incidents of yesterday inform the architectures of tomorrow”
- incidents “below the line” drive changes “above the line"
- staffing, budgets, planning, roadmaps, etc.
- shape the design of new components, subsystems, architectures
💥
40. 5/6/2010 - “Flash Crash” - loss of $1 trillion in market value in <10min
3/23/2012 - BATS IPO - systems issue halted the exchange’s own IPO
5/23/2012 - Facebook IPO - systems issue delayed IPO trading
8/1/2012 - Knight Capital - $461 million in 45 minutes
“Regulation SCI”
- tend also to give birth to new forms of regulations, policies, norms,
compliance requirements, explosion of documentation, auditing, constraints,
etc.
- “incidents of yesterday inform the rules of tomorrow”
- influence staffing, budgets, planning, roadmaps, etc.
PCI-DSS
1988-1998, Visa and MasterCard reported
credit card losses due to fraud of $750 million
incidents as…
motivators for policy
42. incidents help us gauge the delta between
how
the system works
how we think
the system works
Δ
{almost always greater than we imagine
43. “…nonroutine, challenging events, because these tough cases have the
greatest potential for uncovering elements of expertise and related
cognitive phenomena.” (Klein, Crandall, Hoffman, 2006)
A family of well-worn methods, approaches, and techniques
Cognitive task/work analysis
Process tracing
Conversation analysis
Critical decision method
Critical incident technique
more…
research validates these opportunities
56. “Resilience is an expression of how people, alone or together,
cope with everyday situations – large and small –
by adjusting their performance to the conditions.
An organization’s performance is resilient if it can function as required
under expected and unexpected conditions alike
(changes/disturbances/opportunities).”
59. What is it doing?!
Why is it doing that?!
What will it do next?
How did it get into this state?
WTF is happening?
If we do Y, will it help us figure out what to do?
Is it getting worse?
It looks like it’s fixed…but is it…?
If we do X, will it prevent it from getting worse…or make it worse?
Who else should we call that can help us?
Is this OUR issue, or are we BEING ATTACKED?!
60. incidents provide calibration about…
how decisions are focused
how attention flows
how work is coordinated
how escalation manifests
the weight of time pressure
the effects of uncertainty
the impact of ambiguity
what consequences are consequential
61. What can we learn
about these…
how decisions are focused
how attention flows
how work is coordinated
how escalation manifests
the weight of time pressure
the effects of uncertainty
the impact of ambiguity
what consequences are consequential
…from these?
(M)TTR?
(M)TTD?
Frequency of incidents?
Severity of incidents?
Customer impact?
Number of deploys?
“…while there is value in the items on the right, we value the items on the left more.”
62. Thought Food
• We cannot comprehensively understand how our systems behave - we
continually build and revise our understandings based on (relatively sparse)
signals our tech sends us.
• Continuous delivery, “Chaos”/fault injection, are coping strategies (hedges)
for the above state of affairs.
• Understanding activities “above the line” are basically unexplored or
ignored in our industry, and this needs to change.