L'any 2011, en l'entorn del grup de treball TF-NOC (Task Force for Network Operation Centres), es va fer una enquesta entre els centres d'operació de xarxa per obtenir informació sobre les eines utilitzades per a monitoratge, estadístiques, etc., fent un mapeig entre les funcionalitats i les eines que es fan servir als NOC per a aquestes funcionalitats.
Donat que han aparegut noves necessitats i noves eines, i també que altres han evolucionat o desaparegut, a la primera reunió del Grup d'Interès sobre Centres d'Operació de Xarxes (SIG-NOC, Special Interest Group - Network Operation Centers) de Géant es va decidir fer una nova edició de l'enquesta entre els seus membres. En aquesta presentació es fa una revisió dels resultats de l'anterior edició i es proposen alguns canvis per debatre quina serà l'enquesta definitiva, que es farà entre el desembre i el gener, i de la qual es presentaran els resultats al proper SIG-NOC Meeting.
Top 10 Network Operation Center Best Practices
In this free ebook you'll find tips
and best practices related to:
5 Essential tools NOC must have:
1. How to develop and maintain team knowledge and skills
2. Training new NOC Team
3. Improving communication and collaboration within and outside the NOC
4. Escalating, prioritizing, and handling problems
A Network Operations Center monitors the operation of hardware devices, software operating systems and applications. They also ensure IT services stay up and running and respond proactively to problems that may arise.
Top 10 Network Operation Center Best Practices
In this free ebook you'll find tips
and best practices related to:
5 Essential tools NOC must have:
1. How to develop and maintain team knowledge and skills
2. Training new NOC Team
3. Improving communication and collaboration within and outside the NOC
4. Escalating, prioritizing, and handling problems
A Network Operations Center monitors the operation of hardware devices, software operating systems and applications. They also ensure IT services stay up and running and respond proactively to problems that may arise.
A network operations center, also known as a "network management center", is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
IBM Power Migration without the Risk and DowntimePrecisely
Whether you are refreshing server hardware to POWER9, reorganizing storage, or consolidating data centers, migration plays an important role in keeping your IBM i environment up to date, efficient, and productive. Yet, IT pros often fear migration projects due to past experiences with intolerable downtime, lack of predictability, and time demands. View this webinar on-demand and learn how Syncsort can help organizations like yours accelerate your migration project, minimize risk and eliminate downtime.
Key topics include:
• What your peers say about their migration challenges
• How to migrate without downtime using replication
• Minimizing migration risk and resource demands
• How Syncsort can help
Experiences in Mainframe-to-Splunk Big Data AccessPrecisely
Adding mainframe data to the stream of machine-to-machine or “log” data for operational and security/compliance purposes is no longer a nice-to-have - it's a requirement.
View this presentation to hear the real-world experiences of four organizations who bridged the gap between the mainframe data and Splunk to create true operational and security intelligence. You'll learn:
The business needs that drove the requirements to bring their Mainframe data into Splunk
The options they considered to meet these requirements
How they are using Syncsort Ironstream® to meet and exceed their needs
Beyond the Scan: The Value Proposition of Vulnerability AssessmentDamon Small
Vulnerability Assessment is, by some, regarded as one of the least “sexy” capabilities in information security. However, it is the presenter’s view that it is also a key component of any successful infosec program, and one that is often overlooked. Doing so serves an injustice to the organization and results in many missed opportunities to help ensure success in protecting critical information assets. The presenter will explore how Vulnerability Assessment can be leveraged “Beyond the Scan” and provide tangible value to not only the security team, but the entire business that it supports.
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...Matthew Skelton
In this talk, we explore five practical, tried-and-tested, real world techniques for improving operability with many kinds of software systems, including cloud, Serverless, on-premise, and IoT.
Logging as a live diagnostics vector with sparse Event IDs
Operational checklists and ‘Run Book dialogue sheets’ as a discovery mechanism for teams
Endpoint healthchecks as a way to assess runtime dependencies and complexity
Correlation IDs beyond simple HTTP calls
Lightweight ‘User Personas’ as drivers for operational dashboards
Based on our work in many industry sectors, we will share our experience of helping teams to improve the operability of their software systems through
Required audience experience
Some experience of building web-scale systems or industrial IoT/embedded systems would be helpful.
Objective of the talk
We will share our experience of helping teams to improve the operability of their software systems. Attendees will learn some practical operability approaches and how teams can expand their understanding and awareness of operability through these simple, team-friendly techniques.
From a talk given at Continuous Lifecycle London 2018: https://continuouslifecycle.london/sessions/practical-team-focused-operability-techniques-for-distributed-systems/
Structured NERC CIP Process Improvement Using Six SigmaEnergySec
Presented by: Chris Unton, Midwest ISO (MISO)
Abstract: MISO embarked on a structured, comprehensive process improvement program to make advancements in cyber security risk reduction as well as CIP compliance. The program utilizes the Six Sigma framework to reduce process defects and gain efficiencies. The 13 month effort comprises process level health checks; assignment of functional roles, responsibilities, and oversight; cross-functional process improvement events; and training/awareness curriculums to lock in the improvements. As a result, MISO not only is strengthening its cyber security and compliance posture, but also positioning the company for a smoother adoption of controls based audits when applicable. In this presentation, Mr. Unton will walk through the process and show how this has been instrumental in greatly enhancing MISO’s security and compliance environment.
Troubleshooting the Most Common Citrix Complaints for Remote WorkerseG Innovations
When remote workers complain that Citrix is slow, where do you initially focus your investigations? What do you analyze and how do you triage now that there are remote working factors to consider?
Join us as George Spiers, Citrix CTP, and Barry Schiffer, Citrix CTP, share their real-world experience to provide you with tips on troubleshooting in the new normal.
In this webinar you'll learn how to:
• Understand the most common issues and how to troubleshoot them like slow logons, slow app/desktop sessions, connectivity issues, and more
• Methodically go about finding the scope, magnitude of impact, and source of the problem
• Investigate issues in the supporting infrastructure (network, AD, virtualization, etc.)
• Troubleshoot with automated and built-for-Citrix monitoring tools
Desktops & Laptops are getting replaced by Smartphones and Tablets. Is it time to re-look the Service Management Process? We'll review some of the best practices to adopt the technology trend.
With thanks for Ca Technologies for sponsoring TFT14 slides. For a free trial of Nimsoft go to bit.ly/1df6jY7
Webinar - Patch Management: Keep up with security updates by using SysKitSysKit Ltd
When it comes to patch management, we can provide you a complete inventory of everything that is installed on every server or any workstation that’s been monitored. With SysKit, you can get reports on time, schedule a time for an update, check available security updates and current version on your system, keep track of planned or unplanned system reboots, and much more.
Learn more at: https://www.syskit.com/blog/patch-management-with-syskit-keep-up-with-security-updates/
Elena Glinskaya, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
How temenos manages open source use, the easy way combinedWhiteSource
The extensive use of open source in commercial software requires engineering executives to set processes and measures that will enable their organization and their customers to make the most of what open source can offer without assuming the accompanying risks.
See how Temenos manages their open source components.
Presentació a càrrec de Maria Isabel Gandia, cap de comunicacions del CSUC, duta a terme a la novena edició del SIG-NOC meeting, celebrada a Ljubljana (Eslovènia) el 8 i 9 d'abril de 2019.
A network operations center, also known as a "network management center", is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
IBM Power Migration without the Risk and DowntimePrecisely
Whether you are refreshing server hardware to POWER9, reorganizing storage, or consolidating data centers, migration plays an important role in keeping your IBM i environment up to date, efficient, and productive. Yet, IT pros often fear migration projects due to past experiences with intolerable downtime, lack of predictability, and time demands. View this webinar on-demand and learn how Syncsort can help organizations like yours accelerate your migration project, minimize risk and eliminate downtime.
Key topics include:
• What your peers say about their migration challenges
• How to migrate without downtime using replication
• Minimizing migration risk and resource demands
• How Syncsort can help
Experiences in Mainframe-to-Splunk Big Data AccessPrecisely
Adding mainframe data to the stream of machine-to-machine or “log” data for operational and security/compliance purposes is no longer a nice-to-have - it's a requirement.
View this presentation to hear the real-world experiences of four organizations who bridged the gap between the mainframe data and Splunk to create true operational and security intelligence. You'll learn:
The business needs that drove the requirements to bring their Mainframe data into Splunk
The options they considered to meet these requirements
How they are using Syncsort Ironstream® to meet and exceed their needs
Beyond the Scan: The Value Proposition of Vulnerability AssessmentDamon Small
Vulnerability Assessment is, by some, regarded as one of the least “sexy” capabilities in information security. However, it is the presenter’s view that it is also a key component of any successful infosec program, and one that is often overlooked. Doing so serves an injustice to the organization and results in many missed opportunities to help ensure success in protecting critical information assets. The presenter will explore how Vulnerability Assessment can be leveraged “Beyond the Scan” and provide tangible value to not only the security team, but the entire business that it supports.
Practical operability techniques for teams - Matthew Skelton - Conflux - Cont...Matthew Skelton
In this talk, we explore five practical, tried-and-tested, real world techniques for improving operability with many kinds of software systems, including cloud, Serverless, on-premise, and IoT.
Logging as a live diagnostics vector with sparse Event IDs
Operational checklists and ‘Run Book dialogue sheets’ as a discovery mechanism for teams
Endpoint healthchecks as a way to assess runtime dependencies and complexity
Correlation IDs beyond simple HTTP calls
Lightweight ‘User Personas’ as drivers for operational dashboards
Based on our work in many industry sectors, we will share our experience of helping teams to improve the operability of their software systems through
Required audience experience
Some experience of building web-scale systems or industrial IoT/embedded systems would be helpful.
Objective of the talk
We will share our experience of helping teams to improve the operability of their software systems. Attendees will learn some practical operability approaches and how teams can expand their understanding and awareness of operability through these simple, team-friendly techniques.
From a talk given at Continuous Lifecycle London 2018: https://continuouslifecycle.london/sessions/practical-team-focused-operability-techniques-for-distributed-systems/
Structured NERC CIP Process Improvement Using Six SigmaEnergySec
Presented by: Chris Unton, Midwest ISO (MISO)
Abstract: MISO embarked on a structured, comprehensive process improvement program to make advancements in cyber security risk reduction as well as CIP compliance. The program utilizes the Six Sigma framework to reduce process defects and gain efficiencies. The 13 month effort comprises process level health checks; assignment of functional roles, responsibilities, and oversight; cross-functional process improvement events; and training/awareness curriculums to lock in the improvements. As a result, MISO not only is strengthening its cyber security and compliance posture, but also positioning the company for a smoother adoption of controls based audits when applicable. In this presentation, Mr. Unton will walk through the process and show how this has been instrumental in greatly enhancing MISO’s security and compliance environment.
Troubleshooting the Most Common Citrix Complaints for Remote WorkerseG Innovations
When remote workers complain that Citrix is slow, where do you initially focus your investigations? What do you analyze and how do you triage now that there are remote working factors to consider?
Join us as George Spiers, Citrix CTP, and Barry Schiffer, Citrix CTP, share their real-world experience to provide you with tips on troubleshooting in the new normal.
In this webinar you'll learn how to:
• Understand the most common issues and how to troubleshoot them like slow logons, slow app/desktop sessions, connectivity issues, and more
• Methodically go about finding the scope, magnitude of impact, and source of the problem
• Investigate issues in the supporting infrastructure (network, AD, virtualization, etc.)
• Troubleshoot with automated and built-for-Citrix monitoring tools
Desktops & Laptops are getting replaced by Smartphones and Tablets. Is it time to re-look the Service Management Process? We'll review some of the best practices to adopt the technology trend.
With thanks for Ca Technologies for sponsoring TFT14 slides. For a free trial of Nimsoft go to bit.ly/1df6jY7
Webinar - Patch Management: Keep up with security updates by using SysKitSysKit Ltd
When it comes to patch management, we can provide you a complete inventory of everything that is installed on every server or any workstation that’s been monitored. With SysKit, you can get reports on time, schedule a time for an update, check available security updates and current version on your system, keep track of planned or unplanned system reboots, and much more.
Learn more at: https://www.syskit.com/blog/patch-management-with-syskit-keep-up-with-security-updates/
Elena Glinskaya, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
How temenos manages open source use, the easy way combinedWhiteSource
The extensive use of open source in commercial software requires engineering executives to set processes and measures that will enable their organization and their customers to make the most of what open source can offer without assuming the accompanying risks.
See how Temenos manages their open source components.
Presentació a càrrec de Maria Isabel Gandia, cap de comunicacions del CSUC, duta a terme a la novena edició del SIG-NOC meeting, celebrada a Ljubljana (Eslovènia) el 8 i 9 d'abril de 2019.
The differing ways to monitor and instrumentJonah Kowall
FullStack London July 15th, 2016
Monitoring is complicated, and in most organizations consists of far too many tools owned by many teams. These tools consist of monitoring tools each looking at a component myopically. These tools metrics and logs from devices and software emitting them. Increasingly modern companies are creating their own instrumentation, but there is a large base of generic instrumentation of software. Fixing monitoring issues requires people, process, and technology. In this talk we will cover many common issues seen in the real world. For example decisions on what should be monitored or collected from a technology and a business perspective. This requires process and coordination.
We will investigate what instrumentation is most scalable and effective across languages this includes the commonly used APIs and possibilities to capture data from common languages like Java, .NET and PHP, but we’ll also go into methods which work with Python, Node.js, and golang. We will cover browser and mobile instrumentation techniques. How these are done? which APIs are being used? What open source tools and frameworks can be leveraged? Most importantly how to coordinate and communicate requirements across your organization.
Attendees of this session will walk away with a clear understanding of:
What is instrumentation, and what do I instrument, collect, and store?
The understanding of overhead and how this can be accomplished on common software stacks?
How to work with application owners to collect business data.
How correlation works in custom open source or packaged monitoring tools.
AgileDC15 I'm Using Chef So I'm DevOps Right?Rob Brown
Introduce DevOps to the uninitiated
Demystify the terminology and techno-centric jargon
Provide an assessment model that you can take back to your organization to help establish a baseline of behaviors and practices, and guidance on moving towards more of a DevOps culture
Nagios Conference 2014 - Scott Wilkerson - Getting Started with Nagios Networ...Nagios
Scott Wilkerson's presentation on Getting Started with Nagios Network Analzyer
The presentation was given during the Nagios World Conference North America held Oct 13th - Oct 16th, 2014 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/conference
SCM Transformation Challenges and How to Overcome ThemCompuware
If your enterprise is focused on continuously improving quality, velocity and efficiency, you’re going to win against those that aren’t. Driving improvements on the mainframe, and in turn throughout the business, requires the transformation of three things: culture, processes and tools. In other words, changing mindsets, implementing modern practices (Agile, DevOps, CI/CD) and replacing outdated technology.
Mainframe source code management is currently a critical area in need of modernization and should be one of the initial tooling changes organizations make when setting out to improve mainframe systems delivery.
During this session, Compuware specialist Lars-Erik Berglund shares the challenges organizations face with mainframe source code management and what you can do to overcome those.
SharePoint as a Business Platform Why, What and How? – No Codedox42
"SharePoint as a Business Platform
Why, What and How? – No Code"
Im Vortrag von Jean-François Saint-Pierre von Evolusys erfahren Sie mehr über das nahtlose Zusammenspiel von SharePoint und dox42.
24.09.2014, Swiss SharePoint Club Genf
Activitat de formació, impartida pel CSUC, per sensibilitzar de la importància de fer una bona gestió de les dades de recerca i, sobretot, de la necessitat de publicar les dades seguint els principis FAIR (trobables, accessibles, interoperables i reutilitzables).
Presentació a càrrec de Clara Llebot, tècnica de curació de dades, al 18è congrés International Digital Curation Conference (IDCC). En són coautors la Mireia Alcalá, tècnica de recursos d'informació, i en Lluís Anglada, assessor de ciència oberta del CSUC.
Activitat de formació, impartida pel CSUC, per sensibilitzar de la importància de fer una bona gestió de les dades de recerca, començant per la generació de plans de gestió de dades.
Presentació a càrrec de Mireia Alcalá (CSUC). La presentació s'emmarca dins el taller "Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciència oberta?".
El taller va ser organitzat per la UVic-UCC des de la Biblioteca i l'OTRI i relitza una introducció a la ciència oberta i a la gestió de dades de recerca.
Participació de Mireia Alcalá, tècnica líder en Curació de Dades al CSUC, a la jornada de REBIUN-ANECA sobre l'avaluació de la recerca a les biblioteques universitàries i científiques espanyoles.
Presentació a càrrec de Patrícia Sanpera, directora de la Biblioteca – Centre de Documentació de l'Il·lustre Col·legi de l'Advocacia de Barcelona, a la Jornada CCUC 2023.
Presentació a càrrec de Sara Guasteví, responsable de la Biblioteca de l'Espai de Documentació i Recerca del Museu de la Música de Barcelona - L'Auditori, a la Jornada CCUC 2023.
Presentació a càrrec de Maribel Giner, directora - gerent de la Biblioteca Pública Arús, i David Domènech, bibliotecari de la Biblioteca Pública Arús, a la Jornada CCUC 2023.
Presentació de Núria Nevado, cap de Secció d'Informació i Documentació del Departament d'Acció Climàtica, Alimentació i Agenda Rural, a la Jornada CCUC 2023.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
SIG-NOC Tools Survey 2015
1. SIG-NOC Tools Survey 2015
Maria Isabel Gandia Carriedo
2nd SIG-NOC meeting
9 Nov 2015
Universität Wien
2. The evolution of the survey
On the first survey we had 54 quite open questions in 7 groups:
1. Basic information (3)
2. NOC taxonomy (6)
3. Network and Services (6)
4. NOC tools (29)
5. Communication and front end (6)
6. Collaboration and best practices (3)
7. Closing (1)
New tools have appeared, some others have disappeared or changed
and NOCs have evolved.
3. The evolution of the survey
On the first survey we had 54 quite open questions in 7 groups:
1. Basic information (3)
2. -NOC taxonomy (6)
3. -Network and Services (6)
4. NOC tools (29)
5. -Communication and front end (6)
6. -Collaboration and best practices (3)
7. -Closing (1)
New tools have appeared, some others have disappeared or changed
and NOCs have evolved.
In previous steps, we decided to:
• Shorten the number of questions by eliminating the taxonomy, services,
communication and collaboration parts.
• Focus on the tools and include some questions about standards (ITIL/ITSM).
• Score the tools in two ways: Importance for the institution / Quality of the tool.
• Include all the tools that had more than one answer in the last survey and also
a generic "in-house" (asking the possibility of open-sourcing it) and "other".
Now we have 35 questions, answerable via “click-click”.
+Standards(5?)
+Competences(?)
4. What we will review today
For all the survey:
• The “big blocks”:
– Basic information (2)
– Standards (5?)
– Competences (?)
– Tools (26 with 13 yes/no questions and 13 about the tools)
• Missing questions or answers
• The tool we will use (Surveymonkey, Google forms, Limesurvey,..)
For each functionality:
• The name of the functionality (more “standard”?)
• The definition
• The tools that we will include
• Missing tools
For all the questions about tools:
• The scale
• The “I don’t use it option”
• The way they will look like on the survey (options)
5. Basic information
1. Name (acronym) of your organisation *
2. Type (range) of the network that your organisation is responsible for*
(Please choose all that apply):
• Wide area network among several countries
• National research and education network (NREN)
• Regional metropolitan network
• Campus university network
• Specific research network (any range)
• Commercial network (any range)
• Internet exchange?
• Other:
6. Standards
3. Does your NOC use any methodology or follow any standard based
procedures (Please choose all that apply):
• ISO
• eTOM
• ITIL
• NITS
• FIPS
• No at the moment
• Other:
4. If your organisation uses ITIL is your staff ITIL certified (for instance
the ITIL foundations training)?
• Yes
• No
7. Standards
5. Do you use ITIL in all the Departments?
• Yes
• No
6. Do you use ITIL processes/functions for the operational side of your
activities?
• Yes
• No
7. Do you integrate your ITIL implementation with similar
implementations in your third parties/customers)
• Yes
• No
8. Would it be helpful to have more questions about ITIL?
For instance:
• What processes/functions does your institution follow (list)?
• Does your organisation have a CAB (Change Advisory Board)?
• Do you use ITIL processes / functions on a daily basis?
• Do you have instances where ITIL is “bypassed”?
• Do you require ITIL being implemented at (some of) your third parties? (e.g in Call
For Tenders)
• Do you report towards third parties / customers in an ITIL mind-set?
• Does ITIL make your organisation more efficient?
• Does ITIL have an effect on your Service Delivery delays?
• Does ITIL have an effect on your Incident Resolution times?
• Does ITIL make your organisation more consistent towards customers?
• Does ITIL in general save you time in the long term?
• Did you encounter resistance when ITIL was introduced into your organisation?
• Do you experience overhead in the way ITIL is implemented at your organisation?
• How many years did it take to implement ITIL from conception to production?
9. Would it be helpful to have a section about competences?
10. NOC tools
For each one of the functionalities below, indicate if your NOC is
responsible for them and what tools you use for those functions
Please do note:
• If you use more than one tool for a given function, do not forget to specify all.
• If you use home-grown tools that are not commonly known, please include
further reference.
• Feel free to share brief comments based on your practical experience with
each of the tools.
And then for each one of the functionalities:
• Short definition of <functionality>
• Is your NOC responsible for <functionality>
• What tools do you use for <functionality>
Tool
How important is
this tool for your
NOC?
How would you rate
this tool for the
<functionality>?
Comments
TOOL1
TOOL2
…
11. For each functionality we will review
This funcionality stands for...
• Tool4
• Tool5
• Tool10
Answers from one organization in 2011:
Tool7
Tool8
Tool9
Tool10 (add?)
Tool11
Tool12
Tool13
Tool14
Tool15
New suggestions:
• Tool1
• Tool2 (drop/change?)
• Tool3
Tools:
Tools included in the
survey because they
were mentioned more
than once in 2011
Short definition
Tools mentioned
only once in 2011
Possible answers to include
in the survey
12. NOC tools – Monitoring
Observation and measurement of several parameters (from the link status or traffic
on an interface or line to physical parameters, like temperature humidity etc).
Alcatel NMS
BCNET CMDB
Beacon
Bigbrother
Ciena NMS
Ciena Preside
Cisco IP SLA
Cisco EEM
Dude
Equipt sp NMS
Fluxoscope
FSP Net
Manager
GARR mon. sui.
Hobbit
iBGPlay
ICmyNet.Flow
ICmyNet.IS
Kayako
LambdaMonitor
MonaLisa
Munin
NAV
NetCool
Netscout
Network Node
Mgr
NFA
NMIS
NTOP
Observium
OpManager
Racktables
SMARTxAC
Splunk
Trapmon
WuG
Zabbix
• Observium
• RIPE Atlas
• RIPE stats
• RIPE RIS / BGPlay
Answers from one organization in 2011:
• CACTI
• CRICKET
• ICINGA
• INTERMAPPER
• LOGGING
• LOOKING-GLASS
• MRTG
• NAGIOS
• NETFLOW
• NFDUMP
• NFSEN
• OPENVIEW
• PERFSONAR
• RANCID
• SMOKEPING
• SPECTRUM
• SYSLOG
• WEATHERMAP
• ZENOSS
• ZINO
Tools: New suggestions: Do we need more information of what a NOC monitors?
13. NOC tools – Problem management / Incident management?
The primary objectives of Problem Management are to prevent problems and
resulting incidents from happening, to eliminate recurring incidents and to minimize
the impact of incidents that cannot be prevented. Following the necessary steps in
order to identify the source of a problem. Getting warnings about problems or
incidents.
• ELK stack
• NLNOG ring tools
• OTRS
• RIPE Atlas
• RIPE stats
• RIPE RIS/BGPlay
• Splunk
Answers from one organization in 2011:
ARS
CA spectrum
Hobbit
HP insight mgr
HP service cter
HP service mgr
Icinga
ICmyNet.IS
ITIL
Jira
Monitor One
Proprietary NMS
Service now
Splunk
Vigilant_congestio
Wiki
Zenoss
New suggestions:
• NAGIOS
• REQUEST TRACKER
• ZABBIX
• ZINO
Tools:
14. NOC tools – Performance management
Following a procedure in order to identify the source of a performance problem
on the network.
• RIPE Atlas
• NLNOG ring tools
• Wireshark
Atlas
BC NET CMDB
CISCO IP SLA
DynaTrace
IPPM
Jitter
MGEN
Munin
Nagios
NFDUMP
Netflow
Netminder
Ops Mgr
Owamp
PING
Prosilent
QoS
SpeedTest
Storsentry
Traceroute
TCPDUMP
Wireshark
Zenoss
Answers from one organization in 2011:
New suggestions:Tools:
• BWCTL
• HADES
• IPERF
• MRTG
• NDT
• PERFSONAR
• RIPE TTM
• SMOKEPING
• ZINO
15. NOC tools – Reporting and statistics
Querying of data sources for reference and statistics.
BCNET CMDB
Business object
datamarts
Confluence
Cricket
Excel
GINS
HO service desk
Hobbit
Icinga
ICmyNet.IS
Infovision
Jira
MonaLISA
MSR reporter
Netflow
Smokeping
Splunk
Stager
StorSentry
Zabbix
Answers from one organization in 2011:
New suggestions:Tools:
• CA SPECTRUM
• CACTI
• MRTG
• MUNIN
• NAGIOS
• NFSEN
• ZENOSS
• ZINO
16. NOC tools – Ticketing
Process for the tracking of incidents, problems or tasks.
BMC service express
Easyvista
HP Service center
HP Service Manager
HP Service desk
Kayoko Help Desk
Answers from one organization in 2011:
New suggestions:Tools:
• ARS (Remedy)
• JIRA
• OTRS
• REQUEST TRACKER
• SERVICE NOW
17. NOC tools – Change management
Controlling and recording of changes in values technologies etc.
EditGrid
HP-SM
Rancid
Redmine
Savannah
Sharepoint
Telemater
Trac
VC-4 CMDB
Answers from one organization in 2011:
New suggestions:Tools:
• CONFLUENCE
• REQUEST TRACKER
18. NOC tools – Configuration management and backup
Control and backup of the configuration for the routers switches and other pieces
of equipment.
CiscoWorks
Cfengine
Netbackup
viewvc
Answers from one organization in 2011:
New suggestions:Tools:
• CVS
• IMS
• RANCID
• SUBVERSION
19. NOC tools – Communication coordination chat
Communication with people either in the same institution or in other institutions.
Adobe connect
Davical
Desktop video
EVO
Gtalk
HP Service Center
HP Service Manager
iChat
MSN
Phone
Pidgin
Sametime
Scopia Desktop
VoIP
Webex
• Slack
• Twitter
• Telephone
• Whatsapp
Answers from one organization in 2011:
New suggestions:Tools:
• E-MAIL
• IM
• IRC
• JABBER
• MAILING LISTS
• SKYPE
• WIKI
20. NOC tools – Knowledge management/documentation
Storing and sharing knowledge information to improve the efficiency in an
organization.
Editgrid
HP service center
Intranet (Web)
Joomla
Moinmoin
Plone
Sharepoint
Silverstripe
Telemator
Twiki
Wordpress blog
Answers from one organization in 2011:
New suggestions:Tools:
• CONFLUENCE
• DOCUWIKI
• MEDIAWIKI
• REQUEST TRACKER
• WIKI
21. NOC tools - Security management
Control of physical and logical resources to avoid third parts from attacking the
resources of an institution.
2-factor token
Bastion host
Copp
Cyclops
DNSSEC
Drupal based TTS
fwbuilder
iBGPlay
Icmynet.low
keepass
LDAP
NfSen
OTRS
Radius
Routing authentication
Rtconfig
RTIR
VPN
• RSA software
• Radiator
• Freeradius
Answers from one organization in 2011:
New suggestions:Tools:
• ACL
• BGPMON
• FIREWALL
• KERBEROS
• Physical security
• REQUEST TRACKER
• TACACS+
22. NOC tools – Inventory management
Organization and control of information about an institution's devices materials
and products.
BCNET CMDB
BDcops
Editgrid
HP Service desk
Inflow
Insight manager LDAP
MOT2
Navision
NOClook
Rancid
Telemator
VC-4 CMDB
Wiki
Answers from one organization in 2011:
New suggestions:Tools:
• EXCEL
• IMS
23. NOC tools – Resources management
Organization and control of logical resources such as IP addresses AS numbers
circuits numbers topology documentation etc.
Access
BCNET CMDB
Bdcops
IP-range
MOT2
Pinger
Racktables
Telise
Text files
Answers from one organization in 2011:
New suggestions:Tools:
• CONFLUENCE
• EXCEL
• IPPlan
• VISIO
• WIKI
24. NOC tools – Out-of-band Access
Access to the network devices of an institution from an external network.
DRAC IPMI
Answers from one organization in 2011:
New suggestions:Tools:
• ADSL
• CONSOLE SERVER
• DRAC
• HP ILO
• PSTN/ISDN
• UMTS/GSM/3G
25. NOC tools - Data aggregation representation visualisation
Aggregate live data from various tools and represent/visualize them in a human
readable way.
CMDB
Google-maps
IMs
Monalisa
Munin
NAV
Netflow
Splunk
Stager
Zenoss
Zino
• Splunk
• ELK stack (Elastic
Logstash &
Kibana)
Answers from one organization in 2011:
New suggestions:Tools:
• CACTI
• WEATHERMAP
26. The way it will look like: Option 1
Both ratings are easy but you can not comment on each tool
27. The way it will look like: Option 2
2.1: separated questions for importance and rating, comments at the end
2.2: separated questions for importance and rating, comments for each tool
Easy to click, although it “doubles” the number of questions.
28. The way it will look like: Option 3
Easy ratings, but the danger of including more than one in the answers