Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
In this video, we discuss pitfalls to avoid when consolidating IT and Operational Technologies
A key technology convergence impacting the mainstream adoption of the Internet-of-Things (IoT) is the coming together of Information Technology (IT) and Operational Technology (OT).
Below we explore five potential pitfalls to avoid when considering unified IT and OT:
1.Visibility: Improving visibility across unified IT/OT infrastructure has some benefits such as enabling a single service desk to handle both IT and OT domains, and being able to use common management tools.
2.Security: We have discussed how operational technology can create a risk for IT. There is, however, an upside of converging IT and OT. The converged technology infrastructure can be subject to the same security policies and can use common compliance controls.
3.Scalability: By operating OT and IT in separate silos, you miss out on opportunities to procure complimentary technology for both. Purchasing can negotiate better discounts if they are buying technology in high volumes and IT gets to buy IT and OT technology that works together because it can be pre-integrated.
4.Administration: By keeping IT and OT separated, an organization cannot benefit from being able to lower administration costs through streamlining and centralizing management.
5.Collaboration: Higher up the food chain, since OT is normally more closely aligned with how the business makes money, a converged IT and OT solution can improve the partnership between business and IT.
Blazent focuses on providing near real-time insights that can be gained by being able to ingest and analyze large numbers of IT and IoT data streams, correcting data gaps and inconsistencies before the data is consumed.
Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?
In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.
Watch this 30-minute webinar to learn:
*The benefits and challenges associated with Tableau’s mixed device environment
*How Tableau performs data migrations for users who are switching platforms
*Recommendations and considerations for offering Macs to your users
Matt Peterson,Technical Support Specialist,Tableau
Aimee Simpson, Product Marketing Manager, Code42
Tad Johnson, Solutions Architect, Jamf
Join us for a live webcast, “Applying Lean Practices to Healthcare IT Processes" on March 23rd. Seasoned ITSM experts from Pink Elephant and Cherwell will demonstrate how Lean principles are critical in healthcare organizations for better process flow, improved patient care, and lower costs. Additionally, they will map out the connection between Lean, Agile Software Development, and DevOps, how they relate to principles of IT Service Management, and the methods to accelerate business value generation.
Learn best practices for maximizing the security of your PCoIP Zero Client and PCoIP Management
Join this informative session where our security experts will cover:
•Security in a PCoIP deployment
•Securing your PCoIP and management connections
•Setting up profile settings for hardening PCoIP Zero Clients
•Hardening PCoIP Management Console
oPerforming OS security updates in CentOS
Other best security maintenance practices
Q&A will follow at the end of the session.
Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?
If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).
During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:
- It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
- It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
- It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
- It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
Las organizaciones definen SLAs para especificar los niveles de servicio que prestan a sus clientes externos/internos. También para evaluar a los proveedores que les prestan servicio.
Sin embargo, muchas veces este cálculo es manual, subjetivo y centrado en el análisis histórico.
En este webinar se presentan las principales técnicas para definir y cuantificar automáticamente los niveles de servicio, tanto en tiempo real como históricos. A modo de ejemplo, se utiliza la plataforma OBSIDIANsoft como agregador de indicadores provenientes de herramientas de monitorización, service desk, ERPs, etc.
¿Cuenta su organización con una herramienta de service desk? ¿Y con herramientas de monitorización? Por supuesto, tendrán también un ERP y otras aplicaciones de negocio.
Con los datos proporcionados por este tipo de herramientas es posible modelar los servicios de TI de una organización siguiendo las buenas prácticas de ITIL y los requisitos de la ISO 20000, definir las dependencias entre servicios y automatizar la generación de dashboards e informes de cumplimiento de nivel de servicio.
La mise en place d'une gestion de configuration (CMDB) ITSM efficace est essentielle pour les organisations qui souhaitent comprendre et maitriser les différents composants de leur système informatique afin de :
- fournir aux utilisateurs les services et logiciels dont ils ont besoin
- automatiser et rationnaliser leur processus IT
Cependant, d'après le Gartner :
" D'ici 2018, 75 % des organisations IT verront leurs efforts de gestion de configuration échouer en raison du manque de standardisation "
Le défi est donc majeur et ne consiste pas seulement à construire une base de données de gestion de configuration (CMDB) mais surtout à garantir que le référentiel des actifs IT (matériels et logiciels), les utilisateurs et les relations entre eux, soient standardisés, utilisables et constamment à jour. Les changements de configuration et d'infrastructure peuvent rapidement rendre ce référentiel erroné.
•SaaS is becoming the dominate platform of choice for customers in many areas – including IT Service Management (ITSM). If your service management team is evaluating ITSM solutions in the cloud then you must know what are some the important criteria and topics to evaluate before signing that contract for ITSM SaaS. Senior Forrester Analyst, Amy DeMartine, will share with you what you and your team need to consider and answer questions to help you avoid the pitfalls of moving your ITSM implementation to the cloud.
A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.
Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.
During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.
With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.
This webcast will include a live demo and Q&A session.
La gestión nativa de proyectos Agile, de Pruebas, integrada con herramientas de integración continua como Jenkins o Puppet, y repositorios Git, permite gestionar de forma completa todo el ciclo de vida DevOps, desde un marco único e integrado.
De esta forma la implantación de practicas DevOps se hace de forma natural e intuitiva, guiando a todo el personal en cada uno de los pasos de la metodología.
Serem presenta un caso practico sobre la plataforma ServiceNow para ilustrar paso a paso cada uno de estos conceptos: Gestión de la demanda Agile, Cascada, no regresión, integración continua,...
- Conceptos y demostración:
+gestión de la demanda,
+gestión de proyecto y programas,
+recursos y finanzas,
+Proyectos Agile, pruebas.
- práctica: Ciclo de vida completo de un proyecto DevOps
Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:
*The facts on enterprise adoption of Windows 10
*Planning considerations for your Windows 10 migration project
*Three distinct approaches to performing device replacements—and the pros and cons associated with each
About the speaker:
Aimee Simpson, Product Marketing Manager – Code42
Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
More and more organizations are using the shift-left approach to support, bringing more complex work down to Level 1 and moving more repetitive work out into self-service. Likewise, more customers are seeking to solve their own problems before contacting support. With Level 1 work becoming more complex and more urgent for customers, remote support teams must optimize their processes and rethink their customer support strategies.
In this webinar, HDI’s senior analyst, Roy Atkinson, will tell you why organizations are shifting left. You’ll discover how robust remote tools are enabling support teams in high-performing organizations to provide quick resolution to half or more of their issues.
What you’ll learn:
* Industry expert tips on how to run a more efficient, more cost-effective support center
* Best practices for identifying when, where, and how to shift left
* Actionable advice on leveraging remote support to improve the delivery of support across the support center and desktop support
* Effective use cases for deploying technology to enhance the support teams value and optimize their role in a shift-left world
Who should attend:
* Support center managers seeking to improve the performance of their support centers
* Desktop support managers seeking to familiarize themselves with the latest practices and tools
* Anyone in technical service and support seeking a better understanding of remote support capabilities
How can you take minutes, not weeks, to develop projects and detect and fix issues? For Saint-Gobain, one of the world’s top 100 companies and a leader in Building Distribution and Construction Products, they achieved success rapidly and effectively by following some key tips.
Join Jason Goodwill, Solutions Architect at Saint-Gobain Building Distribution Sector, UK, with Andrew Davey, Solutions Consultant, MuleSoft as they share how they began optimizing their data integration strategy and accelerated the abstraction of data from key systems in a matter of minutes, instead of weeks.
Attendees will learn:
- How Saint-Gobain quickly transformed its IT operations to relieve operations and drive greater agility by modernizing core processes
- How Saint-Gobain is spearheading digital transformation by building autonomous skills in-house to enable the wider DevOps integration strategy
- Top tips and pitfalls to look out for when approaching your integration strategy
Have you been wondering: What’s the difference between Scrum and Kanban? Or do you think they are the same thing? In reality, these two ideas are quite different and understanding these differences is key to choosing the path that will work best for your organization.
Join us on Thursday, March 16, 10am PT / 1pm ET, for our webinar, where Christen McLemore will dig into this topic. During this webinar, we’ll:
• Explore the key dimensions of Scrum and Kanban through Principles, Artifacts, Ceremonies, Roles and Metrics
• Understand the key differentiators between the two development styles
• Gain knowledge to better advise others on when each model is more suited
Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.
Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.
Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.
Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
Q&A will follow at the end of the session.
IDC predicts that one of every four people on Earth will be affected by a data breach by 2020. Yet a recent Nasdaq report found that “91% of Board Members at the most vulnerable companies can't interpret a cybersecurity report.” Given that breaches doubled in 2016, the knowledge gap between executives and IT must be bridged.
Companies have responded to these attacks with various tools, such as anti-virus, malware and other endpoint protection, intrusion detection and prevention systems, and others. But despite these additions, data breaches have been increasing steadily over the past five years. This means that either the attackers are improving faster than multibillion dollar security vendors, or that traditional security mechanisms aren’t enough to protect enterprise data. Without direct visibility into the IT environment, non-technical executives can only trust in their technical leadership, who in turn must trust their technicians, who in turn must trust the technology itself, a trust that without hard data is at best an educated guess.
About the presenter:
Jon is an IT security and cyber risk evangelist at UpGuard. He doesn't *like* like risk, he just likes talking about it. More importantly, he likes talking about how it intersects with business risk, and how an accurate picture of cyber risk is one of the most important steps organizations can take toward proper cyber resilience.
Enterprises are facing an ever growing demand for mobile applications. To create and manage meaningful and sustainable mobility programs, while keeping up with the pace of this demand, enterprises should seek solutions that help them conquer the top challenges in large scale mobility programs by providing:
•Security across apps, data, users & devices
•Reducing cost & increasing the speed of development
•Seamless connectivity to multiple systems including legacy and home grown environments
•Holistic & consistent experience across mobile & web channels
•Deployment of applications to customers, partners, employees and vendors
•Streamlined post launch operations by providing real time monitoring abilities
We will discuss these challenges and look at how one of the next generation mobile platforms is simplifying enterprise mobility and addressing these key challenges.
SAP Indirect Usage costs are no longer just theory. A milestone judgement in the UK courts has confirmed SAP’s right to charge customers for Indirect Usage. But what is Indirect Usage? How big is the risk of unbudgeted costs? And what can you do about it? SAP licensing experts from Snow Software will explore the recent legal ruling and what it means for SAP customers around the world, providing insight and a simple five-step plan on how to optimize SAP access and licensing before it’s too late.
A partir de una caso real, en este webinar descubriréis como hacer un inventario automático de activos, y como éste, a su vez, alimentará sin esfuerzo la CMDB con el fin de obtener diversos beneficios:
- Reducir costes eliminando duplicidades innecesarias.
- Tener un mayor nivel de seguridad al detectar vulnerabilidades en la infraestructura.
- Y además tener mayor rapidez en caso de que fuera necesaria la restauración del servicio.
- Cómo realizar un inventario automático de activos
- Dashboards Gestión de Activos de Software
- Cómo alimentar automáticamente los CIs tecnológicos de la CMDB
- La CMDB como imagen completa de la infraestructura TI de su organización
Service Integration And Management (SIAM) is a way of ensuring seamless delivery of service to your end users by utilising multiple IT service providers, working to a common framework.
But what is it? Where did it come from? Does it work? What, when you get right down to it, is it?
Join Peter Hubbard from Pink Elephant as he provides an overview of SIAM, how it works, how it integrates with other bodies of ITSM knowledge such as ITIL, and tips and tricks for successfully implementing it.
Adam Mason, one of Acorio's Vice Presidents, will walk you through Customer Service Management business challenges - All you need to do is enjoy your pizza!
Additionally, within this webinar, we will showcase a demo of ServiceNow’s unique power to address these challenges.
- The Problem: Getting Customer Service Wrong is Expensive
- Here's What you can Achieve Doing it Right
- Deadly Sins of Customer Servie Management
- Not Contextual
- Major Benefits
- What do we mean by Light Speed?
- The Next Level: Mining Customer Support to Drive Revenue (Account Insight, Upsell Cross Sell, New Products and Upgrades)
Over the last few months, cyberattacks have dominated the news, creating uncertainty about how best to protect the value small business owners have worked to create. In this webinar, Emory Simmons, President of CMIT Solutions of South Charlotte, outlines today’s online threats and lays out a plan small businesses can use to manage risk.
Invest an hour to attend, The Blueprint for Managing Small Business Cybersecurity Risk, on March 30th at 11:00 am EDT as we cover the following topics:
- Current cyberthreats facing small businesses
- Case study of a recent attack that took a business down for 1 week
- The blueprint your business can follow to manage cybersecurity risk
- Actionable steps you can start taking immediately
- Resources to help you perform a risk assessment
Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips. Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
Automation in Security. Is your organization doing it? And if so, how much is really being automated? Where does good automation end – giving way to unsafe choices that can spiral out of control? Where should enterprises draw the line?
Tools designed to enable automatic blocking or isolate a compromised system have been known to inadvertently take down critical business applications, leaving security operations teams wary of "automation." However, there are security tasks that can be safely automated without putting systems or jobs at risk. With more precious time back, security analysts can spend more time hunting and responding to threats.
Join Harold Byun and Piero DePaoli, security operations product leaders at ServiceNow, as they discuss and demonstrate approaches to no‑risk automation that can help you dramatically improve the effectiveness of your security response program.
Viewers will learn:
- Why automation is critical for efficient enterprise security response
- A short‑list of repetitive, but necessary tasks that are prime candidates for automation
- Steps to getting started
The HDI Service Improvement Award recognizes an organization that has successfully implemented or improved one or more service offerings. Attend this webinar to learn how the 2016 award winner, CGI Federal, implemented world-class service improvements. Shane Knipschild and Tom Wible will share:
* The state of the organization before CGI Federal launched its service improvement initiative
* The strategy for CGI Federal's service improvement initiative
* The outcome, including lessons learned and the impact on CGI Federal
Explore how architecting a modern security visibility network infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security system investments, and enhance uptime and availability to drive business assurance.
As security threats grow in scope and volume, you increasingly need to ensure complete and timely security visibility down to the packet level. Join Chad Russell, a leading cyber security expert and author of the 2017 “Security Visibility at Scale for Dummies,” as we review the critical highlights from this popular guide.
Attend the webinar to:
* Understand security visibility basics
* Learn the difference between supporting inline and out-of-band systems
* Find out what’s involved in optimizing packet flows
* Review security visibility use cases
The webinar is designed for network & security architects, network operations, and network security specialists.
Chad Russell has been in the cyber security business for over 15 years. He leads and conducts security risk assessments for customers throughout North America. Chad has held numerous certifications including CISSP, CCNP, MCSE, and MCDBA. Connect with him on LinkedIn.
The mandate for applications to change is nothing new. Pushing those changes from design to production in hours, however, is something traditional software delivery models can't handle. DevOps practices have emerged as a viable approach to enabling this speed with quality for increased application performance and better architectures.
In this webinar, we will highlight how DevOps practices and tooling can be applied with Anypoint Platform when implementing and managing an API.
Attendees will learn:
- How (and why) to create a DevOps pipeline with Anypoint Platform
- Setting up a Maven project in Anypoint Studio
- Connecting Mule projects with a Git repository
- Creating automated tests with MUnit and JUnit
- Deploying Mule applications automatically with Jenkins
Information governance (IG) is a hard nut to crack in organizations, where it often lacks proper definition and eludes common user interfaces. As organizations pursue digital transformation and create, collect and use data to determine strategy and command performances, IG makes playbooks for how a modern workforce should appropriately use and consume data assets. This webinar discusses IG as a discipline, framework and collection of technologies to identify, assess and protect information assets and respond to regulatory and litigation risks and global privacy concerns.
The era of the megabreach is upon us. And it's had a seismic effect on global businesses. Many name‑brand organizations are spending millions dealing with the aftermath of losing customer data or intellectual property, and others are working as hard as they can to avoid the type of media attention that no one wants.
The core issue is that security teams are overwhelmed and lack the speed and agility to effectively stop a breach. The only way to make security teams more effective at stopping breaches is to automate security incident response processes.
Join guest speaker Joseph Blankenship, Forrester Senior Analyst, and Piero DePaoli, Senior Director from ServiceNow's Security Operations team, in this on‑demand webinar as they discuss and demonstrate the following.
•The need for rules of engagement to defend against breaches
•Defining policies and workflows to automate much of incident response
•Best practices for creating a response index
•Six game‑changers for efficient security incident response ‑ in action
In the United States, the Department of Veterans Affairs is responsible for providing healthcare and other services for over 21 million veterans. Currently, veteran data and health records are housed in a variety of distinct, complex systems, each holding discrete records of veteran interactions with military, community, and VA health teams.
The Digital Health Platform (DHP) strategy, developed in partnership with the Veterans Health Administration (VHA), calls for a cloud-based technology platform integrating Veteran data from VA, military and commercial electronic health records (EHRs), applications, devices and wearables to a Veteran’s healthcare team in real-time.
Delivering on their vision required the adoption of a composable architecture, using APIs to abstract away complexity from EHRs into discrete units of business capabilities, represented via microservices. In this webinar, the DHP team will present methodology and technology insights drawn from the public-private collaboration that built the proof-of-concept, and share the role MuleSoft’s Anypoint Platform helping enable this vision.
Attendees will learn:
- Why EHRs on their own are insufficient to meet modern interoperability requirements
- How APIs can be used to unlock and orchestrate healthcare data for cloud application consumption
- Why microservices can increase IT agility for both government agencies and private sector companies
- How the Digital Health Platform leverages MuleSoft’s Anypoint Platform to improve care delivery for veterans
- What organizations outside healthcare or government can learn from this digital transformation approach
Mobility connects your most critical assets - your people to your cloud resources. Often times Mobility is an after thought of the bigger Cloud or Transformation strategy versus an integral part. As companies focus on a user in versus a technology approach to transformation - they need to put their mobility cloud strategy at the front and center. Join Jeanne Morain and special guests Jamie MacQuarrie (founder of Appivo) and Harish Sathisan (Director Mobility Avnet) for a lively discussion and insight on what a mobile first strategy means. The trio will provide best practices and prescriptive guidance on how mobility will/should affect your transformation efforts. They will give the top challenges and solutions to overcome them in the enterprise.
As the gateway to IT for most end users, service and support is the biggest driver of customer satisfaction and can generate a tremendous return on investment. IT leaders and managers who ignore these facts do so at their own peril, for the simple truth is this: the success and longevity of an IT management team are directly tied to the success of service and support. In this session, Jeff Rumburg will use benchmarking data and case studies to demonstrate the untapped value of all service and support organizations.
Digital transformation is, undoubtedly, a hot topic and an area of significant interest to organizations across the globe. It's important to remember that digital transformation means different things to different organizations and encompasses many different themes and considerations. There are, however, common areas that are imperative to any digital transformation effort. This webinar will draw upon Ovum data and analyst insights and discuss the digital transformation elements deemed important by businesses and how ITSM capabilities can help support them.
In this webcast you will learn about:
•What does it mean to digitally transform and why is it such a hot-topic at present?
•What are organizations prioritizing when it comes to digital transformation?
•How ITSM can support organizations in executing against digital transformation objectives.
•Why ITSM capabilities and practices are becoming more widely embraced in other business areas.
Many IT organizations are still struggling to achieve self-service success. Well, to be more precise, they are still struggling with end user adoption of their newly deployed self-service capability.
Why? Some causes relate to not truly understanding end user wants and needs, and issues with organizational change management (or the lack of it). But IT self-service, and every other offered service, is not provided in a vacuum - with end users’ expectations increasingly influenced by their often-superior consumer-world experiences. These consumer-world-driven expectations also apply to other organizational service providers, such as HR and facilities, making the approach to self-service capability delivery a company-wide issue whether part of an enterprise service management strategy or not.
This webinar will talk to the state of self-service success, the common issues experienced with IT self-service initiatives and what can you do to avoid them, and other good practices to employ both pre- and post-self-service go-live.
The convergence of tools and processes has been instrumental in making agile and DevOps successful. The roles and re-structuring of the organization that lead to changes in behavior are just as important, if not more so, than agile process and automated tools. Large enterprises will continue to be multi-speed/hybrid environments. In this session we examine how to make the agile and DevOps cultural change succeed in real companies.
Blue Hill recently conducted a study on the true cost of not acting on a managed mobile policy for the Enterprise. The results of this study provide a wake-up call for large enterprises that continue to approach mobile through a status-quo policy without considering the full costs from a financial, technical, logistical and strategic perspective. In our webinar we will reflect on each of these points of view as they relate to mobile, and provide an actionable plan to help you overcome what we term "Mobile Paralysis" or the barriers to implementing a truly holistic mobile policy for your organization.
Digital business requires an integrated approach to delivering services. The journey from IT service request management to enterprise service management is challenging organizations of all sizes and maturity levels. The traditional IT service catalog is becoming the enterprise service portal, providing access to services, apps, resources, and support. Self-service and automation must blend with higher-touch collaborative interactions and expert support in an end to end flow. Predicting when routine interactions are about to escalate is increasingly essential. Ultimately, a customer-led, data-driven, well-designed experience is needed, to support the high performing digital professional and their team.
This session will cover.
- The maturity journey for service management organizations
- The evolution from IT to enterprise service management
- The promise of predictive analytics in supporting the customer journey
Responding to demand for high quality customer experience, firms are pervasively adopting Agile and using those practices to deliver initiatives. Unfortunately, when these digital initiatives scale, the lack of enterprise program management maturity quickly becomes evident. Consistent disciplines are essential, but past PMO failures make IT leadership leery. The next generation PMO takes a center of excellence approach to strike the right balance: stripping bureaucracy to focus on strategy, practice lean portfolio management practices, build competencies, while delivering them in a lightweight service oriented approach.
This presentation discusses the organizational structures, skill sets, practices and tools that enable modern, Agile PMOs keep organizations focused, mitigate dependencies and measure delivered value.
Your customers are adopting new product experiences more rapidly than ever before — what Forrester calls “hyperadoption.” These hyper-demanding customers require immediate satisfaction, relentless innovation, and rapid iteration. How do you pivot your teams, processes, and culture to make them more Agile and help them shift from a preference for bulletproof solutions toward a bias for action — and a tolerance for occasional failure?
In this session Forrester Vice President & Principal Analyst Jeffrey Hammond will review how digital disruptors are replacing traditional development and delivery processes with Agile practices, dev-ops techniques, and a product development mindset. We’ll also examine the cultural impact this shift creates, especially when it comes to recruiting talent and organizing teams. Finally, we’ll examine how delivery tactics and tools are evolving in support of these high-performance Agile development and delivery teams.
The primary challenge facing organizations in the App Economy is delivering more value to customers faster than the competition. To achieve optimal value, organizations need to examine the entire Software Development Lifecycle (SDLC) and the value that it delivers across its phases. True customer value is achieved when all teams in the chain are aligned and supported by end-to-end services and solutions.
Join Dennis Drogseth from Enterprise Management as he explore why successful agile enterprises start with the people first; collaborative, empowered teams that build and deliver the right products to customers quickly.
Attend to learn how to:
• Empower the seamless management of services, projects, products, people, and financials
• Drive both service desk productivity and business-user satisfaction with collaborative self-service, automation, and change management capabilities
• Enable planning, prioritization, and tracking of the work that needs to be done and Continuous Delivery, providing automated test and release functionality to speed delivery
Business agility is an increasingly common theme discussed in organizations, but what is it? Research has shown that there are three laws or principles found across all agile organizations:
• The law of the customer: An obsession with delighting customers by continuously adding value for customers and users, as well as a recognition of the current need to generate instant, intimate, frictionless value at scale.
• The law of the small team: Big difficult problems need to be disaggregated into small batches and performed by small cross-functional autonomous teams, working iteratively in short cycles in a state of flow, with fast feedback from customers and end-users.
• The law of the network: A recognition that, to achieve full business agility, the whole organization needs to embrace the entrepreneurial mindset.
Pursuit of all three laws is key to sustaining business agility. Individually, none of the observed management practices are new. What is new and different is the way that the management goals, practices and values constitute a coherent and integrated approach to continuous innovation, fueled by a pervasive entrepreneurial mindset.
The latest version of CA Project & Portfolio Management comes with new role-based user experiences and deeper integration into Agile Central. As Millennials keep switching jobs at twice the rate, CA PPM 15.2 helps businesses match evolving skill sets with the right projects. A new feature called Telescoping lets resource managers take care of both long and short term needs from a single screen. Project coordinators can solve staffing issues in real time with new collaboration tools. And the CA PPM time-management app now is available for developers working inside Agile Central. Come see Doug Page, product expert at CA Technologies, demo the new CA PPM 15.2.