SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Rajesh'Gundurao'&'Firosh'
Poochaly'
Technology'Trends'and'
Impact'to'ITIL'
Technology Trend & Impact to ITIL
A strategy for Next Gen ITSM from SLK

Disclaimer: All logos used in this deck are property of respective owners
Copyright 2014 SLK Software Services. All rights reserved.
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 1
Contents
Top 10 Strategic Technology Trends 2014
Today’s Challenge - Sample Scenarios

Perceived ITSM Mobile Strategy
Mobile Enablement for ITSM
Enterprise ITSM Mobile Strategy
Strategy Benefits

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(2)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

2
2
Top 10 Strategic Technology Trends 2014

Converging
Forces

•
•
•
•

Mobile Device Diversity & Management
Mobile Apps & Applications
The Internet of Everything
Hybrid Cloud & IT as Service Broker

Derivative
Impact

•
•
•
•

Cloud / Client Architecture
The Era of Personal Cloud
Software Defined Anything
Web Scale IT

Future
Disruption

• Smart Machines
• 3-D Printing

Source: Gartner 2013
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(3)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

3
3
Mobile Device Diversity
Tactics are the new strategy

Wearable

Pocketable Grab & Go

Convertible

Portable

Desk

Shared Areas

Touch,  Voice…

Keyboard, Mouse

Gesture

Source: Gartner 2013
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(4)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

4
4
Today’s Challenge – Sample scenarios

Desktop / User based
Outlook is not connecting to
Exchange – Issue logged at 6pm

ITSM staff unable to resolve in
time till EOD

Issue was not resolved till next
business day

Monitoring tool opened a low
priority ticket to resolve within a
day

Server reached the threshold
unexpectedly and frozen

Backup failed due to bandwidth
choke and ITSM staff unable to
view bandwidth status

Scheduled Backup Failed
unexpectedly

Server based
A critical server approaching disk
full state

Network based
Monthly backup scheduled for
critical system

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(5)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

5
5
Perceived ITSM Mobile Strategy

ITSM Staff
Core Systems

Enterprise Mobile Applications
Tickets / SLA

Alerts

Web App/
Web Features

SM Tools

Monitoring Tools

Enterprises generally focus on enabling Web Apps on the Mobile Channel and most
enterprises perceive this as their Mobile Strategy
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(6)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

6
6
Points to Ponder – ITSM Mobile Strategy
Is your mobile strategy Future-ready?
- Device & Data Security
- Platform/Device Agnostic
- Hardware capabilities
- Bring Your Own Device (BYOD)

Does your mobile applications work on:
- iPhone (iOS), iPad
- Android Phones & Tablets
- Windows Phone, Tablets

Does your Mobile Strategy go beyond
Conventional Usage?
- Scan & Integrate with CMDB
- Access to KEDB from any location
- Capable to Intergrade multiple Applications

Does your mobile strategy support
multiple user interface?
- Voice Command
- Audio Output
- Keyboard & Visual Output

The next-gen mobile strategy should offer more service lines and should be
scalable to futuristic needs
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(7)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

7
7
Mobile Enablement for ITSM
•
•
•
•

Problem, Incidents, Change records
CMDB, KEDB access from anywhere
Critical incident , SLA monitoring
Management dashboards and Alerts

•
•
•
•

Monitoring the critical env- 24/7
Live Alerts for IT env
Accessibility to alert logs and issue resolution
Visibility on critical items for engineers / on call

SM Tools

Analytics

•
•
•
•

Generate reports / trends on tickets / alerts etc.
Intelligence in reporting the unexpected situations
Proactive reports on hardware performance to act
Capacity planning by collaborative method

•
•
•
•

Remote consoles for easy and faster troubleshooting
Visibility and accessibility enabling collaborative resolution
DC server / Network equipment access for faster resolution
LDAP Consoles

Remote Consoles

Monitoring Tools

ITSM

Management
•
•
•
•

BI – for IT
Proactive decisions on critical situations
Single stop live view of IMS environment
Approvals / authorization on the move

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(8)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

8
8
Enterprise ITSM Mobile Strategy
Customer

Enterprise

Partners

IMS

Mobile Application Management
(Enterprise AppStore / MAM)

Enterprise ITSM Mobile Applications
Tickets /
SLA

Live
Alerts

Remote
Consoles

Dashboards/
Reports

SM Tools

Mobile Application Frameworks
Mobile Operating System
Monitoring tools

Device Drivers & API
Mobile Devices & Accessories
Remote devices
Mobile Enterprise Application (MEAP)

Mobile Hardware Accessories
POS
NFC

Camera
Bar Code
RFID

Antenna
Audio

Mobile Device Management
(MDM)

Analytics

Vision:
Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(9)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

9
9
Revised ITSM Maturity Model based on Trends

Ecosystem
Enterprise
Established

Enablers targeted
for entire IT group

Used in selected
divisions of IT
Established strategy
and roadmap

Enforced
Early Learning
Initial exploration in
ITSM

Used by selected
ITSM staff on need
basis
Apps enabled on
web/mobile – Tickets,
Environment Monitoring

Established Security
Standards

Centralized ITSM,
Mobile Policy

Improved SLAs based on
new process and mobile
enablement

All possible tools are
made available in
Mobile platform also

Limited innovative
applications

Validation of enabled
services (ex: 24/7 on call)
and impact

Limited integration with
different ITSM tools (SM,
Monitoring, Analytics)

• Pilot projects

No major impact in SLAs

• Proof of Concepts

VPN based

App Store based
distribution

Gain experience with
tools, technology

Integrated dashboard,
predictive analytics

Consistent within
the ecosystem

Majority of processes &
intelligence on mobile
Measured results feed
to strategy
Business Process
innovations &
automation
Collaborative outputs
lead to Productivity and
Future plan
Omni-channel user
experience

Learn, Innovate and
Continuously improve

Established ITSM +
Mobile Center of
Excellence

Support all major
mobile platform

Reduction in IT Service
investment

Source: SLK Research

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(10)
10
10

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Enterprise ITSM Mobile Strategy – Strategic direction
Establish Enterprise ITSM Mobile Strategy
Focus on building innovative solutions rather than just
applications
Devise a strategy for integrating mobile with enterprise
systems
Focus on building applications that cater to multiple
platforms/devices
Establish consistent user experience across the mobile
channel
Introduce new SLAs leveraging the power of mobile device
Build solutions that caters to customer, enterprise &
partner needs
Evaluate the Tablet space in all initiatives

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(11)
11
11

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Strategy Benefits
Benefit

Impact

Centralized platform to remote access ITSM tools
for Updating, Reassigning, Resolving Issues

Productivity
SLA

Enable mobility for ITSM staff to work on consoles
directly from anywhere

Flexibility

Improved ITSM Staff motivation

Employee Satisfaction

Faster resolution time for Incidents, Problems

SLA

Improved Change management

Productivity

Reduced escalations

Customer Satisfaction

Reduced ITSM staff

Cost

Better solution for 24/7 on call Business demands

Customer Satisfaction
Business Continuity

Proactive & Lively solution for ITSM

Innovation
Predictability

Increased Business revenue

Revenue
Customer Confidence

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(12)
12
12

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Sample Screenshot

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(13)
13
13

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Thank you !

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 14
With thanks to our slides
sponsor, CA Technologies
Try Nimsoft for free at
ca.com/NSD-trial

Mais conteúdo relacionado

Mais procurados

Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
OracleIDM
 
IPsoft Recruitment Brochure
IPsoft Recruitment BrochureIPsoft Recruitment Brochure
IPsoft Recruitment Brochure
dlongipsoft
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
Avtec Inc.
 

Mais procurados (20)

Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home Transition
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]
 
Network Security Offering by GSS America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS America
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation Center
 
Why ips slide share
Why ips slide shareWhy ips slide share
Why ips slide share
 
Intro to android (gdays)
Intro to android (gdays)Intro to android (gdays)
Intro to android (gdays)
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Extending Jenkins to the Mainframe. A Simpler Approach.
Extending Jenkins to the Mainframe.  A Simpler Approach.Extending Jenkins to the Mainframe.  A Simpler Approach.
Extending Jenkins to the Mainframe. A Simpler Approach.
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
IPsoft Recruitment Brochure
IPsoft Recruitment BrochureIPsoft Recruitment Brochure
IPsoft Recruitment Brochure
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 

Semelhante a #TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL

Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
DevConFu
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
mfrancis
 

Semelhante a #TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL (20)

Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and program
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
SplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started Session
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & HistorianinSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015
 
Motadata product itsm overview
Motadata product itsm overviewMotadata product itsm overview
Motadata product itsm overview
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 

Mais de TFT presentations Tomorrow's IT Service Future Today

Mark Smalley & Dave van Herpen, ValOps
Mark Smalley & Dave van Herpen, ValOpsMark Smalley & Dave van Herpen, ValOps
Mark Smalley & Dave van Herpen, ValOps
TFT presentations Tomorrow's IT Service Future Today
 

Mais de TFT presentations Tomorrow's IT Service Future Today (20)

Christophe Capel, The 'Do It Yourself' Service Desk
Christophe Capel, The 'Do It Yourself' Service DeskChristophe Capel, The 'Do It Yourself' Service Desk
Christophe Capel, The 'Do It Yourself' Service Desk
 
Mark Smalley & Dave van Herpen, ValOps
Mark Smalley & Dave van Herpen, ValOpsMark Smalley & Dave van Herpen, ValOps
Mark Smalley & Dave van Herpen, ValOps
 
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
 
Rob England, Dead Cat Syndrome by The IT Skeptic
Rob England, Dead Cat Syndrome by The IT SkepticRob England, Dead Cat Syndrome by The IT Skeptic
Rob England, Dead Cat Syndrome by The IT Skeptic
 
James Gander, The Service Desk Is Dead – Again!
James Gander, The Service Desk Is Dead – Again!James Gander, The Service Desk Is Dead – Again!
James Gander, The Service Desk Is Dead – Again!
 
#TFT14 Amy Donahue - Technology for a culture of abundance
#TFT14 Amy Donahue - Technology for a culture of abundance#TFT14 Amy Donahue - Technology for a culture of abundance
#TFT14 Amy Donahue - Technology for a culture of abundance
 
#TFT14 Ryan Ogilvie - what the hell is IT doing?
#TFT14 Ryan Ogilvie - what the hell is IT doing?#TFT14 Ryan Ogilvie - what the hell is IT doing?
#TFT14 Ryan Ogilvie - what the hell is IT doing?
 
#TFT14 Dan Lee Customer Experiences
#TFT14 Dan Lee Customer Experiences#TFT14 Dan Lee Customer Experiences
#TFT14 Dan Lee Customer Experiences
 
#TFT14 Peter Lijnse Business Relationship Management Love
#TFT14 Peter Lijnse Business Relationship Management Love#TFT14 Peter Lijnse Business Relationship Management Love
#TFT14 Peter Lijnse Business Relationship Management Love
 
#TFT14 James Woodward ITIL v Reality
#TFT14 James Woodward ITIL v Reality#TFT14 James Woodward ITIL v Reality
#TFT14 James Woodward ITIL v Reality
 
#TFT14 Mark Smalley, My Favorite IT Paradigms
#TFT14 Mark Smalley, My Favorite IT Paradigms#TFT14 Mark Smalley, My Favorite IT Paradigms
#TFT14 Mark Smalley, My Favorite IT Paradigms
 
#TFT14 Mark Fitzgerald, Making sense out of information chaos
#TFT14 Mark Fitzgerald, Making sense out of information chaos#TFT14 Mark Fitzgerald, Making sense out of information chaos
#TFT14 Mark Fitzgerald, Making sense out of information chaos
 
#TFT14 Korrine Jones, Virtual Reality
#TFT14 Korrine Jones, Virtual Reality#TFT14 Korrine Jones, Virtual Reality
#TFT14 Korrine Jones, Virtual Reality
 
#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting
#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting
#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting
 
#TFT14 Simone Jo Moore, A novel way of leading
#TFT14 Simone Jo Moore, A novel way of leading#TFT14 Simone Jo Moore, A novel way of leading
#TFT14 Simone Jo Moore, A novel way of leading
 
TFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event HorizonTFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event Horizon
 
TFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSM
TFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSMTFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSM
TFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSM
 
TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...
TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...
TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...
 
TFT13 - Simone Jo Moore, Communication Waves, A Very Human Business
TFT13 - Simone Jo Moore, Communication Waves, A Very Human BusinessTFT13 - Simone Jo Moore, Communication Waves, A Very Human Business
TFT13 - Simone Jo Moore, Communication Waves, A Very Human Business
 
TFT13 - Saurabh Dubey, Outside the Box of IT
TFT13 - Saurabh Dubey, Outside the Box of ITTFT13 - Saurabh Dubey, Outside the Box of IT
TFT13 - Saurabh Dubey, Outside the Box of IT
 

Último

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 

Último (20)

Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL

  • 2. Technology Trend & Impact to ITIL A strategy for Next Gen ITSM from SLK Disclaimer: All logos used in this deck are property of respective owners Copyright 2014 SLK Software Services. All rights reserved. Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 1
  • 3. Contents Top 10 Strategic Technology Trends 2014 Today’s Challenge - Sample Scenarios Perceived ITSM Mobile Strategy Mobile Enablement for ITSM Enterprise ITSM Mobile Strategy Strategy Benefits Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (2) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 2 2
  • 4. Top 10 Strategic Technology Trends 2014 Converging Forces • • • • Mobile Device Diversity & Management Mobile Apps & Applications The Internet of Everything Hybrid Cloud & IT as Service Broker Derivative Impact • • • • Cloud / Client Architecture The Era of Personal Cloud Software Defined Anything Web Scale IT Future Disruption • Smart Machines • 3-D Printing Source: Gartner 2013 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (3) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 3 3
  • 5. Mobile Device Diversity Tactics are the new strategy Wearable Pocketable Grab & Go Convertible Portable Desk Shared Areas Touch,  Voice… Keyboard, Mouse Gesture Source: Gartner 2013 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (4) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 4 4
  • 6. Today’s Challenge – Sample scenarios Desktop / User based Outlook is not connecting to Exchange – Issue logged at 6pm ITSM staff unable to resolve in time till EOD Issue was not resolved till next business day Monitoring tool opened a low priority ticket to resolve within a day Server reached the threshold unexpectedly and frozen Backup failed due to bandwidth choke and ITSM staff unable to view bandwidth status Scheduled Backup Failed unexpectedly Server based A critical server approaching disk full state Network based Monthly backup scheduled for critical system Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (5) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 5 5
  • 7. Perceived ITSM Mobile Strategy ITSM Staff Core Systems Enterprise Mobile Applications Tickets / SLA Alerts Web App/ Web Features SM Tools Monitoring Tools Enterprises generally focus on enabling Web Apps on the Mobile Channel and most enterprises perceive this as their Mobile Strategy Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (6) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 6 6
  • 8. Points to Ponder – ITSM Mobile Strategy Is your mobile strategy Future-ready? - Device & Data Security - Platform/Device Agnostic - Hardware capabilities - Bring Your Own Device (BYOD) Does your mobile applications work on: - iPhone (iOS), iPad - Android Phones & Tablets - Windows Phone, Tablets Does your Mobile Strategy go beyond Conventional Usage? - Scan & Integrate with CMDB - Access to KEDB from any location - Capable to Intergrade multiple Applications Does your mobile strategy support multiple user interface? - Voice Command - Audio Output - Keyboard & Visual Output The next-gen mobile strategy should offer more service lines and should be scalable to futuristic needs Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (7) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 7 7
  • 9. Mobile Enablement for ITSM • • • • Problem, Incidents, Change records CMDB, KEDB access from anywhere Critical incident , SLA monitoring Management dashboards and Alerts • • • • Monitoring the critical env- 24/7 Live Alerts for IT env Accessibility to alert logs and issue resolution Visibility on critical items for engineers / on call SM Tools Analytics • • • • Generate reports / trends on tickets / alerts etc. Intelligence in reporting the unexpected situations Proactive reports on hardware performance to act Capacity planning by collaborative method • • • • Remote consoles for easy and faster troubleshooting Visibility and accessibility enabling collaborative resolution DC server / Network equipment access for faster resolution LDAP Consoles Remote Consoles Monitoring Tools ITSM Management • • • • BI – for IT Proactive decisions on critical situations Single stop live view of IMS environment Approvals / authorization on the move Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (8) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 8 8
  • 10. Enterprise ITSM Mobile Strategy Customer Enterprise Partners IMS Mobile Application Management (Enterprise AppStore / MAM) Enterprise ITSM Mobile Applications Tickets / SLA Live Alerts Remote Consoles Dashboards/ Reports SM Tools Mobile Application Frameworks Mobile Operating System Monitoring tools Device Drivers & API Mobile Devices & Accessories Remote devices Mobile Enterprise Application (MEAP) Mobile Hardware Accessories POS NFC Camera Bar Code RFID Antenna Audio Mobile Device Management (MDM) Analytics Vision: Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (9) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 9 9
  • 11. Revised ITSM Maturity Model based on Trends Ecosystem Enterprise Established Enablers targeted for entire IT group Used in selected divisions of IT Established strategy and roadmap Enforced Early Learning Initial exploration in ITSM Used by selected ITSM staff on need basis Apps enabled on web/mobile – Tickets, Environment Monitoring Established Security Standards Centralized ITSM, Mobile Policy Improved SLAs based on new process and mobile enablement All possible tools are made available in Mobile platform also Limited innovative applications Validation of enabled services (ex: 24/7 on call) and impact Limited integration with different ITSM tools (SM, Monitoring, Analytics) • Pilot projects No major impact in SLAs • Proof of Concepts VPN based App Store based distribution Gain experience with tools, technology Integrated dashboard, predictive analytics Consistent within the ecosystem Majority of processes & intelligence on mobile Measured results feed to strategy Business Process innovations & automation Collaborative outputs lead to Productivity and Future plan Omni-channel user experience Learn, Innovate and Continuously improve Established ITSM + Mobile Center of Excellence Support all major mobile platform Reduction in IT Service investment Source: SLK Research Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (10) 10 10 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 12. Enterprise ITSM Mobile Strategy – Strategic direction Establish Enterprise ITSM Mobile Strategy Focus on building innovative solutions rather than just applications Devise a strategy for integrating mobile with enterprise systems Focus on building applications that cater to multiple platforms/devices Establish consistent user experience across the mobile channel Introduce new SLAs leveraging the power of mobile device Build solutions that caters to customer, enterprise & partner needs Evaluate the Tablet space in all initiatives Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (11) 11 11 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 13. Strategy Benefits Benefit Impact Centralized platform to remote access ITSM tools for Updating, Reassigning, Resolving Issues Productivity SLA Enable mobility for ITSM staff to work on consoles directly from anywhere Flexibility Improved ITSM Staff motivation Employee Satisfaction Faster resolution time for Incidents, Problems SLA Improved Change management Productivity Reduced escalations Customer Satisfaction Reduced ITSM staff Cost Better solution for 24/7 on call Business demands Customer Satisfaction Business Continuity Proactive & Lively solution for ITSM Innovation Predictability Increased Business revenue Revenue Customer Confidence Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (12) 12 12 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 14. Sample Screenshot Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (13) 13 13 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 15. Thank you ! Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 14
  • 16. With thanks to our slides sponsor, CA Technologies Try Nimsoft for free at ca.com/NSD-trial