Harnessing The IoT Phenomenon

Over the last few years, the Internet of Things (IoT) has made a substantial progression into our everyday lives. With this comes an opportunity for Australia to grow exponentially in a variety of sectors; this is crucial as, if we truly do embrace the full extent of IoT and IT auditing, then as a country our companies will be some of the earliest beneficiaries of this new ICT and industry renaissance. At present, Australia is placed 11th in Accenture’s model of countries that are ready to embrace IoT potential; if we take full measures now, however, then we may well find ourselves in the top 10.

 

In the assessment “The Internet of Things: Mapping the Value Beyond the Hype” published by the McKinsey Global Institute (MGI), predictions suggest that harnessing the potential of IoT could result in an additional impact of up to $116 billion by 2025 – that’s a mere six years away. As Australian industries have undoubtedly plateaued in recent years in terms of economic growth, we’re at risk of a country-wide retrogression if something isn’t done soon. IoT auditing and data management is the perfect gateway to avoid such stagnation. http://bit.ly/2ZbnQMv

 

So how do we go about such measures?

Firstly, one has to step back and view the sheer scope of IoT versatility. By 2020 there will be tens of billions of new devices to be interconnected via the internet, and the potential of where these can each be located is limitless. Whether it’s a smart meter in your home or a distant weather sensor on a remote station, anything can be accessed. Thus, a stronger method of network management needs to be implemented. In order to fully comprehend what Australia’s next steps should be, a clear set of data should be gathered; this is where IoT auditing comes in.

 

But why should we?

The auditing of IoT information can allow companies to develop a coherent data strategy in order to maximise their usage of the rise of the Internet of Things. Not only will this allow businesses to boom and expand into new industrial and commercial horizons, but it also creates room for the fixing of potential problems that may arise with IoT, such as implementation time and asset control. As our own Opmantek CTO Keith Sinclair says, “business processes are dependent on the transient. You simply can’t fix what you can’t see.” So as you can see, IoT auditing is essential if you wish to receive accurate data location of your assets and more in seconds.

 

And how do we go about it?

Luckily, Opmantek’s Open-AudI allows users to gain unparalleled visibility and clarity of your assets with the IoT space, giving the chance for enterprise growth on a global level. While most organisations struggle with a day-to-day capturing and analysis of data, Open-AudIT makes it simple and effective. Open-AudIT has the ability to intelligently scan an organization and collect significant amounts of data from large and varying networks, that is catalogued and configured into meaningful reports. If your business is missing something as incredibly unequivocal as the Open-AudIT, then contact us today to get a quote and a demo.

Uncategorized

A Single Pane of Glass With opCharts And NMIS

What is a single pane of glass and why is it so important?

The phrase, Single-pane-of-glass is often used as a synonym for a dashboard, however, it is more than that. It is a dashboard that is able to summarise data from multiple sources and display it in a clear and coherent manner on a single screen (pane of glass).
There are a few benefits to using this type of dashboarding in your organization:
Increased visibility – Your operations team can ensure that the status of your network is always visible and issues are quickly noticed.

Reduced operational complexity – Your team will have the ability to see the complete operational environment in a logical display that will reduce any complexity within your infrastructure.

Reduced time to a root cause analysis – There are no silo’s within the organization, all technologies, vendors, operating systems are displayed in a single location.

A true single-pane-of-glass management system will support:

  • Multiple vendors
  • Multiple technologies
  • Multiple operating systems

This management system will also allow you to:

  • See the current state of all systems in one location.
  • See the full history of all systems in one location.
  • Provide operations teams with a single place to login and see live data.
  • Be flexible enough to incorporate new technologies.

An example of a well-designed dashboard is displayed below:

Note the clear layout of all the dashboards, all of the elements are clickable to retrieve live data and be further inspected.

This can be built for free today using NMIS and opCharts
First, install NMIS, there are two choices in going about doing this:1. Install NMIS from scratch. Here is a link to an NMIS installation guide available on the Opmantek Community WIKI.2. Install the Opmantek Virtual Appliance that has NMIS and opCharts already installed and configured, here is the Virtual Appliance Installation guide.

If you installed NMIS from scratch then you need to Install/upgrade opCharts
Install/upgrade opCharts – opCharts Installation Guide
Get a free trial license key for opCharts –  here

 

How much data is the right amount, and how much is too much?

Before getting into creating a dashboard you should understand what goes into designing a useful dashboard.
1. Limit each dashboard to 5-7 groups of data.
2. Group layout should be organized by data, time- period or visualization.
3. No group should have more than 5-7 data sets.
4. Each data set should be easily distinguishable from the other data sets in the group.
5. Similar data sets across groups should use similar colours/icons.
6. Colours and shapes should be used with purpose and definition.
7. The entire dashboard should be visible at one time, as should each group.

While looking at the image below, we can understand why the dashboard is poorly designed:

opCharts Bad Dashboard - 700

Creating your Single Pane of Glass Dashboard

Now that you understand what separates a well-designed and useful dashboard from a poorly designed one it’s time to create your own.

Start by creating a new dashboard:

Navigate to menu -> Views -> Dashboards

opCharts Create New Dashboard - 700

On the following screen, click the blue “+” icon to create a new dashboard

From this screen you can add data in one of two ways:

1. Give your new dashboard a name, description, and assign it to a dashboard group if required. You can begin by adding components to the dashboard by clicking the add component button. A new component info box will open up and you can select the data you wish to display, change the size of the window and design the dashboard in a way you see fit.

opCharts Save Dashboard - 700

For example, you may want to add a Map you have created to your dashboard, you can do so by navigating to Menu -> Views -> Maps then selecting a previously created map. When the map has been loaded, click the drop-down menu on the top right of the map and select Add to Dashboard.

opCharts Add Map To Dashboard - 700

The add to dashboard menu will open up, select the dashboard name from the drop-down menu that you wish to add the nap to then click save. Once you navigate back to your saved dashboard this map will be displayed. You can follow this same process to add any components to your dashboards.

2. The second way to add data is from the new dashboard screen, click the add component button. This will open up the component info menu allowing you to adjust the width and the height of the component you are adding to your dashboard. After selecting the size, click the data source type drop-down menu to select the desired data for the Dashboard. Once the Data Source Type is selected, another drop-down menu will appear allowing you to choose the specific data point you want to display on the dashboard. You can repeat this process to organize and add as many Components to your Dashboard as you want.

opCharts Add Components - 700

Watch our webinar on dashboard design:

webinar-on-demand-1220X412-1
Uncategorized

ROI – Should You Invest in Network Monitoring Software?

As most IT managers and network professionals will be well aware, business leaders and employees have come to expect 24/7 network availability at work. Unfortunately, achieving this can be very difficult and many businesses lose countless hours to troubleshooting every year. This is where network monitoring comes in.

What is network monitoring?

Network monitoring ensures the smooth running of regular operations via the help of trained technicians, network management software and network support. The idea behind network monitoring is that it helps avoid productivity losses and, by extension, the cost of downtime. Indeed, businesses that calculate how much money network monitoring services could save them every year will discover that they offer a fantastic return on investment (ROI). Here are a few reasons why:

Overtime is reduced

If your staff regularly rack up overtime due to network outages, a monitoring service will save you a great deal of money in the long run. It may also lessen the need for extra staff on night shifts for certain sectors, again saving the company money.

Damage control

Network monitoring services are able to address IT issues before they turn into public relations disasters. Indeed, they can detect issues early on by analysing factors such as round trip times, network utilisation rates and error percentages. If there are any problems with the smooth running of the network, businesses can take action early on before operations slow down or servers cut out altogether.

Support calls are reduced

Investing in network monitoring can help keep end users productive and online, thereby lowering the pressure on network technicians to answer calls and deal with troubleshooting questions. Monitoring services do this by alerting companies to potential problems such as excessive bandwidth consumption early on and eliminating the need for end-user support. This lowers the number of calls to IT teams and, by extension, the number of team members needed to occupy the support desk. Businesses, therefore, save money on support team salaries.

Repair times are lowered

Finding the source of a network problem can be difficult even for the most skilled technicians. This is particularly true for networks that are spread across sites that are very far apart and can end up costing huge amounts of time and money thanks to the need for technicians to travel. Network monitoring can prevent such losses by offering live diagnostic data and maps that can tell technicians where problems lie.

Businesses can meet service level agreements

Service level agreements (SLAs) are drawn up to keep clients and end users happy and to let them know what to expect of their network providers. If SLAs are unmet, then, companies can end up in very hot water. Network monitoring is one of the best ways to ensure SLAs are met.

Downtime is reduced

Downtime is a major factor when it comes to company losses. This is because it can hugely impact employee productivity. As well as the time spent unable to undertake their everyday tasks, employees may become frustrated or angered by slow IT systems, which can impact their ability to get on with tasks. Network monitoring is a great way to reduce downtime.

Choosing the right software for you

Once you have made the decision to opt for network monitoring software, you will need to find a package that suits your needs. You may, for example, want to think about:

– Installation costs
– The cost of initial licenses and product options
– Whether the product offers affordable upgrades and support
– How many of your staff will need training, and how much this will cost
– Costs associated with setting up the system
– Whether you will need to hire anyone new to help manage the new system

Here at Opmantek, we’ve helped our customers use our products to design the solution they need. Our staff are knowledgeable and friendly and there’s no hard sell.

 

Uncategorized

The Importance of Beta Testing

Beta testing is a vital phase of the software development life cycle here at Opmantek. Our software forms the critical business platforms for Network Management Software and IT Auditing and Compliance for our customers – hence reliability and performance are what our customer demand and have come to expect from us. We want to launch software that is successful, continuing to build upon our hard work and success. We want the user to have the best experience they can, so we need to get rid of the bugs and issues the software may have before it is launched.

This is where the Opmantek Early Adopter Program comes in – we work with beta testers to ensure new products and updated versions are up to scratch.

There are a number of different factors that are checked during beta testing – let us look at usability, performance and quality.

Is the product easily usable?

If you want customers to talk about the software for all the right reasons, then the product needs to have great usability.

To do this, you need to consider your target audience and come up with the solutions that would best suit this audience’s problems.

Through beta testing, you will get feedback about the user experience of your software, and through this, the developer will be able to improve the product to ensure it’s meeting the users’ requests.

How strong is the performance of the product?

During beta testing, the speed and performance of the product will be analysed. While we can virtualise a lab network and run all our various automated testing scenarios, we may not always use it in the way a customer does. It needs to be tested by real users trialing the software in their environment.

Why? Put simply, the product will get to operate on all different hardware with a blend of other software installed all begging for resources. There are many variables, which is why the software needs to be tested by real users – such as you – through the beta phase.

Is the product of high quality?

The overall goal of the beta testing phase is to create a product that is fully functional and of high quality. This involves testing all the features within the product to check that they are all working as they should.

Although it is tempting to add a plethora of features to the software, sometimes it’s best to keep its design simple, as having too many functions can sometimes reduce the overall quality and user experience of the product. Even at the late stage of beta testing, feature feedback can help us decide upon which features are useful, and also ensure that we document any unusual ways the tester applied the feature, so everyone can benefit.

Are there any bugs?

One of the most important steps of beta testing is checking the products for bugs. Officially launching a product on to the market with bugs in it can quickly turn users off the software and vastly reduce the number of users interested in your product.

By determining bugs early on, you can weed them out. Sometimes, one of the benefits is that by uncovering one type of bug, other types of bugs are found too. The earlier these are detected, the better.

As an Opmantek Beta Tester in our Early Acceptance Program, you will play a key role in helping software developers to launch their products. There are many benefits for the tester: you can try out new products before they are officially launched, contribute to innovative products, and be rewarded with an Amazon gift card or access to the new product for a year.

Our current program is open for Open-AudIT Cloud. Beta Testing officially starts on 20th May 2019.

Uncategorized

Top Tips to Achieve Operations Team Buy in For An Automation Project

Gartner projected that “Global spending on robotic process automation (RPA) software is estimated to reach $680 million in 2018, an increase of 57 per cent year over year”.

Currently the biggest adopters of RPA include banks, insurance companies, utilities and telecommunications companies. With these industries being some of the most prevalent users of Opmantek Software to automate their network administration and orchestration, we decided to talk to our partners and customers about their experience in implementing robotic process automation and operational process automation in their businesses.

Here are the top 4 tips they gave for gaining team buy-in for an operations project.

Keep the team focused on their job outputs, not tasks

“We hired you for your communication and problem-solving skills, not for your typing speed”.  When implementing an automation project it is really important that staff who will have their routines impacted understand that the automation will serve them to do the job they were hired to do better.  The reports you used to spend an hour running are now ready to review when you arrive at your desk, giving you an extra hour to do what you do best.

Focus on small, regular, time-consuming tasks

When choosing the first tasks to be automated, keep it simple and measurable, so that staff and management can see tangible results from the exercise.  Daily or weekly reports or tasks that have dedicated maintenance windows such as system upgrades or audits are great places to start.

Get your team to workshop the best practice process steps

By giving the team exposure and input into the work that will be automated it allows them to feel some control over the project.  Running a best practice workshop both benefits the project, in ensuring that the most efficient and effective paths to resolution are implemented for the project and helps the staff to understand exactly what the ‘bots’ will be doing for them.

Let the team have some fun with it

One IT manager shared that within his team, each of the bots that completes a specific process was given a name and soon became part of the work team.  If a process failed the team would laugh and say ‘R2D2 is sleeping on the job again”.  This seemed to help with human-computer interaction quite significantly.

 

Here at Opmantek, we have seen many IT departments transformed through the implementation of our suite of tools to automate regular tasks like software and hardware audits, configuration changes, maintenance routines and IP address allocation and management.  To speak to one of our engineers about your Network automation project contact us here.

Uncategorized

Monitor rising tensions in the global cybersecurity landscape

Escalating tensions between the United States and competing countries are reshaping the cyber-security landscape – with severe implications for Australian businesses and government organisations. The United States set down its case in a cyber strategy document released in late 2018 and has escalated its measures from there. According to the document, the United States had adopted a vision of ‘a shared and open cyberspace for the benefit of all,’ but its adversaries had conducted economic espionage and malicious cyber activities that had damaged individuals, commercial and non-commercial interests and governments across the world.

The document listed Russia, China, Iran, and North Korea as challenging the United States in cyberspace, ‘often with a recklessness they would never consider in other domains.’ Since then, the United States Government has issued executive orders to shore up a cybersecurity workforce short of 300,000 practitioners and more importantly, to declare a national emergency and bar United States companies from using foreign telecommunications equipment made by companies it considers a national security risk. The initiative is already causing consternation among local users of smartphones from one supplier – a leading United States-headquartered company is reportedly restricting the supplier’s access to its applications and operating system.

Businesses need to monitor and respond quickly to these measures and the evolving security landscape. Companies exposed to the United States will need to evaluate the risks of doing business with firms targeted by current and future executive orders. Given Australia’s close relationship with the United States, local organisations will also need to remain aware of the ongoing risk of cyberattack or espionage from individuals or groups acting on behalf of ‘cyberspace challenger’ countries.

Some of the steps businesses should take include ensuring cyber-security planning including incident response is up to date and people know their roles and responsibilities; checking that anti-malware products are installed and up-to-date; and that employees are aware of potential cyber-threats and the steps they need to take to minimise risk. If you would like to learn more, please contact sales@firstwavecloud.com.

Uncategorized