<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="https://sampathblogs.online/wp-content/plugins/rss-feed-styles/public/template.xsl"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:rssFeedStyles="http://www.lerougeliet.com/ns/rssFeedStyles#"
>

<channel>
	<title>Functional &#8211; Sampath Kumar A</title>
	<atom:link href="https://sampathblogs.online/category/functional/feed/" rel="self" type="application/rss+xml" />
	<link>https://sampathblogs.online</link>
	<description>Be Concious Be More</description>
	<lastBuildDate>Sun, 21 Sep 2025 17:32:40 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<rssFeedStyles:reader name="Digg Reader" url="http://digg.com/reader/search/https%3A%2F%2Fsampathblogs.online%2Ffeed%2F"/><rssFeedStyles:reader name="Feedly" url="http://cloud.feedly.com/#subscription%2Ffeed%2Fhttps://sampathblogs.online/feed/"/><rssFeedStyles:button name="Like" url="https://www.facebook.com/sharer/sharer.php?u=%url%"/><rssFeedStyles:button name="G+" url="https://plus.google.com/share?url=%url%"/><rssFeedStyles:button name="Tweet" url="https://twitter.com/intent/tweet?url=%url%"/><rssFeedStyles:button name="Pinterest" url="https://www.pinterest.com/pin/create/button?url=%url%"/><rssFeedStyles:button name="LinkedIn" url="https://www.linkedin.com/cws/share?url=%url%"/>	<item>
		<title>Transform Your Task Management with Microsoft Tools</title>
		<link>https://sampathblogs.online/2024/07/transform-your-task-management-with-microsoft-tools/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transform-your-task-management-with-microsoft-tools</link>
					<comments>https://sampathblogs.online/2024/07/transform-your-task-management-with-microsoft-tools/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 11:24:28 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Basic guide]]></category>
		<category><![CDATA[Project management]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=3583</guid>

					<description><![CDATA[A task is an item that you create and track until it&#8217;s completed. Task management is the process of effectively and efficiently tracking, managing, and executing the life cycle of a task or many tasks, from start to completion. It... <a class="more-link" href="https://sampathblogs.online/2024/07/transform-your-task-management-with-microsoft-tools/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>A task is an item that you create and track until it&#8217;s completed. Task management is the process of effectively and efficiently tracking, managing, and executing the life cycle of a task or many tasks, from start to completion. It can help individuals achieve goals or enable groups of individuals to collaborate and share knowledge for the accomplishment of collective goals. Task management apps refer to digital tools designed to help individuals and teams organize, track, and complete tasks efficiently. In this blog post, &#8220;Transform Your Task Management with Microsoft Tools&#8221; you will be introduced to the various tools.</p>



<p>Microsoft tools can be very effective in task management provided the right tools are used for the right purpose. Here, i will be taking you through a few of the most used tools for task management.</p>



<h3 class="wp-block-heading">Microsoft Outlook</h3>



<p>Microsoft Outlook is mainly an email application that allows you to send and receive emails. In addition to emails, it combines calendar, contacts, and tasks in one place.  </p>



<p>If there are a few email tasks and work items to be handled, then Outlook can be used for task management using the tasks option. Outlooks tasks directly integrate with Outlook email, allowing you to create tasks from emails. In case of <a href="https://en.wikipedia.org/wiki/Microsoft_365">Outlook 365</a> you can access the <em>Tasks</em> option from the sidebar under the More Apps as shown in the figure below. </p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img fetchpriority="high" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks0.png" alt="" class="wp-image-3586" width="593" height="280" srcset="https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks0.png 881w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks0-300x142.png 300w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks0-768x364.png 768w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks0-600x284.png 600w" sizes="(max-width: 593px) 100vw, 593px" /></figure></div>



<p>Once the tasks option is selected, you will be at the next screen wherein you will see the list of all your tasks that is created by you or shared with you.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="323" src="https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks1-1-1024x323.png" alt="" class="wp-image-3588" srcset="https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks1-1-1024x323.png 1024w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks1-1-300x95.png 300w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks1-1-768x242.png 768w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks1-1-600x189.png 600w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks1-1-945x298.png 945w, https://sampathblogs.online/wp-content/uploads/2024/07/outlooktasks1-1.png 1386w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h3 class="wp-block-heading">Microsoft Calendar</h3>



<p>As the number of email tasks, work items increase, the Outlook Tasks App  might not be the right tool since the visibility on the progress of tasks might be time consuming to ascertain. This is where the MS Calendar comes handy. Navigate to the Calendar option from the sidebar. In this screen, access the <em>Home &gt; Task</em> option to create a new task. </p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img decoding="async" src="https://sampathblogs.online/wp-content/uploads/2024/07/MScalender-1024x542.png" alt="" class="wp-image-3589" width="571" height="302" srcset="https://sampathblogs.online/wp-content/uploads/2024/07/MScalender-1024x542.png 1024w, https://sampathblogs.online/wp-content/uploads/2024/07/MScalender-300x159.png 300w, https://sampathblogs.online/wp-content/uploads/2024/07/MScalender-768x406.png 768w, https://sampathblogs.online/wp-content/uploads/2024/07/MScalender-600x317.png 600w, https://sampathblogs.online/wp-content/uploads/2024/07/MScalender-945x500.png 945w, https://sampathblogs.online/wp-content/uploads/2024/07/MScalender.png 1276w" sizes="(max-width: 571px) 100vw, 571px" /></figure></div>



<p>If you are creating a task from an email, just drag and drop the email on to the calendar icon in the side bar. In the next screen you can set the start, end date and time for the email task.</p>



<h3 class="wp-block-heading">Microsoft ToDo</h3>



<p>In case of Outlook 365, the Microsoft ToDo is integrated with Outlook. Click on the ToDo icon in the sidebar to open the MS ToDo app as shown in the figure below.</p>



<p>Use the &#8220;My Day&#8221; feature to focus on tasks you want to complete today. ToDo is great for quick task entry and managing personal ToDos. You can create separate lists of tasks for different projects and share them with others for collaborative task management. Since this tool syncs with Outlook tasks, all the Outlook tasks will appear in MS ToDo and viceversa.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2024/07/MStodo-1024x557.png" alt="" class="wp-image-3590" width="577" height="313" srcset="https://sampathblogs.online/wp-content/uploads/2024/07/MStodo-1024x557.png 1024w, https://sampathblogs.online/wp-content/uploads/2024/07/MStodo-300x163.png 300w, https://sampathblogs.online/wp-content/uploads/2024/07/MStodo-768x417.png 768w, https://sampathblogs.online/wp-content/uploads/2024/07/MStodo-600x326.png 600w, https://sampathblogs.online/wp-content/uploads/2024/07/MStodo-945x514.png 945w, https://sampathblogs.online/wp-content/uploads/2024/07/MStodo.png 1525w" sizes="auto, (max-width: 577px) 100vw, 577px" /></figure></div>



<h3 class="wp-block-heading">Microsoft Planner</h3>



<p>At present, there is no integration of Planner with Outlook 365, but you can find this integrated with Microsoft Teams. From the sidebar on MS Teams, click on the Planner icon to open the app as shown in the figure below.</p>



<p>This tool is a combination of MS ToDo and Planner combined into one. At its core, Microsoft Planner is a task management application. You can easily create to-do lists, checklists and projects. The Kanban, charts and calendar views are intuitive for anyone to use and give a clear view of the tasks at hand. Although the features are fewer than other project management tools, they are effective for simple projects.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="494" src="https://sampathblogs.online/wp-content/uploads/2024/07/planner-1024x494.png" alt="" class="wp-image-3591" srcset="https://sampathblogs.online/wp-content/uploads/2024/07/planner-1024x494.png 1024w, https://sampathblogs.online/wp-content/uploads/2024/07/planner-300x145.png 300w, https://sampathblogs.online/wp-content/uploads/2024/07/planner-768x370.png 768w, https://sampathblogs.online/wp-content/uploads/2024/07/planner-1536x741.png 1536w, https://sampathblogs.online/wp-content/uploads/2024/07/planner-600x289.png 600w, https://sampathblogs.online/wp-content/uploads/2024/07/planner-945x456.png 945w, https://sampathblogs.online/wp-content/uploads/2024/07/planner.png 1900w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>MS Planner is easy to use, so you won’t have much of a learning curve even if your team hasn’t used Kanban boards before. Kanban boards visually depict work at various stages of a process using cards to represent work items and columns to represent each stage of the process.</p>



<p>The above Microsoft tools if used efficiently can help transform Task Management , thus improving your productivity.</p>



<p><strong>Further Reading :</strong></p>



<ul class="wp-block-list"><li> <a href="https://sampathblogs.online/2024/06/navigating-jira-from-basics-to-advanced/">Navigating Jira : From Basics to Advanced</a></li><li> <a href="https://sampathblogs.online/2018/11/useful-tools-for-it-professionals/">Useful Tools for IT Professionals</a></li><li> <a href="https://sampathblogs.online/2022/08/few-more-useful-tools-for-it-professionals/">Few More Useful Tools for IT Professionals</a></li><li> <a href="https://sampathblogs.online/2019/07/useful-microsoft-outlook-tips-tricks/">Useful Microsoft Outlook Tips &amp; Tricks</a></li><li><a href="https://sampathblogs.online/2022/10/useful-microsoft-teams-tips-tricks/">Useful Microsoft Teams Tips &amp; Tricks</a></li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2024/07/transform-your-task-management-with-microsoft-tools/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Useful Microsoft Teams Tips &#038; Tricks</title>
		<link>https://sampathblogs.online/2022/10/useful-microsoft-teams-tips-tricks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=useful-microsoft-teams-tips-tricks</link>
					<comments>https://sampathblogs.online/2022/10/useful-microsoft-teams-tips-tricks/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Tue, 25 Oct 2022 13:22:19 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Basic guide]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=3155</guid>

					<description><![CDATA[Since the time pandemic started, remote work has been the norm in most of the IT companies. With the new way of working, the demand for apps that support collaborative work style has increased. In the same way employees would... <a class="more-link" href="https://sampathblogs.online/2022/10/useful-microsoft-teams-tips-tricks/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>Since the time pandemic started, remote work has been the norm in most of the IT companies. With the new way of working, the demand for apps that support collaborative work style has increased. In the same way employees would work together in an office, your teams need the right “tools” to do their collaborative jobs. The utilization of collaboration platforms like Microsoft Office and Microsoft Teams can provide powerful online collaboration that simplify remote work. However, there are many sorts of digital tools your team could use once you understand the basics of collaborative remote work. In this blog post I will focus on a few of the Microsoft Teams tips &amp; tricks that will help to improve your productivity.</p>



<h5 class="wp-block-heading"><strong>Slash Commands</strong></h5>



<p>In the Teams app search box area, you can type in commands preceded by a slash character. This will be helpful to quickly navigate the various options on Teams like changing the status, chatting with a specific person, checking all the @mentions to you etc. You can input the command, irrespective of the tab that you are in on the side bar. Some of the frequently used commands are as follows.</p>



<ul class="wp-block-list"><li>Status commands : <em>/available, /busy, /dnd, /brb, /away, /offline</em></li><li>Check all your @mentions : <em>/mentions</em></li><li>Check all your bookmarked messages : <em>/saved</em></li><li>Chat with a specific person : <em>/chat</em> &lt;person&gt; &lt;message&gt;</li><li>Jump to a Team/Channel : <em>/goto</em> &lt;Team/Channel&gt;</li></ul>



<h5 class="wp-block-heading"><strong>Captions, Transcription &amp; Recording</strong></h5>



<p>Some people prefer to have subtitles or captions during meetings. MS Teams has this feature that when enabled, captions will be visible to the person who activates it. Once in a meeting as the organizer or as an attendee, navigate to the ellipsis icon(&#8230;) and click on &#8220;Turn on live captions&#8221; option to enable the captions.</p>



<p>The point to note here is that the captions setting done above will not save the captions for further reference after the meeting. This is where the transcription feature helps. Once the &#8220;Start transcription&#8221; option is selected under the ellipsis icon, the live transcription starts and the whole meeting will be saved as a file that can be used for later reference or sharing after the meeting . The point to note here is that only the organizer or the presenters within the same organization can start the transcription. Once the transcription is started, it will be visible to all the attendees as well.</p>



<p>The next option is helpful if you want to save the whole meeting session in the form of a video. The recording can be done only by the organizer or presenters of the meeting. Just select the &#8220;Start recording&#8221; option under the ellipsis icon to record the meeting. Once the meeting is complete, the recorded file will be accessible to all the attendees in the meeting chat.</p>



<h5 class="wp-block-heading"><strong>Mute/Unmute</strong></h5>



<p>This section is about the mute or unmute settings available in teams meeting. Once you join a meeting as an organizer or as a presenter you have the permission to mute or unmute others in the meeting. An organizer can make the &#8220;Who can present?&#8221; setting under &#8220;meeting options&#8221; before the start of the meeting so that specific people can be set as presenters. However, with this setting, though the non-presenters or attendees cannot mute/unmute others but can unmute themselves. If you are in a meeting with disturbing background noise of attendees, you can make appropriate setting that will not let the attendees unmute themselves. This is available as &#8220;Allow mic for attendees&#8221; option under &#8220;meeting options&#8221;.</p>



<h5 class="wp-block-heading"><strong>Collaborate &amp; Share</strong></h5>



<p>Microsoft Teams provides an interactive whiteboard in the form of Microsoft Whiteboard app that can be used to brainstorm, share ideas and collaborate in an organization. On Teams channel or group, click on the add a tab(+) icon, search for the Whiteboard app and add the new Whiteboard tab so that the whole team/channel can access it. The collaborate feature can also be made use of during remote meetings. Once you start a meeting, navigate to the share tray and select the &#8220;Microsoft Whiteboard&#8221; option. In the next window you need to select either the present or collaborate option to start using the app based on your needs.</p>



<h5 class="wp-block-heading"><strong>Bookmark</strong></h5>



<p>The option to bookmark a chat post publicly or privately is available on Teams. In order to bookmark an item from a conversation, hover over the post, then click on the more option ellipsis on the right side of the emoji bar. Click “Save this message” or “Pin” . If you select the &#8220;Save this message&#8221; option, the message will be bookmarked privately to you that can later be accessed by navigating to your profile icon at the top right and clicking on the &#8220;Saved&#8221; option. You can remove the bookmark by clicking on the &#8220;Unsave this message&#8221; option on the bookmarked post.</p>



<p>The other way to bookmark is to click on the &#8220;Pin&#8221; option. Any chat participant can pin a message to the top of the chat or unpin the pinned message if they don’t like it. There’s no way to lock a pinned chat to stop someone else deciding that it’s not so important and unpin the message. Even channel conversations support pinning.</p>



<p>Other useful features include the Task Management using <em>Tasks by Planner and To Do</em> app, Polling using <em>Microsoft Forms</em> app, Immersive reader, Channel notifications on/off, Dark Mode etc.</p>



<p><strong>Further Reading :</strong></p>



<ul class="wp-block-list"><li><a href="https://sampathblogs.online/2020/06/minimalism-the-covid-19-lockdown-takeaways-for-work-and-life/">Minimalism : The COVID-19 lockdown takeaways for work and life</a></li><li><a href="https://sampathblogs.online/2022/06/microsoft-forms-getting-started-guide/">Microsoft Forms : Getting Started Guide</a></li><li><a href="https://sampathblogs.online/2019/07/useful-microsoft-outlook-tips-tricks/">Useful Microsoft Outlook Tips &amp; Tricks</a></li><li><a href="https://sampathblogs.online/2022/03/onenote-basic-to-advanced-guide/">OneNote : Basic to Advanced Guide</a></li><li><a href="https://sampathblogs.online/2018/08/data-analysis-using-excel/">Data Analysis using Excel</a></li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2022/10/useful-microsoft-teams-tips-tricks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Book Review : Getting Things Done</title>
		<link>https://sampathblogs.online/2022/07/book-review-getting-things-done/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=book-review-getting-things-done</link>
					<comments>https://sampathblogs.online/2022/07/book-review-getting-things-done/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Mon, 25 Jul 2022 04:27:38 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Books]]></category>
		<category><![CDATA[Personal Development]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=3095</guid>

					<description><![CDATA[I came across the mention of the book, Getting Things Done when I was going through an online video on productivity tools. My honest opinion after completing the book is that everyone in the corporate world should go through this... <a class="more-link" href="https://sampathblogs.online/2022/07/book-review-getting-things-done/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>I came across the mention of the book, Getting Things Done when I was going through an online video on productivity tools. My honest opinion after completing the book is that everyone in the corporate world should go through this book at least once in order to reap some of the benefits. Other than helping to use the productivity tools in an efficient way, the principles and methods mentioned in the book can be incorporated to everything that you have to do in your personal and professional life. </p>



<p>The author of this book, David Allen has been called as one of the world&#8217;s most influential thinkers on productivity. The personal productivity system, Getting Things Done (GTD) was developed by him and published in this book. The GTD method rests on the idea of moving all items of interest, relevant information, issues, tasks and projects out of one&#8217;s mind by recording them externally and then breaking them into actionable work items with known time limits. This avoids recalling each task intuitively that may result in missing out on certain things. </p>



<p>The book starts off with the problem, i.e., most of the people have too much to handle and not enough time to get it all done. These people are to some degree frustrated and perplexed about how to improve the situation. Neither our standard education, nor the traditional time management models, nor the plethora of organizing tools available has given us a viable means of meeting the new demand for speed, complexity, and changing priority. There is a great need for new methods, technologies, and work habits to help us get on top of our world. When you feel out of control, stressed out, unfocused, bored and stuck, the methodology of GTD will show you how to get back to &#8220;mind like water&#8221;, with all your resources and faculties functioning at the maximum level. </p>



<p>In the next chapter, the author explains about the core process or five stage method for managing workflow. No matter what the setting, there are five discrete stages that we go through as we deal with our work. In this management of horizontal aspect of our lives, we incorporate everything that has our attention at any time. </p>



<h6 class="wp-block-heading">Collect things that command Your attention</h6>



<p>It is important to know what needs to be collected and how to collect it most effectively so you can process it appropriately. You must be sure that at some point in the near future you will process and review all of it. There are several types of tools that you can use to collect the open loops or incompletes. Tools that can serve as in-basket are the physical ones like the trays that can collect the paper based materials, note taking devices like the paper writing pads, electronic note taking devices like the PDAs, Voice recording devices, Email application. These collection tools should become part of your life style so that you can collect your thought anytime &amp; anywhere. </p>



<h6 class="wp-block-heading">Process what they mean and what to do about them </h6>



<p>The most important question to ask here is what&#8217;s the next action? This is the critical question for anything you have collected. If you answer it appropriately, you will have the key substantive thing to organize. The &#8220;next action&#8221; is the next physical visible activity that you need to engaged in, in order to move the current reality towards completion.</p>



<h6 class="wp-block-heading">Organize the results</h6>



<p>For nonactionable items, the possible categories are trash, incubation tools and reference storage. If no action is needed on something, you toss it, reassess it later, or file it so you can find the topic that you need to refer to at a later time. However for actionable things, you will need a list of projects, storage or files for project plans and materials, a calendar, a list of reminders of next actions, and a list of reminders of things you are waiting for.</p>



<h6 class="wp-block-heading">Review the result as options for what we choose to do</h6>



<p>Its one thing to write down a task and another to actually execute it. You need to be able to review the whole picture of your life and work at appropriate intervals and appropriate levels. After checking your calendar, it is good to turn to &#8220;Next actions&#8221; list. If you have organized the list by context, they will come into play only when those contexts are available. Everything that might potentially require action must be reviewed on a frequent enough basis to keep your mind from taking back the job of remembering and reminding. </p>



<h6 class="wp-block-heading"> Perform the action </h6>



<p>The basic purpose of this workflow management process is to facilitate good choices about what you are doing at any point in time. If you have collected, processed, organized and reviewed all your current commitments, you can galvanize your intuitive judgement with some intelligent and practical thinking about your work and life.</p>



<p>A functional workspace is critical. Be it office or home, everyone must have a dedicated workspace and in-basket to start with. This serves as a physical locus of control from which to deal with everything else. It is imperative that you have your own work space, or at least your own in basket and a physical place in which to process paper. Some of the basic processing tools that you will need are paper holding trays, paper, pen or pencil, post-it, paper clips, binder clips, a stapler &amp; staples, scotch tape, rubber bands, an auto labeler, file folders, a calendar, wastebasket.</p>



<p>The author suggests everyone to maintain their own personal, at hand filing system. The following are the guidelines as suggested by the author to make your filing effective.</p>



<ul class="wp-block-list"><li>Keep your general reference files at hand&#8217;s reach </li><li>One Alpha Filing system &#8211; Ex: Manila folder system with A-Z and nothing else </li><li>Have lots of fresh folders to process the in-basket</li><li>Keep the drawer less than three quarters full always </li><li>Label your file folders with an Auto Labeler </li><li>Get high-quality mechanics file cabinet </li><li>Purge your files at least once a year </li></ul>



<p>In the subsequent chapters, the author goes into the detail of each of the core process starting with collection or getting all your incompletes into one place ,i.e., your in-basket. The first activity is to search your physical environment for anything that doesn’t belong where it is, the way it is and put it into your in-basket. Start your activity with your desk at home/office, drawers, inside the cabinets, floor, walls, furniture etc. Once you have collected all the physical things, you will want to collect anything else that may be residing in your mind that has your attention. In this instance, go for the quantity instead of quality so as to avoid missing out on anything. Often you may just need a walk to unearth something lurking in a corner of your mind. Remember, when something occurs to you, write it on a piece of paper or pad and toss it into your in-basket. </p>



<p>The next chapter is about the processing or the review part. When you have finished processing the in-basket you will have trashed what you don’t need, completed any less than 2minute actions, handed off to others anything that can be delegated, set reminders of actions that require more than 2minutes, identified any larger commitments. The key processing question that needs to be asked when processing each item in the in-basket is &#8220;What&#8217;s the next action?&#8221;. If there is a next action it, that may be either to do it, delegate it or defer it. In case of no actions required for the items, the categories that they fall into will be either trash, incubate or reference. </p>



<p>In the next chapter on organizing, the author writes about the primary types of things that everyone needs to track and manage from an organizational perspective.</p>



<ul class="wp-block-list"><li>A Project list</li><li>Project support material</li><li>Calendarized actions and information</li><li>&#8220;Next Actions&#8221; list</li><li>A &#8220;Waiting For&#8221; list</li><li>Reference material</li><li>A &#8220;Someday/Maybe&#8221; list </li></ul>



<p>The above categories must be visually, physically and psychologically separate. If the above categories begin to blend, much of the value of organizing will be lost. The best way as per the author to be reminded of an &#8220;as soon as I can&#8221; action is by the particular context required for that action ,i.e., either the tool or the location or the person needed to complete it. Like the reminders of actions, you need to set reminders of all the things that you are waiting to get back from or get done by others have to be sorted out too. In this case, &#8220;Waiting For&#8221; list is the best to use, similar to the &#8220;Next actions&#8221; reminder list. As per the author, your calendar can be a very handy place to park reminders like the triggers for activating projects, events you might want to participate in, decision catalysts. The timely reminder from outlook calendar will make it sure that you remember your tasks on time.</p>



<p>In the next chapter about review, the author says that if everything is completely collected, processed and organized you will take only a few brief moment to access your system for day to day reminders. Your most frequent review will probably be your daily calendar followed by the list of all the actions you could possibly do in the current context. As per the author, the magic key to sustainability of the whole process is the weekly review. Weekly review is simply whatever you need to do to get your head empty again. It builds in some capturing, reevaluation and reprocessing time to keep you in balance.</p>



<p>When you start to perform any action, the choices can be made based on the criterion of context, time available, energy available and priority.</p>



<p>There is much more to these simple techniques and models than may appear at first glance. Indeed, they offer a systematic method to keep your mind distraction free, ensuring a high level of efficiency and effectiveness in your work. Getting things done, and feeling good about it, means being willing to recognize, acknowledge, and appropriately manage the things that have your consciousness engaged. The author says that your life and work are made up of outcomes and actions. When your operational behavior is grooved to organize everything that comes your way, at all levels, a deep alignment occurs and wondrous things emerge. This results in you becoming highly productive.</p>



<p><strong>Further Reading :</strong></p>



<ul class="wp-block-list"><li><a href="https://sampathblogs.online/2018/11/useful-tools-for-it-professionals/">Useful Tools for IT Professionals</a> </li><li><a href="https://sampathblogs.online/2019/07/useful-microsoft-outlook-tips-tricks/">Useful Microsoft Outlook Tips &amp; Tricks</a></li><li><a href="https://sampathblogs.online/2022/03/onenote-basic-to-advanced-guide/">OneNote : Basic to Advanced Guide</a></li><li><a href="https://sampathblogs.online/2020/06/minimalism-the-covid-19-lockdown-takeaways-for-work-and-life/">Minimalism : The COVID-19 lockdown takeaways for work and life</a></li><li><a href="https://sampathblogs.online/2022/05/rules-to-live-by-to-thrive-at-life-work/">Rules to Live By to Thrive at Life/Work</a></li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2022/07/book-review-getting-things-done/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Frequently Used Documents at Japanese Companies</title>
		<link>https://sampathblogs.online/2022/04/frequently-used-documents-at-japanese-companies/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=frequently-used-documents-at-japanese-companies</link>
					<comments>https://sampathblogs.online/2022/04/frequently-used-documents-at-japanese-companies/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Mon, 25 Apr 2022 04:47:07 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Basic guide]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=3021</guid>

					<description><![CDATA[Anyone who has been employed at a Japanese company for some time might have come across various documents required in different situations. The exchange of documents can be either top-down, bottom-up or between the subordinates within an organization. However, the... <a class="more-link" href="https://sampathblogs.online/2022/04/frequently-used-documents-at-japanese-companies/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>Anyone who has been employed at a Japanese company for some time might have come across various documents required in different situations. The exchange of documents can be either top-down, bottom-up or between the subordinates within an organization. However, the external documents are used to mainly communicate with the clients. In this blog post i will try to list out the frequently used documents that i have come across during my career.</p>



<h2 class="wp-block-heading"><strong>Company Internal Documents</strong></h2>



<p>In the corporate world, documentation is very important. The internal documents are intended for use within a company for communication or information exchange. This should result in improving the efficiency of work, implementing new ideas etc. In the following section let us try to understand the various types of internal documents and the purpose of each. </p>



<h3 class="wp-block-heading"><strong>Hierarchical</strong></h3>



<p>The following documents follow a top-down or bottom-up flow within an organization.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>日報・週報・月報</strong>（Daily &amp; Weekly &amp; Monthly Report ）</h5>


<p>A daily report is typically a document prepared by each of the team member / team lead to submit to their supervisors. A standard report contains details on how they spent their work day, including any achievements or challenges that they encountered. It gives information about the work an individual / a team has done for the day and how it contributes to a team’s or company’s overall accomplishments. </p>



<p>A weekly report outlines the main points of the week&#8217;s projects and tasks, including team and individual accomplishments, completed projects and future work overviews. It is a great way to monitor employee performance and ensure that projects stay on track.</p>



<p>A monthly report provides a summary of all the activities that have occurred and are in progress on a project during a given month. Project Managers use monthly reports to inform the client / the higher management about scope creep, risks to the schedule, budget, or resources, and other issues. </p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>届出書・申請書</strong>（Notification Form）</h5>


<p>This form is used to report to the company about your current status. Also this can be an application that you submit to your company for approval. This form will be helpful to the company (concerned department) for a smooth execution of the necessary processes. Usually a standard format in word or excel will be provided by the company that needs to be filled and submitted. Some of the frequently used forms are change of address form, commutation expense reimbursement form, certification expense reimbursement form etc.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>顛末書</strong>（A Circumstantial Report） </h5>


<p>In case of an incident or trouble at work, a written statement needs to be submitted that explains the status of the trouble or the cause of occurrence. Also the mitigation steps need to be mentioned before submitting the report to the supervisor. </p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>辞令</strong>（Appointment Notice）</h5>


<p>This notification is issued by the HR department to an employee, based on the instruction from higher management in case of transfer, promotion etc. This is different from the everyday work instruction sent by an incharge to the team. This document contains changes to employee information like location, wages, position, job profile etc. </p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>通達</strong>（Official Notice）</h5>


<p>This is usually a notification mail or document sent by the person incharge to a team or all the employees w.r.t matters relating to work or any specific instruction. Some of the official notice examples are change in work timings, new year holiday calendar etc. </p>



<h3 class="wp-block-heading"><strong>Non Hierarchical</strong></h3>



<p>The following documents are mostly used between the subordinates, between the concerned members or used by an individual to improve work efficiency.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>管理台帳</strong>（Management Register）</h5>


<p>This is a record to precisely manage the various office equipment, office supplies, IT (software &amp; hardware) etc. Some of the frequently used records are the inventory management record, asset management record, change management record etc. Usually, this is used by multiple people with shared usage permissions while performing a task. Mostly, Excel tool or online database  is used for this purpose rather than a sheet of paper. </p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>一覧表・名簿</strong>（List &amp; List of names）</h5>


<p>Literally ichiranhyō means a chart or a table. This term is frequently used to refer to any list that you prepare at work including names. However meibo refers to a list or directory of people only.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>手順書</strong>（Procedure Manual）</h5>


<p>This document tells us about the steps to be followed to execute a process or task. Anyone who goes through this document should be ready to execute the actions instantly. This document will be helpful while executing a task, when the task is being assigned to another person, while training a new employee, in case any improvements are to be made to a process.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>予定表・スケジュール表</strong>（Schedule）</h5>


<p>This refers to timetable or calendar that lists events and times at which they take place. Some of the frequently used ones are the Outlook calendar, work/shift schedule, task schedule etc.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>議事録</strong>（Record of Proceedings）</h5>


<p>This is also known as minutes of a meeting that provides instant written record of a meeting or hearing. Minutes may include agenda, date &amp; time, place, list of attendees, outline, issues &amp; responses, comments. </p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>チェックリスト</strong>（Checklist）</h5>


<p>A checklist helps to reduce mistakes by compensating for potential limits of human memory and attention. It aids to ensure consistency and completeness in carrying out a task. A simple example is a To-Do list that can be used at workplace to enlist the tasks to be carried out in a day/week, enlist the steps to be carried out in order to execute a task successfully.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"> <strong>伝言メモ</strong>（Message Memo）</h5>


<p>A message memo is used frequently when the concerned incharge is absent. On behalf of the incharge, necessary information is taken note of inorder to convey when the concerned person gets back. </p>



<h2 class="wp-block-heading">Company External Document</h2>



<p>These documents are either business related or invitation/notification issued to clients. Among other types there are etiquette and legal documents as well. Hence these documents need to be polite and should be carefully written.</p>



<h3 class="wp-block-heading">Business Related</h3>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>見積書</strong>（Quotation）</h5>


<p>This document is submitted during the bidding process and will contain details like the price, conditions etc. </p>


<p class="fonts-plugin-block " style="font-family: Metal"><strong>請求書</strong>（Invoice）</p>


<p>An invoice is a simple document with a list of all products, price descriptions, tax breakups that establishes an obligation on the buyer/client to pay the seller for the purchased goods or services.                                                                                                       </p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>注文書</strong>（Purchase Order）</h5>


<p>A purchase order is an official document that buyers/customers send to sellers to document the sale of products and services to be delivered at a later date.  </p>



<h3 class="wp-block-heading">Invitation/Notification</h3>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>案内状</strong>（Invitation Letter）</h5>


<p>This is a document to invite the customers to an event that is to be held at your company. </p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>通知状</strong>（Notification）</h5>


<p>This document is used to notify a candidate about the acceptance or rejection of candidature or used for  communicating any administration related information.</p>



<h3 class="wp-block-heading">Socializing</h3>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>挨拶状</strong>（Greeting Card）</h5>


<p>This is sent to convey good wishes to the customer. Usually, greetings are sent to the customers during the new year, summer time, new business unit opening, transfer etc., This is used within a company to greet each other as well.</p>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>礼状</strong>（Letter of Thanks）</h5>


<p>This is sent to customers or to any superior at your company from whom you have received a favor. </p>



<h3 class="wp-block-heading">Legal</h3>


<h5 class="fonts-plugin-block " style="font-family: Metal"><strong>契約書</strong>（Agreement）</h5>


<p>A negotiated and typically legally binding arrangement between parties as to a course of action.</p>



<p><strong>Further Reading :</strong></p>



<ul class="wp-block-list"><li><a href="https://sampathblogs.online/2020/01/important-documents-information-for-those-employed-in-japan/">Important documents information for those employed in Japan</a></li><li><a href="https://sampathblogs.online/2018/10/japanese-work-culture/">Japanese Work Culture</a></li><li><a href="https://sampathblogs.online/2019/04/good-to-know-rules-for-those-employed-in-japan/">Good to know rules for those employed in Japan</a></li><li><a href="https://sampathblogs.online/2018/06/japanese-workplace-etiquette/">Japanese Workplace Etiquette</a></li><li><a href="https://sampathblogs.online/2018/04/a-view-of-japan-business-environment/">A View of Japan Business Environment</a></li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2022/04/frequently-used-documents-at-japanese-companies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OneNote : Basic to Advanced Guide</title>
		<link>https://sampathblogs.online/2022/03/onenote-basic-to-advanced-guide/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=onenote-basic-to-advanced-guide</link>
					<comments>https://sampathblogs.online/2022/03/onenote-basic-to-advanced-guide/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Thu, 17 Mar 2022 13:17:51 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Basic guide]]></category>
		<category><![CDATA[Personal Development]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=2973</guid>

					<description><![CDATA[I used to look for a note taking app that supported all the note taking requirements in a single app. After a lot of search i settled for the combination of Notepad, Notepad++ and MS Excel for the various note... <a class="more-link" href="https://sampathblogs.online/2022/03/onenote-basic-to-advanced-guide/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>I used to look for a note taking app that supported all the note taking  requirements in a single app. After a lot of search i settled for the combination of Notepad, Notepad++ and MS Excel for the various note taking and data organizing at workplace. However, recently i came across the OneNote that immediately caught my attention. It is a cloud based digital notebook that can be used to take notes, gather information, create multiple personal or professional notebooks, collaborate with others, flag notes, supports handwriting, audio &amp; video features, integrates with MS office apps etc. The main point to note here is, Microsoft&#8217;s&nbsp;OneNote&nbsp;is&nbsp;free&nbsp;for all users, whether you&#8217;re on a Mac, a PC, an iPhone or iPad, or an Android device.</p>



<h3 class="wp-block-heading">Structure</h3>



<p>For this blog post i have taken the OneNote for Windows 10 as reference. In the android or Mac versions of OneNote few of the features may not be available. OneNote is comprised of three main hierarchical levels: notebooks, sections, and pages. <em>Notebooks&nbsp;</em>are the main files for OneNote that hold all pieces inside. <em>Sections&nbsp;</em>are the dividers in the notebooks and the next levels in the hierarchy. <em>Pages&nbsp;</em>are within each section as the notes, lists, and planners. </p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2022/02/onenote-org.png" alt="" class="wp-image-2987" width="481" height="303" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/onenote-org.png 586w, https://sampathblogs.online/wp-content/uploads/2022/02/onenote-org-300x189.png 300w" sizes="auto, (max-width: 481px) 100vw, 481px" /></figure></div>



<p>Multiple notebooks can be created for different purpose with the above structure. Each notebook can have a section group that can hold multiple sections. Each section can hold single or multiple pages based on your requirement. </p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2022/02/onenote-1024x494.jpg" alt="" class="wp-image-2985" width="604" height="291" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/onenote-1024x494.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2022/02/onenote-300x145.jpg 300w, https://sampathblogs.online/wp-content/uploads/2022/02/onenote-768x371.jpg 768w, https://sampathblogs.online/wp-content/uploads/2022/02/onenote-600x290.jpg 600w, https://sampathblogs.online/wp-content/uploads/2022/02/onenote-945x456.jpg 945w, https://sampathblogs.online/wp-content/uploads/2022/02/onenote.jpg 1297w" sizes="auto, (max-width: 604px) 100vw, 604px" /></figure></div>



<p>In the above picture, kumar&#8217;s Notebook contains three sections, namely, Quick Notes, Blogs and Personal. The Quick Notes section contains three pages, namely, Title A, Title B and Title C.</p>



<h3 class="wp-block-heading">Features</h3>



<p>There are a lot of useful features in OneNote that can be made use of based on your need. I have highlighted a few of the features that i found to be useful as follows.</p>



<h4 class="wp-block-heading"><strong>Note Taking</strong></h4>



<p>Notes can be taken in various forms ,i.e., as text, image, audio and video. The below picture provides an example of the various note taking formats available. The text can be directly entered at any point randomly inside the page. I have not come across any such application till now except for the MS Excel spreadsheet. You can attach files at any point in the page either as an attachment, as a link of the file uploaded to OneDrive or as an inline printout of the contents of the file. The inline printout of the contents can be set as background to the page for marking or note taking.   </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="606" src="https://sampathblogs.online/wp-content/uploads/2022/02/print-1024x606.jpg" alt="" class="wp-image-2991" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/print-1024x606.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2022/02/print-300x178.jpg 300w, https://sampathblogs.online/wp-content/uploads/2022/02/print-768x455.jpg 768w, https://sampathblogs.online/wp-content/uploads/2022/02/print-1536x910.jpg 1536w, https://sampathblogs.online/wp-content/uploads/2022/02/print-600x355.jpg 600w, https://sampathblogs.online/wp-content/uploads/2022/02/print-945x560.jpg 945w, https://sampathblogs.online/wp-content/uploads/2022/02/print.jpg 1589w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Other note taking options include inserting an image through the <strong>Pictures </strong>option under <strong>Insert</strong>. You can insert pictures directly from the phone camera, scanner(MS Lens), file or online. Even own audio can be recorded using the <strong>Audio </strong>option. Links of other pages online or other notebooks can also be used using the <strong>Link </strong>option. You can use the <strong>Online Video</strong> option to provide a video link that enables video viewing directly from the page. <strong>Office Dictation</strong> option under <strong>Home</strong> menu provides voice to text functionality that can be utilized based on your need.</p>



<h4 class="wp-block-heading"><strong>Organize Notes</strong></h4>



<p>Once you start taking notes, various features like checklist, tags, bullets,  fonts/font sizes, tables, stickers, indentation etc. will be really helpful to organize notes. The below picture depicts a few of the major features.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2022/02/org.jpg" alt="" class="wp-image-2999" width="372" height="312" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/org.jpg 584w, https://sampathblogs.online/wp-content/uploads/2022/02/org-300x251.jpg 300w" sizes="auto, (max-width: 372px) 100vw, 372px" /></figure></div>



<p>The checklist icon, bullets, indentation, font size/font change, strikethrough,  Tags &#8211; Important/star, Question mark, Remember for later are available under the <strong>Home</strong> menu. Table, Stickers option are available under the <strong>Insert </strong>option. Use the <strong>Show Search</strong> option at the left to search for any tags used in any Notebook.</p>



<h4 class="wp-block-heading"><strong>Password Protection</strong></h4>



<p>OneNote provide an easy way to secure confidential data. You can apply passwords to any number of sections within a notebook. The 128-bit AES encryption is used to secure password-protected notebook sections. Due to the high level of encryption, no one will be able to unlock your notes for you if you forget your password. To keep your notes secure, OneNote automatically locks password-protected sections after a few minutes of inactivity.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2022/02/pwd.jpg" alt="" class="wp-image-2994" width="492" height="469" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/pwd.jpg 634w, https://sampathblogs.online/wp-content/uploads/2022/02/pwd-300x286.jpg 300w, https://sampathblogs.online/wp-content/uploads/2022/02/pwd-600x572.jpg 600w" sizes="auto, (max-width: 492px) 100vw, 492px" /></figure></div>



<p>Right click on any section to set the password. Once you set the password, a lock mark appears next to the section name. Check the above picture on how to access the add password option.</p>



<h4 class="wp-block-heading"><strong>Integration with Office Suite</strong></h4>



<p>You can automatically save emails to OneNote under the sections as a page by sending a mail to <a href="mailto:me@onenote.com">me@onenote.com</a> . However, in order to use the facility you need to register at the following link using the button &#8220;Set up email to OneNote&#8221;. </p>



<p><a href="https://www.onenote.com/emailtoonenote">https://www.onenote.com/emailtoonenote</a></p>



<p>Once you enter the login credentials, the following page appears. Confirm your email id and specify the location in your OneNote to save the mails and you are done. The point to note here is either your Microsoft email id or any non-Microsoft email id can be setup.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2022/02/emails-1024x569.jpg" alt="" class="wp-image-3001" width="521" height="289" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/emails-1024x569.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2022/02/emails-300x167.jpg 300w, https://sampathblogs.online/wp-content/uploads/2022/02/emails-768x427.jpg 768w, https://sampathblogs.online/wp-content/uploads/2022/02/emails-600x333.jpg 600w, https://sampathblogs.online/wp-content/uploads/2022/02/emails-945x525.jpg 945w, https://sampathblogs.online/wp-content/uploads/2022/02/emails.jpg 1515w" sizes="auto, (max-width: 521px) 100vw, 521px" /></figure></div>



<p>Another useful feature is that once you login to the web version of outlook, you can find the OneNote feed at the top right of the screen. You can use the feed to take notes or refer to an earlier note while checking mails.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2022/02/webnote.jpg" alt="" class="wp-image-3002" width="214" height="192" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/webnote.jpg 483w, https://sampathblogs.online/wp-content/uploads/2022/02/webnote-300x269.jpg 300w" sizes="auto, (max-width: 214px) 100vw, 214px" /></figure></div>



<p>One more useful feature is to connect Outlook to OneNote for taking meeting minutes. Just login with your work email account by clicking the <strong>Meeting Details</strong> option under the <strong>Insert</strong> menu on OneNote. Once logged in all the meetings for any particular selected date will show up. Select any meeting that you plan to attend and start taking notes instantly.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://sampathblogs.online/wp-content/uploads/2022/02/mm.jpg" alt="" class="wp-image-3003" width="264" height="152" srcset="https://sampathblogs.online/wp-content/uploads/2022/02/mm.jpg 561w, https://sampathblogs.online/wp-content/uploads/2022/02/mm-300x172.jpg 300w" sizes="auto, (max-width: 264px) 100vw, 264px" /></figure></div>



<h4 class="wp-block-heading"><strong>Misc.</strong></h4>



<ul class="wp-block-list"><li><strong>Immersive Reader</strong> : This feature is helpful when you want OneNote to read out the text entered in a page. Just open the page that you want OneNote to read out, navigate to <em>View &gt; Immersive Reader</em> and click on play button at the bottom of the screen to start the reader. You can adjust voice using the voice setting option.</li><li><strong>Translate </strong>: This is another useful feature to translate selected text or the whole page to an available local language or international language. Select a text in a page or a page, navigate to <em>View &gt; Translate</em> and select the option Selection/Page to start the translation.</li><li><strong>Send to OneNote</strong> : When you print any document on a OneNote installed PC, an additional printer &#8220;OneNote for Windows10&#8221; will show up under the select printer section. Using this printer you can print directly to your selected section on OneNote.</li><li><strong>Delete Notebook</strong> : If you want to delete any Notebook on OneNote, the <em>Close this Notebook</em> option will only move the Notebook under the <em>More Notebooks</em> area. Delete the notebook directly on OneDrive to delete it completely.</li><li><strong>Sync &amp; Share</strong> : When you use OneNote on multiple devices the <strong>Sync</strong> option helps to synchronize a single notebook/all notebooks with the latest updates if any. You can use the <strong>Share</strong> option available on the top right of the OneNote window to share a notebook with anyone using their email address.</li></ul>



<p><strong>Further Reading :</strong></p>



<ul class="wp-block-list"><li><a href="https://sampathblogs.online/2018/11/useful-tools-for-it-professionals/">Useful Tools for IT Professionals</a></li><li><a href="https://sampathblogs.online/2019/07/useful-microsoft-outlook-tips-tricks/">Useful Microsoft Outlook Tips &amp; Tricks</a></li><li><a href="https://sampathblogs.online/2018/08/data-analysis-using-excel/">Data Analysis using Excel</a></li><li><a href="https://sampathblogs.online/2019/11/understanding-google-sheets-basics/">Understanding Google Sheets Basics</a></li><li><a href="https://sampathblogs.online/2020/06/minimalism-the-covid-19-lockdown-takeaways-for-work-and-life/">Minimalism : The COVID-19 lockdown takeaways for work and life</a> </li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2022/03/onenote-basic-to-advanced-guide/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Japanese Workplace Etiquette</title>
		<link>https://sampathblogs.online/2018/06/japanese-workplace-etiquette/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=japanese-workplace-etiquette</link>
					<comments>https://sampathblogs.online/2018/06/japanese-workplace-etiquette/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Mon, 25 Jun 2018 06:26:55 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Functional]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=315</guid>

					<description><![CDATA[Necessity of Business Manners Business manner is the basic necessity in-order to work smoothly in a society or a workplace environment. So if the foundation of business manner is strong, trust with others can be built easily leading to a... <a class="more-link" href="https://sampathblogs.online/2018/06/japanese-workplace-etiquette/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>Necessity of Business Manners</h3>
<p>Business manner is the basic necessity in-order to work smoothly in a society or a workplace environment. So if the foundation of business manner is strong, trust with others can be built easily leading to a good workplace environment. If a person is highly skilled it doesn&#8217;t mean that he/she will be assigned a job or project immediately, only after the foundation of trust is built he will be assigned a proper job. The trust factor here comes from a proper display of business manner which is based on the human skills like pro-activeness, judgemental power and expressiveness. The main thing expected out of a person in the business world is maintaining good people relations which is dependent upon the expressiveness of the person ,i.e, proper judgement of situations and proactively reacting to it.</p>
<p>So, in Japan a person who has gained the trust and has sufficient skill set will be called a true professional or a capable business man.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1323 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/manners1.jpg" alt="" width="519" height="287" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/manners1.jpg 519w, https://sampathblogs.online/wp-content/uploads/2020/01/manners1-300x166.jpg 300w" sizes="auto, (max-width: 519px) 100vw, 519px" /></p>
<h3>Important requirements for a working professional</h3>
<h4><strong>Relationship</strong></h4>
<p>Good relationships start with good people skills,i.e, how well you collaborate, communicate and deal with conflict.<br />
There are several characteristics that make up good, healthy working relationship:</p>
<p><strong>・Trust</strong><br />
This is the foundation of every good relationship. When you trust your team and colleagues, you form a powerful bond that helps you to work and communicate more effectively. If you trust the people you work with, you can be open and honest in your thoughts and actions, and you don&#8217;t have to waste time and energy &#8220;watching your back.&#8221;</p>
<p><strong>・Mutual Respect</strong><br />
When you respect the people who you work with, you value their input and ideas, and they value yours. Working together, you can develop solutions based on your collective insight, wisdom and creativity.</p>
<p><strong>・Mindfulness</strong><br />
This means taking responsibility for your words and actions. Those who are mindful are careful and attend to what they say, and they don&#8217;t let their own negative emotions impact the people around them.</p>
<p><strong>・Open Communication</strong><br />
We communicate all day, whether we&#8217;re sending emails and IMs, or meeting face to face. The better and more effectively you communicate with those around you, the richer your relationships will be. All good relationships depend on open, honest communication.</p>
<p>Understanding Business manner is about knowing the &#8216;activity model&#8217; of social ethics or people relationship. Here, one needs to identify the morals and associated people relations with one&#8217;s heart. It is most important to connect the heart with human relationships which forms the core of business manner understanding. The word heart refers to concern and consideration.</p>
<p>Find below a couple of examples related to right attitude w.r.t human relationship and applying heart w.r.t human relationship:</p>
<p>1) No matter how close a person is to his colleague or senior at workplace, he needs to behave with the basic workplace etiquette in mind.<br />
2) A newly appointed manager regarding whom there is negative feedback from various sources, should not be dealt with based one others feedback but with one&#8217;s viewpoint.</p>
<h4><strong>Manner</strong></h4>
<p>This is one of the basics of good business manner. To be considerate and have concern towards your subordinates and superiors. When this thoughtful behavior reverberates in your coworker&#8217;s heart it leads to smooth interactions and a pleasant working environment.Also the considerate nature always reflects in one&#8217;s bowing posture,business card exchange or in other behavioral attitude towards a client. So we can conclude that, when considerate nature reflects in a form or posture we have business manner put into practice.</p>
<p>Find below few examples of various instances which can be referred to as basic skills or core values of business manners in Japan:</p>
<p><strong>・Greeting Manners</strong></p>
<ul>
<li>Greeting everyone with a loud voice in the mornings when one enters the office.</li>
<li>When leaving office in the evening one needs to wish the senior who is still working.</li>
</ul>
<p><strong>・Posture Manners</strong><br />
The three basic postures are shown in the figure below:</p>
<ol>
<li><em>Eshaku</em> &#8211; The body is bent 15 degrees in this posture and used to greet a subordinate or senior in the office in the morning and evening. Also can be 　a used as a casual way of greeting anyone at office in a day.</li>
<li><em>Keirei</em> &#8211; The best situation to use this posture of bending the body 30 degrees is after introducing ourselves during customer visits.</li>
<li><em>Sai-keirei</em> &#8211; The best case of using this posture of bending the body 45 degrees is while seeing off the customers which expresses gratitude.</li>
</ol>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1297 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/greet1.jpg" alt="" width="755" height="365" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/greet1.jpg 755w, https://sampathblogs.online/wp-content/uploads/2020/01/greet1-300x145.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/greet1-600x290.jpg 600w" sizes="auto, (max-width: 755px) 100vw, 755px" /></p>
<p><strong>・Manners when going out on a client Visit</strong></p>
<ul>
<li>The appointment date and time should be prioritized as per client need.</li>
<li>When client enters the meeting room, one needs to getup from one&#8217;s seat and greet. Later on introduce self(in case of first meeting) and hand over   the business card followed by the Keirei posture.In case of receiving the business card as well the same flow should be followed ending with the Sai-keirei posture which shows deep gratitude towards the client.</li>
</ul>
<p><strong>・Manners when client visits us</strong></p>
<ul>
<li>In case of guiding client inside an elevator, one needs to enter first and press the open button and destination floor button and guide the client inside. However in cases wherein there are people already inside the elevator, one needs to hold the door with one hand and guide the client inside first and later enter. While getting off the elevator one needs to press the open button and guide the client outside first and later move out of the elevator.</li>
<li>It is a good practice to knock the door of meeting room before entering. Also in case of door which opens on the inside of the room one needs to enter first and invite the clients inside. However in case of door which opens outside, one needs to hold the door and show the client inside first and later enter the room.</li>
</ul>
<p><strong>・Seating Manners</strong><br />
Seating manners are also too important in Japanese business. Refer to the various instances as displayed in the below figure.</p>
<p>The Senior most person will be given the seat farthest from the door in a meeting room while the junior most will be seated near to the door. In case of a taxi, senior most employee will be given the seat behind the driver while the junior most employee will be seated on the passenger seat next to the driver. In a train or aeroplane, senior most person will be given the seat next to the window in the direction of motion. Finally the position in a elevator will be behind the junior most person who will operate the panel. The 1,2,3,4,5 numbers in the below picture refer to the employees from the senior most to the junior most position in the order.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1363 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/seating.jpg" alt="" width="819" height="519" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/seating.jpg 819w, https://sampathblogs.online/wp-content/uploads/2020/01/seating-300x190.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/seating-768x487.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/seating-600x380.jpg 600w" sizes="auto, (max-width: 819px) 100vw, 819px" /></p>
<h4><strong>Communication style</strong></h4>
<p>All good relationships are dependent on how much we respect the other person&#8217;s thinking or values and his position. This considerate nature is the starting step in building a satisfactory communication.Lets get to know more about the considerate nature communication style used to connect with people.</p>
<h5><strong>Understanding the connection between communication style and relationships</strong></h5>
<p>&#8220;To make or mar depends on the telling&#8221; is the translation of a famous Japanese proverb. This simply means that, people may or may not get offended by the way you speak and mentioning &#8220;i didn&#8217;t mean that&#8221; might be too late to say once one is offended. However, if one is considerate and gentle towards others feelings even the unsaid things can be understood leading to a communication style which touches the other person&#8217;s heart. This considerate nature improves people relationships resulting in strong bonds and high efficiency within teams at workplace.</p>
<ul>
<li>Points to be taken care of when listening to others<br />
1) Make agreeable responses in order to make the person feel at ease<br />
2) Look the person in eye while making the agreeable response<br />
3) Listen to the person till the end of his conversation without interrupting</li>
<li>Points to be taken care of when talking to others<br />
1) Use respectful words as much as possible even while speaking to a colleague or coworker<br />
2) When asked about a topic which one is not well versed about, avoid creating false impressions and convey your true knowledge<br />
3) Do not deny a person&#8217;s opinion outright.</li>
</ul>
<h5><strong>Knowledge of the basic Keigo/ Honorifics</strong></h5>
<p>Keigo is the verbal expression of one&#8217;s respect towards the other person&#8217;s position or standpoint. We can say that keigo is the basic human skill required because incase our respect towards a person doesn&#8217;t match in words there is an imbalance which needs to be addressed to with high priority. There are some rules to use the Keigo which we will learn in this section.</p>
<p>Keigo consists of following types, which uses different expressions for different situations;</p>
<ol>
<li>Honorific language (Sonkeigo)<br />
Sonkeigo, or the respectful form, is used to show respect to someone of higher position. This can be somebody in the same company of higher rank or a client for example.</li>
<li>Humble language (Kenjougo)<br />
When referring to him or herself in business, the Japanese will use a form called Kenjougo.The form essentially tries to show respect by deliberately referring to oneself lower than the listener (who typically are of higher rank or position).</li>
<li>Polite language (Teineigo)<br />
Teineigo is perhaps the easiest and the most commonly used by everybody (including native Japanese speakers). This is because the Teineigo is usually the first form of Keigo that is taught to students learning the Japanese language.</li>
</ol>
<p>Below picture gives a pictorial representation of the above forms;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1314 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/keigo.jpg" alt="" width="264" height="321" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/keigo.jpg 264w, https://sampathblogs.online/wp-content/uploads/2020/01/keigo-247x300.jpg 247w" sizes="auto, (max-width: 264px) 100vw, 264px" /></p>
<p>Refer below the Keigo list of various verbs;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1315 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/keigolist.jpg" alt="" width="814" height="474" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/keigolist.jpg 814w, https://sampathblogs.online/wp-content/uploads/2020/01/keigolist-300x175.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/keigolist-768x447.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/keigolist-600x349.jpg 600w" sizes="auto, (max-width: 814px) 100vw, 814px" /></p>
<h5><strong>Basic knowledge of situation based communication style</strong></h5>
<p>A true professional or a capable business person chooses different communication style for situations like reporting or explanation, requests, trouble resolution etc. The main motive here is the same as point number one above ,i.e, relating communication style to relationships. Planning of communication techniques based on positive response from the audience in-order to develop good relationships.</p>
<p><strong>・Reporting</strong><br />
The purpose of reporting is to provide information. There are various types here like business reporting, management reporting, office reporting etc. The basic idea in all the reporting types is to communicate the information as it is in a simple and understandable way. The main point here is to start from the conclusion or summary and elaborate on that thereby giving priority to the superior&#8217;s time. This is the true quality of a considerate business person.</p>
<p><strong>・Explanation</strong><br />
The purpose of explanation is to make the audience understand your point. Instances like explanation of new features of a product to the customer, explaining one&#8217;s point of view in a meeting, explaining the work procedure to one&#8217;s team etc are a few cases which requires explanation from a business perspective. The important thing here is to use simple words and be specific so that the other party can understand your viewpoint easily.</p>
<p><strong>・Requesting</strong><br />
Where every one in the team is involved in their routine work, in addition to that if we need cooperation from the team on another task at hand we need to make a request. The way to request is, first ask about the status of the current work and express one&#8217;s understanding regarding the same.On top of that explain about the new task on hand and check the team&#8217;s co-operation on get involved.So the gist is to first understand the other person&#8217;s current status and get a frank reply regarding cooperation on the new task at hand. This is the way to make a request in-order for the other party to get involved wholeheartedly.</p>
<p><strong>・Grievance Redressal</strong><br />
Whenever there are claims or complaints from the clients, first thing is to accept it and take the responsibility. The next important thing is to rebuild the confidence of one&#8217;s organization by wiping off the distrust factor. This is the main purpose behind grievance redressal. In most of the cases whenever there is a complaint we can see people replying as &#8220;not a problem with our product&#8221; or put the blame on handling the product etc. Here the first thing is to apologize followed by expression of gratitude towards instructions from the customer. By this way of communication we are trying to rebuild the confidence of customer w.r.t our company.</p>
<h5><strong>Socializing activities</strong></h5>
<p>Of the many socializing activities of a business person in Japan greeting colleagues and customers during end and start of the year, wining and dining with the customers, sending gifts to seniors to express gratitude, thanking a person who was of help are some of the instances during which consideration towards the other person are expressed.</p>
<p>The socializing activities mentioned here are w.r.t to work or business. Hence the person representing the company will be required to show a dignified behavior or business manner. The polite greeting towards the end or start of the year, hospitality shown through corporate entertainment, the gratitude shown by sending summer gifts(chuugen) or winter gifts(seibo) to seniors, the words of concern expressed during visit to a sick coworker or client are all dignified ways of showing one&#8217;s heartfelt considerate nature.</p>
<h4><strong>Other necessary skills</strong></h4>
<h5><strong>Information handling</strong></h5>
<p>Information gathering, organizing and communicating form the main components of business information cycle. Information here comprises of vital data which may be used for business related activities. The motto of information handling is to have fast access to precise information.</p>
<p>Though clients are the main source of information, we have occasions like business get together parties and pan-industry social events wherein important information can be gathered w.r.t to new business etc. The business manner to be displayed here is to listen patiently to the person providing information in-order to extract the precise information which we want.</p>
<p>The main intention behind organizing information is easy and quick access when needed. Information like business cards, sales or development documents etc are vital data relating to business, when handled properly is a proof that one is seriously involved in one&#8217;s work. Also the information managed by us should not be limited to us but must be actively utilized by all concerned in-order to maximize the gains. So organizing of information is vital.</p>
<p>Communicating the actual information in a proper way is of prime importance. The information provided here should be of value to the customer as well. Hence the routine gathering and organizing of information is vital to sharing the needed information to the customer. Also the information limited to us will be of little value when compared to information shared within the team thereby increasing the efficiency of the team. Information like business related documents, problem points etc can be of real help to anyone in the team.</p>
<h5><strong>Document management</strong></h5>
<p>It is common at workplace to communicate information in writing when the same can be done through a call like an order or notice. The reason behind this can be thought of as to keep a record of transactions, to communicate the point precisely, to communicate the information to multiple people at a time etc.</p>
<p>Communication in writing,i.e, documentation can be broadly divided into internal and external documents.The internal documentation or the document circulated within the company should prioritize on the efficiency aspect rather than politeness. Whereas an external document to be sent to a client should follow a specific format and must consist of polite words. Here we are following a writing format which keeps the recipient in high esteem.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1307 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/intdoc.jpg" alt="" width="735" height="476" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/intdoc.jpg 735w, https://sampathblogs.online/wp-content/uploads/2020/01/intdoc-300x194.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/intdoc-600x389.jpg 600w" sizes="auto, (max-width: 735px) 100vw, 735px" /></p>
<p>The format above shows the layout of an internal document like a notice and the below format picture depicts an external document like a letter sent to a client.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1290 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1.jpg" alt="" width="700" height="385" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1.jpg 700w, https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1-300x165.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1-600x330.jpg 600w" sizes="auto, (max-width: 700px) 100vw, 700px" /></p>
<p>One more section which falls under this section of necessary skill is meetings, regarding which we had discussed earlier in the situation based communication style and seating manners part.</p>
<p>To sum it up, i have tried my maximum to write in simple words regarding workplace practices expected out of a professional in Japan. I hope you find it useful!</p>
<p><strong><em>Sources : </em></strong><br />
ビジナス実務マナー検定 受験ガイド<em>(Business Practice Manner Test Guidebook), Work Experience</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/06/japanese-workplace-etiquette/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Towards Human Error Zero through KY</title>
		<link>https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=towards-human-error-zero-through-ky</link>
					<comments>https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 25 May 2018 01:11:21 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=181</guid>

					<description><![CDATA[Purpose The most common cause of workplace accidents or industrial accidents is often attributed to human error such as operational error, judgmental error, and job-related error, all of which are caused by human characteristics. Human behavioral characteristics, such as mistakes... <a class="more-link" href="https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>Purpose</h3>
<p>The most common cause of workplace accidents or industrial accidents is often attributed to human error such as operational error, judgmental error, and job-related error, all of which are caused by human characteristics. Human behavioral characteristics, such as mistakes and carelessness, are called “human characteristics,” and errors caused by human characteristics are called “human errors.”One more major effect of human error is that it leads to interruption of services to customer, resulting in loss of trust and/or compensation for damages.</p>
<p>Work is always accompanied by issues related to human error, and unsafe behavior accounts for about 90% of all accidents, including those caused by inexperienced and unskilled workers.Most of the human errors are said to be associated with psychological factors affecting human behavior like carelessness and assumption based work.</p>
<p>Specific safety methods were developed so that workplaces can take steps on preemptive action for safety which includes hazard prediction training and pointing and calling. Activities incorporating these methods in a unified manner are called hazard prediction activities and will result in improved customer satisfaction.</p>
<p>Below points need to be kept in mind while doing any work;<br />
<strong>• </strong>Take appropriate measures beforehand in order to counter risk after identification.<br />
<strong>• </strong>Recheck at each of the important stages of work.<br />
<strong>• </strong>Do the things that are obvious and need to be done.<br />
<strong>• </strong>Human error reduction through Team work and communication.</p>
<h3>Human Error and Hiyari Hatto</h3>
<p><em>Human Error</em> : An inappropriate or undesirable human behavior or decision that reduces, or has the potential for reducing, effectiveness, safety, or system performance resulting in trouble, accident or escalations.</p>
<p>Undesirable or inappropriate human behavior can be anything concerned with human nature like misjudgement, mishearing, verbal slip-up, misunderstand, carelessness. Even risk taking factors like rule violation wherein difficulty to abide, probability that it is ok to violate as others are doing can also be categorized as inappropriate behavior.</p>
<p><em>Hiyari Hatto (HH)</em> : An inappropriate or undesirable human behavior or decision that reduces, or has the potential for reducing, effectiveness, safety, or system performance but didn&#8217;t result in trouble, accident or escalations.</p>
<p>Hiyari Hatto is a Japanese term. It means Experience of Almost Accident situation. Hiyari Hatto (HH) is a System to<br />
<strong>• </strong>Identify the possible danger through Team members experience<br />
<strong>• </strong>Develop the countermeasure utilizing their expertise and<br />
<strong>• </strong>Implement the same in consultation with Team members supervisor</p>
<p>It is a pro-active exercise but not post mortem after accident.</p>
<h3>What is HEZ Activity/Campaign</h3>
<p>Each and every individual human being is irreplaceable. The HEZ(Human Error Zero) Campaign aims for zero accidents in the workplace resulting in increased customer satisfaction.The Campaign builds on the <strong>three principles</strong> of zero accidents, preemptive action, and participation to implement the <strong>KY activity</strong> in order to <strong>prevent human errors</strong> and bring about increased customer satisfaction.</p>
<p><strong>The three principles</strong></p>
<p>The following are the three basic principles.</p>
<p><em>The principle of zero accidents</em><br />
“Zero accidents” means to achieve an accident free workplace (not only no fatal accidents or accidents causing absent from work, but also no accidents, including industrial accidents, occupational illness, or other accidents) by detecting, understanding, and solving all hazards (problems) in everybody’s daily life as well as potential hazards existing in workplaces and work and should be implemented 100%.</p>
<p><em>The principle of preemptive action</em><br />
“Preemptive action” means to prevent all accidents and industrial accidents by detecting, understanding, and solving all hazards (problems) in everybody’s daily life as well as potential hazards existing in workplaces and work in order to create a brighter and more vigorous workplace with zero accidents and zero diseases as an ultimate goal.</p>
<p>Here the basic understanding is that, counter measures need to be developed for hiyari hatto which may lead to accidents or trouble. On the other hand, unsafe actions which may lead to hiyari hatto should also be identified beforehand and appropriate counter measures be taken. Also in situation where accident has happened already, the causes need to be found out in order to avoid re-occurrence.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1301 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/hiyari.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/hiyari.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/hiyari-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/hiyari-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/hiyari-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" /></p>
<p>As per Heinrich&#8217;s findings for every accident that causes a major injury, there are 29 accidents that cause minor injuries and 300 accidents that cause no injuries or “near misses.” He felt that because accidents share many common root causes, addressing the commonplace accidents will help eliminate major injuries or fatalities down the road. Heinrich also believed from his findings that 85 to 95% of all workplace accidents stem from unsafe actions by individuals.</p>
<p><em>The principle of participation</em><br />
“Participation” means to make a concerted effort by managers, supervisors, staff, and workers to detect, understand, and solve potential hazards (problems) existing in workplaces and work. It requires the voluntary effort and commitment of all those involved in actions for problem-solving.</p>
<p><strong>Hazard Prediction Activity(KY Katsudo)</strong><br />
<em>*KY Katsudo (K: kiken (hazard), Y: yochi (prediction), Katsudo: Activity)</em></p>
<p>Hazard Prediction(KY) Activity is a brainstorming drill to discuss, mutually consider and understand all potential human error factors in advance. The potential human errors can rise out of human trait like carelessness (misjudgement, mishearing etc) and risk taking activities like rule violation(follow the crowd, assumption based work etc). The purpose of KY activity is to detect possible human errors beforehand or even in the case of human error should not result in affecting customer services. This activity is used in the promotion of HEZ campaign.</p>
<p>Here you can find a sample of KY Activity chart used during the brainstorming drill, just before start of work.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1317 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/KYT.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/KYT.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/KYT-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/KYT-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/KYT-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" /></p>
<p><strong>HE Preventive Measures</strong></p>
<p>In order to tackle accidents caused by human error the following three preventive measures must be ensured:</p>
<p><em>Hardware (equipment, facilities, and other tools)</em><br />
It is important to push ahead with safety and health measures in terms of Fail Safe or Fool Proof hardware (facilities, machinery, working environment, and raw materials) for the prevention of accidents caused by human error.</p>
<p><em>Software (human beings as well as hardware)</em><br />
In addition to the above measures, it is necessary to improve the working environment including the relationship between workers and hardware as well as work from the perspective of a man-machine system. Here necessary procedure document should be created with checklist sections for the creation, implementation and confirm operations. An environment wherein 4S is implemented would be the best.</p>
<p><em>Humanware</em><br />
Humanware incorporates the safety and health management of both hardware and software. Effective humanware hazard prediction activities incorporate countermeasures against human error and include the Health KY, the hazard prediction training (KYT), pointing and calling and the Hiyari hatto.</p>
<p>All the three,i.e., Hardware, Software and Humanware countermeasure put together will result in achieving the goals of HEZ campaign.</p>
<h3>HEZ Activity in detail</h3>
<p>Here i will take you through the specific actions which must be performed in-order to create a Human Error Zero environment.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1299 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" />(1) HEZ training to all the employees of a company</p>
<p>Appropriate HEZ training to all the employees at different levels of a company needs to be provided. This can go a great way in creating awareness and reduce the Human error at work and eventually make it reach the ideal zero figure.</p>
<p>(2) Strict adherence to the code of conduct at work</p>
<p>While any work is done with the elementary action items being put into practice, the must be adhered to rules should be kept in mind and is known as the code of conduct at work. In any organization, the code of conduct will be released and distributed as either a booklet or a card along with a briefing session regarding the same. The code of conduct document will contain the code of conduct items, concrete examples relating to code of conduct and the definition of terminologies.</p>
<p>The elementary action items are nothing but the consolidated number items of any organization based on the past occurrences of operation error or accidents and is the compilation of preventive measures with respect to the same. A few of the elementary action items are KY drill before start of work, work to be executed as per the procedure document, pointing and calling at each of the important points, contact concerned authority in case of ambiguity or insecurity or abnormality after stopping the work etc.,</p>
<p>(3) Hiyari Hatto activity</p>
<p>In order to target zero HE, the potential accident causing condition should be grasped in advance and procedure should be established to report as many as such cases to the management as possible. Also let&#8217;s ensure that countermeasures are taken to all HH in-order to make work place safer, pleasant and easy to work. The below flow chart shows a sample pictorial representation of the HH activity work flow.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1300 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/HHflow.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/HHflow.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/HHflow-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/HHflow-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/HHflow-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" />(4) Pointing and Calling in every day activity</p>
<p>This activity involves pointing at target objects by stretching your arm and stating out loud, “Such and such is OK” at important points in the work in order to proceed with work safely and correctly. Pointing and calling are methods for raising the consciousness level of workers and confirming that conditions are regular and clear, increasing the accuracy and safety of work.By raising the consciousness level, accidents resulting out of human characteristics of carelessness like misjudgement, mishearing etc., can be avoided.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1347 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/pnc.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/pnc.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/pnc-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/pnc-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/pnc-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" /></p>
<p>A few illustrations of the pointing and calling are as follows;<br />
Eg 1) email address confirmation before sending a email &#8211; abc@xyz.com address Yoshi!<br />
Eg 2) Cabinet confirmation before leaving your work desk at break time &#8211; 1/2/3 desk cabinet/s locked Yoshi!<br />
Eg 3) Tidiness confirmation after finishing work at the end of day &#8211; clear desk Yoshi!<br />
Eg 4) Avoiding forgetfulness before moving out &#8211;  possess a/b/c Yoshi!</p>
<p>The results of proof testing conducted by the Railway Technical Research Institute in 1994 showed that the rate of work-related errors decreased to less than one-sixth when conducting pointing and calling as compared with doing nothing.</p>
<p>(5) Hazard Prediction Training(KYT) at workplace</p>
<p>Hazard prediction training called &#8221; Kiken-Yochi Training &#8221; (KYT) in Japanese can be defined as a role-play based training method, in which staff members first observe photos/videos or illustrations of everyday scenes in a workplace, and then those scenes are discussed within a group for detection of potential hazards, countermeasures against hazardous issues , and, finally, slogans or messages are created and directed at risk avoidance (ensuring of safety). It was invented in 1974 in Japan for prevention of occupational accidents, and, since the late 1970s, has spread from the manufacturing industry to the entire industrial world. A systematic review reported that KYT reduced the occupational accident rate significantly. Thereafter, KYT was introduced into safety education programs across industries, leading to a significant reduction in accidents.</p>
<p>The KYT Basic 4-Round Method forms the foundation for this activity. Participants openly discuss the hidden hazards depicted in the illustrations of the workplace and work conditions and solve problems by proceeding through the four rounds step by step.</p>
<p>Round 1: What are the hidden hazards? (Understanding the actual situation)<br />
Round 2: These are the danger points. (Investigating the reality)<br />
Round 3: What would you do? (Establishing countermeasures)<br />
Round 4: These are the danger points. (Setting targets)</p>
<p>The KYT method increases the motivation of workers to practice in teams. It uses meetings to sharpen awareness of what constitutes danger. Workers share information on hazards and improve their problem solving capabilities by working on finding solutions in meetings. And they improve their powers of concentration by practicing pointing and calling activities in all of the important points in the work.</p>
<p>In order to maintain long term consistency in the implementation of KYT learnings, the following points should be kept in mind and executed during everyday activities.<br />
1) Sensitivity towards the hazard points<br />
2) Rise the concentration level through pointing and calling<br />
3) Improve problem resolution through KY activity<br />
4) Fire up the motivation through KY activity<br />
5) Display teamwork in detection, understanding and resolution of problems during KY activity<br />
6) Think the problems as your own</p>
<p>(6) Morning and Evening Assembly</p>
<p>In order to perform any task safely and avoid human errors one more important component would be to actively take part in the morning and evening assembly sessions. Other than being an integral part for the execution of everyday activities, here we can find various teams sharing their experiences which may include accident reporting, hiyari hatto incidents, new learnings etc. and thus serves as a place for self development.</p>
<p>KY cycle is a structure wherein Health and safety is integrated as part of everyday activities which includes the morning and evening assembly sessions. Here we can find the various safety techniques included in every work performed as well. Each KY cycle is divided into 3 parts ,i.e, safety measures taken before work, while doing work and after work activities and promotion of human error zero activity is done.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1316 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1.jpg" alt="" width="1582" height="649" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1.jpg 1582w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-300x123.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-1024x420.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-768x315.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-1536x630.jpg 1536w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-945x388.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-600x246.jpg 600w" sizes="auto, (max-width: 1582px) 100vw, 1582px" /></p>
<p>The above picture gives you the description of KY cycle of every day work and relates to every work performed in a day.</p>
<p>(7) Repetition &amp; Reporting</p>
<p>Sometimes the output of our work may differ from the instructions received which was not cross checked. Also there may be times when we may have been asked about the status of work which was not reported. These two are instances wherein the repetition of the instruction received in the former case and reporting of the work status in the latter case are not adhered to.</p>
<p>Repetition(Before start of work)<br />
This is a way of making sure the instruction is received correctly by repeating the instruction contents loudly. So we can get started with the work avoiding any potential human errors with respect to receiving instructions.</p>
<p>Reporting(After work)<br />
This is a way to inform about the progress of work with respect to the instruction received. By this was both the receiving and instructing side can fell safe about the proper progress or completion of work.</p>
<p>(8) 4S(seiri, seiton, seiso, seiketsu)</p>
<p>4S is a workplace organization method abbreviated from the Japanese words seri for &#8220;Sort&#8221;, seiton for &#8220;Set in order&#8221;, seiso for &#8220;Systematic cleaning&#8221; and seiketsu for &#8220;Standardize&#8221;. Organizing the workplace leads to a safe and healthy environment.</p>
<p>• Sorting &#8212; separating the needed from the unneeded. Sorting activities aim to eliminate unneeded items from the work area and to perform an initial cleaning.</p>
<p>• Set in order &#8212; a place for everything and everything in its place, clean and ready for use. Simplifying arranges the workplace to ensure safety and efficiency.</p>
<p>• Systematic Cleaning &#8212; cleaning for inspection. Systematic daily cleaning and inspection of work areas and equipment help you understand current conditions and determine if corrective action is required.</p>
<p>• Standardize &#8212; developing common methods for consistency. Standardizing assures that everyone knows what is expected .It aims to make abnormal conditions noticeable and to document agreements to ensure consistency and sustainability.</p>
<h3>The 3 main pillars of the HEZ activity</h3>
<p>Implementation of the HEZ Campaign requires three important pillars: the positive attitude of the top management, the complete management of the safety and health system by line managers and supervisors, and the promotion of voluntary activities in the workplace. The HEZ Campaign depends on the mutual relationships and assistance of these three pillars.</p>
<p>1) The positive attitude of the top management<br />
The starting point of safety and health activity is a tough attitude held by top management towards zero accidents and zero diseases.The campaign starts with a determined commitment by the senior management to respect every single worker and ensure no injuries.</p>
<p>2) The complete management of the safety and health system by line managers and supervisors<br />
In order to promote safety and health in the workplace, it is essential for line managers and supervisors to lead by example by integrating safety and health activities into day-to-day work, making safety and health part of the line management.</p>
<p>3) The activation of voluntary activities in the workplace<br />
Human error plays a part in most workplace accidents, and each and every employee needs to be fully aware that responsibility cannot be shifted to others. Employees must engage in small group activities for zero accidents with the awareness that their existence is irreplaceable for their families and dependents and safety and health is their own and their co-worker&#8217;s own problem.</p>
<h4>Conclusion</h4>
<p>The philosophy of the HEZ Activity is to respect human life. Specific safety methods are developed so that workplaces can take steps on preemptive action for safety. Activities incorporating these methods in a unified manner are called hazard prediction(KY) activities. As the system is operated by human beings, so, to make it function properly, it requires the motivation and enthusiasm of all of the people involved in it, namely the top management, the line managers, and the team members.</p>
<p><strong><em>Sources:</em></strong><br />
危険予知訓練<em>(KY Training), experience</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>International Organization for Standardization(ISO) : Must know basics</title>
		<link>https://sampathblogs.online/2018/05/iso/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iso</link>
					<comments>https://sampathblogs.online/2018/05/iso/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 18 May 2018 01:48:23 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=279</guid>

					<description><![CDATA[What is ISO ISO refers to International Organization for Standardization. It is headquartered in Geneva, Switzerland and is a non-governmental organization. A total of 163 countries are affiliated with the organization. In order to smoothen international transactions with respect to... <a class="more-link" href="https://sampathblogs.online/2018/05/iso/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>What is ISO</h3>
<p>ISO refers to International Organization for Standardization. It is headquartered in Geneva, Switzerland and is a non-governmental organization. A total of 163 countries are affiliated with the organization. In order to smoothen international transactions with respect to any product or service, concerned authorities from different countries come together to define a set of standards so that same quality and level of a deliverable can be maintained anywhere in the world.</p>
<p>The ISO membership is one organization per country. Majority of the ISO members are a part of the country’s government organization or have been entrusted the responsibility by the government organization of a country.<br />
There are three types of membership types with different privileges as follows;</p>
<p>• <em>Regular Member</em> – Has all the privileges starting from participating in development of standards, taking part in policy making, selling publications and ISO standards with copyrights or with ISO title and logo and finally to be part of the ISO management group. Most of the countries in the world are regular members.</p>
<p>• <em>Correspondence Member</em> – Has all the privileges except, being part of the ISO management group, which is not allowed. A few countries are with this kind of membership.</p>
<p>• <em>Paid Member</em> – Has the privilege for only taking part in the development of standards. As few as three to four countries in the world are with this kind of membership.</p>
<p>The standard organizations is Japan are JISC(Japan Industrial Standards Committee), JAB(Japan Accreditation Board) etc., based on the type of businesses and represent Japan at the ISO. The websites of <a href="http://www.jisc.go.jp/">JIS</a> and <a href="https://www.jab.or.jp/">JAB</a> provide a detailed information on the various standards released by the respective organizations.</p>
<h4>Development of Standards</h4>
<p>There are 5 stages in the development of standards;</p>
<p>• <em>Working Draft(WD) development</em> – Vague idea suggested by different groups about a standard to be developed.</p>
<p>• <em>Committee Draft(CD) development</em> – The working draft will be analyzed further by a committee to check for the acceptability world over.</p>
<p>• <em>Draft International Standard(DIS) development and circulation</em>– Once the draft reaches this stage we have a draft standard which can be circulated with other member countries for voting during which suggestions and other feedbacks can be expected and appropriate updations are done. This process usually takes a long time period of one to two years depending upon the completeness of the draft. The ‘OK’ vote should be received from all the participating countries to arrive at the final draft.</p>
<p>• <em>Final Draft International Standard(FDIS) circulation</em>– The <em>DIS</em> will be circulated with all the participating countries for a final confirmation and review before the release.</p>
<p>• <em>Release of International Standard</em> – With the approval of the <em>FDIS</em> by the participating countries, the International Standard with be released.</p>
<p>The ISO can be classified into the following two categories mainly;</p>
<p>1) Standards applicable to objects (pictorial symbols, dimensions)<br />
A few examples are as follows;<br />
ISO 7010/JIS 8210     Emergency exit symbol(Japan design used world over)<br />
ISO/IEC 7810               Card sizes<br />
ISO 68                           Nut size etc.,</p>
<p>2) Standards applicable to management systems<br />
A few examples are as follows;<br />
ISO 9001                      Quality Management System<br />
ISO 14001                    Environment Management System<br />
ISO 27001                    Information Security Management System etc.,</p>
<h3>Management System standards and certification</h3>
<p>A management system is the way in which an organization manages the inter-related parts of its business in order to achieve its objectives. These objectives can relate to a number of different topics, including product or service quality, operational efficiency, environmental performance, health and safety in the workplace and many more.</p>
<p>The level of complexity of the system will depend on each organization’s specific context. For some organizations, especially smaller ones, it may simply mean having strong leadership from the business owner, providing a clear definition of what is expected from each individual employee and how they contribute to the organization’s overall objectives, without the need for extensive documentation. More complex businesses operating, for example, in highly regulated sectors, may need extensive documentation and regulation in order to fulfil their legal obligations and meet their organizational objectives.</p>
<p>ISO management system standards (MSS) help organizations improve their performance by specifying repeatable steps that organizations consciously implement to achieve their goals and objectives, and to create an organizational culture that reflexively engages in a continuous cycle of self-evaluation, correction and improvement of operations and processes through heightened employee awareness and management leadership and commitment.</p>
<p>There are various management system standards based on industry types and businesses. The type of ISO standard to be implemented entirely depends upon the client requirements or internal risk reduction requirements of a company. Considering Japan in our study, the following three are the major ISO certification standard sought after by most of the companies in Japan.</p>
<p><strong>• ISO 9001</strong><br />
ISO 9001 sets out the criteria for a quality management system and is the only standard in the family that can be certified to (although this is not a requirement). It can be used by any organization, large or small, regardless of its field of activity.</p>
<p>This standard is based on a number of quality management principles including a strong customer focus, the motivation and implication of top management, the process approach and continual improvement. Using ISO 9001 helps ensure that customers get consistent, good quality products and services, which in turn brings many business benefits.</p>
<p><strong>• ISO 14001</strong><br />
ISO 14001 specifies the requirements for an environmental management system that an organization can use to enhance its environmental performance. ISO 14001 is intended for use by an organization seeking to manage its environmental responsibilities in a systematic manner that contributes to the environmental pillar of sustainability.</p>
<p>ISO 14001 is applicable to any organization, regardless of size, type and nature, and applies to the environmental aspects of its activities, products and services that the organization determines it can either control or influence considering a life cycle perspective. ISO 14001 does not state specific environmental performance criteria.</p>
<p><strong>• ISO/IEC 27001</strong><br />
ISO/IEC 27001 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.</p>
<p>The logos of the above three management systems certified by the JQA(Japan) are as follows;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1319 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/logos.jpg" alt="" width="1033" height="580" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/logos.jpg 1033w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-300x168.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-1024x575.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-768x431.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-945x531.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-600x337.jpg 600w" sizes="auto, (max-width: 1033px) 100vw, 1033px" />The ISO management system standards (MSS) is revised once every five years. Though the time period specified is 5 years once, the update may happen based on convenience and state of affairs. For example in case of ISO 9001, the last update happened in 2015 and is named as ISO 9001 : 2015 version. The previous version to 2015 was ISO 9001 : 2008.</p>
<p>In case of an organization wishing to certify to a certain management system (For ex: ISO 14001), the readiness of an organization to the system will first be checked by the JQA(Japan Quality Association) organization. JQA is a body to provide testing and certification service for the various ISO standards as part of quality management system activity.Thus we can say that as JQA checks for the conformity to the various standards and provides the ceritifcation, they have to work in close co-ordination with the various Standards organizations like the JAB, JISC etc.,</p>
<p>The IAF or International Accreditation Forum develops a single worldwide program of conformity assessment which reduces risk for business and its customers by assuring them that accredited certificates may be relied upon. Accreditation assures users of the competence and impartiality of the body accredited. IAF members, i.e., the certifying bodies of member countries(JAB/JISC.. incase of Japan) or registration bodies issue certificates attesting that an organization&#8217;s management, products or personnel comply with ISO standard.</p>
<h3>Merits of ISO certification</h3>
<p>Certification can be a useful tool to add credibility, by demonstrating that your product or service meets the expectations of your customers. For some industries, certification is a legal or contractual requirement. The following points describe the actual merits behind ISO certification.,</p>
<p>1) To gain the trust of customers<br />
In order to demonstrate that a product exported to foreign countries or sold in the domestic market meets a certain level of quality, is safe to the environment and maintains the confidentiality of user data, a 3rd party certifying authority like the ISO is used as a tool.</p>
<p>2) Gaps or Problem identification from a 3rd Party perspective<br />
In case of audit done by an internal party, the seriousness compared to a certifying external body will not be there. So, when the audit is done by a 3rd party body like the ISO, issues or gaps unable to be identified or overlooked by the organization can be certainly expected. Also the auditing ISO personnel will be auditing from a customer’s position so issues unidentified from the customer viewpoint may be also found out.</p>
<p>3) Continuous improvement<br />
Organizations which get certified with the ISO Management System Standards, will have a review yearly once by the concerned ISO authorities. At the end of each yearly audit, the auditors suggest the organization improvement plans with respect to the problems identified. As a result of these continued yearly audits, continued improvement of the organization can be brought about.</p>
<p>The <a href="https://sampathblogs.online/2018/04/18/lean-and-six-sigma-in-short/">PDCA cycle</a> is the most used methodology to implement a continuous improvement system in a company or organization. The PDCA methodology describes the four essential steps that should be carried out systematically to achieve continuous improvement, defined as a continuous way to improve the quality of products and processes (decrease failures, increase effectiveness and efficiency, problem solving, avoid potential risks etc., ).</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1344 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy.jpg" alt="" width="1033" height="580" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy.jpg 1033w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-300x168.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-1024x575.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-768x431.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-945x531.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-600x337.jpg 600w" sizes="auto, (max-width: 1033px) 100vw, 1033px" /></p>
<p>The PDCA/Deming Cycle is composed for four cyclic steps as above, so that once we have finished with the final stage we have to start again with the first one, and repeat the cycle again. Doing that in a company, the activities are reevaluated periodically to incorporate new enhancements. The application of this methodology is primarily intended to be used for companies and organizations, but you can also use it in any other situation.</p>
<p>One special characteristic of ISO Management Standard System is the <em>Internal Audit</em>. The internal audit is basically used to check(PD<strong>C</strong>A) whether the management system built by the organization is functioning properly or not. Also in case of suggestion for changes, a trial period to verify the development of the new process is established. If the improvement does not achieve the initial expectations we will have to modify the process again to obtain the desired objectives.</p>
<p>In other words internal audit is used,<br />
1) To check for the management system functionality.<br />
2) To Identify problems or improvement points.<br />
3) By the concerned manager to implement the audit suggestions in management system improvement.</p>
<p>The internal audit is an indispensable activity as part of the continuous improvement of an organization.</p>
<p>The management systems specify the requirements but do not mention “how to” attain those requirements. So, it is upto the organizations to decide how to attain and to what level based on their targets with respect to the continuous improvement plan. This can be a set of lower level targets before targeting the higher level expectancy of the management system.</p>
<h3>Management systems of the future</h3>
<p>One of the main changes in the new version of ISO 9001:2015 is the adoption of the High-Level Structure (HLS). That sounds innovative, but it is important because this High-Level Structure means that in the future, all management system standards will be aligned. The core text in the High-Level Structure will be used in every management system standard whether it be for quality, work health and safety, the environment, food safety or another discipline. This common factor also applies to the text of requirements description wherever applicable.  Also, common terminologies will be used in every management system with the same definition.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1308 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/ISO.jpg" alt="" width="1033" height="580" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/ISO.jpg 1033w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-300x168.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-1024x575.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-768x431.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-945x531.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-600x337.jpg 600w" sizes="auto, (max-width: 1033px) 100vw, 1033px" /></p>
<p>This common structure is possible because basic concepts such as management, customer requirements, planning, performance, control, monitoring, measurement, auditing, corrective action, and nonconformity are common to all management system standards. Whilst the standards have always had common elements, they have been described and organized differently, making effective integration difficult.</p>
<p>The High-Level Structure will ensure that future management system standards support each other. They will be easier to read and understand, and it will aid greatly in the integration of multiple standards within the one organization. The resulting improved linkages in processes and activities will deliver better value and efficiency.</p>
<h4>Conclusion</h4>
<p><strong>• </strong>In order to smoothen international transactions with respect to any product or service, a set of ISO standards have been set up to maintain the quality and level of a deliverable.<br />
<strong>• </strong>The ISO standards can be classified as “Standards applicable to Objects” and “Standards applicable to Management systems”.<br />
<strong>• </strong>The ISO management system is a useful tool to reduce the management risks of each organization.<br />
<strong>• </strong>The ISO brings about step by step continuous improvement, thus strengthening the organization.<br />
<strong>• </strong>The common factors as part of future management systems will bring about better integration of multiple standards within an organization resulting in better value and efficiency.</p>
<p><em><strong>Sources:</strong></em><br />
<em>Online learning(<a href="http://www.schoo.jp">www.schoo.jp</a>)</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/iso/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Data Center and Service Desk Operations</title>
		<link>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=understanding-data-center-and-service-desk-operations</link>
					<comments>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 04 May 2018 15:08:37 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[Basic guide]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[IT Infrastructure Service]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=188</guid>

					<description><![CDATA[A data center is a facility that centralizes an organization&#8217;s IT operations and equipment, as well as where it stores, manages, and diseminates its data. Data centers house a network&#8217;s most critical systems and are vital to the continuity of... <a class="more-link" href="https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<p>A data center is a facility that centralizes an organization&#8217;s IT operations and equipment, as well as where it stores, manages, and diseminates its data. Data centers house a network&#8217;s most critical systems and are vital to the continuity of daily operations. Consequently, the security and reliability of data centers and their information is a top priority for organizations.</p>
<p>Although data center designs are unique, they can generally be classified as internet-facing and enterprise (or internal) data centers. Internet-facing data centers usually support relatively few applications, are typically browser-based, and have many users, typically unknown. In contrast, enterprise data centers service fewer users, but host more applications that vary from off-the-shelf to custom applications.</p>
<p>The main purpose of a data centre design is to run core business or mission critical applications and store operational data as well as providing Disaster Recover (DR) facilities. Typical applications will be enterprise software systems such as Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) services. Data center architectures and requirements can differ significantly.<br />
For example, a data center built for a cloud service provider like Amazon EC2 satisfies facility, infrastructure, and security requirements that significantly differ from a completely private data center, such as one built for the Pentagon that is dedicated to securing classified data.</p>
<h3>Why data centers are business-critical</h3>
<p>Most data center deployments are carried out for the following reasons:<br />
•<em>Availability</em>: Maximizing the availability of IT services to the organization.<br />
•<em>Business continuity</em>: The redundancy, monitoring and infrastructure provided by most data centers means that the potential for business  interruption is very low.<br />
•<em>Lower total cost of ownership</em>: Where an organization has several silos of data, it can combine resources and reduce the amount of separate data servers required.<br />
Staff overhead is reduced as administrative operations are simplified, whilst energy and floor space costs are reduced.<br />
•<em>Agility</em>: Centralizing IT infrastructure within a data center creates greater agility since new deployments do not have to be rolled out to multiple physical locations.</p>
<p>Basically, an effective data center operation is achieved through a balanced investment in the facility and equipment housed. The elements of a data center break down as follows:</p>
<p><strong>Facility</strong> &#8211; the location and white space or usable space, that is available for IT equipment. Providing round-the-clock access to information makes data centers some of the most energy-consuming facilities in the world. A high emphasis is placed on design to optimize white space and environmental control to keep equipment within manufacturer-specified temperature/humidity range.</p>
<p><strong>Support infrastructure</strong> &#8211; equipment contributing to securely sustaining the highest level of availability possible.<br />
Some components for supporting infrastructure include:<br />
•Uninterruptible Power Sources (UPS) &#8211; battery banks, generators and redundant power sources.<br />
•Environmental Control &#8211; computer room air conditioners (CRAC), heating, ventilation, and air conditioning (HVAC) systems, and exhaust systems.<br />
•Physical Security Systems &#8211; biometrics and video surveillance systems.</p>
<p><strong>IT equipment</strong> &#8211; actual equipment for IT operations and storage of the organization&#8217;s data. This includes servers, storage hardware, cables and racks, as well as a variety of information security elements, such as firewalls.</p>
<p><strong>Operations staff</strong> &#8211; to monitor operations and maintain IT and infrastructural equipment around the clock.</p>
<p>Data centers have evolved significantly in recent years, adopting technologies such as virtualization to optimize resource utilization and increase IT flexibility. As enterprise IT needs continue to evolve toward on-demand services, many organizations are moving toward cloud-based services and infrastructure. A focus has also been placed on initiatives to reduce the enormous energy consumption of data centers by incorporating more efficient technologies and practices in data center management. Data centers built to these standards have been coined green data centers.</p>
<h3>Data Center Solutions</h3>
<p>So, what exactly do data centers offer? What&#8217;s so great about them versus doing everything in-house.Below is a list of some of the services offered:<br />
<em>•Colocation Services</em><br />
A colocation data center lies on the opposite spectrum of the in-house data center. Colocation facilities are third party organizations that are multi-tenant accessible, meaning that multiple businesses of any size or industry may house their equipment within the data center. Customers are able to select from a variety of solutions to accommodate the specific requirements for their business.</p>
<p><em>•Cloud Services like Iaas, Paas, Saas</em></p>
<p><em>•Disaster Recovery</em><br />
This is a flexible and scalable service to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions,as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity.</p>
<p><em>•Managed Services</em><br />
Managed hosting service provider is a company or individual that remotely manages a customer’s IT infrastructure.Many small and medium sized businesses tend to use the services of a managed service provider for web servers and website management.</p>
<p>Managed providers will each specialize in a different area of IT. Some may be experts in managed colocation services whereas others are more focused on business connectivity and cloud services.</p>
<p><em>•High Availability</em><br />
High availability in the data center refers to systems and components that are continuously operational for a long time. It typically means the systems have been thoroughly tested, are regularly maintained and have redundant components installed to ensure continuous operation.</p>
<p>These services and much more are managed professionally by IT administrators who stay up-to-date with the latest technology and ultimately help a data center&#8217;s overall efficiency.</p>
<p>Data center administrators have a long to-do list when it comes to infrastructure monitoring. From server and equipment monitoring &#8212; and in some cases, mainframe monitoring &#8212; it&#8217;s a practice that&#8217;s often difficult to juggle, especially if you work in a large data center. But monitoring is an essential task. By obtaining the data you need, you can increase security and scalability, efficiently automate and better align resources with capacity needs.</p>
<p>Instead of scrambling to fix a problem after it occurs, data center admins should strive to be proactive, anticipating issues before end users even notice. But that can be difficult to do without the right data center monitoring tools and strategy.Trends such as mobility, virtualization adoption, new and increasing compliance and governance requirements, and the need to modernize existing infrastructure add further complication to managing the IT environment.</p>
<p>To make information across the enterprise readily available requires an enterprise infrastructure that is managed as an integrated whole. The go to ITSM tool(Example:Opsmart, Remedy etc.,) should provide a flexible, scalable, and open solution.Also the tool should align ITSM resources to support customer business objectives.These services create a centralized operations and support center, providing the customer a cohesive approach to integrate process optimization, systems development and support, and network and service desk management across the business enterprise.</p>
<h4>Moving Forward</h4>
<p>Due to the cloudification of data centers, current situation is such that it is no longer reserved for any specific type of organizations any longer; they&#8217;ve become accessible to almost anyone. Even if in-house IT operations are conceivable for small or large companies, wise IT administrators are choosing to outsource some portions of IT management. In the long run, it saves time, money, and manpower and it&#8217;s much less of a headache.</p>
<h2>Service Desk Operations</h2>
<p>Operations staff have direct responsibility for the availability of computer services; nonetheless, they also have direct contact with users and decision makers. One part of the Operations ,i.e,the service desk also known as the “help desk” is the single point of contact for users to report incidents. Without the service desk, users will contact support staff without the limitations of structure or prioritization. This means that a high-priority incident may be ignored while the staff handles a low-priority incident.</p>
<p>IT Infrastructure Library, ITIL is a set of best practices for an effective IT Service management, ITSM is followed across companies of all sizes.<br />
ITIL enables businesses to handle IT issues and service requests efficiently by assigning clear roles and responsibilities. It helps individuals and organizations to realize business growth and transformation.</p>
<h3>ITIL Service Life cycle</h3>
<p>ITIL service lifecycle consists of five stages. Each stage has a set of ITIL processes and it is significant to understand the purpose of each process before implementing. However, companies may selectively implement few processes that are necessary.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1310 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/itil-service.jpg" alt="" width="629" height="422" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/itil-service.jpg 629w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-service-300x201.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-service-600x403.jpg 600w" sizes="auto, (max-width: 629px) 100vw, 629px" /></p>
<p><em>• Service strategy</em> &#8211; Service strategy involves clear understanding of customer’s and market’s needs. This advocates a long-term market driven approach to deliver IT support. Service strategy include strategy management for IT services, service portfolio management, demand management, financial management for IT services and business relationship management that focuses on customer satisfaction.</p>
<p><em>• Service design</em> &#8211; This is an holistic approach to design a support service. The right service design approach translates to higher customer satisfaction and usability. Some of the ITIL service design processes include service level agreement, service catalog management, availability management and IT service continuity management.</p>
<p><em>• Service Transition</em> &#8211; This stage ensures changes in service lifecycle are handled with minimum risk and impact so that there is minimal or no downtime. Some of the processes here include change management, release management, configuration management database, knowledge management.</p>
<p><em>• Service Operation</em> &#8211; ITIL service operation ensures seamless service in day to day business activities. Actual delivery and consumption of services happen during this stage. This has a direct impact on the productivity of end users. Typical processes include <em>incident management, request fulfillment</em>, problem management.</p>
<p><em>• Continual Service Improvement</em> &#8211; CSI aims for process review and improvement throughout the service lifecycle. This is applicable to all service stages including strategy, design, transition and operation. Metrics definition and performance review happen at this stage which help companies to revisit existing process.</p>
<h4>Incident Management</h4>
<p>ITIL defines an incident as an unplanned interruption to or quality reduction of an IT service. The service level agreements (SLA) defines the agreed-upon service level between the provider and the customer. Incident management focuses solely on handling and escalating incidents to the next level as they occur to restore defined service levels. Incident management does not deal with root cause analysis or problem resolution. The main goal is to take user incidents from a reported stage to a closed stage.</p>
<p>The below figure depicts a sample incident management flow.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1309 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow.jpg" alt="" width="666" height="454" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow.jpg 666w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow-300x205.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow-600x409.jpg 600w" sizes="auto, (max-width: 666px) 100vw, 666px" /></p>
<p>The Alerts and incident calls may be related in cases where the incidents result in Alerts on the monitoring tool. However, Alert may occur on tool independently and follows the flow 1 &#8211; 3 &#8211; 4 &#8211; 5 and finally closure of the ticket raised w.r.t to the Alert generated on tool.</p>
<p>The other case is when the Client or user calls up regarding a service disruption issue or a service enhancement support. In such cases, the flow 1 or 2 &#8211; 3 &#8211; 4 &#8211; 5 &#8211; 6 is followed. Here as well, once the issue is resolved the concerned ticket is closed.</p>
<p>Operational incident management requires several key pieces:<br />
1.A service level agreement between the provider and the customer that defines incident priorities, escalation paths, and response/resolution time frames<br />
2.Incident models, or templates, that allow incidents to be resolved efficiently<br />
3.Categorization of incident types for better data gathering and problem management<br />
4.Agreement on incident statuses, categories, and priorities<br />
5.Establishment of a major incident response process<br />
6.Agreement on incident management role assignment</p>
<h3>Incident statuses</h3>
<p>Incident statuses mirror the incident process and include:<br />
•New<br />
•Assigned<br />
•In progress<br />
•On hold or pending<br />
•Resolved<br />
•Closed</p>
<p>The <em>new</em> status indicates that the service desk has received the incident but has not assigned it to an agent.<br />
The <em>assigned</em> status means that an incident has been assigned to an individual service desk agent.<br />
The <em>in-progress</em> status indicates that an incident has been assigned to an agent but has not been resolved. The agent is actively working with the user to diagnose and resolve the incident.<br />
The <em>on-hold</em> status indicates that the incident requires some information or response from the user or from a third party. The incident is placed “on hold” so that SLA response deadlines are not exceeded while waiting for a response from the user or vendor.<br />
The <em>resolved</em> status means that the service desk has confirmed that the incident is resolved and that the user’s service has restored to the SLA levels.<br />
The <em>closed </em>status indicates that the incident is resolved and that no further actions can be taken.</p>
<p>Incident management follows incidents through the service desk to track trends in incident categories and time in each status. The final component of incident management is the evaluation of the data gathered. Incident data guides organizations to make decisions that improve the quality of service delivered and decrease the overall volume of incidents reported. Incident management is just one process in the service operation framework.</p>
<p><em><strong>Sources:</strong></em><br />
<em>Work Experience, Online Learning</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity : A Quick reference guide</title>
		<link>https://sampathblogs.online/2018/05/cybersecurity-quick-reference/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-quick-reference</link>
					<comments>https://sampathblogs.online/2018/05/cybersecurity-quick-reference/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 04 May 2018 15:08:18 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Basic guide]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=211</guid>

					<description><![CDATA[Protecting Data and Privacy Here the focus will be on protecting devices, creating strong passwords and safely using wireless networks. Also maintaining the data securely will be looked into. Protect Computing Devices Your computing devices store your data and are the portal to your... <a class="more-link" href="https://sampathblogs.online/2018/05/cybersecurity-quick-reference/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>Protecting Data and Privacy</h3>
<p>Here the focus will be on protecting devices, creating strong passwords and safely using wireless networks. Also maintaining the data securely will be looked into.</p>
<h4><strong>Protect Computing Devices</strong></h4>
<p>Your computing devices store your data and are the portal to your online life.<br />
Below is a short list of steps you can take to protect your computing devices from intrusion:</p>
<ul>
<li>Keep the Firewall On &#8211; Whether it is a software firewall or a hardware firewall on a router, the firewall should be turned on and updated to prevent hackers from accessing your personal or company data.</li>
<li>Use Antivirus and Antispyware &#8211; Antivirus software is designed to scan your computer and incoming email for viruses and delete them. Sometimes antivirus software also includes antispyware. Keep your software up to date to protect your computer from the newest malicious software.</li>
<li>Manage Your Operating System and Browser &#8211; Hackers are always trying to take advantage of vulnerabilities in your operating systems and your web browsers. To protect your computer and your data, set the security settings on your computer and browser at medium or higher. Update your computer’s operating system including your web browsers and regularly download and install the latest software patches and security updates from the vendors.</li>
<li>Protect All Your Devices &#8211; Your computing devices, whether they are PCs, laptops, tablets, or smartphones, should be password protected to prevent unauthorized access. The stored information should be encrypted, especially for sensitive or confidential data.</li>
</ul>
<p>IoT devices pose an even greater risk than your other computing devices. While desktop, laptop and mobile platforms receive frequent software updates, most of the IoT devices still have their original firmware.If vulnerabilities are found in the firmware, the IoT device is likely to stay vulnerable.The best way to protect yourself from this scenario is to have IoT devices using an isolated network, sharing it only with other IoT devices.</p>
<h4><strong>Use Wireless Networks Safely</strong></h4>
<p>Wireless networks allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the network by way of the network identifier, known as the Service Set Identifier (SSID). To prevent intruders from entering your home wireless network, the pre-set SSID and default password for the browser-based administrative interface should be changed.Furthermore, you should encrypt wireless communication by enabling wireless security and the WPA2 encryption feature on the wireless router. Even with WPA2 encryption enabled, the wireless network can still be vulnerable.</p>
<h4><strong>Use Unique Passwords for Each Online Account or Passphrase</strong></h4>
<p>You probably have more than one online account, and each account should have a unique password. That is a lot of passwords to remember. However, the consequence of not using strong and unique passwords leaves you and your data vulnerable to cyber criminals.</p>
<p>To prevent unauthorized physical access to your computing devices, use passphrases, rather than passwords. It is easier to create a long passphrase than a password, because it is generally in the form of a sentence rather than a word. The longer length makes passphrases less vulnerable to dictionary or brute force attacks. Furthermore, a passphrase maybe easier to remember, especially if you are required to change your password frequently.</p>
<h4><strong>Encrypting, Back up or Deleting Your Data permanently</strong></h4>
<p>Your data should always be encrypted. You may think you have no secrets and nothing to hide so why use encryption? Maybe you think that nobody wants your data. Most likely, this is probably not true.Malicious application infects your computer or mobile device and can steal potentially valuable information, such as account numbers and passwords, and other official documents. That kind of information can lead to identity theft, fraud, or ransom. Criminals may decide to simply encrypt your data and make it unusable until you pay the ransom.</p>
<p>Your hard drive may fail. Your laptop could be lost. Your smart phone stolen. Maybe you erased the original version of an important document. Having a backup may prevent the loss of irreplaceable data, such as family photos. To back up data properly, you will need an additional storage location for the data such as online storage and you must copy the data to that location regularly and automatically.</p>
<p>When you move a file to the recycle bin or trash and delete it permanently, the file is only inaccessible from the operating system. Anyone with the right forensic tools can still recover the file due to a magnetic trace left on the hard drive.To prevent the recovery of deleted files, you may need to use tools specifically designed to do just that like SDelete from Microsoft and Shred for Linux and Secure Empty Trash for Mac OSX.</p>
<h4><strong>Different types of Authentication</strong></h4>
<p>• Two Factor Authentication<br />
Popular online services, such as Google, Facebook, Twitter, LinkedIn, Apple and Microsoft, use two factor authentication to add an extra layer of security for account logins. Besides the username and password, or personal identification number (PIN) or pattern, two factor authentication requires a second token, such as physical (phone number) or biometric(finger print) authentication.Even with two factor authentication, hackers can still gain access to your online accounts through attacks such as phishing attacks, malware, and social engineering.</p>
<p>• OAuth 2.0<br />
Open Authorization (OAuth) is an open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password. OAuth acts as the middle man to decide whether to allow end users access to third party applications. For example, say you want to access web application XYZ, and you do not have a user account for accessing this web application. However, XYZ has the option to allow you to log in using the credentials from a social media website ABC. So you access the website using the social media login.</p>
<p>Ultimately, it is your responsibility to safeguard your data, your identity, and your computing devices. When you send an email, should you include your medical records? The next time you browse the Internet, is your transmission secure? Just a few simple precautions may save you problems later.</p>
<h3>Protecting the Organization</h3>
<p>Here we cover some of the technology and processes used by cybersecurity professionals when protecting an organization’s network, equipment and data. First, we briefly cover the many types of firewalls, security appliances, and software that are currently used, including best practices.</p>
<p>Next, we will get to know about botnets, the kill chain, behavior-based security, and using NetFlow to monitor a network. The last section discusses about different approaches to cybersecurity, including the CSIRT team and the security playbook.</p>
<h4><strong>Firewalls, Security Appliances and best practices</strong></h4>
<p>• Firewall Types</p>
<p>A firewall is a wall or partition that is designed to prevent fire from spreading from one part of a building to another. In computer networking, a firewall is designed to control, or filter, which communications are allowed in and which are allowed out of a device or network.<br />
A firewall can be installed on a single computer with the purpose of protecting that one computer (host-based firewall), or it can be a stand-alone network device that protects an entire network of computers and all of the host devices on that network (network-based firewall).</p>
<p>• Port Scanning</p>
<p>Port-scanning is a process of probing a computer, server or other network host for open ports. In networking, each application running on a device is assigned an identifier called a port number. This port number is used on both ends of the transmission so that the right data is passed to the correct application. Port-scanning can be used maliciously as a reconnaissance tool to identify the operating system and services running on a computer or host, or it can be used harmlessly by a network administrator to verify network security policies on the network.</p>
<p>For the purposes of evaluating your own computer network’s firewall and port security, you can use a port-scanning tool like Nmap to find all the open ports on your network. Port-scanning can be seen as a precursor to a network attack and therefore should not be done on public servers on the Internet, or on a company network without permission.</p>
<p>• Security Appliances</p>
<p>Today there is no single security appliance or piece of technology that will solve all network security needs. Because there is a variety of security appliances and tools that need to be implemented, it is important that they all work together. Security appliances are most effective when they are part of a system. Security appliances can be stand-alone devices, like a router or firewall, a card that can be installed into a network device, or a module with its own processor and cached memory. Security appliances can also be software tools that are run on a network device.</p>
<p>Security appliances fall into these general categories:</p>
<ol>
<li><em>Routers</em> &#8211;  Have many firewall capabilities besides just routing functions, including traffic filtering, the ability to run an Intrusion Prevention System (IPS), encryption, and VPN capabilities for secure encrypted tunneling.</li>
<li><em>Firewalls</em> &#8211; Capabilities of an ISR router, as well as, advanced network management and analytics.</li>
<li><em>IPS</em> &#8211; Dedicated to intrusion prevention.</li>
<li><em>VPN</em> &#8211; Appliances equipped with a Virtual Private Network (VPN) server and client technologies are designed for secure encrypted tunneling.</li>
<li><em>Malware/Antivirus</em> &#8211; Advanced Malware Protection (AMP) comes in next generation Cisco routers, firewalls, IPS devices, Web and Email Security Appliances and can also be installed as software in host computers.</li>
<li><em>Other Security Devices</em> &#8211; This category includes web and email security appliances, decryption devices, client access control servers, and security management systems.</li>
</ol>
<p>• Detecting Attacks in Real Time</p>
<p>Software is not perfect. When a hacker exploits a flaw in a piece of software before the creator can fix it, it is known as a zero-day attack. Due to the sophistication and enormity of zero-day attacks found today, it is becoming common that network attacks will succeed and that a successful defense is now measured in how quickly a network can respond to an attack. The ability to detect attacks as they happen in real-time, as well as stopping the attacks immediately, or within minutes of occurring, is the ideal goal. Unfortunately, many companies and organizations today are unable to detect attacks until days or even months after they have occurred.</p>
<ul>
<li>Real Time Scanning from Edge to Endpoint &#8211;<br />
Detecting attacks in real time requires actively scanning for attacks using firewall and IDS/IPS network devices.</li>
<li>DDoS Attacks and Real Time Response &#8211;<br />
DDoS is one of the biggest attack threats requiring real-time response and detection. DDoS attacks are extremely difficult to defend against because the attacks originate from hundreds, or thousands of zombie hosts, and the attacks appear as legitimate traffic.</li>
<li>Protecting Against Malware &#8211;<br />
How do you provide defense against the constant presence of zero-day attacks, as well as advanced persistent threats (APT) that steal data over long periods of time? One solution is to use an enterprise-level advanced malware detection solution that offers real-time malware detection.<br />
Network administrators must constantly monitor the network for signs of malware or behaviors that reveal the presence of an APT.</li>
</ul>
<p>• Security Best Practices</p>
<p>Many national and professional organizations have published lists of security best practices. The following is a list of some security best practices:</p>
<ul>
<li>Perform Risk Assessment &#8211; Knowing the value of what you are protecting will help in justifying security expenditures.</li>
<li>Create a Security Policy &#8211; Create a policy that clearly outlines company rules, job duties, and expectations.</li>
<li>Physical Security Measures &#8211; Restrict access to networking closets, server locations, as well as fire suppression.</li>
<li>Human Resource Security Measures &#8211; Employees should be properly researched with background checks.</li>
<li>Perform and Test Backups &#8211; Perform regular backups and test data recovery from backups.</li>
<li>Maintain Security Patches and Updates &#8211; Regularly update server, client, and network device operating systems and programs.</li>
<li>Employ Access Controls &#8211; Configure user roles and privilege levels as well as strong user authentication.</li>
<li>Regularly Test Incident Response &#8211; Employ an incident response team and test emergency response scenarios.</li>
<li>Implement a Network Monitoring, Analytics and Management Tool &#8211; Choose a security monitoring solution that integrates with other technologies.</li>
<li>Implement Network Security Devices &#8211; Use next generation routers, firewalls, and other security appliances.</li>
<li>Implement a Comprehensive Endpoint Security Solution &#8211; Use enterprise level antimalware and antivirus software.</li>
<li>Educate Users &#8211; Educate users and employees in secure procedures.</li>
<li>Encrypt data &#8211; Encrypt all sensitive company data including email.</li>
</ul>
<h4><strong>Botnets, Kill chain and behavior based security</strong></h4>
<p>• Botnet</p>
<p>A botnet is a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group. A bot computer is typically infected by visiting a website, opening an email attachment, or opening an infected media file. A botnet can have tens of thousands, or even hundreds of thousands of bots. These bots can be activated to distribute malware, launch DDoS attacks, distribute spam email, or execute brute force password attacks. Botnets are typically controlled through a command and control server. Cyber criminals will often rent out Botnets, for a fee, to third parties for nefarious purposes.</p>
<p>• The Kill Chain in Cyberdefense</p>
<p>In cyber security, the Kill Chain is the stages of an information systems attack. Developed by Lockheed Martin as a security framework for incident detection and response, the Cyber Kill Chain is comprised of the following stages:</p>
<ol>
<li>Reconnaissance &#8211; The attacker gathers information about the target.</li>
<li>Weaponization &#8211; The attacker creates an exploit and malicious payload to send to the target.</li>
<li>Delivery &#8211; The attacker sends the exploit and malicious payload to the target by email or other method.</li>
<li>Exploitation &#8211; The exploit is executed.</li>
<li>Installation &#8211; Malware and backdoors are installed on the target.</li>
<li>Command and Control &#8211; Remote control of the target is gained through a command and control channel or server.</li>
<li>Action &#8211; The attacker performs malicious actions like information theft, or executes additional attacks on other devices from within the network by working through the Kill Chain stages again.</li>
</ol>
<p>To defend against the Kill Chain, network security defenses are designed around the stages of the Kill Chain.<br />
These are some questions about a company’s security defenses, based on the Cyber Kill Chain:</p>
<ul>
<li>What are the attack indicators at each stage of the Kill Chain?</li>
<li>Which security tools are needed to detect the attack indicators at each of the stages?</li>
<li>Are there gaps in the company’s ability to detect an attack?</li>
</ul>
<p>According to Lockheed Martin, understanding the stages of Kill Chain allowed them to put up defensive obstacles, slow down the attack, and ultimately prevent the loss of data.</p>
<p>• Behavior-Based Security</p>
<p>Behavior-based security is a form of threat detection that does not rely on known malicious signatures, but instead uses informational context to detect anomalies in the network. Behavior-based detection involves capturing and analyzing the flow of communication between a user on the local network and a local, or remote destination. These communications, when captured and analyzed, reveal context and patterns of behavior which can be used to detect anomalies. Behavior-based detection can discover the presence of an attack by a change from normal behavior.</p>
<ul>
<li><em>Honeypots</em> &#8211; A Honeypot is a behavior-based detection tool that first lures the attacker in by appealing to the attacker’s predicted pattern of malicious behavior, and then, when inside the honeypot, the network administrator can capture, log, and analyze the attacker’s behavior. This allows an administrator to gain more knowledge and build a better defense.</li>
</ul>
<p><img loading="lazy" decoding="async" class="wp-image-1302 size-full aligncenter" src="https://sampathblogs.online/wp-content/uploads/2020/01/honeypots.jpg" alt="" width="748" height="455" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/honeypots.jpg 748w, https://sampathblogs.online/wp-content/uploads/2020/01/honeypots-300x182.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/honeypots-600x365.jpg 600w" sizes="auto, (max-width: 748px) 100vw, 748px" /></p>
<ul>
<li><em>NetFlow</em> &#8211; NetFlow technology is used to gather information about data flowing through a network. NetFlow information can be likened to a phone bill for your network traffic. It shows you who and what devices are in your network, as well as when and how users and devices accessed your network. NetFlow is an important component in behavior- based detection and analysis. Switches, routers, and firewalls equipped with NetFlow can report information about data entering, leaving, and traveling through the network. Information is sent to NetFlow Collectors that collect, store, and analyze NetFlow records.</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1333 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/netflow.png" alt="" width="1000" height="372" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/netflow.png 1000w, https://sampathblogs.online/wp-content/uploads/2020/01/netflow-300x112.png 300w, https://sampathblogs.online/wp-content/uploads/2020/01/netflow-768x286.png 768w, https://sampathblogs.online/wp-content/uploads/2020/01/netflow-945x352.png 945w, https://sampathblogs.online/wp-content/uploads/2020/01/netflow-600x223.png 600w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /><strong>CSIRT Team, Security Playbook , Misc</strong></p>
<p>• CSIRT Team</p>
<p>Many large organizations have a Computer Security Incident Response Team (CSIRT) to receive, review, and respond to computer security incident reports. The primary mission of CSIRT is to help ensure company, system, and data preservation by performing comprehensive investigations into computer security incidents.</p>
<p>There are various types of CSIRTs. An internal CSIRTs is assembled as part of a parent organization, such as a government, a corporation, a university or a research network. National CSIRTs (one type of internal CSIRT), for example, oversee incident handling for an entire country. Typically, internal CSIRTS gather periodically throughout the year for proactive tasks such as DR testing, and on an as-needed basis in the event of a security breach.</p>
<p>• Security Playbook</p>
<p>Technology is constantly changing. That means cyberattacks are evolving too. New vulnerabilities and attack methods are discovered continuously. Security is becoming a significant business concern because of the resulting reputation and financial impact from security breaches. Attacks are targeting critical networks and sensitive data. Organizations should have plans to prepare for, deal with, and recover from a breach.</p>
<p>One of the best way to prepare for a security breach is to prevent one. There should be guidance on identifying the cybersecurity risk to systems, assets, data, and capabilities, protecting the system by the implementation of safeguards and personnel training, and detecting cybersecurity event as soon as possible.</p>
<p>When a security breach is detected, appropriate actions should be taken to minimize its impact and damage. The response plan should be flexible with multiple action options during the breach. After the breach is contained and the compromised systems and services are restored, security measures and processes should be updated to include the lessons learned during the breach.</p>
<p>All this information should be compiled into a security playbook. A security playbook is a collection of repeatable queries (reports) against security event data sources that lead to incident detection and response.Ideally the security playbook must accomplish the following actions:</p>
<ul>
<li>Detect malware infected machines.</li>
<li>Detect suspicious network activity.</li>
<li>Detect irregular authentication attempts.</li>
<li>Describe and understand inbound and outbound traffic.</li>
<li>Provide summary information including trends, statistics, and counts.</li>
<li>Provide usable and quick access to statistics and metrics.</li>
</ul>
<p>• IDS and IPS</p>
<p>An Intrusion Detection System (IDS), is either a dedicated network device, or one of several tools in a server or firewall that scans data against a database of rules or attack signatures, looking for malicious traffic. If a match is detected, the IDS will log the detection, and create an alert for a network administrator. The Intrusion Detection System does not take action when a match is detected so it does not prevent attacks from happening. The job of the IDS is merely to detect, log and report.</p>
<p>An Intrusion Prevention System (IPS) has the ability to block or deny traffic based on a positive rule or signature match. One of the most well-known IPS/IDS systems is Snort. The commercial version of Snort is Sourcefire. Sourcefire has the ability to perform real-time traffic and port analysis, logging, content searching and matching, and can detect probes, attacks, and port scans. It also integrates with other third party tools for reporting, performance and log analysis.</p>
<p>• Legal &amp; Ethical Issues in Cybersecurity</p>
<p>Cybersecurity professionals must have the same skills as hackers, especially black hat hackers, in order to protect against attacks. One difference between a hacker and a cybersecurity professional is that the cybersecurity professional must work within legal boundaries.The area of cybersecurity law is much newer than cybersecurity itself. Most countries have some laws in place, and there will be more laws to come.</p>
<ul>
<li><em> Personal Legal Issues</em><br />
Cybersecurity professionals develop many skills which can be used for good or evil. Those who use their skills within the legal system, to protect infrastructure, networks, and privacy are always in high demand.</li>
<li><em>Corporate Legal Issues</em><br />
Most countries have some cybersecurity laws in place. They may have to do with critical infrastructure, networks, and corporate and individual privacy. Businesses are required to abide by these laws.In some cases, if you break cybersecurity laws while doing your job, it is the company that may be punished and you could lose your job. In other cases, you could be prosecuted, fined, and possibly sentenced.</li>
<li><em>Ethical Issues in Cybersecurity</em><br />
In addition to working within the confines of the law, cybersecurity professionals must also demonstrate ethical behavior.</li>
<li><em>Personal Ethical Issues</em><br />
A person may act unethically and not be subject to prosecution, fines or imprisonment. This is because the action may not have been technically illegal. But that does not mean that the behavior is acceptable. Ethical behavior is fairly easy to ascertain. It is impossible to list all of the various unethical behaviors that can be exhibited by someone with cybersecurity skills.</li>
<li style="list-style-type: none;"> Below are just two. Ask yourself:</li>
<li>• Would I want to discover that an IT technician whom I trusted to fix my network, told colleagues personal information gained while working on my network?</li>
<li>• Would I want to discover that someone has hacked into my computer and altered images in my social network sites?<br />
If your answer to any of these questions was ‘no’, then do not do such things to others.</li>
<li>Corporate Ethical Issues<br />
Ethics are codes of behavior that are sometimes enforced by laws. There are many areas in cybersecurity that are not covered by laws. This means that doing something that is technically legal still may not be the ethical thing to do. Because so many areas of cybersecurity are not (or not yet) covered by laws, many IT professional organizations have created codes of ethics for persons in the industry.Below is a list of three organizations with Codes of Ethics:<br />
• The CyberSecurity Institute (CSI).<br />
• The Information Systems Security Association (ISSA).<br />
• The Association of Information Technology Professionals (AITP).</li>
</ul>
<p><strong><em>Sources : </em></strong><br />
<em>Online Certification on Cybersecurity(<a href="http://www.netacad.com"><code class="EnlighterJSRAW" data-enlighter-language="null">www.netacad.com</code></a></em><em>)<br />
</em>情報セキュリテイマネジメント試験  教科書（<em>IT Security Management Test Textbook</em>）<br />
<em>Online Learnings</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/cybersecurity-quick-reference/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
