<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="https://sampathblogs.online/wp-content/plugins/rss-feed-styles/public/template.xsl"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:rssFeedStyles="http://www.lerougeliet.com/ns/rssFeedStyles#"
>

<channel>
	<title>Best practice &#8211; Sampath Kumar A</title>
	<atom:link href="https://sampathblogs.online/tag/best-practice/feed/" rel="self" type="application/rss+xml" />
	<link>https://sampathblogs.online</link>
	<description>Be Concious Be More</description>
	<lastBuildDate>Thu, 25 Sep 2025 11:18:09 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<rssFeedStyles:reader name="Digg Reader" url="http://digg.com/reader/search/https%3A%2F%2Fsampathblogs.online%2Ffeed%2F"/><rssFeedStyles:reader name="Feedly" url="http://cloud.feedly.com/#subscription%2Ffeed%2Fhttps://sampathblogs.online/feed/"/><rssFeedStyles:button name="Like" url="https://www.facebook.com/sharer/sharer.php?u=%url%"/><rssFeedStyles:button name="G+" url="https://plus.google.com/share?url=%url%"/><rssFeedStyles:button name="Tweet" url="https://twitter.com/intent/tweet?url=%url%"/><rssFeedStyles:button name="Pinterest" url="https://www.pinterest.com/pin/create/button?url=%url%"/><rssFeedStyles:button name="LinkedIn" url="https://www.linkedin.com/cws/share?url=%url%"/>	<item>
		<title>Optimizing Scrum in Jira: Board Filter, Automation and Dashboard</title>
		<link>https://sampathblogs.online/2025/09/optimizing-scrum-in-jira-board-filter-automation-and-dashboard/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=optimizing-scrum-in-jira-board-filter-automation-and-dashboard</link>
					<comments>https://sampathblogs.online/2025/09/optimizing-scrum-in-jira-board-filter-automation-and-dashboard/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Thu, 25 Sep 2025 11:18:09 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Project management]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=3924</guid>

					<description><![CDATA[Optimizing your scrum process in Jira involves leveraging some of the key areas like the custom dashboard to increase visibility, automation rules to reduce manual overload and refined board filters for focused work. To measure the team performance metrics like... <a class="more-link" href="https://sampathblogs.online/2025/09/optimizing-scrum-in-jira-board-filter-automation-and-dashboard/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p><br>Optimizing your scrum process in Jira involves leveraging some of the key areas like the custom dashboard to increase visibility, automation rules to reduce manual overload and refined board filters for focused work. To measure the team performance metrics like resolution time, Issue statistics and sprint performance the pie chart gadget can be used. Combine the Pie chart with the other inbuilt charts like burndown chart, velocity chart etc to get a better understanding of how the sprint is progressing. In one of my previous blogs on automation, I had introduced about the various helpful automation rules to optimize your scrum project. For better board management, you have something called quick filters and board filters. Quick filters are dynamic, clickable filters that the scrum team members can toggle on/off to narrow down the board view, while the Board filter is your foundational JQL query that defines which issues appear on your scrum board.<br><br>In this blog, we will delve into the advanced level of each key area mentioned above that can help you elevate your Scrum process.</p>



<h3 class="wp-block-heading">Board Filter Refinement</h3>



<p>If we have multiple boards in a project, tasks and stories from one board can appear in another board&#8217;s backlog if proper board filters are not set. Additionally, to create a board that only displays work items you want included, you can use filters based on a JQL query.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img fetchpriority="high" decoding="async" width="964" height="715" src="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrumbrd-1.png" alt="" class="wp-image-3928" style="width:626px;height:auto" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrumbrd-1.png 964w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrumbrd-1-300x223.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrumbrd-1-768x570.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrumbrd-1-600x445.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrumbrd-1-945x701.png 945w" sizes="(max-width: 964px) 100vw, 964px" /></figure>
</div>


<p>In the above Scrum board setting, the filter query is set to display only the work items that has the<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-accent-color"> <em>sprint</em> </mark>section with some value. Since the board filter is set as above, you can view only the work items within the SP Sprint 1 backlog as the <em>sprint </em>section in each work item is set to <code data-enlighter-language="generic" class="EnlighterJSRAW">SP Sprint 1</code>.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img decoding="async" width="1024" height="509" src="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrum-bklog-1024x509.png" alt="" class="wp-image-3930" style="width:654px;height:auto" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrum-bklog-1024x509.png 1024w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrum-bklog-300x149.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrum-bklog-768x382.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrum-bklog-600x298.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrum-bklog-945x470.png 945w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-scrum-bklog.png 1381w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<p>In the same project, you have one more board called Kanbanx ,i.e., <code>Scrum project (SP)</code>. The kanban board filter query is set to filter only work items with the labels section set to test.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img decoding="async" width="955" height="714" src="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban.png" alt="" class="wp-image-3932" style="width:652px;height:auto" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban.png 955w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-300x224.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-768x574.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-600x449.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-945x707.png 945w" sizes="(max-width: 955px) 100vw, 955px" /></figure>
</div>


<p>As you can see in the screenshot below, on the kanban board we can get to see only the work item/s set to the value of <code>test</code> with the sprint section <code>empty</code>.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="551" src="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-task-1-1024x551.png" alt="" class="wp-image-3931" style="width:662px;height:auto" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-task-1-1024x551.png 1024w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-task-1-300x161.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-task-1-768x413.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-task-1-600x323.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-task-1-945x509.png 945w, https://sampathblogs.online/wp-content/uploads/2025/09/brd-settings-kanban-task-1.png 1429w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading">Advanced Automation Rules</h3>



<p>The picture below depicts the branching rule in Jira automation. For any newly created subtask in the project, if the summary contains the letter <code data-enlighter-language="generic" class="EnlighterJSRAW">X</code>, the description field of the work item will be edited to include the text &#8220;Notes by Sampath&#8221;. The same is depicted in the next picture below.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="593" src="https://sampathblogs.online/wp-content/uploads/2025/09/auto1.png" alt="" class="wp-image-3944" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/auto1.png 1024w, https://sampathblogs.online/wp-content/uploads/2025/09/auto1-300x174.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/auto1-768x445.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/auto1-600x347.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/auto1-945x547.png 945w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<p>In the below picture, you can see the subtask with <code data-enlighter-language="xml" class="EnlighterJSRAW">X</code> in the summary part.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="409" src="https://sampathblogs.online/wp-content/uploads/2025/09/automation-subtaskX-1-1024x409.png" alt="" class="wp-image-3941" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/automation-subtaskX-1-1024x409.png 1024w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-subtaskX-1-300x120.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-subtaskX-1-768x307.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-subtaskX-1-600x240.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-subtaskX-1-945x378.png 945w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-subtaskX-1.png 1249w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<p>However, if the description section does not contain the letter <code data-enlighter-language="generic" class="EnlighterJSRAW">X</code>, then the description will be edited to include the text &#8220;General notes:&#8221; as shown below.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="450" src="https://sampathblogs.online/wp-content/uploads/2025/09/automation-noX-1-1024x450.png" alt="" class="wp-image-3940" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/automation-noX-1-1024x450.png 1024w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-noX-1-300x132.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-noX-1-768x338.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-noX-1-600x264.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-noX-1-945x415.png 945w, https://sampathblogs.online/wp-content/uploads/2025/09/automation-noX-1.png 1242w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The last branch rule in the above description update is about adding the Labels as <code data-enlighter-language="generic" class="EnlighterJSRAW">scrum</code> to any subtask that has empty labels.</p>



<p>Another helpful feature in Jira automation is the <code data-enlighter-language="generic" class="EnlighterJSRAW">Multiple work item events</code>. Using this feature, you can trigger the workflow at multiple events of work item without using branches, that can be really helpful in some cases.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="879" height="450" src="https://sampathblogs.online/wp-content/uploads/2025/09/trigger.png" alt="" class="wp-image-3948" style="width:548px;height:auto" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/trigger.png 879w, https://sampathblogs.online/wp-content/uploads/2025/09/trigger-300x154.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/trigger-768x393.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/trigger-600x307.png 600w" sizes="auto, (max-width: 879px) 100vw, 879px" /></figure>
</div>


<h3 class="wp-block-heading">Custom Dashboard</h3>



<p>In this section on the dashboard, i will introduce you to the usage of a <em>Workload Pie Chart</em> to display the per-person effort of a scrum team. This is an inbuilt Jira feature. Let us say the sprint starts on 3rd and ends on the 16th of September. The JQL filter that we need to create would be as follows. Remember to make the appropriate settings under Filter details so that the data is visible to the concerned person or group.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="77" src="https://sampathblogs.online/wp-content/uploads/2025/09/filterscrum1-1024x77.png" alt="" class="wp-image-3946" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/filterscrum1-1024x77.png 1024w, https://sampathblogs.online/wp-content/uploads/2025/09/filterscrum1-300x22.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/filterscrum1-768x57.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/filterscrum1-600x45.png 600w, https://sampathblogs.online/wp-content/uploads/2025/09/filterscrum1-945x71.png 945w, https://sampathblogs.online/wp-content/uploads/2025/09/filterscrum1.png 1456w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>From the gadget section under Dashboards, select the Workload Pie Chart gadget. You can configure the gadget as follows by selecting the <em>above filter</em>, Statistic Type needs to be set to <em>Assignee</em>, Time field to report on needs to be set to <em>Time Spent</em>. Select the refresh interval appropriately and click on save.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="577" height="598" src="https://sampathblogs.online/wp-content/uploads/2025/09/Jira-dashbrd-settings.png" alt="" class="wp-image-3938" style="width:416px;height:auto" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/Jira-dashbrd-settings.png 577w, https://sampathblogs.online/wp-content/uploads/2025/09/Jira-dashbrd-settings-289x300.png 289w" sizes="auto, (max-width: 577px) 100vw, 577px" /></figure>
</div>


<p>Once you click on the Save button, you will be able to see the following pie chart. Two users have logged the hours in the sprint and hence the respective hours is getting displayed. If more members of the team  login in the hours on their subtasks, their efforts will also be displayed.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="787" height="609" src="https://sampathblogs.online/wp-content/uploads/2025/09/jira-dashbrd.png" alt="" class="wp-image-3939" style="width:490px;height:auto" srcset="https://sampathblogs.online/wp-content/uploads/2025/09/jira-dashbrd.png 787w, https://sampathblogs.online/wp-content/uploads/2025/09/jira-dashbrd-300x232.png 300w, https://sampathblogs.online/wp-content/uploads/2025/09/jira-dashbrd-768x594.png 768w, https://sampathblogs.online/wp-content/uploads/2025/09/jira-dashbrd-600x464.png 600w" sizes="auto, (max-width: 787px) 100vw, 787px" /></figure>
</div>


<p><strong>Further Reading:</strong></p>



<ul class="wp-block-list">
<li><a href="https://sampathblogs.online/2025/05/jira-data-visualization/">Jira Data Visualization: A Guide to Effective Dashboards</a></li>



<li><a href="https://sampathblogs.online/2024/09/essential-jira-automation-rules-for-scrum-teams/">Essential Jira Automation Rules for Scrum Teams</a></li>



<li><a href="https://sampathblogs.online/2024/06/navigating-jira-from-basics-to-advanced/">Navigating Jira : From Basics to Advanced</a></li>



<li><a href="https://sampathblogs.online/2024/10/jira-service-management-forms-enhancing-user-experience/">Jira Service Management Forms: Enhancing User Experience</a></li>



<li><a href="https://sampathblogs.online/2025/01/integrating-service-and-software-workflows-on-a-single-kanban-board/">Integrating Service and Software Workflows on a Single Kanban Board</a></li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2025/09/optimizing-scrum-in-jira-board-filter-automation-and-dashboard/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Essential Cybersecurity Practices</title>
		<link>https://sampathblogs.online/2023/10/essential-cybersecurity-practices/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=essential-cybersecurity-practices</link>
					<comments>https://sampathblogs.online/2023/10/essential-cybersecurity-practices/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Wed, 25 Oct 2023 13:34:40 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[IT Infrastructure Service]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=3415</guid>

					<description><![CDATA[Recently I obtained the ISC2 Certification in Cybersecurity. In this blog, &#8220;Essential Cybersecurity Practices&#8221; I have tried to highlight the knowledge that i gained, which is nothing but the best practices needed for securing the digital landscape. Apart from the... <a class="more-link" href="https://sampathblogs.online/2023/10/essential-cybersecurity-practices/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>Recently I obtained the <a href="https://www.isc2.org/certifications/cc">ISC2 Certification</a> in Cybersecurity. In this blog, &#8220;Essential Cybersecurity Practices&#8221; I have tried to highlight the knowledge that i gained, which is nothing but the best practices needed for securing the digital landscape. Apart from the certification aspect, these essential cybersecurity practices are a must know to anyone who is into the IT field.</p>



<h3 class="wp-block-heading">Security Principles</h3>



<p>In this first section of essential cybersecurity practices, i have briefed upon the topics of security concepts of information assurance, risk management process, security controls and governance elements.</p>



<h5 class="wp-block-heading">Security Concepts</h5>



<p>The basic security model that was mentioned in one of my earlier blogs too was the CIA triad, which stands for confidentiality, integrity, and availability. Confidentiality involves protecting data from unauthorized access. Integrity ensures that data has not been altered in an unauthorized manner. Lastly, availability ensures that data is accessible to authorized users when and where it is needed.</p>



<h5 class="wp-block-heading">Threat Actors</h5>



<p>In the realm of cybersecurity, threat actors encompass a range of  entities. These may include insiders, external individuals seeking vulnerabilities, non-political cyber criminals, political entities like terrorists, and information gatherers, along with technological elements such as free-running bots that may be affiliated with any of the  aforementioned groups.</p>



<h5 class="wp-block-heading">Risk Management Process</h5>



<p>In the context of risk management, steps involved in identifying, assessing and prioritizing risks as well as different ways to manage the risks are discussed.</p>



<p>Risk identification is the process of identifying potential risks to an organization&#8217;s operations, assets, individuals, or other organizations. This involves identifying and documenting the risks that could impact the organization and its information systems.</p>



<p>Risk assessment is the process of analyzing and evaluating the identified risks to determine their potential impact and likelihood. This involves assessing the risks based on their potential impact, likelihood, and other factors, such as the organization&#8217;s risk tolerance and the effectiveness of existing security controls.</p>



<p>Risk treatment is the process of selecting and implementing appropriate controls to manage the identified risks. This involves deciding whether to accept, avoid, reduce, or transfer the risks, and then implementing the appropriate controls to manage the risks. The goal of risk treatment is to reduce the overall risk to an acceptable level.</p>



<h5 class="wp-block-heading">Security Controls</h5>



<p>The various types of security controls include physical control or physical hardware devices, technical controls or logical controls, administrative controls or managerial control aimed at people within the organization.</p>



<h5 class="wp-block-heading">Governance Elements</h5>



<p>The various governance elements necessary for effective information security  management are procedures, policies, standards and regulations. </p>



<p>Procedures are the detailed steps to complete a task that support departmental or organizational policies. Policies are put in place by organizational governance to provide guidance to all activities to ensure that the organization supports industry standards and regulations. Standards are often used by governance teams to provide a framework to introduce policies and procedures in support of regulations. Regulations are commonly issued in the form of laws, usually from the government and typically carry financial penalties for non-compliance.</p>



<h3 class="wp-block-heading">Incident Response, Business Continuity and Disaster Recovery</h3>



<p>In this section, the focus is mainly on the availability part of the CIA triad and the importance of maintaining availability for business operations. Maintaining business operations during or after an incident, event, breach, intrusion, exploit or zero day is accomplished through the<br>implementation of Incident Response (IR), Business Continuity (BC), and/or Disaster Recovery (DR) plan. This is one of the essential cybersecurity practices that plays a vital role in providing interruption free service.</p>



<h5 class="wp-block-heading">Incident Response</h5>



<p>Incident Response is a plan that responds to abnormal operating conditions to keep the business operating. It involves four main components: Preparation, Detection and Analysis, Containment, Eradication and Recovery, and Post-Incident Activity. Incident Response teams are typically a cross-functional group of individuals who represent the management, technical and functional areas of responsibility most directly impacted by a security incident. The team is responsible for determining the amount and scope of damage and whether any confidential information was compromised, implementing recovery procedures to restore security and recover from incident-related damage, and supervising implementation of future measures to improve security and prevent the recurrence of incident.</p>



<h5 class="wp-block-heading">Business Continuity</h5>



<p>Business Continuity is a plan that focuses on maintaining essential business functions during and after a disruption. It includes a list of the BCP team members, immediate response procedures and checklists, notification systems and call trees, guidance for management, contact numbers for critical members of the supply chain, and how/when to enact the plan.</p>



<h5 class="wp-block-heading">Disaster Recovery</h5>



<p>Disaster Recovery (DR) plan is concerned with restoring IT and communications back to full operations after a disruption. DR planning takes over from where business continuity efforts conclude. The goal of DR is to restore normal operations as quickly as possible after a disaster or other disruptive event. The DR plan includes an executive summary providing a high-level overview of the plan, department-specific plans, technical guides for IT personnel responsible for implementing and maintaining critical backup systems, full copies of the plan for critical disaster recovery team members, and checklists for certain individuals.</p>



<h3 class="wp-block-heading">Access Control Concepts</h3>



<p>Access control is the process of managing who has access to what information or resources in an organization. It involves three elements: subjects (who), objects (what), and rules (how and when). Access controls can be physical or logical. They are used to prevent  unauthorized access, enforce the principle of least privilege, and protect the confidentiality, integrity, and availability of information.</p>



<p>Defense in depth is an information security strategy that involves implementing multiple layers of security controls to protect against a variety of threats. Privileged Access Management can help reduce risk by limiting administrative access to only when it is needed. User provisioning is the process of creating, modifying, disabling, or deleting user accounts in an organization&#8217;s information systems. Proper user provisioning is an important aspect of access control and can help ensure the confidentiality, integrity, and availability of an organization&#8217;s information.</p>



<p>Physical access controls are security measures that are designed to prevent unauthorized access to physical locations, facilities, and equipment. These controls are an important aspect of access control and can help prevent theft, vandalism, and other physical security threats. Examples of physical access controls include fences, mantraps/turnstiles, motion detectors, swipe cards etc.</p>



<p>Logical access controls are security measures that are designed to prevent unauthorized access to information and computer systems. Typically, organizations implement these controls through software to  restrict access to specific files, applications, or other resources  based on user roles, permissions, or other criteria. Examples of logical access controls include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).</p>



<h3 class="wp-block-heading">Network Security</h3>



<p>Computer networking refers to the practice of connecting two or more computers together to share data, information, or resources. There are many types of networks, such as LAN, WAN, WLAN, VPN, etc., each with its own characteristics and requirements. Devices found on a network can include hubs, switches, routers, firewalls, servers, endpoints/end user devices and many more. Other important network terms include ports, protocols, ethernet, Wi-Fi, IP address, and MAC address. The OSI and TCP/IP models are two common models used to describe network architecture. When setting up and maintaining a network, it&#8217;s crucial to consider  network security. You can use measures like firewalls, antivirus software, and access controls to safeguard against common threats,  including spoofing, DoS/DDoS, viruses, worms, and Trojans.</p>



<h5 class="wp-block-heading">Network Threats and Attacks</h5>



<p>This refers to malicious activities that aim to disrupt or damage computer networks and the devices connected to them. Common types of network attacks include DoS/DDoS attacks, which overwhelm a network with traffic, and man-in-the-middle attacks, which intercept and modify network traffic. Other types of attacks include spoofing, in which an attacker impersonates a legitimate user or device, and phishing, in which an attacker tricks a user into revealing sensitive information. Viruses, worms, and Trojans, among other malware, can compromise network security. To protect against these threats, network administrators can use a variety of security measures, such as firewalls, Antivirus, Intrusion Prevention System and access controls. It is important to stay vigilant and up-to-date with the latest security practices to ensure the safety and integrity of computer networks.</p>



<h5 class="wp-block-heading">Network Security Infrastructure</h5>



<p>Network security infrastructure refers to the collection of hardware, software, and protocols used to protect computer networks from unauthorized access, attacks, and other security threats. It encompasses physical security measures such as power, HVAC, and fire suppression systems in data centres, as well as cloud security measures such as service models (SaaS, IaaS, PaaS) and deployment models (public, private, community, hybrid). Network design terminology, such as network segmentation, VLANs, VPNs, defense in depth, zero trust, and network access control, is also an important part of network security infrastructure. As mentioned in the earlier section, this infrastructure includes devices such as firewalls, intrusion detection and prevention systems, and access control systems, as well as security protocols such as SSL/TLS, IPsec, etc., By implementing a comprehensive network security infrastructure, organizations can help ensure the confidentiality, integrity, and availability of their networks and the data they contain.</p>



<h3 class="wp-block-heading">Security Operations</h3>



<p>In this last topic on essential cybersecurity practices, i will be taking up the topics of data security, system hardening, security policies and security awareness training.</p>



<h5 class="wp-block-heading">Data Security</h5>



<p>Data security is the practice of safeguarding data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing various security measures to ensure the confidentiality, integrity, and availability of data. This involves categorizing and labeling sensitive data, setting retention periods, and ensuring its secure disposal when no longer required. Data security demands constant monitoring(Ingress &amp; Egress), testing, and updates to address evolving threats and vulnerabilities.</p>



<h5 class="wp-block-heading">System Hardening</h5>



<p>System hardening reduces the attack surface by applying secure  configurations to hardware, communication systems, and software,  including operating systems, web servers, application servers, and  applications. It involves implementing security controls and risk mitigation strategies to minimize the vulnerabilities and weaknesses of a system. The elements of configuration management, such as inventory, baselines, updates, and patches, make this possible. System hardening follows industry guidelines and benchmarks, like those from the Center for Internet Security (CIS). The goal of system hardening is to make a system more secure and less susceptible to cyber attacks.</p>



<h5 class="wp-block-heading">Best Practice Security Policies</h5>



<p> Best practice security policies ensure data and system confidentiality,  integrity, and availability through guidelines and procedures. These policies include data handling, password protection, acceptable use, bring your own device (BYOD), privacy, and change management. Data handling policies ensure the appropriate use of data, while password policies establish guidelines for the appropriate use of passwords.  Acceptable use policies define asset, device, and data usage, while BYOD policies set rules for personal device use.  Privacy policies safeguard personal data, while change management policies oversee transitions from the present to the future state. These policies adhere to industry standards and best practices, requiring continual monitoring and updates to address evolving threats and vulnerabilities.</p>



<h5 class="wp-block-heading">Securing Awareness Training</h5>



<p>Security awareness training educates stakeholders about information  security and safeguarding data and systems from cyber threats.  Typically, three types of training are there, namely; education, training, and awareness. Education provides a basic understanding of security concepts and policies, while training focuses on specific skills and procedures. Awareness aims to keep security top of mind and encourage employees to report suspicious activity. You can tailor the training to the security topic(s), organization, position, and/or individual. Security awareness training aims to diminish internal threats by enhancing employee and other stakeholder security awareness. It&#8217;s vital in an organization&#8217;s security strategy, requiring continuous monitoring and updates for emerging threats and vulnerabilities.</p>



<p>I hope that you find this blog on essential cybersecurity practices useful.</p>



<p><strong>Further Reference :</strong></p>



<ul class="wp-block-list"><li><a href="https://sampathblogs.online/2018/05/cybersecurity-quick-reference/">Cybersecurity : A Quick reference guide</a></li><li><a href="https://sampathblogs.online/2018/05/security-basics-quick-reference/">IT Security Vulnerabilities and Exploitation</a></li><li><a href="https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/">Understanding Data Center and Service Desk Operations</a></li><li><a href="https://sampathblogs.online/2018/12/enterprise-it-infrastructure-support/">Enterprise IT Infrastructure &amp; Support</a></li><li><a href="https://sampathblogs.online/2018/04/virtualization-and-cloud-computing-basics/">Introduction to Virtualization and Cloud computing</a></li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2023/10/essential-cybersecurity-practices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Common Business Terminologies used in Japanese Companies</title>
		<link>https://sampathblogs.online/2023/06/common-business-terminologies-used-in-japanese-companies/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=common-business-terminologies-used-in-japanese-companies</link>
					<comments>https://sampathblogs.online/2023/06/common-business-terminologies-used-in-japanese-companies/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Sun, 25 Jun 2023 10:30:17 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=3311</guid>

					<description><![CDATA[Anyone who works at a Japanese company or aspires to work there will find this blog to be of great use. During formal meetings as well as casual conversations, it is typical to utilise either japanese, katakana, english or other... <a class="more-link" href="https://sampathblogs.online/2023/06/common-business-terminologies-used-in-japanese-companies/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>Anyone who works at a Japanese company or aspires to work there will find this blog to be of great use. During formal meetings as well as casual conversations, it is typical to utilise either japanese, katakana, english or other language terms. A person with a better knowledge of these terms will be able to understand and communicate in a better way with the co-workers. I&#8217;ve listed here a few of the common business terminologies used in Japanese companies. </p>



<h3 class="wp-block-heading"><strong>General</strong> <strong>Terms</strong></h3>



<p>These are the words used to describe workplace events, specific activities and their consequences, and the materials to do tasks. Since these words are short, there is no need of lengthy explaination. Here i would like to list out a few of the workplace terms along with their meaning.</p>



<h6 class="wp-block-heading">棚卸　tanaoroshi</h6>



<p>This is one of the frequently used words in factories &amp; warehouses for taking stock of product count, checking the quality of products. The term when applied to everyday work, provides a clear picture of inefficient areas, tasks that need to be prioritised, and so on. The other word for this is visualizing tasks and workloads.</p>



<h6 class="wp-block-heading">たたき台<strong>　</strong>Tatakidai</h6>



<p>The term tatakidai refers to the tool/metal base on which blacksmiths pound hot metal to shape it. At work, the same word tatakidai is used to denote a draft, prototype, or a rough blueprint. The draft will serve as the foundation for further work in order to finalise a plan.</p>



<h6 class="wp-block-heading">終日　shuujitsu</h6>



<p>This term is commonly used at work to denote working hours or the time between clocking in and out.</p>



<h6 class="wp-block-heading">五月雨式<strong>　</strong>samidareshiki</h6>



<p>The word samidareshiki refers to &#8220;Early summer/May rain&#8221; that is intermittent. The same word is used to describe a situation in which you contact someone constantly. Usually a word of apology will go along this word in a sentence.</p>



<h6 class="wp-block-heading">虎の巻<strong>　</strong>Toranomaki</h6>



<p>This term can be traced back to an ancient Chinese text of military tactics. Because the secrets of tactics were mentioned in the Tiger volume of the book, it came to be known as Tora no maki, or the Tiger scroll. Nowadays, the Tiger scroll is an idiom that implies &#8220;Key&#8221; or &#8220;Book of knowledge&#8221;. The master text for a specific topic is known as the &#8220;Tora no Maki,&#8221; which refers to the traditional Japanese technique of writing texts on long scrolls. It is common to see the word Tora no maki at workplace or on the title of books. The word is commonly used for a text book, answer book, reference book, work handbook, guide book, and so on.</p>



<h3 class="wp-block-heading">Business Practice Terms</h3>



<p>These terms indicate a set of ideas, guidelines or ethics in order to bring about improvements in communication flow, risk assesment, problem resolution, quality and efficiency.</p>



<h6 class="wp-block-heading">報連相　hourensou</h6>



<p>In a workplace, having effective communication is vital to building relationships with trust, and for this reason hourensou is exemplified.<br>Hou-Ren-Sou is an abbreviation of three words: houkoku, renraku, and soudan – reporting, informing, and consulting. Funny enough, it sounds the same as the Japanese word for “spinach”. This method is employed by the great majority of organisations and is strongly embedded in the country&#8217;s working culture.</p>



<h6 class="wp-block-heading"> 危険予知活動　kiken-yochi-katsudo</h6>



<p>Kiken Yochi Katsudo translates to Hazarad Awareness Activities. It refers to the proactive process of identifying potential hazards or risks due to unsafe conditions or actions before they occur so that accidents or incidents at workplace can be prevented.</p>



<h6 class="wp-block-heading">横展開　yokotenkai　|　<strong>水平展開　</strong>suiheitenkai</h6>



<p>Yokotenkai or Suiheitenkai translates to &#8220;best practice sharing&#8221;. It is an essential part of long term success in a lean culture. Achieve a result, and then share the results, learn from it &amp; adopt it wherever applicable, and immediately recreate and multiply the success.</p>



<h6 class="wp-block-heading"> ポカヨケ　pokayoke</h6>



<p>Poka Yoke means &#8220;Mistake proofing&#8221; or avoiding inadverdent errors. It is utilised in both the manufacturing and service industries. Its purpose is to eliminate product/process defects by preventing, correcting, or drawing attention to human errors as they occur.</p>



<h6 class="wp-block-heading">5S</h6>



<p>Seiri, Seiton, Seiso, Seiketsu, and Shitsuke are the five Japanese words that stand for Sort, Set, Shine, Standardise, and Sustain. The essence of 5S can be summarized as : &#8220;Only what is needed, in its proper place, clean and ready for use&#8221;. Its simplicity, practical applicability, and visual nature makes it an easy methodology for all types of companies from manufacturing plants to offices.</p>



<h3 class="wp-block-heading">Katakana Terms</h3>



<p>Katakana is typically used to write foreign words and the names of foreign individuals and places. However, katakana is sometimes used to write words that can also be written in hiragana or kanji. This is to emphazise the kanji words or to bring about rhythm in a sentence. The following are some words that are commonly used at work in casual chat or in meetings.</p>



<h6 class="wp-block-heading">テーマ・ネタ　Topic</h6>



<p>This refers to the topic of discussion.</p>



<h6 class="wp-block-heading">オンスケ　Onschedule　｜　リスケ　Reschedule </h6>



<p>The original words in english are on schedule and reschedule. On schedule means the meeting or plan is on schedule. If a schedule change is required, the term reschedule will be used.</p>



<h6 class="wp-block-heading">クレーム　Complaint</h6>



<p>This refers to an opinion or requirement from a customer in case of dissatisfaction w.r.t a defective product or bad service. The customer can demand either improvements or necessary actions.</p>



<h6 class="wp-block-heading">イラスト　Illustration</h6>



<p>The original english word is illustration. An illustration is a visual portrayal of a text, concept, or process that is intended for use in print and digitally produced media.</p>



<h6 class="wp-block-heading">エビデンス　evidence</h6>



<p>The english meaning of this word is proof. At a Japanese workplace this term is used to keep a record of interactions such as meetings, correspondence, and so on that can be retrieved later on.</p>



<h6 class="wp-block-heading">ブレスト　brainstorming</h6>



<p>The English word brainstorming refers to a group creativity process for product planning, new business start-up, team development, and other purposes. Here, efforts are made to collect a list of ideas spontaneously given by its participants.</p>



<h6 class="wp-block-heading">ヒヤリング　hearing</h6>



<p>At Japanese workplace, this term refers to the process of obtaining information through meetings or other formal interactions.</p>



<p><strong>Reference :</strong></p>



<ul class="wp-block-list"><li><a href="https://sampathblogs.online/2019/01/handy-japanese-proverbs-idioms/">Handy Japanese Proverbs &amp; Idioms</a></li><li><a href="https://sampathblogs.online/2023/05/japanese-proverbs-and-idioms-for-self-development/">Popular Japanese Proverbs and Idioms on Self-Development</a></li><li><a href="https://sampathblogs.online/2019/04/good-to-know-rules-for-those-employed-in-japan/">Good to know rules for those employed in Japan</a></li><li><a href="https://sampathblogs.online/2018/06/japanese-workplace-etiquette/">Japanese Workplace Etiquette</a></li><li><a href="https://sampathblogs.online/2018/10/japanese-work-culture/">Japanese Work Culture</a></li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2023/06/common-business-terminologies-used-in-japanese-companies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ITIL 4 Foundation : Getting Started Guide</title>
		<link>https://sampathblogs.online/2021/03/itil-4-foundation-getting-started-guide/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=itil-4-foundation-getting-started-guide</link>
					<comments>https://sampathblogs.online/2021/03/itil-4-foundation-getting-started-guide/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 05 Mar 2021 07:37:07 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[IT Infrastructure Service]]></category>
		<guid isPermaLink="false">https://sampathblogs.online/?p=2403</guid>

					<description><![CDATA[Recently i obtained the ITIL 4 Foundation certification. In this blog i will write in brief about my learning on the topic. Introduction As you might be knowing, ITIL is a framework for service management. ITIL is the most widely... <a class="more-link" href="https://sampathblogs.online/2021/03/itil-4-foundation-getting-started-guide/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[
<p>Recently i obtained the ITIL 4 Foundation certification. In this blog i will write in brief about my learning on the topic.</p>



<h3 class="wp-block-heading">Introduction</h3>



<p>As you might be knowing, ITIL is a framework for service management. ITIL is the most widely used ITSM framework in the entire world. Most large companies have built their IT service management systems and processes around the ideas and concepts of ITIL framework. Currently we are in the 4th Industrial revolution, where fusion of technologies has blurred the lines between physical and digital realms. Technologies such as Cloud computing, IoT, Machine Learning, Blockchain, Self driving cars etc. have transformed our world economies and our lives.</p>



<p>ITIL 4 is not considered as ITIL version 4, instead it means ITIL for the 4th Industrial revolution. ITIL 4 Foundation will introduce readers to the management of the modern IT-enabled services, provide them with an understanding of the common language and key concepts and show them how they can improve their work and the work of their organization with ITIL 4 guidance.</p>



<h3 class="wp-block-heading">Service Management</h3>



<p><strong>Service management</strong> is defined as a set of specialized organizational <br>capabilities for enabling value to customers in the form of services. More and more organizations recognize that value is <em><strong>co-created</strong></em> through an active<br> collaboration between providers and consumers, as well as other organizations that are part of the relevant service relationships. Those organizations that deliver services are referred to as <strong><em>service providers</em></strong>. Those to whom services are delivered are referred to as <strong><em>service consumers</em></strong>. By the way, an <strong><em>organization </em></strong>is a person or a group of people that has its own functions with responsibilities, authorities and relationships to achieve its objectives.</p>



<p>Service Consumer Roles can be classified as customer, user and sponsor. A <strong><em>customer </em></strong>is one who defines requirements for services and takes responsibility for outcomes from service consumption. A person who uses the services is a <strong><em>user</em></strong>. While a person who authorizes the budget for service consumption is a <em><strong>sponsor</strong></em>. By the way, a <strong><em>service </em></strong>is a means of enabling value co-creation by facilitating outcomes that customers want to achieve, without the customer having to manage specific costs and risks. The term <strong>outcome </strong>refers to a result for a stakeholder enabled by one or more outputs.</p>



<h4 class="wp-block-heading">Service Relationship</h4>



<p>In order to create value, service providers have to provide more than just the service. <strong><em>Service Relationship</em></strong> is a co-operation between a service provider and service consumer that includes service provision, service consumption and service relationship management. The term <strong><em>service provision</em></strong> refers to the activities performed by an organization to provide the services. <strong><em>Service consumption</em></strong> points to the activities performed by the organization/or a person to consume the services. Finally the term, <strong><em>service relationship management </em></strong>refers to the activities that the service provider and service consumer perform together to enable value co-creation to occur based upon the service offerings.</p>



<p>In this section we will look into the different relationships involved in providing any single service. For example, a facility organization can rent office space to an IT organization. IT organization can also provide IT services to the facility organization in addition to its other customer organizations. The customer organization inturn provides services to its users. Interactions between organizations are more likely a <strong><em>network </em></strong>or <strong><em>ecosystem </em></strong>rather than the simple sequence of interaction between organizations as shown below.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="6424" height="2456" src="https://sampathblogs.online/wp-content/uploads/2021/02/SRM0.png" alt="" class="wp-image-2525"/></figure>



<p>The above <strong><em>service relationship model</em></strong> depicts the sequence of service relationships between the various organizations involved in our example.</p>



<h4 class="wp-block-heading">Costs and Risks</h4>



<p>Costs refer to the amount of money spent on a specific activity or a resource. Costs can also be expressed in non-financial terms like man-hours or Full time equivalent (FTE). A service provider aims to reduce or remove costs for you when providing a service. For example, when a person who rarely makes a call or uses internet purchases a mobile connection service, a package that involves minimum charges on calls and internet connection would provide more value.</p>



<p>Risk is a possible event that could cause harm, loss or make it more difficult to achieve objectives. A service provider&#8217;s goal should be to reduce risk for the consumer. Risk is potentially imposed on consumers by the service. Consumers should contribute to reducing the risk by taking some mitigating actions like communicating the needs and constraints to the service provider. Even here value can be co-created or risks can be reduced by mutual co-operation. However, risks can either be avoided, accepted, transferred or mitigated and cannot be eliminated completely. </p>



<h4 class="wp-block-heading">Utility and Warranty</h4>



<p>Utility is the functionality offered by a product or service to meet a particular need. In short, it means &#8220;Fit for Purpose&#8221;. While, warranty is the assurance that a product or service will meet agreed requirements. In short, it means &#8220;Fit for Use&#8221;. A service should have both utility and warranty in order to be successful. Warranty addresses areas such a availability, capacity, security levels and continuity w.r.t to a service infrastructure. </p>



<h4 class="wp-block-heading">Four Dimensions of Service Management</h4>



<p>As shown in the below picture, the value at the center is co-created through the various products and services. When a service provider creates a product or service to a customer, the service provider will look at it in 4 perspectives or dimensions. The perspectives are Organizations &amp; people, Information &amp;  technology, Partners &amp; suppliers and Value streams &amp; processes. The external factors ,i.e, PESTLE in clockwise order starting with Political factors need to be considered when building your services as they might have an impact. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="721" height="576" src="https://sampathblogs.online/wp-content/uploads/2021/02/fourdim.png" alt="" class="wp-image-2528" srcset="https://sampathblogs.online/wp-content/uploads/2021/02/fourdim.png 721w, https://sampathblogs.online/wp-content/uploads/2021/02/fourdim-300x240.png 300w, https://sampathblogs.online/wp-content/uploads/2021/02/fourdim-600x479.png 600w" sizes="auto, (max-width: 721px) 100vw, 721px" /></figure></div>



<p>The first dimension of <strong><em>Organizations &amp; people</em></strong> focuses on how are we going to setup the organization, how is it going to function, what kind of culture it is going to have, how do we take care of the people so that people can deliver the products and services to create value to the customer. </p>



<p>The second dimension of <strong><em>Information &amp; technology </em></strong>stresses on points like, is it compatible with the current architecture, does it raise any regulatory, compliance or information security control issues, will it continue to be viable in the foreseeable future, does it align with the service provider / service consumer strategy, does the organization have the right skills to support and maintain the technology ,i.e, with or without automation, does it have  additional capabilities that can be leveraged for other products and services, does it introduce new risks and constraints to the organization, risk tolerance.</p>



<p><strong><em>Partners &amp; suppliers</em></strong> do not fit under the dimension one, the reason being Organization &amp; people is internally focused to the organization, while partners &amp; suppliers is externally focused. Partners are more closely tied to the organization business while suppliers are more commodity based. Every organization relies on other partners &amp; suppliers and is based on goals, culture and business environment of the organization.</p>



<p><strong><em>Value streams &amp; processes</em></strong> defines the activities, workflows, controls and procedures needed to achieve the agreed upon objectives. The definition of <em>Value stream</em> is, a series of steps an organization undertakes to create and deliver products and services to service consumers. This combines all of the organization&#8217;s value chain activities. <em>Process </em>is a set of interrelated or interacting activities that transforms inputs into outputs. A well defined process can improve productivity, be optimized and will be automated. This dimension is more concerned about delivering a product or service to a consumer by executing certain processes that is part of a value stream. </p>



<h3 class="wp-block-heading">Service Value System</h3>



<p>Service Value System (SVS) describes how all the components of the organization work together as a system to enable value co-creation. The purpose is to ensure that the organization continually co-creates value with all stakeholders through the use and management of products and services. As shown in the below picture, the SVS consists of <strong><em>three parts</em></strong> namely the opportunity/demand as input, value as output, the central part with the Service value chain-Governance-Practices-Guiding principles-Continual improvement. In simple words, the idea of service value system is to take something in, add value, and put it out on the other side </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="721" height="457" src="https://sampathblogs.online/wp-content/uploads/2021/02/svs.png" alt="" class="wp-image-2533" srcset="https://sampathblogs.online/wp-content/uploads/2021/02/svs.png 721w, https://sampathblogs.online/wp-content/uploads/2021/02/svs-300x190.png 300w, https://sampathblogs.online/wp-content/uploads/2021/02/svs-600x380.png 600w" sizes="auto, (max-width: 721px) 100vw, 721px" /></figure></div>



<h4 class="wp-block-heading">Opportunity, demand and Value</h4>



<p><strong><em>Opportunities </em></strong>represent options or possibilities to add value for stakeholders or otherwise improve the organization. <em>For example</em>: create a new product or service and bring them to market to add value. The other input ,i.e, the <strong><em>demand </em></strong>is the need or desire for products and services among internal and external consumers. The output ,i.e, the <strong><em>Value </em></strong>is the outcome of the service value system that enables creation of many different types of value for a wide group of stakeholders.</p>



<h4 class="wp-block-heading">Governance</h4>



<p>Governance is the means by which an organization is directed and controlled. ITIL being a best practice provides a framework for governance. For example,  you may come up with activities, process and procedures to handle something like change management within your organization. You will build the activities and procedures around the governance so that they are inline with the governance that is part of the high level of your organization.</p>



<h4 class="wp-block-heading">Guiding principles</h4>



<p>Guiding principle is a recommendation that guides an organization in all circumstances. Though the approach to service management may differ with organizations, the guiding principles should be the same. Guiding principles encourage and support organizations in continual improvement across all levels of the organization. Of the seven guiding principles, consider which of the guiding principles are relevant to your situation. The seven guiding principles are as follows;</p>



<ul class="wp-block-list"><li>Focus on Value</li></ul>



<p>Everything the organization does should link back, directly or indirectly, to value for itself, its customers and other stakeholders.  </p>



<ul class="wp-block-list"><li>Start Where You Are</li></ul>



<p>Don&#8217;t start over without first considering what is already available to be leveraged. By figuring out the existing steps, you will get to know what useful steps to be taken forward and non-useful steps to be left out. All of this is done by measuring what you have. Measurement should be used to support the analysis of what has been observed rather than to replace it.</p>



<ul class="wp-block-list"><li>Progress Iteratively with Feedback</li></ul>



<p>Working in a time boxed and iterative manner with embedded feedback loops allows for greater flexibility, faster responses to needs, the ability to respond to failure earlier, and an overall improvement in quality.</p>



<ul class="wp-block-list"><li>Collaborate and Promote Visibility</li></ul>



<p>Collaboration is about working together and promotes visibility. Collaborate and promote visibility is about, making sure the information is getting up to the right people, at the right level, to make the right decisions.</p>



<ul class="wp-block-list"><li>Think and Work Holistically</li></ul>



<p>A holistic approach to service management requires an understanding of how all the parts of an organization work together in an integrated way. Collaboration is one of the key points here. Automation can help you to work more holistically. Automation of Service desk can be provided as an example.</p>



<ul class="wp-block-list"><li>Keep it Simple and Practical</li></ul>



<p>Outcome based thinking should be used to produce practical solutions which deliver valuable outcomes using the minimum number of steps. Having a holistic view of the organization&#8217;s work and starting with an uncomplicated approach are important. By keeping it simple, it makes things easier to understand, more likely to be adopted, and is the best route to achieve the quick wins.</p>



<ul class="wp-block-list"><li>Optimize and Automate</li></ul>



<p>Optimization is to make something as effective and useful as it makes sense to do. While, automation is using technology to perform a step or series of steps correctly and consistently with limited or no human intervention. The point here is to simplify and optimize before automating. Make use of the other guiding principles when applying this one.</p>



<h4 class="wp-block-heading">Service Value Chain</h4>



<p>The central part of the service value system is the service value chain that consists of Plan, Improve, Engage, Design and transition, Obtain/build, deliver and support activities as depicted in the below picture. The below picture does not depict a linear sequence of events. However, in <strong><em>ITIL v3</em></strong> we had the service life cycle that had a linear sequence of actions starting with the service strategy, service design, service transition, service operation and  continual service improvement. In <strong><em>ITIL 4</em></strong>, we normally start with engage but we always don&#8217;t have to. Based on this, we will touch upon other activities within the service value chain that can interact with each other in any order.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="616" height="325" src="https://sampathblogs.online/wp-content/uploads/2021/02/SVC.png" alt="" class="wp-image-2539" srcset="https://sampathblogs.online/wp-content/uploads/2021/02/SVC.png 616w, https://sampathblogs.online/wp-content/uploads/2021/02/SVC-300x158.png 300w, https://sampathblogs.online/wp-content/uploads/2021/02/SVC-600x317.png 600w" sizes="auto, (max-width: 616px) 100vw, 616px" /></figure></div>



<ul class="wp-block-list"><li>Plan</li></ul>



<p>Ensures a shared understanding of the vision, current status, and improvement direction for all four dimensions of ITSM and all products and services across the organization. Inputs to the plan process can be from the organization&#8217;s governance body, engage process, improve process, design &amp; transition and obtain/build. All the information is used to plan the updated service roadmap. Outputs can either go to the engage, improve or design &amp; transition process.</p>



<ul class="wp-block-list"><li>Improve</li></ul>



<p>Ensures continual improvement of products, services, and practices across all value chain activities and the four dimensions of service management. Inputs to the improve activity can be from the deliver &amp; support process, engage process and all other value chain activities. Outputs can be directed towards all value chain activities.</p>



<ul class="wp-block-list"><li>Engage</li></ul>



<p>The purpose is to provide good understanding of internal / external stakeholder needs, continual engagement, transparency and maintain good relationships with all stakeholders. Inputs to the engage activity can be from the plan, deliver and support process, customers, partners &amp; suppliers and all other value chain activities. The outputs from engage can go to the customer, any of the value chain activities.</p>



<ul class="wp-block-list"><li>Design &amp; Transition</li></ul>



<p>The purpose is to ensure that products and services continually meet stakeholder expectations for quality, costs, and time to market.<br>There are a lot of inputs from the plan, engage, improve and the other value chain activities. The output from the activity will be fed to obtain/build, engage, deliver &amp; support and to all the other value chain activities.</p>



<ul class="wp-block-list"><li> Obtain/Build </li></ul>



<p>This activity ensures that service components are available when and where they are needed, and that they meet agreed upon specifications. There are a lot of inputs from the plan, engage, external &amp; internal partner &amp; suppliers, all other value chain activities. The output goes to design &amp; transition and/or delivery &amp; support, other value chain activities.</p>



<ul class="wp-block-list"><li> Deliver and Support </li></ul>



<p>This activity ensures that services are delivered and supported according to agreed specifications and stakeholder expectations. People in IT support are part of the deliver and support. The inputs to this process can be from the design &amp; transition, engage, obtain/build, improve. The outputs are the services delivered to customers and users. Other outputs are fed to engage, improve, design &amp; transition and obtain/build.</p>



<h4 class="wp-block-heading">Continual Improvement</h4>



<p>As depicted in the lowest part of the SVS picture above , continual improvement is a part of the 34 ITIL practices that comes under the practices activity which is just above the continual improvement activity in the picture. Since continual improvement is that important, it has been separately mentioned. The purpose of continual improvement practice is to align the organization&#8217;s practices and services with changing business needs through the ongoing identification and improvement of services, service components, practices, or any element involved in the efficient and effective management of products and services.</p>



<p><strong>Continual Improvement Model</strong> is a seven step methodology that provides a framework for improvement operations with organizations.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="541" height="549" src="https://sampathblogs.online/wp-content/uploads/2021/02/CIM.png" alt="" class="wp-image-2547" srcset="https://sampathblogs.online/wp-content/uploads/2021/02/CIM.png 541w, https://sampathblogs.online/wp-content/uploads/2021/02/CIM-296x300.png 296w" sizes="auto, (max-width: 541px) 100vw, 541px" /></figure></div>



<p>As shown in the above picture, the model starts with the step1 &#8220;What is the vision?&#8221;, the subsequent steps follow and the final step ,i.e, step7 would be &#8220;How do we keep the momentum going?&#8221;. However we restart it once again with the step1 as continual improvement is an ongoing process that never stops. This may continue until we have the best product or service possible.</p>



<ul class="wp-block-list"><li>What is the vision?</li></ul>



<p>The vision for the organization is going to come from the top leadership.       By understanding the vision, we can drill it down to our specific case and get to know the status of all the improvements, who is going to help whom and how it is going to affect the organization as a whole.</p>



<ul class="wp-block-list"><li>Where are we now?</li></ul>



<p>The success of an improvement initiative depends upon the starting point and the impact of the initiative. It is difficult to track and measure effectiveness of any improvement initiative if you never determined where you started from. So it is important to create an <em>objective baseline</em> or a starting point metric.</p>



<ul class="wp-block-list"><li>Where do we want to be?</li></ul>



<p>From the baseline we got to know the current status, so we need to know our next step. <em>Gap analysis</em> looks at our overall vision, where we currently are, and where we want to be over some amount of time. Based on this analysis using KPI and Critical Success Factor(CSF) metrics, we will get to know what the gap/delta is. Set the goals based on this.</p>



<ul class="wp-block-list"><li>How do we get there?</li></ul>



<p>In this step we are going to create an improvement plan. The plan may be simple and direct or a complex one. Break the complex plan into manageable chunks and check progress after each iteration.</p>



<ul class="wp-block-list"><li>Take Action</li></ul>



<p>Here we put the plans into motion. The waterfall or agile method can be used to execute your plans and depends on the situation on which you want to use. Measuring the progress, managing the risk, ensuring visibility are important.</p>



<ul class="wp-block-list"><li>Did we get there?</li></ul>



<p>In this step we check the progress that can be either positive or negative. Our current state, i.e, &#8220;where are we today?&#8221; is compared against the original baseline of step2. Based on the new baseline we need to determine the next steps.</p>



<ul class="wp-block-list"><li>How do we keep the momentum going?</li></ul>



<p>If we meet the goal we need not stop there, as we need to keep improving. In case we did not meet the goals, we need to get back, readjust and figure out on how to meet the goals. If we meet the goals, it is important to attempt to continue the improvement gains across the organization.</p>



<h3 class="wp-block-heading">Practices</h3>



<p>As mentioned in the earlier section there are 34 ITIL practices. Since the section is huge, i will be explaining the details under a separate heading. Practice is a set of organized resources, designed for performing work or accomplishing an objective. Each practice supports multiple value chain activities. The 34 practices are divided into three categories as follows.</p>



<h4 class="wp-block-heading">General Management Practices</h4>



<p>There are 14 general management practices. These general management principles/practices have been adopted/adapted for service management for more general business management domains.</p>



<ul class="wp-block-list"><li>Continual Improvement</li></ul>



<p>When working on continual improvement, the methods/models/techniques like Lean, Multi-phase projects, Balanced scorecard, Agile, Maturing assessments, Devops, SWOT analysis will be helpful. One more helpful tool,  <strong><em>Continual Improvement Register (CIR)</em></strong> is a database of structured document to track and manage improvement ideas from identification through to final action. All value chain activities are subject to continual improvement as we are always trying to improve our activities and processes. Refer to the earlier section for more information on the topic.</p>



<ul class="wp-block-list"><li>Information Security Management</li></ul>



<p>This is to protect the information needed by the organization to conduct its business. The primary focus is on the balanced protection of Confidentiality, Integrity, Availability, Authentication, Non-repudiation of data. </p>



<ul class="wp-block-list"><li>Relationship Management</li></ul>



<p>The purpose is to establish and nurture the links between the organization and its stakeholders at strategic and tactical levels. This is done by identifying, analyzing, monitoring and doing continual improvement of those relationships between various stakeholders.</p>



<ul class="wp-block-list"><li> Supplier Management</li></ul>



<p>The purpose of supplier management is to ensure that the organization&#8217;s suppliers and their performance are managed appropriately to support the provision of seamless and quality products, services and components.</p>



<p><strong>NOTE :</strong> <em>The following practices are mentioned for awareness only and will not be part of the test.</em></p>



<ul class="wp-block-list"><li>Architecture Management &#8211; Provides an understanding of all the different elements that make up an organization and how those elements interrelate, enabling the organization to effectively achieve its current and future objectives.</li><li>Knowledge Management &#8211;  Provides an understanding of all the different elements/data that make up an organization and how those elements interrelate to generate wisdom needed to make decisions.</li><li>Measurement and Reporting &#8211; This practice supports good decision making and continual improvement by decreasing levels of uncertainty. Example : Baseline.</li><li>Organization Change Management &#8211; Ensures that changes in an organization are smoothly and successfully implemented and that lasting benefits are achieved by managing the human aspects of change.</li><li>Portfolio Management &#8211; Ensures an organization has the right mix of programs, projects, products and services to execute its strategy within its funding and resource constraints.</li><li>Project Management &#8211; Ensures that all of an organization&#8217;s projects are delivered successfully. PMP &amp; Prince2 are the methodologies available.</li><li>Risk Management &#8211; Ensures that an organization understands and effectively handles risk either through avoidance, mitigation, transfer or acceptance.</li><li>Service Financial Management &#8211; Supports the organization&#8217;s strategies and plans for service management by ensuring that the organization&#8217;s financial resources and investments are being used effectively.</li><li>Strategy Management &#8211; Here the top management formulates the goals of the organization and adopts the courses of action and allocation of resources necessary for achieving those goals.</li><li>Workforce and Talent Management &#8211; Ensures that an organization has the right people with the appropriate skills and knowledge and in the correct roles to support its business objectives.</li></ul>



<h4 class="wp-block-heading">Service Management Practices</h4>



<p>Service Management Practices have been developed in the service management and IT service management industries over the past decades. In ITIL 4 there are 17 service management practices.</p>



<ul class="wp-block-list"><li>Change Control</li></ul>



<p>This is all about maximizing the number of successful IT changes by ensuring that risks have been properly assessed, authorizing changes to proceed, and managing the change schedule. As you know, <strong><em>change </em></strong>is the addition, modification or removal of anything that could have a direct or indirect effect on IT services. Changes are of three type namely; standard, normal and emergency changes. A <strong><em>standard change</em></strong> is pre-authorized, low risk and well understood (ex: password reset). A <em><strong>normal change</strong></em> requires some level of authorization, is planned and scheduled in advance (ex:server upgrade). <strong><em>Emergency change</em></strong> has an expedited assessment and authorization process so that it is introduced as soon as possible (ex: file server crash).</p>



<ul class="wp-block-list"><li>Incident  Management</li></ul>



<p>The purpose of incident management is to minimize the negative impact of incidents by restoring normal service operation as quickly as possible. As you know, <strong><em>incident </em></strong>is an unplanned interruption to a service or reduction in the quality of service. Every incident must be logged, updated, managed to the agreed upon target resolution times and prioritized. Incident management requires a high level of collaboration within and between the teams.</p>



<ul class="wp-block-list"><li>Problem Management</li></ul>



<p>This reduces the likelihood and impact of incidents by identifying actual and potential causes of incidents and managing workarounds and known errors. As you know, a <em><strong>problem</strong> </em>is a cause or potential cause of one or more incidents. While, a <em><strong>known error</strong></em> is a problem that has been analyzed and has not been resolved. <em><strong>Workaround </strong></em>is a solution that reduces or eliminates the impact of an incident or problem for which a full resolution is not yet available. To summarize, in problem management we find the things that happen again and again and solve the root cause.</p>



<ul class="wp-block-list"><li>Service Desk</li></ul>



<p>The purpose of this practice is to capture demand for incident resolution and service requests. It should also be the single point of contact for your service provider for all of its users. Once the issue/request is received by the service desk, the workflow is to acknowledge, classify, own and act. There are 4 types, namely&#8217;; local, centralized, virtual and follow the sun. A<strong><em> local service desk</em></strong> is located within or close to the users that it serves. A <strong><em>centralized service desk</em></strong> uses a single centralized location to serve all users. It is efficient and cost effective compared to the local service desk. A <strong><em>virtual service desk</em></strong> allows  agents to work from multiple, geographically dispersed locations giving the impression of a centralized service desk. In <strong><em>follow the sun</em></strong>, two or more geographically dispersed service desks are combined to provide 24hr follow the sun coverage.</p>



<ul class="wp-block-list"><li>Service Level Management (SLM)</li></ul>



<p>The purpose of this practice is to set clear business based targets for service performance so that the delivery of a service can be properly assessed, monitored and managed against those targets. All of the service levels will be written down in a <strong><em>service level agreement (SLA)</em></strong>.  SLA can be defined as a documented agreement between a service provider and a customer, that identifies services required and the expected level of service. SLA should be written in a simple language and should be easy to understand. Other than SLA, things like initial listening, customer feedback, business metrics,  operational metrics (ex: server uptime) etc can go into the SLM. SLM affects all the value chain activities.</p>



<ul class="wp-block-list"><li>Service Request Management (SRM)</li></ul>



<p>This supports the agreed quality of a service by handling all predefined, user initiated service requests in an effective and user friendly manner. <strong><em>Service Request (SR)</em></strong> is a request from a user or user&#8217;s authorized representative that initiates a service action that has been agreed as a normal part of service delivery. SRs can have simple/complex workflows, but make sure to test, optimize and then automate the steps involved. To summarize, SRM is all about making sure the users are getting what they need so that they can operate at peak efficiency (ex: provision a resource, increase capacity etc). </p>



<ul class="wp-block-list"><li>IT Asset Management</li></ul>



<p>The purpose is to plan and manage the full life cycle of all IT assets, to help the organization : maximize value, control costs, manage risks, support decision making about purchase/re-use/retirement of assets, meet regulatory and contractual requirements. <strong><em>IT Asset</em></strong> can be defined as any valuable component that can contribute to the delivery of an IT product or service.   </p>



<ul class="wp-block-list"><li>Monitoring and Event Management</li></ul>



<p>The purpose is to systematically observe a service or service component, and record, report selected changes of state identified as events. <strong><em>Event </em></strong>is any change of state that has significance for the management of a configuration item (CI) or IT service (ex: successful login, failed login).</p>



<ul class="wp-block-list"><li>Release Management</li></ul>



<p>The purpose is to make new and changed services and features available for use.</p>



<ul class="wp-block-list"><li>Service Configuration Management</li></ul>



<p>Here the purpose is to ensure that accurate and reliable information about the configuration of services, and the CIs that support them, is available when and where it is needed. Where <strong><em>configuration item</em></strong> (CI) is any component that needs to be managed in order to deliver an IT service (ex:server, desktop etc).</p>



<p> <strong>NOTE<em> :</em></strong> <em>The following practices are mentioned for awareness only and will not be part of the test<strong>.</strong></em></p>



<ul class="wp-block-list"><li>Availability Management &#8211; This ensures services deliver agreed levels of availability to meet the needs of customers and users.</li><li>Business Analysis &#8211; This helps to analyze a business or some element of the business, to define its needs and recommend solutions to address those needs, or to solve a problem. This helps to create value.</li><li>Capacity and Performance Management &#8211; This ensures services achieve agreed upon and expected performance, satisfying current and future demand in a cost effective way.</li><li>Service Catalog Management &#8211; This provides a single source of consistent information on all services and service offerings, and ensures that it is available to the relevant audience. The idea of service catalog management is to tell people what is coming, what is to be taken away and what is currently available.</li><li>Service Continuity Management &#8211; This ensures that the availability and performance of a service is maintained at a sufficient level in the event of a disaster.</li><li>Service Design &#8211; This is about the practice of designing products and services that are fit for purpose, fit for use, and that can be delivered by the organization and its ecosystem.</li><li>Service Validation and Testing &#8211; This ensures that new or changed products and services meet defined requirements.</li></ul>



<h4 class="wp-block-heading">Technical Management Practices</h4>



<p>These have been adapted from technology management domains for service management purposes by expanding or shifting their focus from technology solutions to IT services. In ITIL 4 there are only 3 technology management solutions covered.</p>



<ul class="wp-block-list"><li>Deployment Management</li></ul>



<p>The purpose is to move new or changed hardware, software, documentation, processes or any other components to live environments. In ITIL 4, release and deployment management are two different things. Release is more about approvals, while deployment is about moving change to the live environment.</p>



<p><strong>NOTE<em> :</em></strong> <em>The following practices are mentioned for awareness only and will not be part of the test<strong>.</strong></em></p>



<ul class="wp-block-list"><li>Infrastructure and Platform Management &#8211; This is responsible for overseeing the infrastructure and platforms used by an organization. Normally, this is people who are inside your Network/Security OC.</li><li>Software Development and Management &#8211; This ensures that application meets internal and external stakeholder needs, in terms of functionality, reliability, maintainability, compliance and auditability.</li></ul>



<p><strong>Further Reading :</strong></p>



<ul class="wp-block-list"><li> <a href="https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/">Understanding Data Center and Service Desk Operations</a></li><li> <a href="https://sampathblogs.online/2020/05/itsm-and-system-management-tools-a-basic-guide/">ITSM and System Management Tools : A Basic Guide</a></li><li> <a href="https://sampathblogs.online/2018/12/enterprise-it-infrastructure-support/">Enterprise IT Infrastructure &amp; Support</a></li><li> <a href="https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/">Towards Human Error Zero through KY</a></li><li> <a href="https://sampathblogs.online/2018/04/lean-and-six-sigma-in-short/">Lean and Six Sigma in brief</a></li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2021/03/itil-4-foundation-getting-started-guide/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Japanese Workplace Etiquette</title>
		<link>https://sampathblogs.online/2018/06/japanese-workplace-etiquette/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=japanese-workplace-etiquette</link>
					<comments>https://sampathblogs.online/2018/06/japanese-workplace-etiquette/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Mon, 25 Jun 2018 06:26:55 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Functional]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=315</guid>

					<description><![CDATA[Necessity of Business Manners Business manner is the basic necessity in-order to work smoothly in a society or a workplace environment. So if the foundation of business manner is strong, trust with others can be built easily leading to a... <a class="more-link" href="https://sampathblogs.online/2018/06/japanese-workplace-etiquette/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>Necessity of Business Manners</h3>
<p>Business manner is the basic necessity in-order to work smoothly in a society or a workplace environment. So if the foundation of business manner is strong, trust with others can be built easily leading to a good workplace environment. If a person is highly skilled it doesn&#8217;t mean that he/she will be assigned a job or project immediately, only after the foundation of trust is built he will be assigned a proper job. The trust factor here comes from a proper display of business manner which is based on the human skills like pro-activeness, judgemental power and expressiveness. The main thing expected out of a person in the business world is maintaining good people relations which is dependent upon the expressiveness of the person ,i.e, proper judgement of situations and proactively reacting to it.</p>
<p>So, in Japan a person who has gained the trust and has sufficient skill set will be called a true professional or a capable business man.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1323 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/manners1.jpg" alt="" width="519" height="287" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/manners1.jpg 519w, https://sampathblogs.online/wp-content/uploads/2020/01/manners1-300x166.jpg 300w" sizes="auto, (max-width: 519px) 100vw, 519px" /></p>
<h3>Important requirements for a working professional</h3>
<h4><strong>Relationship</strong></h4>
<p>Good relationships start with good people skills,i.e, how well you collaborate, communicate and deal with conflict.<br />
There are several characteristics that make up good, healthy working relationship:</p>
<p><strong>・Trust</strong><br />
This is the foundation of every good relationship. When you trust your team and colleagues, you form a powerful bond that helps you to work and communicate more effectively. If you trust the people you work with, you can be open and honest in your thoughts and actions, and you don&#8217;t have to waste time and energy &#8220;watching your back.&#8221;</p>
<p><strong>・Mutual Respect</strong><br />
When you respect the people who you work with, you value their input and ideas, and they value yours. Working together, you can develop solutions based on your collective insight, wisdom and creativity.</p>
<p><strong>・Mindfulness</strong><br />
This means taking responsibility for your words and actions. Those who are mindful are careful and attend to what they say, and they don&#8217;t let their own negative emotions impact the people around them.</p>
<p><strong>・Open Communication</strong><br />
We communicate all day, whether we&#8217;re sending emails and IMs, or meeting face to face. The better and more effectively you communicate with those around you, the richer your relationships will be. All good relationships depend on open, honest communication.</p>
<p>Understanding Business manner is about knowing the &#8216;activity model&#8217; of social ethics or people relationship. Here, one needs to identify the morals and associated people relations with one&#8217;s heart. It is most important to connect the heart with human relationships which forms the core of business manner understanding. The word heart refers to concern and consideration.</p>
<p>Find below a couple of examples related to right attitude w.r.t human relationship and applying heart w.r.t human relationship:</p>
<p>1) No matter how close a person is to his colleague or senior at workplace, he needs to behave with the basic workplace etiquette in mind.<br />
2) A newly appointed manager regarding whom there is negative feedback from various sources, should not be dealt with based one others feedback but with one&#8217;s viewpoint.</p>
<h4><strong>Manner</strong></h4>
<p>This is one of the basics of good business manner. To be considerate and have concern towards your subordinates and superiors. When this thoughtful behavior reverberates in your coworker&#8217;s heart it leads to smooth interactions and a pleasant working environment.Also the considerate nature always reflects in one&#8217;s bowing posture,business card exchange or in other behavioral attitude towards a client. So we can conclude that, when considerate nature reflects in a form or posture we have business manner put into practice.</p>
<p>Find below few examples of various instances which can be referred to as basic skills or core values of business manners in Japan:</p>
<p><strong>・Greeting Manners</strong></p>
<ul>
<li>Greeting everyone with a loud voice in the mornings when one enters the office.</li>
<li>When leaving office in the evening one needs to wish the senior who is still working.</li>
</ul>
<p><strong>・Posture Manners</strong><br />
The three basic postures are shown in the figure below:</p>
<ol>
<li><em>Eshaku</em> &#8211; The body is bent 15 degrees in this posture and used to greet a subordinate or senior in the office in the morning and evening. Also can be 　a used as a casual way of greeting anyone at office in a day.</li>
<li><em>Keirei</em> &#8211; The best situation to use this posture of bending the body 30 degrees is after introducing ourselves during customer visits.</li>
<li><em>Sai-keirei</em> &#8211; The best case of using this posture of bending the body 45 degrees is while seeing off the customers which expresses gratitude.</li>
</ol>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1297 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/greet1.jpg" alt="" width="755" height="365" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/greet1.jpg 755w, https://sampathblogs.online/wp-content/uploads/2020/01/greet1-300x145.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/greet1-600x290.jpg 600w" sizes="auto, (max-width: 755px) 100vw, 755px" /></p>
<p><strong>・Manners when going out on a client Visit</strong></p>
<ul>
<li>The appointment date and time should be prioritized as per client need.</li>
<li>When client enters the meeting room, one needs to getup from one&#8217;s seat and greet. Later on introduce self(in case of first meeting) and hand over   the business card followed by the Keirei posture.In case of receiving the business card as well the same flow should be followed ending with the Sai-keirei posture which shows deep gratitude towards the client.</li>
</ul>
<p><strong>・Manners when client visits us</strong></p>
<ul>
<li>In case of guiding client inside an elevator, one needs to enter first and press the open button and destination floor button and guide the client inside. However in cases wherein there are people already inside the elevator, one needs to hold the door with one hand and guide the client inside first and later enter. While getting off the elevator one needs to press the open button and guide the client outside first and later move out of the elevator.</li>
<li>It is a good practice to knock the door of meeting room before entering. Also in case of door which opens on the inside of the room one needs to enter first and invite the clients inside. However in case of door which opens outside, one needs to hold the door and show the client inside first and later enter the room.</li>
</ul>
<p><strong>・Seating Manners</strong><br />
Seating manners are also too important in Japanese business. Refer to the various instances as displayed in the below figure.</p>
<p>The Senior most person will be given the seat farthest from the door in a meeting room while the junior most will be seated near to the door. In case of a taxi, senior most employee will be given the seat behind the driver while the junior most employee will be seated on the passenger seat next to the driver. In a train or aeroplane, senior most person will be given the seat next to the window in the direction of motion. Finally the position in a elevator will be behind the junior most person who will operate the panel. The 1,2,3,4,5 numbers in the below picture refer to the employees from the senior most to the junior most position in the order.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1363 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/seating.jpg" alt="" width="819" height="519" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/seating.jpg 819w, https://sampathblogs.online/wp-content/uploads/2020/01/seating-300x190.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/seating-768x487.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/seating-600x380.jpg 600w" sizes="auto, (max-width: 819px) 100vw, 819px" /></p>
<h4><strong>Communication style</strong></h4>
<p>All good relationships are dependent on how much we respect the other person&#8217;s thinking or values and his position. This considerate nature is the starting step in building a satisfactory communication.Lets get to know more about the considerate nature communication style used to connect with people.</p>
<h5><strong>Understanding the connection between communication style and relationships</strong></h5>
<p>&#8220;To make or mar depends on the telling&#8221; is the translation of a famous Japanese proverb. This simply means that, people may or may not get offended by the way you speak and mentioning &#8220;i didn&#8217;t mean that&#8221; might be too late to say once one is offended. However, if one is considerate and gentle towards others feelings even the unsaid things can be understood leading to a communication style which touches the other person&#8217;s heart. This considerate nature improves people relationships resulting in strong bonds and high efficiency within teams at workplace.</p>
<ul>
<li>Points to be taken care of when listening to others<br />
1) Make agreeable responses in order to make the person feel at ease<br />
2) Look the person in eye while making the agreeable response<br />
3) Listen to the person till the end of his conversation without interrupting</li>
<li>Points to be taken care of when talking to others<br />
1) Use respectful words as much as possible even while speaking to a colleague or coworker<br />
2) When asked about a topic which one is not well versed about, avoid creating false impressions and convey your true knowledge<br />
3) Do not deny a person&#8217;s opinion outright.</li>
</ul>
<h5><strong>Knowledge of the basic Keigo/ Honorifics</strong></h5>
<p>Keigo is the verbal expression of one&#8217;s respect towards the other person&#8217;s position or standpoint. We can say that keigo is the basic human skill required because incase our respect towards a person doesn&#8217;t match in words there is an imbalance which needs to be addressed to with high priority. There are some rules to use the Keigo which we will learn in this section.</p>
<p>Keigo consists of following types, which uses different expressions for different situations;</p>
<ol>
<li>Honorific language (Sonkeigo)<br />
Sonkeigo, or the respectful form, is used to show respect to someone of higher position. This can be somebody in the same company of higher rank or a client for example.</li>
<li>Humble language (Kenjougo)<br />
When referring to him or herself in business, the Japanese will use a form called Kenjougo.The form essentially tries to show respect by deliberately referring to oneself lower than the listener (who typically are of higher rank or position).</li>
<li>Polite language (Teineigo)<br />
Teineigo is perhaps the easiest and the most commonly used by everybody (including native Japanese speakers). This is because the Teineigo is usually the first form of Keigo that is taught to students learning the Japanese language.</li>
</ol>
<p>Below picture gives a pictorial representation of the above forms;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1314 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/keigo.jpg" alt="" width="264" height="321" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/keigo.jpg 264w, https://sampathblogs.online/wp-content/uploads/2020/01/keigo-247x300.jpg 247w" sizes="auto, (max-width: 264px) 100vw, 264px" /></p>
<p>Refer below the Keigo list of various verbs;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1315 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/keigolist.jpg" alt="" width="814" height="474" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/keigolist.jpg 814w, https://sampathblogs.online/wp-content/uploads/2020/01/keigolist-300x175.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/keigolist-768x447.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/keigolist-600x349.jpg 600w" sizes="auto, (max-width: 814px) 100vw, 814px" /></p>
<h5><strong>Basic knowledge of situation based communication style</strong></h5>
<p>A true professional or a capable business person chooses different communication style for situations like reporting or explanation, requests, trouble resolution etc. The main motive here is the same as point number one above ,i.e, relating communication style to relationships. Planning of communication techniques based on positive response from the audience in-order to develop good relationships.</p>
<p><strong>・Reporting</strong><br />
The purpose of reporting is to provide information. There are various types here like business reporting, management reporting, office reporting etc. The basic idea in all the reporting types is to communicate the information as it is in a simple and understandable way. The main point here is to start from the conclusion or summary and elaborate on that thereby giving priority to the superior&#8217;s time. This is the true quality of a considerate business person.</p>
<p><strong>・Explanation</strong><br />
The purpose of explanation is to make the audience understand your point. Instances like explanation of new features of a product to the customer, explaining one&#8217;s point of view in a meeting, explaining the work procedure to one&#8217;s team etc are a few cases which requires explanation from a business perspective. The important thing here is to use simple words and be specific so that the other party can understand your viewpoint easily.</p>
<p><strong>・Requesting</strong><br />
Where every one in the team is involved in their routine work, in addition to that if we need cooperation from the team on another task at hand we need to make a request. The way to request is, first ask about the status of the current work and express one&#8217;s understanding regarding the same.On top of that explain about the new task on hand and check the team&#8217;s co-operation on get involved.So the gist is to first understand the other person&#8217;s current status and get a frank reply regarding cooperation on the new task at hand. This is the way to make a request in-order for the other party to get involved wholeheartedly.</p>
<p><strong>・Grievance Redressal</strong><br />
Whenever there are claims or complaints from the clients, first thing is to accept it and take the responsibility. The next important thing is to rebuild the confidence of one&#8217;s organization by wiping off the distrust factor. This is the main purpose behind grievance redressal. In most of the cases whenever there is a complaint we can see people replying as &#8220;not a problem with our product&#8221; or put the blame on handling the product etc. Here the first thing is to apologize followed by expression of gratitude towards instructions from the customer. By this way of communication we are trying to rebuild the confidence of customer w.r.t our company.</p>
<h5><strong>Socializing activities</strong></h5>
<p>Of the many socializing activities of a business person in Japan greeting colleagues and customers during end and start of the year, wining and dining with the customers, sending gifts to seniors to express gratitude, thanking a person who was of help are some of the instances during which consideration towards the other person are expressed.</p>
<p>The socializing activities mentioned here are w.r.t to work or business. Hence the person representing the company will be required to show a dignified behavior or business manner. The polite greeting towards the end or start of the year, hospitality shown through corporate entertainment, the gratitude shown by sending summer gifts(chuugen) or winter gifts(seibo) to seniors, the words of concern expressed during visit to a sick coworker or client are all dignified ways of showing one&#8217;s heartfelt considerate nature.</p>
<h4><strong>Other necessary skills</strong></h4>
<h5><strong>Information handling</strong></h5>
<p>Information gathering, organizing and communicating form the main components of business information cycle. Information here comprises of vital data which may be used for business related activities. The motto of information handling is to have fast access to precise information.</p>
<p>Though clients are the main source of information, we have occasions like business get together parties and pan-industry social events wherein important information can be gathered w.r.t to new business etc. The business manner to be displayed here is to listen patiently to the person providing information in-order to extract the precise information which we want.</p>
<p>The main intention behind organizing information is easy and quick access when needed. Information like business cards, sales or development documents etc are vital data relating to business, when handled properly is a proof that one is seriously involved in one&#8217;s work. Also the information managed by us should not be limited to us but must be actively utilized by all concerned in-order to maximize the gains. So organizing of information is vital.</p>
<p>Communicating the actual information in a proper way is of prime importance. The information provided here should be of value to the customer as well. Hence the routine gathering and organizing of information is vital to sharing the needed information to the customer. Also the information limited to us will be of little value when compared to information shared within the team thereby increasing the efficiency of the team. Information like business related documents, problem points etc can be of real help to anyone in the team.</p>
<h5><strong>Document management</strong></h5>
<p>It is common at workplace to communicate information in writing when the same can be done through a call like an order or notice. The reason behind this can be thought of as to keep a record of transactions, to communicate the point precisely, to communicate the information to multiple people at a time etc.</p>
<p>Communication in writing,i.e, documentation can be broadly divided into internal and external documents.The internal documentation or the document circulated within the company should prioritize on the efficiency aspect rather than politeness. Whereas an external document to be sent to a client should follow a specific format and must consist of polite words. Here we are following a writing format which keeps the recipient in high esteem.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1307 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/intdoc.jpg" alt="" width="735" height="476" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/intdoc.jpg 735w, https://sampathblogs.online/wp-content/uploads/2020/01/intdoc-300x194.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/intdoc-600x389.jpg 600w" sizes="auto, (max-width: 735px) 100vw, 735px" /></p>
<p>The format above shows the layout of an internal document like a notice and the below format picture depicts an external document like a letter sent to a client.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1290 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1.jpg" alt="" width="700" height="385" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1.jpg 700w, https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1-300x165.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/extdoc1-600x330.jpg 600w" sizes="auto, (max-width: 700px) 100vw, 700px" /></p>
<p>One more section which falls under this section of necessary skill is meetings, regarding which we had discussed earlier in the situation based communication style and seating manners part.</p>
<p>To sum it up, i have tried my maximum to write in simple words regarding workplace practices expected out of a professional in Japan. I hope you find it useful!</p>
<p><strong><em>Sources : </em></strong><br />
ビジナス実務マナー検定 受験ガイド<em>(Business Practice Manner Test Guidebook), Work Experience</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/06/japanese-workplace-etiquette/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Towards Human Error Zero through KY</title>
		<link>https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=towards-human-error-zero-through-ky</link>
					<comments>https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 25 May 2018 01:11:21 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=181</guid>

					<description><![CDATA[Purpose The most common cause of workplace accidents or industrial accidents is often attributed to human error such as operational error, judgmental error, and job-related error, all of which are caused by human characteristics. Human behavioral characteristics, such as mistakes... <a class="more-link" href="https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>Purpose</h3>
<p>The most common cause of workplace accidents or industrial accidents is often attributed to human error such as operational error, judgmental error, and job-related error, all of which are caused by human characteristics. Human behavioral characteristics, such as mistakes and carelessness, are called “human characteristics,” and errors caused by human characteristics are called “human errors.”One more major effect of human error is that it leads to interruption of services to customer, resulting in loss of trust and/or compensation for damages.</p>
<p>Work is always accompanied by issues related to human error, and unsafe behavior accounts for about 90% of all accidents, including those caused by inexperienced and unskilled workers.Most of the human errors are said to be associated with psychological factors affecting human behavior like carelessness and assumption based work.</p>
<p>Specific safety methods were developed so that workplaces can take steps on preemptive action for safety which includes hazard prediction training and pointing and calling. Activities incorporating these methods in a unified manner are called hazard prediction activities and will result in improved customer satisfaction.</p>
<p>Below points need to be kept in mind while doing any work;<br />
<strong>• </strong>Take appropriate measures beforehand in order to counter risk after identification.<br />
<strong>• </strong>Recheck at each of the important stages of work.<br />
<strong>• </strong>Do the things that are obvious and need to be done.<br />
<strong>• </strong>Human error reduction through Team work and communication.</p>
<h3>Human Error and Hiyari Hatto</h3>
<p><em>Human Error</em> : An inappropriate or undesirable human behavior or decision that reduces, or has the potential for reducing, effectiveness, safety, or system performance resulting in trouble, accident or escalations.</p>
<p>Undesirable or inappropriate human behavior can be anything concerned with human nature like misjudgement, mishearing, verbal slip-up, misunderstand, carelessness. Even risk taking factors like rule violation wherein difficulty to abide, probability that it is ok to violate as others are doing can also be categorized as inappropriate behavior.</p>
<p><em>Hiyari Hatto (HH)</em> : An inappropriate or undesirable human behavior or decision that reduces, or has the potential for reducing, effectiveness, safety, or system performance but didn&#8217;t result in trouble, accident or escalations.</p>
<p>Hiyari Hatto is a Japanese term. It means Experience of Almost Accident situation. Hiyari Hatto (HH) is a System to<br />
<strong>• </strong>Identify the possible danger through Team members experience<br />
<strong>• </strong>Develop the countermeasure utilizing their expertise and<br />
<strong>• </strong>Implement the same in consultation with Team members supervisor</p>
<p>It is a pro-active exercise but not post mortem after accident.</p>
<h3>What is HEZ Activity/Campaign</h3>
<p>Each and every individual human being is irreplaceable. The HEZ(Human Error Zero) Campaign aims for zero accidents in the workplace resulting in increased customer satisfaction.The Campaign builds on the <strong>three principles</strong> of zero accidents, preemptive action, and participation to implement the <strong>KY activity</strong> in order to <strong>prevent human errors</strong> and bring about increased customer satisfaction.</p>
<p><strong>The three principles</strong></p>
<p>The following are the three basic principles.</p>
<p><em>The principle of zero accidents</em><br />
“Zero accidents” means to achieve an accident free workplace (not only no fatal accidents or accidents causing absent from work, but also no accidents, including industrial accidents, occupational illness, or other accidents) by detecting, understanding, and solving all hazards (problems) in everybody’s daily life as well as potential hazards existing in workplaces and work and should be implemented 100%.</p>
<p><em>The principle of preemptive action</em><br />
“Preemptive action” means to prevent all accidents and industrial accidents by detecting, understanding, and solving all hazards (problems) in everybody’s daily life as well as potential hazards existing in workplaces and work in order to create a brighter and more vigorous workplace with zero accidents and zero diseases as an ultimate goal.</p>
<p>Here the basic understanding is that, counter measures need to be developed for hiyari hatto which may lead to accidents or trouble. On the other hand, unsafe actions which may lead to hiyari hatto should also be identified beforehand and appropriate counter measures be taken. Also in situation where accident has happened already, the causes need to be found out in order to avoid re-occurrence.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1301 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/hiyari.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/hiyari.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/hiyari-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/hiyari-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/hiyari-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" /></p>
<p>As per Heinrich&#8217;s findings for every accident that causes a major injury, there are 29 accidents that cause minor injuries and 300 accidents that cause no injuries or “near misses.” He felt that because accidents share many common root causes, addressing the commonplace accidents will help eliminate major injuries or fatalities down the road. Heinrich also believed from his findings that 85 to 95% of all workplace accidents stem from unsafe actions by individuals.</p>
<p><em>The principle of participation</em><br />
“Participation” means to make a concerted effort by managers, supervisors, staff, and workers to detect, understand, and solve potential hazards (problems) existing in workplaces and work. It requires the voluntary effort and commitment of all those involved in actions for problem-solving.</p>
<p><strong>Hazard Prediction Activity(KY Katsudo)</strong><br />
<em>*KY Katsudo (K: kiken (hazard), Y: yochi (prediction), Katsudo: Activity)</em></p>
<p>Hazard Prediction(KY) Activity is a brainstorming drill to discuss, mutually consider and understand all potential human error factors in advance. The potential human errors can rise out of human trait like carelessness (misjudgement, mishearing etc) and risk taking activities like rule violation(follow the crowd, assumption based work etc). The purpose of KY activity is to detect possible human errors beforehand or even in the case of human error should not result in affecting customer services. This activity is used in the promotion of HEZ campaign.</p>
<p>Here you can find a sample of KY Activity chart used during the brainstorming drill, just before start of work.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1317 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/KYT.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/KYT.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/KYT-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/KYT-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/KYT-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" /></p>
<p><strong>HE Preventive Measures</strong></p>
<p>In order to tackle accidents caused by human error the following three preventive measures must be ensured:</p>
<p><em>Hardware (equipment, facilities, and other tools)</em><br />
It is important to push ahead with safety and health measures in terms of Fail Safe or Fool Proof hardware (facilities, machinery, working environment, and raw materials) for the prevention of accidents caused by human error.</p>
<p><em>Software (human beings as well as hardware)</em><br />
In addition to the above measures, it is necessary to improve the working environment including the relationship between workers and hardware as well as work from the perspective of a man-machine system. Here necessary procedure document should be created with checklist sections for the creation, implementation and confirm operations. An environment wherein 4S is implemented would be the best.</p>
<p><em>Humanware</em><br />
Humanware incorporates the safety and health management of both hardware and software. Effective humanware hazard prediction activities incorporate countermeasures against human error and include the Health KY, the hazard prediction training (KYT), pointing and calling and the Hiyari hatto.</p>
<p>All the three,i.e., Hardware, Software and Humanware countermeasure put together will result in achieving the goals of HEZ campaign.</p>
<h3>HEZ Activity in detail</h3>
<p>Here i will take you through the specific actions which must be performed in-order to create a Human Error Zero environment.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1299 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/HEZgoal-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" />(1) HEZ training to all the employees of a company</p>
<p>Appropriate HEZ training to all the employees at different levels of a company needs to be provided. This can go a great way in creating awareness and reduce the Human error at work and eventually make it reach the ideal zero figure.</p>
<p>(2) Strict adherence to the code of conduct at work</p>
<p>While any work is done with the elementary action items being put into practice, the must be adhered to rules should be kept in mind and is known as the code of conduct at work. In any organization, the code of conduct will be released and distributed as either a booklet or a card along with a briefing session regarding the same. The code of conduct document will contain the code of conduct items, concrete examples relating to code of conduct and the definition of terminologies.</p>
<p>The elementary action items are nothing but the consolidated number items of any organization based on the past occurrences of operation error or accidents and is the compilation of preventive measures with respect to the same. A few of the elementary action items are KY drill before start of work, work to be executed as per the procedure document, pointing and calling at each of the important points, contact concerned authority in case of ambiguity or insecurity or abnormality after stopping the work etc.,</p>
<p>(3) Hiyari Hatto activity</p>
<p>In order to target zero HE, the potential accident causing condition should be grasped in advance and procedure should be established to report as many as such cases to the management as possible. Also let&#8217;s ensure that countermeasures are taken to all HH in-order to make work place safer, pleasant and easy to work. The below flow chart shows a sample pictorial representation of the HH activity work flow.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1300 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/HHflow.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/HHflow.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/HHflow-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/HHflow-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/HHflow-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" />(4) Pointing and Calling in every day activity</p>
<p>This activity involves pointing at target objects by stretching your arm and stating out loud, “Such and such is OK” at important points in the work in order to proceed with work safely and correctly. Pointing and calling are methods for raising the consciousness level of workers and confirming that conditions are regular and clear, increasing the accuracy and safety of work.By raising the consciousness level, accidents resulting out of human characteristics of carelessness like misjudgement, mishearing etc., can be avoided.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1347 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/pnc.jpg" alt="" width="791" height="498" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/pnc.jpg 791w, https://sampathblogs.online/wp-content/uploads/2020/01/pnc-300x189.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/pnc-768x484.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/pnc-600x378.jpg 600w" sizes="auto, (max-width: 791px) 100vw, 791px" /></p>
<p>A few illustrations of the pointing and calling are as follows;<br />
Eg 1) email address confirmation before sending a email &#8211; abc@xyz.com address Yoshi!<br />
Eg 2) Cabinet confirmation before leaving your work desk at break time &#8211; 1/2/3 desk cabinet/s locked Yoshi!<br />
Eg 3) Tidiness confirmation after finishing work at the end of day &#8211; clear desk Yoshi!<br />
Eg 4) Avoiding forgetfulness before moving out &#8211;  possess a/b/c Yoshi!</p>
<p>The results of proof testing conducted by the Railway Technical Research Institute in 1994 showed that the rate of work-related errors decreased to less than one-sixth when conducting pointing and calling as compared with doing nothing.</p>
<p>(5) Hazard Prediction Training(KYT) at workplace</p>
<p>Hazard prediction training called &#8221; Kiken-Yochi Training &#8221; (KYT) in Japanese can be defined as a role-play based training method, in which staff members first observe photos/videos or illustrations of everyday scenes in a workplace, and then those scenes are discussed within a group for detection of potential hazards, countermeasures against hazardous issues , and, finally, slogans or messages are created and directed at risk avoidance (ensuring of safety). It was invented in 1974 in Japan for prevention of occupational accidents, and, since the late 1970s, has spread from the manufacturing industry to the entire industrial world. A systematic review reported that KYT reduced the occupational accident rate significantly. Thereafter, KYT was introduced into safety education programs across industries, leading to a significant reduction in accidents.</p>
<p>The KYT Basic 4-Round Method forms the foundation for this activity. Participants openly discuss the hidden hazards depicted in the illustrations of the workplace and work conditions and solve problems by proceeding through the four rounds step by step.</p>
<p>Round 1: What are the hidden hazards? (Understanding the actual situation)<br />
Round 2: These are the danger points. (Investigating the reality)<br />
Round 3: What would you do? (Establishing countermeasures)<br />
Round 4: These are the danger points. (Setting targets)</p>
<p>The KYT method increases the motivation of workers to practice in teams. It uses meetings to sharpen awareness of what constitutes danger. Workers share information on hazards and improve their problem solving capabilities by working on finding solutions in meetings. And they improve their powers of concentration by practicing pointing and calling activities in all of the important points in the work.</p>
<p>In order to maintain long term consistency in the implementation of KYT learnings, the following points should be kept in mind and executed during everyday activities.<br />
1) Sensitivity towards the hazard points<br />
2) Rise the concentration level through pointing and calling<br />
3) Improve problem resolution through KY activity<br />
4) Fire up the motivation through KY activity<br />
5) Display teamwork in detection, understanding and resolution of problems during KY activity<br />
6) Think the problems as your own</p>
<p>(6) Morning and Evening Assembly</p>
<p>In order to perform any task safely and avoid human errors one more important component would be to actively take part in the morning and evening assembly sessions. Other than being an integral part for the execution of everyday activities, here we can find various teams sharing their experiences which may include accident reporting, hiyari hatto incidents, new learnings etc. and thus serves as a place for self development.</p>
<p>KY cycle is a structure wherein Health and safety is integrated as part of everyday activities which includes the morning and evening assembly sessions. Here we can find the various safety techniques included in every work performed as well. Each KY cycle is divided into 3 parts ,i.e, safety measures taken before work, while doing work and after work activities and promotion of human error zero activity is done.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1316 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1.jpg" alt="" width="1582" height="649" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1.jpg 1582w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-300x123.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-1024x420.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-768x315.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-1536x630.jpg 1536w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-945x388.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/kycycle1-600x246.jpg 600w" sizes="auto, (max-width: 1582px) 100vw, 1582px" /></p>
<p>The above picture gives you the description of KY cycle of every day work and relates to every work performed in a day.</p>
<p>(7) Repetition &amp; Reporting</p>
<p>Sometimes the output of our work may differ from the instructions received which was not cross checked. Also there may be times when we may have been asked about the status of work which was not reported. These two are instances wherein the repetition of the instruction received in the former case and reporting of the work status in the latter case are not adhered to.</p>
<p>Repetition(Before start of work)<br />
This is a way of making sure the instruction is received correctly by repeating the instruction contents loudly. So we can get started with the work avoiding any potential human errors with respect to receiving instructions.</p>
<p>Reporting(After work)<br />
This is a way to inform about the progress of work with respect to the instruction received. By this was both the receiving and instructing side can fell safe about the proper progress or completion of work.</p>
<p>(8) 4S(seiri, seiton, seiso, seiketsu)</p>
<p>4S is a workplace organization method abbreviated from the Japanese words seri for &#8220;Sort&#8221;, seiton for &#8220;Set in order&#8221;, seiso for &#8220;Systematic cleaning&#8221; and seiketsu for &#8220;Standardize&#8221;. Organizing the workplace leads to a safe and healthy environment.</p>
<p>• Sorting &#8212; separating the needed from the unneeded. Sorting activities aim to eliminate unneeded items from the work area and to perform an initial cleaning.</p>
<p>• Set in order &#8212; a place for everything and everything in its place, clean and ready for use. Simplifying arranges the workplace to ensure safety and efficiency.</p>
<p>• Systematic Cleaning &#8212; cleaning for inspection. Systematic daily cleaning and inspection of work areas and equipment help you understand current conditions and determine if corrective action is required.</p>
<p>• Standardize &#8212; developing common methods for consistency. Standardizing assures that everyone knows what is expected .It aims to make abnormal conditions noticeable and to document agreements to ensure consistency and sustainability.</p>
<h3>The 3 main pillars of the HEZ activity</h3>
<p>Implementation of the HEZ Campaign requires three important pillars: the positive attitude of the top management, the complete management of the safety and health system by line managers and supervisors, and the promotion of voluntary activities in the workplace. The HEZ Campaign depends on the mutual relationships and assistance of these three pillars.</p>
<p>1) The positive attitude of the top management<br />
The starting point of safety and health activity is a tough attitude held by top management towards zero accidents and zero diseases.The campaign starts with a determined commitment by the senior management to respect every single worker and ensure no injuries.</p>
<p>2) The complete management of the safety and health system by line managers and supervisors<br />
In order to promote safety and health in the workplace, it is essential for line managers and supervisors to lead by example by integrating safety and health activities into day-to-day work, making safety and health part of the line management.</p>
<p>3) The activation of voluntary activities in the workplace<br />
Human error plays a part in most workplace accidents, and each and every employee needs to be fully aware that responsibility cannot be shifted to others. Employees must engage in small group activities for zero accidents with the awareness that their existence is irreplaceable for their families and dependents and safety and health is their own and their co-worker&#8217;s own problem.</p>
<h4>Conclusion</h4>
<p>The philosophy of the HEZ Activity is to respect human life. Specific safety methods are developed so that workplaces can take steps on preemptive action for safety. Activities incorporating these methods in a unified manner are called hazard prediction(KY) activities. As the system is operated by human beings, so, to make it function properly, it requires the motivation and enthusiasm of all of the people involved in it, namely the top management, the line managers, and the team members.</p>
<p><strong><em>Sources:</em></strong><br />
危険予知訓練<em>(KY Training), experience</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/towards-human-error-zero-through-ky/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>International Organization for Standardization(ISO) : Must know basics</title>
		<link>https://sampathblogs.online/2018/05/iso/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iso</link>
					<comments>https://sampathblogs.online/2018/05/iso/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 18 May 2018 01:48:23 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=279</guid>

					<description><![CDATA[What is ISO ISO refers to International Organization for Standardization. It is headquartered in Geneva, Switzerland and is a non-governmental organization. A total of 163 countries are affiliated with the organization. In order to smoothen international transactions with respect to... <a class="more-link" href="https://sampathblogs.online/2018/05/iso/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h3>What is ISO</h3>
<p>ISO refers to International Organization for Standardization. It is headquartered in Geneva, Switzerland and is a non-governmental organization. A total of 163 countries are affiliated with the organization. In order to smoothen international transactions with respect to any product or service, concerned authorities from different countries come together to define a set of standards so that same quality and level of a deliverable can be maintained anywhere in the world.</p>
<p>The ISO membership is one organization per country. Majority of the ISO members are a part of the country’s government organization or have been entrusted the responsibility by the government organization of a country.<br />
There are three types of membership types with different privileges as follows;</p>
<p>• <em>Regular Member</em> – Has all the privileges starting from participating in development of standards, taking part in policy making, selling publications and ISO standards with copyrights or with ISO title and logo and finally to be part of the ISO management group. Most of the countries in the world are regular members.</p>
<p>• <em>Correspondence Member</em> – Has all the privileges except, being part of the ISO management group, which is not allowed. A few countries are with this kind of membership.</p>
<p>• <em>Paid Member</em> – Has the privilege for only taking part in the development of standards. As few as three to four countries in the world are with this kind of membership.</p>
<p>The standard organizations is Japan are JISC(Japan Industrial Standards Committee), JAB(Japan Accreditation Board) etc., based on the type of businesses and represent Japan at the ISO. The websites of <a href="http://www.jisc.go.jp/">JIS</a> and <a href="https://www.jab.or.jp/">JAB</a> provide a detailed information on the various standards released by the respective organizations.</p>
<h4>Development of Standards</h4>
<p>There are 5 stages in the development of standards;</p>
<p>• <em>Working Draft(WD) development</em> – Vague idea suggested by different groups about a standard to be developed.</p>
<p>• <em>Committee Draft(CD) development</em> – The working draft will be analyzed further by a committee to check for the acceptability world over.</p>
<p>• <em>Draft International Standard(DIS) development and circulation</em>– Once the draft reaches this stage we have a draft standard which can be circulated with other member countries for voting during which suggestions and other feedbacks can be expected and appropriate updations are done. This process usually takes a long time period of one to two years depending upon the completeness of the draft. The ‘OK’ vote should be received from all the participating countries to arrive at the final draft.</p>
<p>• <em>Final Draft International Standard(FDIS) circulation</em>– The <em>DIS</em> will be circulated with all the participating countries for a final confirmation and review before the release.</p>
<p>• <em>Release of International Standard</em> – With the approval of the <em>FDIS</em> by the participating countries, the International Standard with be released.</p>
<p>The ISO can be classified into the following two categories mainly;</p>
<p>1) Standards applicable to objects (pictorial symbols, dimensions)<br />
A few examples are as follows;<br />
ISO 7010/JIS 8210     Emergency exit symbol(Japan design used world over)<br />
ISO/IEC 7810               Card sizes<br />
ISO 68                           Nut size etc.,</p>
<p>2) Standards applicable to management systems<br />
A few examples are as follows;<br />
ISO 9001                      Quality Management System<br />
ISO 14001                    Environment Management System<br />
ISO 27001                    Information Security Management System etc.,</p>
<h3>Management System standards and certification</h3>
<p>A management system is the way in which an organization manages the inter-related parts of its business in order to achieve its objectives. These objectives can relate to a number of different topics, including product or service quality, operational efficiency, environmental performance, health and safety in the workplace and many more.</p>
<p>The level of complexity of the system will depend on each organization’s specific context. For some organizations, especially smaller ones, it may simply mean having strong leadership from the business owner, providing a clear definition of what is expected from each individual employee and how they contribute to the organization’s overall objectives, without the need for extensive documentation. More complex businesses operating, for example, in highly regulated sectors, may need extensive documentation and regulation in order to fulfil their legal obligations and meet their organizational objectives.</p>
<p>ISO management system standards (MSS) help organizations improve their performance by specifying repeatable steps that organizations consciously implement to achieve their goals and objectives, and to create an organizational culture that reflexively engages in a continuous cycle of self-evaluation, correction and improvement of operations and processes through heightened employee awareness and management leadership and commitment.</p>
<p>There are various management system standards based on industry types and businesses. The type of ISO standard to be implemented entirely depends upon the client requirements or internal risk reduction requirements of a company. Considering Japan in our study, the following three are the major ISO certification standard sought after by most of the companies in Japan.</p>
<p><strong>• ISO 9001</strong><br />
ISO 9001 sets out the criteria for a quality management system and is the only standard in the family that can be certified to (although this is not a requirement). It can be used by any organization, large or small, regardless of its field of activity.</p>
<p>This standard is based on a number of quality management principles including a strong customer focus, the motivation and implication of top management, the process approach and continual improvement. Using ISO 9001 helps ensure that customers get consistent, good quality products and services, which in turn brings many business benefits.</p>
<p><strong>• ISO 14001</strong><br />
ISO 14001 specifies the requirements for an environmental management system that an organization can use to enhance its environmental performance. ISO 14001 is intended for use by an organization seeking to manage its environmental responsibilities in a systematic manner that contributes to the environmental pillar of sustainability.</p>
<p>ISO 14001 is applicable to any organization, regardless of size, type and nature, and applies to the environmental aspects of its activities, products and services that the organization determines it can either control or influence considering a life cycle perspective. ISO 14001 does not state specific environmental performance criteria.</p>
<p><strong>• ISO/IEC 27001</strong><br />
ISO/IEC 27001 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.</p>
<p>The logos of the above three management systems certified by the JQA(Japan) are as follows;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1319 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/logos.jpg" alt="" width="1033" height="580" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/logos.jpg 1033w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-300x168.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-1024x575.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-768x431.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-945x531.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/logos-600x337.jpg 600w" sizes="auto, (max-width: 1033px) 100vw, 1033px" />The ISO management system standards (MSS) is revised once every five years. Though the time period specified is 5 years once, the update may happen based on convenience and state of affairs. For example in case of ISO 9001, the last update happened in 2015 and is named as ISO 9001 : 2015 version. The previous version to 2015 was ISO 9001 : 2008.</p>
<p>In case of an organization wishing to certify to a certain management system (For ex: ISO 14001), the readiness of an organization to the system will first be checked by the JQA(Japan Quality Association) organization. JQA is a body to provide testing and certification service for the various ISO standards as part of quality management system activity.Thus we can say that as JQA checks for the conformity to the various standards and provides the ceritifcation, they have to work in close co-ordination with the various Standards organizations like the JAB, JISC etc.,</p>
<p>The IAF or International Accreditation Forum develops a single worldwide program of conformity assessment which reduces risk for business and its customers by assuring them that accredited certificates may be relied upon. Accreditation assures users of the competence and impartiality of the body accredited. IAF members, i.e., the certifying bodies of member countries(JAB/JISC.. incase of Japan) or registration bodies issue certificates attesting that an organization&#8217;s management, products or personnel comply with ISO standard.</p>
<h3>Merits of ISO certification</h3>
<p>Certification can be a useful tool to add credibility, by demonstrating that your product or service meets the expectations of your customers. For some industries, certification is a legal or contractual requirement. The following points describe the actual merits behind ISO certification.,</p>
<p>1) To gain the trust of customers<br />
In order to demonstrate that a product exported to foreign countries or sold in the domestic market meets a certain level of quality, is safe to the environment and maintains the confidentiality of user data, a 3rd party certifying authority like the ISO is used as a tool.</p>
<p>2) Gaps or Problem identification from a 3rd Party perspective<br />
In case of audit done by an internal party, the seriousness compared to a certifying external body will not be there. So, when the audit is done by a 3rd party body like the ISO, issues or gaps unable to be identified or overlooked by the organization can be certainly expected. Also the auditing ISO personnel will be auditing from a customer’s position so issues unidentified from the customer viewpoint may be also found out.</p>
<p>3) Continuous improvement<br />
Organizations which get certified with the ISO Management System Standards, will have a review yearly once by the concerned ISO authorities. At the end of each yearly audit, the auditors suggest the organization improvement plans with respect to the problems identified. As a result of these continued yearly audits, continued improvement of the organization can be brought about.</p>
<p>The <a href="https://sampathblogs.online/2018/04/18/lean-and-six-sigma-in-short/">PDCA cycle</a> is the most used methodology to implement a continuous improvement system in a company or organization. The PDCA methodology describes the four essential steps that should be carried out systematically to achieve continuous improvement, defined as a continuous way to improve the quality of products and processes (decrease failures, increase effectiveness and efficiency, problem solving, avoid potential risks etc., ).</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1344 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy.jpg" alt="" width="1033" height="580" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy.jpg 1033w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-300x168.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-1024x575.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-768x431.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-945x531.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/pdca_cy-600x337.jpg 600w" sizes="auto, (max-width: 1033px) 100vw, 1033px" /></p>
<p>The PDCA/Deming Cycle is composed for four cyclic steps as above, so that once we have finished with the final stage we have to start again with the first one, and repeat the cycle again. Doing that in a company, the activities are reevaluated periodically to incorporate new enhancements. The application of this methodology is primarily intended to be used for companies and organizations, but you can also use it in any other situation.</p>
<p>One special characteristic of ISO Management Standard System is the <em>Internal Audit</em>. The internal audit is basically used to check(PD<strong>C</strong>A) whether the management system built by the organization is functioning properly or not. Also in case of suggestion for changes, a trial period to verify the development of the new process is established. If the improvement does not achieve the initial expectations we will have to modify the process again to obtain the desired objectives.</p>
<p>In other words internal audit is used,<br />
1) To check for the management system functionality.<br />
2) To Identify problems or improvement points.<br />
3) By the concerned manager to implement the audit suggestions in management system improvement.</p>
<p>The internal audit is an indispensable activity as part of the continuous improvement of an organization.</p>
<p>The management systems specify the requirements but do not mention “how to” attain those requirements. So, it is upto the organizations to decide how to attain and to what level based on their targets with respect to the continuous improvement plan. This can be a set of lower level targets before targeting the higher level expectancy of the management system.</p>
<h3>Management systems of the future</h3>
<p>One of the main changes in the new version of ISO 9001:2015 is the adoption of the High-Level Structure (HLS). That sounds innovative, but it is important because this High-Level Structure means that in the future, all management system standards will be aligned. The core text in the High-Level Structure will be used in every management system standard whether it be for quality, work health and safety, the environment, food safety or another discipline. This common factor also applies to the text of requirements description wherever applicable.  Also, common terminologies will be used in every management system with the same definition.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1308 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/ISO.jpg" alt="" width="1033" height="580" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/ISO.jpg 1033w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-300x168.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-1024x575.jpg 1024w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-768x431.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-945x531.jpg 945w, https://sampathblogs.online/wp-content/uploads/2020/01/ISO-600x337.jpg 600w" sizes="auto, (max-width: 1033px) 100vw, 1033px" /></p>
<p>This common structure is possible because basic concepts such as management, customer requirements, planning, performance, control, monitoring, measurement, auditing, corrective action, and nonconformity are common to all management system standards. Whilst the standards have always had common elements, they have been described and organized differently, making effective integration difficult.</p>
<p>The High-Level Structure will ensure that future management system standards support each other. They will be easier to read and understand, and it will aid greatly in the integration of multiple standards within the one organization. The resulting improved linkages in processes and activities will deliver better value and efficiency.</p>
<h4>Conclusion</h4>
<p><strong>• </strong>In order to smoothen international transactions with respect to any product or service, a set of ISO standards have been set up to maintain the quality and level of a deliverable.<br />
<strong>• </strong>The ISO standards can be classified as “Standards applicable to Objects” and “Standards applicable to Management systems”.<br />
<strong>• </strong>The ISO management system is a useful tool to reduce the management risks of each organization.<br />
<strong>• </strong>The ISO brings about step by step continuous improvement, thus strengthening the organization.<br />
<strong>• </strong>The common factors as part of future management systems will bring about better integration of multiple standards within an organization resulting in better value and efficiency.</p>
<p><em><strong>Sources:</strong></em><br />
<em>Online learning(<a href="http://www.schoo.jp">www.schoo.jp</a>)</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/iso/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Data Center and Service Desk Operations</title>
		<link>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=understanding-data-center-and-service-desk-operations</link>
					<comments>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Fri, 04 May 2018 15:08:37 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[Basic guide]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[IT Infrastructure Service]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=188</guid>

					<description><![CDATA[A data center is a facility that centralizes an organization&#8217;s IT operations and equipment, as well as where it stores, manages, and diseminates its data. Data centers house a network&#8217;s most critical systems and are vital to the continuity of... <a class="more-link" href="https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<p>A data center is a facility that centralizes an organization&#8217;s IT operations and equipment, as well as where it stores, manages, and diseminates its data. Data centers house a network&#8217;s most critical systems and are vital to the continuity of daily operations. Consequently, the security and reliability of data centers and their information is a top priority for organizations.</p>
<p>Although data center designs are unique, they can generally be classified as internet-facing and enterprise (or internal) data centers. Internet-facing data centers usually support relatively few applications, are typically browser-based, and have many users, typically unknown. In contrast, enterprise data centers service fewer users, but host more applications that vary from off-the-shelf to custom applications.</p>
<p>The main purpose of a data centre design is to run core business or mission critical applications and store operational data as well as providing Disaster Recover (DR) facilities. Typical applications will be enterprise software systems such as Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) services. Data center architectures and requirements can differ significantly.<br />
For example, a data center built for a cloud service provider like Amazon EC2 satisfies facility, infrastructure, and security requirements that significantly differ from a completely private data center, such as one built for the Pentagon that is dedicated to securing classified data.</p>
<h3>Why data centers are business-critical</h3>
<p>Most data center deployments are carried out for the following reasons:<br />
•<em>Availability</em>: Maximizing the availability of IT services to the organization.<br />
•<em>Business continuity</em>: The redundancy, monitoring and infrastructure provided by most data centers means that the potential for business  interruption is very low.<br />
•<em>Lower total cost of ownership</em>: Where an organization has several silos of data, it can combine resources and reduce the amount of separate data servers required.<br />
Staff overhead is reduced as administrative operations are simplified, whilst energy and floor space costs are reduced.<br />
•<em>Agility</em>: Centralizing IT infrastructure within a data center creates greater agility since new deployments do not have to be rolled out to multiple physical locations.</p>
<p>Basically, an effective data center operation is achieved through a balanced investment in the facility and equipment housed. The elements of a data center break down as follows:</p>
<p><strong>Facility</strong> &#8211; the location and white space or usable space, that is available for IT equipment. Providing round-the-clock access to information makes data centers some of the most energy-consuming facilities in the world. A high emphasis is placed on design to optimize white space and environmental control to keep equipment within manufacturer-specified temperature/humidity range.</p>
<p><strong>Support infrastructure</strong> &#8211; equipment contributing to securely sustaining the highest level of availability possible.<br />
Some components for supporting infrastructure include:<br />
•Uninterruptible Power Sources (UPS) &#8211; battery banks, generators and redundant power sources.<br />
•Environmental Control &#8211; computer room air conditioners (CRAC), heating, ventilation, and air conditioning (HVAC) systems, and exhaust systems.<br />
•Physical Security Systems &#8211; biometrics and video surveillance systems.</p>
<p><strong>IT equipment</strong> &#8211; actual equipment for IT operations and storage of the organization&#8217;s data. This includes servers, storage hardware, cables and racks, as well as a variety of information security elements, such as firewalls.</p>
<p><strong>Operations staff</strong> &#8211; to monitor operations and maintain IT and infrastructural equipment around the clock.</p>
<p>Data centers have evolved significantly in recent years, adopting technologies such as virtualization to optimize resource utilization and increase IT flexibility. As enterprise IT needs continue to evolve toward on-demand services, many organizations are moving toward cloud-based services and infrastructure. A focus has also been placed on initiatives to reduce the enormous energy consumption of data centers by incorporating more efficient technologies and practices in data center management. Data centers built to these standards have been coined green data centers.</p>
<h3>Data Center Solutions</h3>
<p>So, what exactly do data centers offer? What&#8217;s so great about them versus doing everything in-house.Below is a list of some of the services offered:<br />
<em>•Colocation Services</em><br />
A colocation data center lies on the opposite spectrum of the in-house data center. Colocation facilities are third party organizations that are multi-tenant accessible, meaning that multiple businesses of any size or industry may house their equipment within the data center. Customers are able to select from a variety of solutions to accommodate the specific requirements for their business.</p>
<p><em>•Cloud Services like Iaas, Paas, Saas</em></p>
<p><em>•Disaster Recovery</em><br />
This is a flexible and scalable service to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions,as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity.</p>
<p><em>•Managed Services</em><br />
Managed hosting service provider is a company or individual that remotely manages a customer’s IT infrastructure.Many small and medium sized businesses tend to use the services of a managed service provider for web servers and website management.</p>
<p>Managed providers will each specialize in a different area of IT. Some may be experts in managed colocation services whereas others are more focused on business connectivity and cloud services.</p>
<p><em>•High Availability</em><br />
High availability in the data center refers to systems and components that are continuously operational for a long time. It typically means the systems have been thoroughly tested, are regularly maintained and have redundant components installed to ensure continuous operation.</p>
<p>These services and much more are managed professionally by IT administrators who stay up-to-date with the latest technology and ultimately help a data center&#8217;s overall efficiency.</p>
<p>Data center administrators have a long to-do list when it comes to infrastructure monitoring. From server and equipment monitoring &#8212; and in some cases, mainframe monitoring &#8212; it&#8217;s a practice that&#8217;s often difficult to juggle, especially if you work in a large data center. But monitoring is an essential task. By obtaining the data you need, you can increase security and scalability, efficiently automate and better align resources with capacity needs.</p>
<p>Instead of scrambling to fix a problem after it occurs, data center admins should strive to be proactive, anticipating issues before end users even notice. But that can be difficult to do without the right data center monitoring tools and strategy.Trends such as mobility, virtualization adoption, new and increasing compliance and governance requirements, and the need to modernize existing infrastructure add further complication to managing the IT environment.</p>
<p>To make information across the enterprise readily available requires an enterprise infrastructure that is managed as an integrated whole. The go to ITSM tool(Example:Opsmart, Remedy etc.,) should provide a flexible, scalable, and open solution.Also the tool should align ITSM resources to support customer business objectives.These services create a centralized operations and support center, providing the customer a cohesive approach to integrate process optimization, systems development and support, and network and service desk management across the business enterprise.</p>
<h4>Moving Forward</h4>
<p>Due to the cloudification of data centers, current situation is such that it is no longer reserved for any specific type of organizations any longer; they&#8217;ve become accessible to almost anyone. Even if in-house IT operations are conceivable for small or large companies, wise IT administrators are choosing to outsource some portions of IT management. In the long run, it saves time, money, and manpower and it&#8217;s much less of a headache.</p>
<h2>Service Desk Operations</h2>
<p>Operations staff have direct responsibility for the availability of computer services; nonetheless, they also have direct contact with users and decision makers. One part of the Operations ,i.e,the service desk also known as the “help desk” is the single point of contact for users to report incidents. Without the service desk, users will contact support staff without the limitations of structure or prioritization. This means that a high-priority incident may be ignored while the staff handles a low-priority incident.</p>
<p>IT Infrastructure Library, ITIL is a set of best practices for an effective IT Service management, ITSM is followed across companies of all sizes.<br />
ITIL enables businesses to handle IT issues and service requests efficiently by assigning clear roles and responsibilities. It helps individuals and organizations to realize business growth and transformation.</p>
<h3>ITIL Service Life cycle</h3>
<p>ITIL service lifecycle consists of five stages. Each stage has a set of ITIL processes and it is significant to understand the purpose of each process before implementing. However, companies may selectively implement few processes that are necessary.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1310 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/itil-service.jpg" alt="" width="629" height="422" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/itil-service.jpg 629w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-service-300x201.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-service-600x403.jpg 600w" sizes="auto, (max-width: 629px) 100vw, 629px" /></p>
<p><em>• Service strategy</em> &#8211; Service strategy involves clear understanding of customer’s and market’s needs. This advocates a long-term market driven approach to deliver IT support. Service strategy include strategy management for IT services, service portfolio management, demand management, financial management for IT services and business relationship management that focuses on customer satisfaction.</p>
<p><em>• Service design</em> &#8211; This is an holistic approach to design a support service. The right service design approach translates to higher customer satisfaction and usability. Some of the ITIL service design processes include service level agreement, service catalog management, availability management and IT service continuity management.</p>
<p><em>• Service Transition</em> &#8211; This stage ensures changes in service lifecycle are handled with minimum risk and impact so that there is minimal or no downtime. Some of the processes here include change management, release management, configuration management database, knowledge management.</p>
<p><em>• Service Operation</em> &#8211; ITIL service operation ensures seamless service in day to day business activities. Actual delivery and consumption of services happen during this stage. This has a direct impact on the productivity of end users. Typical processes include <em>incident management, request fulfillment</em>, problem management.</p>
<p><em>• Continual Service Improvement</em> &#8211; CSI aims for process review and improvement throughout the service lifecycle. This is applicable to all service stages including strategy, design, transition and operation. Metrics definition and performance review happen at this stage which help companies to revisit existing process.</p>
<h4>Incident Management</h4>
<p>ITIL defines an incident as an unplanned interruption to or quality reduction of an IT service. The service level agreements (SLA) defines the agreed-upon service level between the provider and the customer. Incident management focuses solely on handling and escalating incidents to the next level as they occur to restore defined service levels. Incident management does not deal with root cause analysis or problem resolution. The main goal is to take user incidents from a reported stage to a closed stage.</p>
<p>The below figure depicts a sample incident management flow.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1309 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow.jpg" alt="" width="666" height="454" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow.jpg 666w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow-300x205.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/itil-flow-600x409.jpg 600w" sizes="auto, (max-width: 666px) 100vw, 666px" /></p>
<p>The Alerts and incident calls may be related in cases where the incidents result in Alerts on the monitoring tool. However, Alert may occur on tool independently and follows the flow 1 &#8211; 3 &#8211; 4 &#8211; 5 and finally closure of the ticket raised w.r.t to the Alert generated on tool.</p>
<p>The other case is when the Client or user calls up regarding a service disruption issue or a service enhancement support. In such cases, the flow 1 or 2 &#8211; 3 &#8211; 4 &#8211; 5 &#8211; 6 is followed. Here as well, once the issue is resolved the concerned ticket is closed.</p>
<p>Operational incident management requires several key pieces:<br />
1.A service level agreement between the provider and the customer that defines incident priorities, escalation paths, and response/resolution time frames<br />
2.Incident models, or templates, that allow incidents to be resolved efficiently<br />
3.Categorization of incident types for better data gathering and problem management<br />
4.Agreement on incident statuses, categories, and priorities<br />
5.Establishment of a major incident response process<br />
6.Agreement on incident management role assignment</p>
<h3>Incident statuses</h3>
<p>Incident statuses mirror the incident process and include:<br />
•New<br />
•Assigned<br />
•In progress<br />
•On hold or pending<br />
•Resolved<br />
•Closed</p>
<p>The <em>new</em> status indicates that the service desk has received the incident but has not assigned it to an agent.<br />
The <em>assigned</em> status means that an incident has been assigned to an individual service desk agent.<br />
The <em>in-progress</em> status indicates that an incident has been assigned to an agent but has not been resolved. The agent is actively working with the user to diagnose and resolve the incident.<br />
The <em>on-hold</em> status indicates that the incident requires some information or response from the user or from a third party. The incident is placed “on hold” so that SLA response deadlines are not exceeded while waiting for a response from the user or vendor.<br />
The <em>resolved</em> status means that the service desk has confirmed that the incident is resolved and that the user’s service has restored to the SLA levels.<br />
The <em>closed </em>status indicates that the incident is resolved and that no further actions can be taken.</p>
<p>Incident management follows incidents through the service desk to track trends in incident categories and time in each status. The final component of incident management is the evaluation of the data gathered. Incident data guides organizations to make decisions that improve the quality of service delivered and decrease the overall volume of incidents reported. Incident management is just one process in the service operation framework.</p>
<p><em><strong>Sources:</strong></em><br />
<em>Work Experience, Online Learning</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/05/understanding-data-center-and-service-desk-operations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lean and Six Sigma in brief</title>
		<link>https://sampathblogs.online/2018/04/lean-and-six-sigma-in-short/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=lean-and-six-sigma-in-short</link>
					<comments>https://sampathblogs.online/2018/04/lean-and-six-sigma-in-short/#respond</comments>
		
		<dc:creator><![CDATA[mail2sampath]]></dc:creator>
		<pubDate>Wed, 18 Apr 2018 12:51:17 +0000</pubDate>
				<category><![CDATA[Functional]]></category>
		<category><![CDATA[Best practice]]></category>
		<category><![CDATA[Japan]]></category>
		<guid isPermaLink="false">http://excelall.byethost32.com/?p=97</guid>

					<description><![CDATA[Lean Lean is basically a set of organization processes required to develop a product or service from initial concept to the final delivery to the customer by reducing waste and adding customer defined value. Lean means doing more with less... <a class="more-link" href="https://sampathblogs.online/2018/04/lean-and-six-sigma-in-short/">Continue Reading &#8594;</a>]]></description>
										<content:encoded><![CDATA[<h2><strong>Lean</strong></h2>
<p>Lean is basically a set of organization processes required to develop a product or service from initial concept to the final delivery to the customer by reducing waste and adding customer defined value. Lean means doing more with less while doing it better.</p>
<h4>Why implement Lean</h4>
<p>Usually more than 90% of any process is wasted time and activity. In today’s competitive marketplace many companies are continually looking for ways to win the race. Every new product idea must have a solid business case to back it up. Otherwise, management would not allow that project to continue. On several occasions, the fate of a project has rested upon cost versus market value. Lean is all about adding value to the product while eliminating waste.</p>
<p>Lean helps identify eight types of waste:</p>
<p>1.Motion: Unnecessary motion of personnel, equipment or information due to inadequate workspace layout, missing parts or tools and ergonomic issues</p>
<p>2.Transportation: Transporting items or information that is not required to perform the process from one location to another</p>
<p>3.Waiting: Time waiting for parts, tools, supplies or the previous process step</p>
<p>4.Overproduction: Producing more product than what is required to meet current demand</p>
<p>5.Defects: Non-conforming products or services requiring resources to correct</p>
<p>6.Inventory: Inventory or information that is being stored or not being processed likely due to line imbalance or overproduction</p>
<p>7.Unrecognized talent: Failure to effectively engage employees in the process and fully utilize their knowledge and skills</p>
<p>8.Non-value processing: Activity that is not adding value or required to produce a functioning part, product or service</p>
<p>By continually identifying and eliminating waste in our processes, we can lower costs and increase margin. Lean, done properly, enables an organization to be more adaptable to changes in the market and the economy. The development of a continuous improvement company culture is also an outcome of Lean. These organizations will not merely survive; these organizations will grow and given that, create additional jobs.</p>
<h4>Lean Principles</h4>
<p>The five principles of Lean are as follows;<br />
• Identify customer value<br />
Remove non-value or waste activities from customer perspective.</p>
<p>• Map the value stream<br />
No matter how efficient your process currently is, it most likely can be improved. Any step or operation that does not add value is waste. One method used to discover waste is the Value Stream Map. The Value Stream Map depicts how materials, parts and processes flow through the organization and on to the customer.</p>
<p>Through examination of the map, your team can identify which actions and processes add value and which are wastes. The team can then develop a “future state” map with as many of the non-value added actions and processes excluded.</p>
<p>• Create flow by eliminating waste<br />
As you develop the new value stream, look for ways to change to a pull system where production is based on customer demand without the wait time and eliminate the waste.</p>
<p>• Respond to customer pull<br />
Produce what the customer wants and when.</p>
<p>• Continuous improvement<br />
There must be a commitment from management to provide the proper resources and on-going support to implement a Lean program that will stand the test of time. At the heart of Lean is gradual continuous improvement or Kaizen. An organization cannot expect to implement Lean overnight. It will require time, resources and hard work to build a robust and effective Lean program.</p>
<p>Comparison of traditional and lean process improvements</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1345 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/pic.jpg" alt="" width="865" height="479" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/pic.jpg 865w, https://sampathblogs.online/wp-content/uploads/2020/01/pic-300x166.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/pic-768x425.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/pic-600x332.jpg 600w" sizes="auto, (max-width: 865px) 100vw, 865px" /></p>
<p>As can be seen from the above picture, in case of traditional process improvements along the small reduction in Non-value added(NVA) activities there is a certain reduction in Value added(VA) activities as well. But in case of Lean implementation, there is no reduction in Value Added(VA) activities while a huge reduction is NVA is achieved thus reducing the lead time.</p>
<h3>Kaizen</h3>
<p>Kaizen is a key building block for a robust sustainable Lean initiative. Kaizen philosophy empowers everyone to assume responsibility of their work processes and improve them. With Kaizen, workers at all levels of the organization are engaged in constantly watching for and identifying opportunities for change and improvement. Kaizen is a culture change that supports gradual continuous improvement on a daily basis. When everyone is working to reduce waste and improve processes the organization becomes Lean.</p>
<p>There are various approaches as to how Kaizen is implemented, a couple are listed as follows;</p>
<p>• Daily event: Improvement ideas implemented by everyone everyday.<br />
• Blitz event: Rapid improvement workshop designed to produce results in a few days.</p>
<h2><strong>Six Sigma</strong></h2>
<p>Six Sigma is a methodology focused on creating breakthrough improvements by managing variation and reducing defects in processes across the enterprise. It is a proven data driven structured process improvement methodology for sustainable business improvement, driven by business and customer expectations. If we can measure process variations that cause defects i.e. unacceptable deviation from the mean or target, we can work towards systematically managing the variation to eliminate defects.</p>
<p>It is extremely important to remember that Six Sigma is not just about product quality where only three products in a million are defective. It is about what is important or critical to the customer, whether internal or external. It is focuses on value in context of the customer and the market.</p>
<p>Six sigma goals</p>
<p>• Reduce process variation<br />
• Shift the process mean to the center ,i.e., move the average process performance to the target</p>
<p>As depicted by the below picture, in case of variation which is out of the customer expectation range or in case the mean is not centered it is considered as defective and the goal would be to reduce the variation and center the mean as per customer expectations.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1247 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/6sig.jpg" alt="" width="699" height="370" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/6sig.jpg 699w, https://sampathblogs.online/wp-content/uploads/2020/01/6sig-300x159.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/6sig-600x318.jpg 600w" sizes="auto, (max-width: 699px) 100vw, 699px" /></p>
<p>Six sigma approach</p>
<p>• All work occurs in a system of interconnected processes.<br />
• Variation exists in all processes, whose characteristics can be measured, analyzed, controlled and improved.<br />
• Understanding cause of variation and continuous efforts to achieve stable and predictable process results (i.e., reduce process variation) are of vital importance to business success.<br />
• Reduced variation results is improved customer satisfaction.</p>
<h2>Lean Six Sigma DMAIC Methodology</h2>
<p>DMAIC is a data-driven quality strategy used to improve processes. It is an integral part of a Six Sigma initiative, but in general can be implemented as a standalone quality improvement procedure or as part of other process improvement initiatives such as lean.</p>
<p>DMAIC is an acronym for the five phases that make up the process:<br />
•Define the problem, improvement activity, opportunity for improvement, the project goals, and customer (internal and external) requirements.<br />
•Measure process performance.<br />
•Analyze the process to determine root causes of variation, poor performance (defects).<br />
•Improve process performance by addressing and eliminating the root causes.<br />
•Control the improved process and future process performance.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1283 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/dmaic.jpg" alt="" width="865" height="479" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/dmaic.jpg 865w, https://sampathblogs.online/wp-content/uploads/2020/01/dmaic-300x166.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/dmaic-768x425.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/dmaic-600x332.jpg 600w" sizes="auto, (max-width: 865px) 100vw, 865px" /></p>
<p>The PDCA-Cycle, also called the Deming-Cycle or Shewhart-Cycle, is the classic problem-solving approach in a LEAN environment. PDCA is used for medium sized problems and the Act-phase implies that the PDCA-Cycle should start again in the sense of a continuous improvement process. Basically, DMAIC is a 5-Step PDCA used for large problems where typically a huge amount of data is available.</p>
<h4>The funneling effect of DMAIC</h4>
<p>The Six Sigma process seeks to improve processes by eliminating variation and defects, the opportunities for variation and defects in the process, and all non-value added activities. The DMAIC process begins with clearly defining the problem by way of a formula, called the ‘Y Statement,’ where the process output “Y” is a function of one or more inputs, or “Xn”: Y = f(X1, X2, X3…Xn)</p>
<p>The DMAIC process is designed to provide a systematic method to reduce the number of key inputs down to a manageable set that have: a) a statistically significant impact on the process output, and b) a definable action plan. This “funneling effect” is illustrated as below.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1296 size-full" src="https://sampathblogs.online/wp-content/uploads/2020/01/funnel.jpg" alt="" width="865" height="479" srcset="https://sampathblogs.online/wp-content/uploads/2020/01/funnel.jpg 865w, https://sampathblogs.online/wp-content/uploads/2020/01/funnel-300x166.jpg 300w, https://sampathblogs.online/wp-content/uploads/2020/01/funnel-768x425.jpg 768w, https://sampathblogs.online/wp-content/uploads/2020/01/funnel-600x332.jpg 600w" sizes="auto, (max-width: 865px) 100vw, 865px" /></p>
<p><strong><em>Sources : </em></strong><br />
<em>Workplace Learning</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sampathblogs.online/2018/04/lean-and-six-sigma-in-short/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
