Tuesday, September 28, 2010

Privacy Policy

Privacy Policy for industrialstrategies.blogspot.com

If you require any more information or have any questions about our privacy policy, please feel free to contact us by email at avortec33@gmail.com.

At industrialstrategies.blogspot.com, the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected by industrialstrategies.blogspot.com and how it is used.

Log Files
Like many other Web sites, industrialstrategies.blogspot.com makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons
industrialstrategies.blogspot.com does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie
.:: Google, as a third party vendor, uses cookies to serve ads on industrialstrategies.blogspot.com.
.:: Google's use of the DART cookie enables it to serve ads to users based on their visit to industrialstrategies.blogspot.com and other sites on the Internet.
.:: Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html

Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include ....
Google Adsense
Commission Junction
Widget Bucks
Adbrite
Clickbank
Azoogle
Chitika
Linkshare
Amazon
Kontera


These third-party ad servers or ad networks use technology to the advertisements and links that appear on industrialstrategies.blogspot.com send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

industrialstrategies.blogspot.com has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. industrialstrategies.blogspot.com's privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers' respective websites.

Friday, August 20, 2010

Professional Services

MSA's professional services staff uses rigorous, field-tested, standard-setting methodologies and extensive hands-on experience. We advise our customers on how to architect and implement an enterprise management operation that succeeds in meeting their business mission and protects enterprise network assets. Today's enterprise networks are a crucial asset for many businesses, involving data, telecommunications, and converged media sources. 

The result is a system that delivers the reliability, scalability, usability, accuracy, and maintainability to meet the competitive challenges our customers face. What does a typical enterprise management system delivered by MSA look like? Take a look at this.
 
 

Free Executive level overview of Earned Value Management

Pinnacle is pleased to offer a free Executive level overview of Earned Value Management Implementation for organizations that are facing new or changing EVM requirements.

This presentation has been extremely effective at building Executive buy-in and Adoption of Earned Value Management.

The presentation is intended for CEO, CFO, Program Managers and EVM Implementation teams. We will arrange a presentation for your company and configure the presentation to fit your specific needs based on contract type, client Agency and current Project Management infrastructure .

We have had excellent reviews from companies who are:
  •     Facing new EVM mandates in their contract requirements
  •     Evaluating Earned Value Management and Project Management software.
  •     Dealing with increased EVM rigor, IBRs or EVMS validations
  •     Looking at implementing EVM to help in responding to RFPs and winning new contracts
  •     Not sure how implementing EVM will impact their organizations

The content of the presentation can be tailored to suit your specific requirements, as dictated by your organizational or contractual needs.  All we ask is that you assemble a team of decision makers and implementation stakeholders.  We typically have a preliminary conversation to determine your specific goals, and then we deliver a 1-2 hour presentation to your team.

The standard outline of the presentation includes:

Overview of Earned Value Management (EVM)
  •     EVM concepts and terminology
  •     EVM Principles and Integrated Program Management (IPM)

Government Reviews and Validation – As required by specific Agencies
  •     EVM Mandate Thresholds and the different level of EVM requirements (ex. 32 ANSI criteria versus 10 core criteria)
  •     EVM Validation process and timeframes
  •     Integrated Baseline Reviews

Elements of an effective EVMS
  •     People, Process, Tools, Deliverables
  •     Software System overview

Competency management implementation guide


The ITG Competency Management Implementation Guide offers tested methods, tools and guidance for customizing the ITG Model and other competency data to fit the organization’s culture, and for implementing it on a sustainable basis into your competency-based workforce initiative.






The Competency Management Implementation Guide (IMPG) documents the combined experiences of our competency consultants and the clients with whom they’ve worked. It offers a variety of tools: tutorials, a project plan, document templates, meeting agendas, facilitation guides, best practices, PowerPoint slides and others. It underscores Salary.com’s ability to assist in rapid implementation of a competency-based workforce initiative.

The IMPG documents our phased implementation approach and focuses on:
  •       Ensuring that the jobs and competencies required to achieve the organization’s desired future are  clearly defined and in lock step with business plans and directions.
  •       Providing individuals with information on competencies required for success in the organization’s various job functions.
  •       Providing individuals and managers with actionable information on current competencies and the gaps that may exist between the competencies that are currently on hand and those which are required for the future.
  •       Providing individuals and managers with actionable information on current competency strengths.
  •       Providing both individual and organizational development plans to close selected gaps and take full advantage of strengths.
  •       Ensuring that competency data is properly maintained for use beyond the initial project and the demands of the moment.

Telecom & Mobility Management Implementation Project Tips

I was recently reading AOTMP's  State of the Industry Report on the Telecom Expense and Wireless Expense Management Industry. You can find it here  There was some interesting feedback from clients who have engaged in TEM projects.  There was one question in particular that resonated with me.

"If there was one thing you would do differently with your TEM program, what would it be? "

Some of the respondents regretted their approach to their project. This got me thinking...... what advice do we typically give so that there are no regrets? We are asked daily for suggestions on how to ensure a TEM/WEM initiative is successful.  The following tips may help you start off on the right foot.

Tip #1 - Give everyone a heads up - TEM projects require change...change that sometimes scares people.  The more buy-in and comfort you can secure from the groups involved, the quicker and more effectively your program will be implemented. Lay out the key organizational goals and the reasons why certain tasks must be done. If this is clearly communicated in terms of those that stand to benefit from the solution -  cooperation and enthusiasm should be strong.

Tip #2 - Start gathering your info NOW  - Getting your arms around your inventory and billing can sometimes be a pain.  No matter who you choose, most vendors will ask for very similar information, so you benefit regardless of who you select.  Even put aside a box in your office or a folder on your desktop and start adding bills and records that you think may be useful when the time comes  Telecom management project plan

Tip #3 - Dedicate resources to the project -  One of the biggest reasons that an implementation is delayed is due to insufficient resources. It is important to prepare all of the groups involved and clearly define who responsible for what tasks and share this information with the vendor you choose. If a vendor recommends a specific headcount, trust them.  They typically know how many man-hours tasks will take.

Tip #4 - Speak up and discuss expectations  -  Of course this applies to the vendor but it also applies to you. There are certain areas that are MUST tackle subjects.  For example, project timeframes, internal goals, expectations, target dates should NEVER be assumed.  Any client engagement should start with a project initiation meeting where timeframes are mutually developed, mapped and signed off on by both you and the vendor. Schedule a discovery session ...it will be worth your time.

Tip #5 - Clearly define the scope of work.  -The more information you can gather regarding the scope, the better.  Again, this is another area that must be clearly discussed and outlined with your vendor. The scope of work should be clearly defined and mutually agreed upon.  A plan should also be discussed and mapped out that cover how to handle out of scope issues that arise during the engagement.

Facility Management

Better service management through consolidation of applications

RightStar’s facilities management implementation reduces operating costs by consolidating several facility and administrative applications using BMC Service Desk Express or BMC Remedy as the application centerpiece. Potential facilities applications include:


RightStar enables organizations to make better use of their existing service management tools and processes by reducing, rather than increasing, the number of applications and systems supported.

Identity Management (IdM)

First Soft Solutions Long experience helping global companies meet business challenges is at the core of First Soft Solutions’s Identity Management Practice. First Soft Solutions has been helping customers worldwide realize maximum value from their Identity Management implementations. We delivers Identity Management consulting, Identity Management implementation, Identity Management integration and post implementation services for our customers.


First Soft Solutions’s Identity Management Support services cover the entire Identity Management systems spectrum — spanning from configuration set up, customization/enhancement of existing functionality, and post implementation support.

Our proven Identity Management integration capability enables seamlessly integrated solutions that increase the value of technology investments.

First Soft Solutions maintains a resource pool of experienced professionals, consultants, solution designers and developers. This high caliber staff is backed by proven end-to-end project execution methodologies. First Soft Solutions’s focused Delivery Center and skilled resource pool ensures scalability, while a well-established onsite-offshore execution model delivers cost effective solutions for clients.

First Soft Solutions provides consulting, integration and managed services for the following Identity Management technologies:

  •     Automated Provisioning
  •     Password Management
  •     Compliance Management
  •     Role Management
  •     Enterprise Single Sign-On
  •     Centralized Unix Authentication
  •     Privileged Access Management
  •     Virtual Directory/Metadirectory
  •     Web Access Management