Enamul Haque's Blog, page 2
October 3, 2020
Blockchain Basics
If you have seen the famous Hollywood film "Catch Me If You Can", then you will know how a fraudster named Frank Abagale took advantage of the loopholes of Bank checks. The US government certainly caught him but did not let his talent go. Eventually, control of cheque fraudulent could also be brought under the help of this Frank Abagnale. I mean to say that if any mind or skill is used in the right direction, then it does not take any time to reverse the results.
The same thing applies to the blockchain technology used in cryptocurrency like bitcoin. In fact, Blockchain Technology became infamous in the round of cryptocurrency. But in many countries, this technology is not only used for better governance, so industries around the world are pressuring their government to use this technology.
We all know that bitcoin has betrayed the large population of the world overnight, and all this was possible through its basic technology. It is likely that blockchain technology will be revolutionary for the future economy.
Blockchain is a technology that helps to transfer bitcoin or some other services from one individual to another. For example, if a person “A” needs to send money from Dhaka to a person “B” in London, and if this is done via a trusted third party or a bank, it can take upto 1 to 2 days for reaching from person "A" to person "B". But in blockchain technology, we can send money instantly and anywhere directly, and for this, it takes only a few minutes. In this, transaction fees are also deficient.
Blockchain technology was created in 2008. Satoshi Nakamoto invented this technology to provide service to bitcoins. There is no need of banking sector to send money from blockchain. The blockchain was made for bitcoins, but now many more cryptocurrency has come in it.
In this chain, people are connected to each other. All the people who live in blockchain's network, they know who is paying, and how much is paying. Therefore, there can be no unethical transaction in this network.
Hackers also cannot hack blockchain technology, because to hack this technology, they have to hack thousands of computers simultaneously. That is why blockchain is considered to be a secured technology. In the future blockchain technology can be used for election voting, banking, necessary paperwork. This technology can also come handy in the future to keep Digital Data, Digital Information secured.
The same thing applies to the blockchain technology used in cryptocurrency like bitcoin. In fact, Blockchain Technology became infamous in the round of cryptocurrency. But in many countries, this technology is not only used for better governance, so industries around the world are pressuring their government to use this technology.
We all know that bitcoin has betrayed the large population of the world overnight, and all this was possible through its basic technology. It is likely that blockchain technology will be revolutionary for the future economy.
Blockchain is a technology that helps to transfer bitcoin or some other services from one individual to another. For example, if a person “A” needs to send money from Dhaka to a person “B” in London, and if this is done via a trusted third party or a bank, it can take upto 1 to 2 days for reaching from person "A" to person "B". But in blockchain technology, we can send money instantly and anywhere directly, and for this, it takes only a few minutes. In this, transaction fees are also deficient.
Blockchain technology was created in 2008. Satoshi Nakamoto invented this technology to provide service to bitcoins. There is no need of banking sector to send money from blockchain. The blockchain was made for bitcoins, but now many more cryptocurrency has come in it.
In this chain, people are connected to each other. All the people who live in blockchain's network, they know who is paying, and how much is paying. Therefore, there can be no unethical transaction in this network.
Hackers also cannot hack blockchain technology, because to hack this technology, they have to hack thousands of computers simultaneously. That is why blockchain is considered to be a secured technology. In the future blockchain technology can be used for election voting, banking, necessary paperwork. This technology can also come handy in the future to keep Digital Data, Digital Information secured.
The Use of Artificial Intelligence in ITSM Practice
The stunning promises to improve IT service management through artificial intelligence (AI) have been turning heads for quite some time. For the last couple of months, I have been heavily involved in getting the cloud operations run team mobilised with automation at its core. It's a gigantic project for a life-sciences company towards a colossal move to digitisation. During this troubling time of the pandemic, this project took my heart and soul.
The automation leveraging next-gen, chat as a medium for operations, collaboration and communication. Seamlessly integrating business users, developers, operations teams, cloud providers and BOTs and all in real-time.
But despite the genuine advantages that AI offers in an ITSM environment, the IT teams responsible should carefully check whether the use of the technology is really worthwhile in their specific case. They should also consider whether they can operate and support tools and processes based on AI.
While ITSM, in theory, has long promoted the entire life cycle of IT services and products - from the ideation of service to its decommissioning - many ITSM implementations only focus on ongoing tasks.
Many companies have set up a service desk and incident management as well as processes for answering inquiries. Others have defined a simple change management process that handles requests through a central approval point. Although these approaches have their own advantages, they are far from a comprehensive and holistic ITSM strategy.
With the emergence of new approaches such as DevOps, VeriSM, Lean IT and Shift Left in IT service management, frameworks such as ITIL, ISO / IEC 20000 and COBIT have undergone a significant revision.
Technologies such as Cloud Computing, the Internet of Things (IoT) , Containers, Microservices, Big data, automation and artificial intelligence require a fundamental revision of traditional ITSM processes. Another driving force behind the change in IT service management is purely business considerations, for example, the focus on customer and employee experience. Luckily, ITIL 4, proudly introduced XLA (Experience Level Agreements). XLAs are important in understanding the impact we’re having on the customer experience. XLAs can help us as an organisation develop our capacity for digital empathy.
Anyway, IT teams need to balance high responsiveness, which has become the standard in the digital economy, with organisational stability.
Artificial intelligence can improve or expand existing methods in IT product and service management. Most current AI-enabled ITSM systems focus on the following technical areas, with service desk and IT operations being the most popular use cases:
Service Desk: Relieves employees of tedious and repetitive tasks, such as the routine troubleshooting of recurring problems or answering inquiries.
Ongoing Monitoring: managing events with filters and disclosure of relationships.
Incident Management: Categorises incidents based on defined criteria, forwards tickets automatically or resolves simpler incidents without the need for human intervention.
Answering Inquiries: Answering end-user queries automatically, preferably via a self-service portal, including requests for all sorts.
Problem Management: Analyses large amounts of data in order to identify patterns and relate IT incidents to one another.
AI-enabled ITSM platforms can usually be divided into three categories: Reactive, Proactive or Predictive.
Reactive AI tools support the service desk primarily through self-service functions for the end-user. These tools are reactive because they only become active in response to a stimulus, for example, an alarm or human interaction. Examples of reactive AI in ITSM tools are chatbots and virtual assistants.
Proactive tools independently recognise a critical condition or an upcoming situation. They then initiate effective measures - for example, to resolve a necessary condition before an interruption in operations occurs. Automation, robotic process automation (RPA), and process orchestration tools are typical entry points into this category.
The third category is Predictive, predictive tools. They forecast future performance, demand or necessary work in the IT department. The forecast is based on an analysis of historical and current data. To make such predictions, some tools create new data sets from the collected data sets. Examples are ITSM tools that rely on machine learning and the evaluation of large amounts of data.
The fourth category of ITSM tools with artificial intelligence is currently emerging: Autonomous tools. They can make value judgments and take action that may have nothing to do with their original program. These platforms can recognise complex concepts such as risk-benefit considerations or the ethical effects of actions in ITSM and apply these findings. However, autonomous ITSM tools are not yet ready for the market.
The automation leveraging next-gen, chat as a medium for operations, collaboration and communication. Seamlessly integrating business users, developers, operations teams, cloud providers and BOTs and all in real-time.
But despite the genuine advantages that AI offers in an ITSM environment, the IT teams responsible should carefully check whether the use of the technology is really worthwhile in their specific case. They should also consider whether they can operate and support tools and processes based on AI.
While ITSM, in theory, has long promoted the entire life cycle of IT services and products - from the ideation of service to its decommissioning - many ITSM implementations only focus on ongoing tasks.
Many companies have set up a service desk and incident management as well as processes for answering inquiries. Others have defined a simple change management process that handles requests through a central approval point. Although these approaches have their own advantages, they are far from a comprehensive and holistic ITSM strategy.
With the emergence of new approaches such as DevOps, VeriSM, Lean IT and Shift Left in IT service management, frameworks such as ITIL, ISO / IEC 20000 and COBIT have undergone a significant revision.
Technologies such as Cloud Computing, the Internet of Things (IoT) , Containers, Microservices, Big data, automation and artificial intelligence require a fundamental revision of traditional ITSM processes. Another driving force behind the change in IT service management is purely business considerations, for example, the focus on customer and employee experience. Luckily, ITIL 4, proudly introduced XLA (Experience Level Agreements). XLAs are important in understanding the impact we’re having on the customer experience. XLAs can help us as an organisation develop our capacity for digital empathy.
Anyway, IT teams need to balance high responsiveness, which has become the standard in the digital economy, with organisational stability.
Artificial intelligence can improve or expand existing methods in IT product and service management. Most current AI-enabled ITSM systems focus on the following technical areas, with service desk and IT operations being the most popular use cases:
Service Desk: Relieves employees of tedious and repetitive tasks, such as the routine troubleshooting of recurring problems or answering inquiries.
Ongoing Monitoring: managing events with filters and disclosure of relationships.
Incident Management: Categorises incidents based on defined criteria, forwards tickets automatically or resolves simpler incidents without the need for human intervention.
Answering Inquiries: Answering end-user queries automatically, preferably via a self-service portal, including requests for all sorts.
Problem Management: Analyses large amounts of data in order to identify patterns and relate IT incidents to one another.
AI-enabled ITSM platforms can usually be divided into three categories: Reactive, Proactive or Predictive.
Reactive AI tools support the service desk primarily through self-service functions for the end-user. These tools are reactive because they only become active in response to a stimulus, for example, an alarm or human interaction. Examples of reactive AI in ITSM tools are chatbots and virtual assistants.
Proactive tools independently recognise a critical condition or an upcoming situation. They then initiate effective measures - for example, to resolve a necessary condition before an interruption in operations occurs. Automation, robotic process automation (RPA), and process orchestration tools are typical entry points into this category.
The third category is Predictive, predictive tools. They forecast future performance, demand or necessary work in the IT department. The forecast is based on an analysis of historical and current data. To make such predictions, some tools create new data sets from the collected data sets. Examples are ITSM tools that rely on machine learning and the evaluation of large amounts of data.
The fourth category of ITSM tools with artificial intelligence is currently emerging: Autonomous tools. They can make value judgments and take action that may have nothing to do with their original program. These platforms can recognise complex concepts such as risk-benefit considerations or the ethical effects of actions in ITSM and apply these findings. However, autonomous ITSM tools are not yet ready for the market.