Tuning Agile Delivery for Customer and Employee Success

Ashish Joseph

What is Agile?

Agile has been very popular in the software development industry for empowering delivery to be more efficient and effective. It is a common misconception for Agile to be thought of as a framework or a process that follows a methodology for software development. But Agile is a set of values and principles. It is a collection of beliefs that teams can use for decision making and optimizing project deliveries. It is customer-centric and flexible, helping teams adapt accordingly. It doesn’t make the decision for the team. Instead, it gives a foundation for teams to make decisions that can result in a stellar execution of the project.

According to the Agile Manifesto, teams can deliver better by prioritizing the following over the other.

  • Individuals and Interactions over process and tools
  • Working Model over Comprehensive Documentation
  • Customer Collaboration over Contract Negotiation
  • Responding to Changes over following a Plan

With respect to Software Development, Agile is an iterative approach to project management which help teams deliver results with measurable customer value. The approach is designed to be faster and ensures the quality of delivery that is aided with periodic customer feedbacks. Agile aims to break down the requirement into smaller portions, results of which can be continuously evaluated with a natural mechanism to respond to changes quickly.

AIOps Artificial Intelligence for IT Operations

Why Agile?

The world is changing, and businesses must be ready to adapt to how the market demands change over time. When we look at the Fortune 500 companies from 1955, 88% of them perished. Nearly half of the S&P 500 companies is forecasted to be replaced every ten years. The only way for organizations to survive is to innovate continuously and understand the pulse of the market every step of the way. An innovative mindset helps organizations react to changes and discover new opportunities the market can offer them from time to time.

Agile helps organizations execute projects in an everchanging environment. The approach helps break down modules for continuous customer evaluation and implement changes swiftly.

The traditional approach to software project management uses the waterfall model, where we Plan, Build, Test, Review and Deploy. But this existing approach would result in iterations in the plan phase whenever there are deviations in the requirement with respect to the market. When teams choose agile, it helps them respond to changes in the marketplace and implement customer feedback without going off the plan. Agile plans are designed in such a manner to include continuous feedback and its corresponding changes. Organizations should imbibe the ability to adapt and respond fast to new and changing market demands. This foundation is imperative for modern software development and delivery.

Is Agile a right fit for my Customer? People who advocate Agile development claim that Agile projects succeed more often than waterfall delivery models. But this claim has not been validated by statistics. A paper titled “How Agile your Project should be?” by Dr. Kevin Thompson from Kevin Thompson Consulting, provides a perspective from a mathematical point of view for both Agile and Waterfall project management. Here both approaches were followed for the same requirements and were also affected by the same unanticipated variables. The paper focused on the statistical evidence to support the validity of both the options to evaluate the fit.

While assessing the right approach, the following questions need to be asked

  • Are the customer requirements for the project complete, clear and stable?
  • Can the project effort estimation be easily predicted?
  • Has a project with similar requirements been executed before?

If the answer to all the above questions are Yes, then Agile is not the approach to be followed.

The Agile approach provides a better return on investment and risk reduction when there is high uncertainty of different variables in the project. When the uncertainty is low, waterfall projects tend to be more cost effective than agile projects.

Optimizing Agile Customer Centricity

Customer centricity should be the foundation of all project deliveries. This help businesses align themselves to the customer’s mission and vision with respect to the project at hand. While we consider an Agile approach to a project in a dynamic and changing environment, the following are some principles that can help organizations align themselves better with their customer goals.

  • Prioritizing Customer Satisfaction through timely and continuous delivery of requirements.
  • Openness to changing requirements, regardless of the development phase, to enable customers to harness the change for their competitive advantage in the market.
  • Frequent delivery of modules with a preference towards shorter timelines.
  • Continuous collaboration between management and developers to understand the functional and non-functional requirements better.
  • Measuring progress through the number of working modules delivered.
  • Improving velocity and agility in delivery by concentrating on technical excellence and good design.
  • Periodic retrospection at the end of each sprint to improve delivery effectiveness and efficiency.
  • Trusting and supporting motivated individuals to lead projects on their own and allowing them to experiment.

Since Agile is a collection of principles and values, its real utility lies in giving teams a common foundation to make good decisions with actionable intelligence to deliver measurable value to their customers.

Agile Empowered Employee Success

A truly Agile team makes their decisions based on Agile values and principles. The values and principles have enough flexibility to allow teams to develop software in the ways that work best for their market situation while providing enough direction to help them to continually move towards their full potential. The team and employee empowerment through these values and principles aid in the overall performance.

Agile not only improves the team but also the environment around which it is established by helping employees to be compliant with respect to audit and governance.  It reduces the overall project cost for dynamic requirements and focuses on technical excellence along with an optimized process for its delivery. The 14th Annual State of Agile Report 2020 published by StateofAgile.com surveyed 40,000 Agile executives to get insights into the application of Agile across different areas of enterprises. The report surveyed different Agile techniques that contributed most towards the employee success of the organization. The following are some of the most preferred Agile techniques that helped enhance the employee and team performances.

Best AI Auto Discovery Tools

All the above Agile techniques help teams and individuals to introspect their actions and understand areas of improvement in real time with periodic qualitative and quantitative feedback. Each deliverable from multiple cross functional teams can be monitored, tracked and assessed under a single roof. All these techniques collectively bring together an enhanced form of delivery and empower each team to realize their full potential.
Above all, Agile techniques help teams to feel the pulse of the customer every step of the way. The openness to change regardless of the phase, helps them to map all the requirements leading to an overall customer satisfaction coupled with employee success.

Top 5 Agile Approaches

Best AIOps Platforms Software

A Truly Agile Organization

Majority of the Agile approach has been concentrated towards development, IT, and Operations. However, organizations should strive towards effective alignment and coordination across all departments. Organizations today are aiming for greater expansion of agility into areas beyond building, deploying, and maintaining software. At the end of the day, Agile is not about the framework. It is all about the Agile values and principles the organizations believe in for achieving their mission and vision in the long run.

About the Author –

Ashish Joseph is a Lead Consultant at GAVS working for a healthcare client in the Product Management space. His areas of expertise lie in branding and outbound product management. He runs a series called #BizPective on LinkedIn and Instagram focusing on contemporary business trends from a different perspective. Outside work, he is very passionate about basketball, music, and food.

Vision for 2021

Sumit Ganguli

CEO, GAVS Technologies

God, grant me the serenity to accept things, I cannot change,

Courage to change the things I can,

And the wisdom to know the difference.

The events of 2020 have reaffirmed in me the ethos conveyed by this stanza, from the Serenity Prayer.

For us, COVID has been up close and personal. One of our key clients, Bronx Care Hospital has been an epicenter of the pandemic in New York City. The doctors, staff and support staff, including GAVS’ IT support engineers have experienced the devastating effect of this pandemic, up close and personal. GAVS’ technical team supported the ICUs and patient care units at the hospitals during the peak of pandemic.

“Every day we witness these heroic acts: one example out of many this week was our own Kishore going into our ICU to move a computer without full PPE (we have a PPE shortage). The GAVS technicians who come into our hospital every day are, like our doctors and healthcare workers, the true heroes of our time.”

Ivan Durbak, CIO, BronxCare Health System

“GAVS Team was instrumental in assisting the deployment of digital contact less care solutions and remote patient monitoring solutions during the peak of COVID. Their ability to react in quick time really helped us save more lives than what we could have, with technology at the fore-front.”

Dr. Sridhar Chilimuri, Chairman, Dept. of Medicine, BronxCare Health System

The alacrity with which our colleagues in India addressed the remote working situation and the initiative that they have demonstrated in maintaining business continuity for the clients in the US have inspired us at GAVS and  have reaffirmed our belief that we are on the way to create a purposeful company.  

The biggest learning from 2020, is that we need to be mindful of the fragility of life and truly make every day count. At GAVS, we are committed to use technology and service for the betterment of our clients and our stakeholders; and anchor this with our values of Respect, Integrity, Trust and Empathy.

The year was not without some positives. Thanks to some new client acquisitions and renewed contracts we have been able to significantly expand the GAVS family and have registered a 40% growth in revenue. 

We have formed Long 80, A GAVS & Premier, Inc. JV and have started reaching out to Healthcare providers in the US. We are reaching out to some of the largest hospitals in North America offering our AI-based Infrastructure Managed Services, Cybersecurity solutions, Prescriptive and Predictive Healthcare Solutions based on Analytics.

“Moving from a vendor-only model with GAVS to a collaborative model through Long 80 expands Premier’s current technology portfolio, enabling us to offer GAVS’ technology, digital transformation and data security services and solutions to US healthcare organizations. We are extremely excited about this opportunity and look forward to our new relationship with GAVS.”

Leigh Anderson, President, Performance Services, Premier, Inc.

This year, we see the Premier team growing by an additional 120 persons to continue to support their initiative to reduce costs, improve efficiency, enhance productivity and faster time to market.

We aim to hit some milestones in our journey of enabling AI-driven Digital Transformation in the Healthcare space. We have constituted a team dedicated to achieving that.

We are contemplating on establishing the GAVS Healthcare Institute in partnership leading institutions in India and US to develop competency within GAVS in the latest technologies for the healthcare space.

GAVS is committed to being a company focused on AI, and newer technologies and promote GAVS’ AI led Technology Operations, Zero Incident Framework. In 2021, we will work on increasing our ZIF sites around the US and India.  

Based on inputs from our Customer Advisory Board, we at GAVS would like to build a competency around Client Relationship and empower our Client Success Managers to evolve as true partners of our Clients and support their aspirations and visions.  

GAVS is also making strong progress in the BFS sector and we would like to leverage our expertise in AI, Blockchain, Service Reliability and other digital technologies.

GAVS has the competency to support multiyear contracts and there will be a push to reach out to Sourcing Companies, Influencers and partners to garner these long-term predictable business.

We will continue to build competency and expertise around Innovation, and there are some initiatives that we will be putting in place to promote a Culture of Innovation and have measurable successes under Novelty of Innovation.

Our experience of 2020 has inspired us to once again remind ourselves that we should make GAVS an aspirational company, a firm that is purposeful and anchored with our values.

Palo Alto Firewall – DNS Sinkhole

Ganesh Kumar J

Starting with PAN-OS 6.0, DNS sinkhole is an action that can be enabled in Anti-Spyware profiles. A DNS sinkhole can be used to identify infected hosts on a protected network using DNS traffic in environments where the firewall can see the DNS query to a malicious URL.

The DNS sinkhole enables the Palo Alto Networks device to forge a response to a DNS query for a known malicious domain/URL and causes the malicious domain name to resolve to a definable IP address (fake IP) that is given to the client. If the client attempts to access the fake IP address and there is a security rule in place that blocks traffic to this IP, the information is recorded in the logs.

Sample Flow

We need to keep the following in mind before assigning an IP address to DNS sinkhole configuration.

When choosing a “fake IP”, make sure that the IP address is a fictitious IP address that does not exist anywhere inside the network. DNS and HTTP traffic must pass through the Palo Alto Networks firewall for the malicious URL to be detected and for the access to the fake IP to be stopped. If the fake IP is routed to a different location, and not through the firewall, this will not work properly.

Steps:

  1. Make sure the latest Antivirus updates are installed on the Palo Alto Networks device. From the WebUI, go to Device > Dynamic Updates on the left. Click “Check Now” in the lower left, and make sure that the Anti-Virus updates are current. If they are not, please do that before proceeding. The Automatic Updates can be configured if they are not setup.

Fig1.1

IT Automation with AI

Note: A paid Threat Prevention subscription for the DNS sinkhole is required to function properly.

  1. Configure the DNS Sinkhole Protection inside an Anti-Spyware profile. Click on the Objects > Anti-Spyware under Security Profiles on the left.
    Use either an existing profile or create a new profile. In the example below the “alert-all” is being used:

Fig1.2:

Office 365 Migration

Click the name of the profile – alert-all, click on the DNS Signatures tab.

Fig1.3:

Software Test Automation Platform

Change the “Action on DNS queries” to ‘sinkhole’ if it is not already set to sinkhole.
Click on the Sinkhole IPv4 field, either select the default Palo Alto Networks Sinkhole IP (72.5.65.111) or a different IP of your choosing. If you opt to use your own IP, ensure the IP is not used inside your network and preferably not routable over the internet (RFC1918).
Click on Sinkhole IPv6 and enter a fake IPv6 IP. Even if IPv6 is not used, something still needs to be entered. The example shows ::1. Click OK. 

Note: If nothing is entered for the Sinkhole IPv6 field, OK will remain grayed out.

  1. Apply the Anti-Spyware profile on the security policy that allows DNS traffic from the internal network (or internal DNS server) to the internet. Click on Policies> Security on the left side. Inside the rules, locate the rule that allows DNS traffic outbound, click on the name, go to the Actions tab, and make sure that the proper Anti-Spyware profile is selected. Click OK..

Fig1.4:

Software Product Engineering Services

  1. The last thing needed is to have a security rule that will block all web-browsing and SSL access to the fake IP 72.5.65.111 and also :1 if using IPv6. This will ensure to deny traffic to the fake IP from any infected machines.

Fig1.5:

Security Iam Management Tools

  1. Commit the configuration

Fig1.6:

Rpa in Infrastructure Management

(To be continued…)

References:

About the Author –

Ganesh is currently managing Network, Security and engineering team for a large US based customer. He has been associated with the Network & Security domain for more than 15 years.

Container Security

Anandharaj V

We live in a world of innovation and are beneficiaries of new advancements. New advancements in software technology also comes with potential security vulnerabilities.

‘Containers’ are no exception. Let us first understand what a container is and then the vulnerabilities associated with it and how to mitigate them.

What is a Container?

You might have seen containers in the shipyard. It is used to isolate different cargos which is transported via ships. In the same way, software technologies use a containerization approach.

Containers are different from Virtual Machines (VM) where VMs need a guest operating system which runs on a host operating system (OS). Containers uses OS virtualization, in which required processes, CPU, Memory, and disk are virtualized so that containers can run without a separate operating system.

In containers, software and its dependencies are packaged so that it can run anywhere whether on-premises desktop or in the cloud.

IT Infrastructure Managed Services

Source: https://cloud.google.com/containers

As stated by Google, “From Gmail to YouTube to Search, everything at Google runs in containers”.

Container Vulnerabilities and Countermeasures

Containers Image Vulnerabilities

While creating a container, an image may be patched without any known vulnerabilities. But a vulnerability might have been discovered later, while the container image is no longer patched. For traditional systems, it can be patched when there is a fix for the vulnerability without making any changes but for containers, updates should be upstreamed in the images, and then redeployed. So, containers have vulnerabilities because of the older image version which is deployed.

Also, if the container image is misconfigured or unwanted services are running, it will lead to vulnerabilities.

Countermeasures

If you use traditional vulnerability assessment tools to assess containers, it will lead to false positives. You need to consider a tool that has been designed to assess containers so that you can get actionable and reliable results.

To avoid container image misconfiguration, you need to validate the image configuration before deploying.

Embedded Malware and Clear Text Secrets

Container images are collections of files packaged together. Hence, there are chances of malicious files getting added unintentionally or intentionally. That malicious software will have the same effect as of the traditional systems.

If secrets are embedded in clear text, it may lead to security risks if someone unauthorized gets access.

Countermeasures

Continuous monitoring of all images for embedded malware with signature and behavioral detection can mitigate embedded malware risks.

 Secrets should never be stored inside of containers image and when required, it should be provided dynamically at runtime.

Use of Untrusted Images

Containers have the advantages of ease of use and portability. This capability may lead teams to run container images from a third party without validating it and thus can introducing data leakage, malware, or components with known vulnerabilities.

Countermeasures

Your team should maintain and use only trusted images, to avoid the risk of untrusted or malicious components being deployed.

Registry Risks

Registry is nothing but a repository for storing container images.

  1. Insecure connections to registries

Images can have sensitive information. If connections to registries are performed over insecure channels, it can lead to man-in-the-middle attacks that could intercept network traffic to steal programmer or admin credentials to provide outdated or fraudulent images.

You should configure development tools and containers while running, to connect only over the encrypted medium to overcome the unsecured connection issue.

  1. Insufficient authentication and authorization restrictions

As we have already seen that registries store container images with sensitive information. Insufficient authentication and authorization will result in exposure of technical details of an app and loss of intellectual property. It also can lead to compromise of containers.

Access to registries should authenticated and only trusted entities should be able to add images and all write access should be periodically audited and read access should be logged. Proper authorization controls should be enabled to avoid the authentication and authorization related risks.

Orchestrator Risks

  1. Unbounded administrative access

There are many orchestrators designed with an assumption that all the users are administrators but, a single orchestrator may run different apps with different access levels. If you treat all users as administrators, it will affect the operation of containers managed by the orchestrator.

Orchestrators should be given the required access with proper role-based authorization to avoid the risk of unbounded administrative access.

  1. Poorly separated inter-container network traffic

In containers, traffic between the host is routed through virtual overlay networks. This is managed by the orchestrator. This traffic will not be visible to existing network security and management tools since network filters only see the encrypted packets traveling between the hosts and will lead to security blindness. It will be ineffective in monitoring the traffic.

To overcome this risk, orchestrators need to configure separate network traffic as per the sensitivity levels in the virtual networks.

  1. Orchestrator node trust

You need to give special attention while maintaining the trust between the hosts, especially the orchestrator node. Weakness in orchestrator configuration will lead to increased risk. For example, communication can be unencrypted and unauthenticated between the orchestrator, DevOps personnel, and administrators.

To mitigate this, orchestration should be configured securely for nodes and apps. If any node is compromised, it should be isolated and removed without disturbing other nodes.

Container Risks

  1. App vulnerabilities

It is always good to have a defense. Even after going through the recommendations, we have seen above; containers may still be compromised if the apps are vulnerable.

As we have already seen that traditional security tools may not be effective when you use it for containers. So, you need a container aware tool which will detect behavior and anomalies in the app at run time to find and mitigate it.

  1. Rogue containers

It is possible to have rogue containers. Developers may have launched them to test their code and left it there. It may lead to exploits as those containers might not have been thoroughly checked for security loopholes.

You can overcome this by a separate environment for development, test, production, and with a role-based access control.

Host OS Risks

  1. Large attack surface

Every operating system has its attack surface and the larger the attack surface, the easier it will be for the attacker to find it and exploit the vulnerability and compromise the host operating system and the container which run on it.

You can follow the NIST SP 800-123 guide to server security if you cannot use container specific operating system to minimize the attack surface.

  1. Shared kernel

If you only run containers on a host OS you will have a smaller attack surface than the normal host machine where you will need libraries and packages when you run a web server or a database and other software.

You should not mix containers and non-containers workload on the same host machine.

If you wish to further explore this topic, I suggest you read NIST.SP.800-190.


References

About the Author –

Anandharaj is a lead DevSecOps at GAVS and has over 13 years of experience in Cybersecurity across different verticals which include Network Security, application Security, computer forensics and cloud security.

Business Intelligence Platform RESTful Web Service

Albert Alan

Restful API

RESTful Web Services are REST architecture based web services. Representational State Transfer (REST) is a style of software architecture for distributed systems such as the World Wide Web. In this architectural style, data and functionality is considered resources and are accessed using Uniform Resource Identifiers (URIs), typically links on the Web.

RESTful Web Service

REST has some advantages over SOAP (Simple Objects Access Protocol) but is similar in technology since it is also a function call via HTTP protocol. REST is easier to call from various platforms, transfers pure human-readable data in JSON or XML and is faster and saves resources.

In the basic idea of REST, an object is accessed via REST, not its methods. The state of the object can be changed by the REST access. The change is caused by the passed parameters. A frequent application is the connection of the SAP PI via the REST interface.

When to use Rest Services

  • You want to access BI platform repository objects or perform basic scheduling.
  • You want to use a programming language that is not supported by another BI platform SDK.
  • You want to extract all the query details and number of records per query for all the reports like Webi and Crystal, etc.
  • You want to extract folder path of all reports at once.

Process Flow

RESTful Web Service

RESTful Web Service Requests

To make a RESTful web service request, you need the following:

  • URL – The URL that hosts the RESTful web service.
  • Method – The type of HTTP method to use for sending the request, for example GET, PUT, POST, or DELETE.
  • Request header – The attributes that describe the request.
  • Request body – Additional information that is used to process the request.

Common RWS Error Messages

RESTful Web Service

Restful Web Service URIs Summary List

URLResponseComments
  /v1Service document that contains a link to the /infostore API.This is the root level of an infostore resource
  /v1/infostoreFeed contains all the objects in BOE system/v1/infostore
  /v1/infostore/ <object_id>Entry corresponding to the info object with SI_ID=./v1/infostore/99
      /v1/logon/longReturns the long form for logon, which contains the user and password authentication template.Used to logon to the BI system based on the authentication method.
  /v1/users/ <user_id>  XML feed of user details in BOE systemYou can Modify user using PUT method and DELETE user using DELETE method.
    /v1/usergroups/ <usergroup_id>    XML feed of user group details in BOE systemSupport GET and PUT and DELETE method. You can Modify user group using PUT method and DELETE user group using DELETE method.
  v1/folders/ <folder_id>XML feed displays the details of the folder, can be used to modify the details of the folder, and delete the folder.You modify the folder using PUT method and DELETE the folder using DELETE method
  /v1/publicationsXML feed of all publications created in BOE systemThis API supports GET method only.

Extended Workflow

 The workflow is as follows:

  • To Pass the Base URL

GET http:///localhost:6405/biprws/v1/users

  • To Pass the Headers

  • To Get the xml/json response

Automation of Rest Call

The Business Intelligence platform RESTful Web Service  (BI-REST-SDK) allows you to programmatically access the BI platform functionalities such as administration, security configuration and modification of the repository. In addition, to the Business Intelligence platform RESTful web service SDK, you can also use the SAP Crystal Reports RESTful Web Services  (CR REST SDK) and SAP Web Intelligence RESTful Web Services (WEBI REST SDK).

Implementation

An application has been designed and implemented using Java to automate the extraction of SQL query for all the webi reports from the server at once.

Tools used:

  • Postman (Third party application)
  • Eclipse IDE

The structure of the application is as below:

The application file comprises of the required java jar files, java class files, java properties files and logs. Java class files (SqlExtract) are the source code and will be compiled and executed using command prompt as:

Step 1

  • Javac -cp “.;java-json.jar;json-simple-1.1.jar;log4j-1.2.17.jar” SqlExtract.java

 The above command compiles the java code.

Step 2

  • Java -cp “.;java-json.jar;json-simple-1.1.jar;log4j-1.2.17.jar” SqlExtract.java

 The above command runs the compiled java file.

The java properties file (log4j) is used to set the configurations for the java code to run. Also, the path for the log file can be set in the properties file.

RESTful Web Service

The logs (SqlExtractLogger) consist of the required output file with all the extracted query for the webi reports along with the data source name, type and the row count for each query in the respective folder in the path set by the user in properties file.

RESTful Web Service

The application is standalone and can run in any windows platform or server which has java JRE (version greater than 1.6 – preferred) installed in it.

Note: All the above steps required to execute the application are consolidated in the (steps) file.

Conclusion

SAP BO provides Restful web service to traverse through its repository, to fetch structural info and to modify the metadata structure based on the user requirements. When integrated with programming languages like python, java, etc., extends the scope to a greater extent, allowing the user to automate the workflows and to solve the backtracking problems.

Handling Restful web service needs expertise in server administration and programming as changes made to the metadata are irreversible.

References

About the Author –

Alan is a SAP Business Intelligence consultant with a critical thinking and an analytical mind. He believes in ‘The more extensive a man’s knowledge of what has been done, the greater will be his power of knowing what to do’.

Center of Excellence – .Net

Best Cyber Security Services Companies

“Maximizing the quality, efficiency, and reusability by providing innovative technical solutions, creating intellectual capital, inculcating best practices and processes to instill greater trust and provide incremental value to the Stakeholders.”

With the above mission,we have embarked on our journey to establish and strengthen the .NET Center of excellence (CoE).

“The only way to do great work is to love what you do.” – Steve Jobs

Expertise in this CoE is drawn from top talent across all customer engagements within GAVS. Team engagement is maintained at a very high level with various connects such as regular technology sessions, advanced trainings for CoE members from MS, support and guidance for becoming a MS MVP. Members also socialize new trending articles, tools, whitepapers and blogs within the CoE team and MS Teams channels setup for collaboration. All communications from MS Premier Communications sent to Gold Partners is also shared within the group. The high-level roadmap as planned for this group is laid out below.

Best DCaas Providers in USA
<!–td {border: 1px solid #ccc;}br {mso-data-placement:same-cell;}–>
Best DCaas Providers in USA<!–td {border: 1px solid #ccc;}br {mso-data-placement:same-cell;}–>
Best DCaas Providers in USA

The .NET CoEfocused on assistingourcustomers in every stage of theengagement right from on-boarding, planning, execution, technical implementation and finally all the way to launching and growing. Our prescriptive approach is to leverage industry-proven best practices, solutions, reusable components and include robust resources, training, and making a vibrant partner community.

With the above as the primary goal in mind the CoE group is currently engaged inor planning the following initiatives.

Technology Maturity Assessment

One of the main objectivesof this group is to provide constant feedback to all .NET stack project for improvement and improvisation. The goal for this initiative is to build the technology maturity index for all projects for the below parameters.

Best Virtual Desktop Infrastructure Software

Using those approaches within a short span of time we were able to make a significant impact for some of our engagements.

Client – Online Chain Store: Identified cheaper cloud hosting option for application UI.

Benefits: Huge cost and time savings.

Client – Health care sector: Provided alternate solution for DB migrations from DEV to various environments.

Benefits: Huge cost savings due to licensing annually.

Competency Building

“Anyone who stops learning is old, whether at twenty or eighty.” – Henry Ford

Continuous learning and upskilling are the new norms in today’s fast changing technology landscape. This initiative is focused on providing learning and upskilling support to all technology teams in GAVS. Identifying code mentors, supporting team members to become full stack developers are some of the activities planned under this initiative.  Working along with the Learning & Development team,the .NET CoE isformulating different training tracks to upskill the team members and provide support for external assessments and MS certifications.

Solution Accelerators

“Good, better, best. Never let it rest. ‘Till your good is better and your better is best.” – St. Jerome

The primary determinants of CoE effectiveness are involvement in solutions and accelerators and in maintaining standard practices of the relevant technologies across customer engagements across the organization.

As part of this initiative we are focusing on building project templates, DevOps pipelines and automated testing templates for different technology stacks for both Serverless and Server Hosted scenarios. We also are planning similar activities for the Desktop/Mobile Stack with the Multi-Platform App UI (MAUI) framework which is planned to be released for Preview in Q4 2020.

Blockchain Solution and Services

Additionally, we are also adoptingless-code, no-code development platforms for accelerated development cycles for specific use-cases.

As we progress on our journey to strengthen the .NET CoE, we want to act as acatalyst in rapid and early adoption of new technology solutions and work as trusted partners with all our customer and stakeholders.

If you have any questions about the CoE, you may reach out to them at COE_DOTNET@gavstech.com

CoE Team Members

  • Bismillakhan Mohammed
  • Gokul Bose
  • Kirubakaran Girijanandan
  • Neeraj Kumar
  • Prasad D
  • Ramakrishnan S
  • SaphalMalol
  • Saravanan Swaminathan
  • SenthilkumarKamayaswami
  • Sethuraman Varadhan
  • Srinivasan Radhakrishnan
  • Thaufeeq Ahmed
  • Thomas T
  • Vijay Mahalingam

Center of Excellence – Server

Our Server CoE is a team of highly skilled individuals and experts in various server technologies who promote collaboration, standardization and best practices to drive business or customer-valued results.

The CoE is focused on providing expert level support in technologies like Windows / Linux Servers, Exchange / O365 Messaging solution, Virtualization with VMWare / Hyper-V / Citrix / Linux, Patch & Compliance Management, Application Availability & Performance Monitoring and Backup / Recovery solutions, etc.

The Server CoE also focuses on in-depth assessment of customer end server infrastructure components to study and analyze the existing design implementations, configurations, and operations to identify strengths and weaknesses to implement technical and economical improvements to businesses, wherever applicable, and perform upgrades, migrations and transformations as necessary.

IT Automation with AI

A wide range of server technologies comprise the Server CoE and not every business or customer can practically leverage all of them. And in the same way, not all the members can practically become an SME in all the server technologies.

Service Offerings

AI Devops Automation Service Tools

Current & Upcoming Engagements

A farm credit bank of US – Server Assessment – In Progress – July 2020

  • MS Active Directory Assessment
    • MS Exchange Assessment
    • VMWare Assessment
    • MS SCCM Assessment
    • MS SCOM Assessment
    • Storage
    • Backup Assessment

A global professional services firm – Hybrid Exchange 2016 Migration – July/August 2020

  • SOW Sign Off – Completed
    • Background verification process for 2 Technical Resources – Completed
    • Migration Environment Setup – In Progress
    • Assessment / Pre-requisites Review – Next Steps
    • Migration Test Phase – July 2020
    • Production Migration – July-August 2020

A Multinational Dairy Company – Active Directory & Exchange Server Migration / July – August 2020

  • Microsoft Active Directory Server Assessment
    • Microsoft Exchange Server Assessment
    • Migration of Active Directory from Windows Server 2008 R2 to Windows Server 2016.
    • Migration of Exchange from Exchange Server 2016 to Exchange Server 2019.

A Wellness Services Agency – Resolve Issues with Exchange Database / DDL – July – August 2020

  • Customer Call / Technical Solution / SOW – Completed
    • SOW Sign Off – In Progress by July 2020
    • Assessment / Migration – Next Steps

A Leading FMCG company of India – Digital Transformation to O365 – July – August 2020

  • Zimbra Mail to O365 Migration
    • Licensing Model Finalization – In Progress
    • Migration Plan & Execution – Next Steps

A Leading FMCG company of India – DNS Migration between Service Providers – July 2020

  • 30+ Domains are registered with Net4India
    • Availability & Support Issues with current provider
    • Assess current domain lists and Migrate to new Provider

A Diverse Hardware Group – Azure Cloud Integration & Support – July/August 2020

  • SOW – in Progress

Road Map

AIOps Artificial Intelligence for IT Operations

Contribution to Organization’s Growth

The Server CoE’s contribution is not limited to one activity with one customer at a time, but involved with multiple simultaneous activities in different server technologies in different customer requirements. Server CoE contributions:

  • Participating in RFPs / Proposals by providing technical solutions to prospects’ requirements
  • Participating in full time Infrastructure Assessment projects for various customers
  • Participating in full time Implementations & Migration projects for different customers
  • Providing Standard Operating Procedures, templates & best practice recommendations in various server technologies
  • Provide internal training to individuals to upskill and strengthen the team
  • Responding to requests and providing solutions to issues faced in various customer engagements

The members of our CoE are dedicated to in carrying out all CoE related activities in addition to their day to day activities in their assigned projects without any impact. We aim to contribute to the organization in terms of technological capability establishment and financial growth with new business opportunities.

If you have any questions about the CoE, you may reach out to them at COE_SERVER@gavstech.com

CoE Team Members

  • Balamurugan Rajamanickam
  • Dilipkumar Dhanasekaran
  • Dinesh Kumar
  • Karthick Mani
  • Karthickmanikandan G
  • Manoj Akula
  • Marimuthupandi Kalimuthu
  • Ramkumar Janakiraman
  • Sabari Nivas
  • Sathishkumar Jayaraman
  • Selvaganesh Kothandan
  • Sivakumar Duraisamy
  • Lakshmi Srikanth

Is the Future of White-Collared Workforce only Digital?

Hariharan Madhavan

COVID-19 taught all white-collared workers and their employers one thing for sure – “It is possible to work from home”. With the current advancements in technology – using a mobile app-based contact center solutions, using collaboration platforms to edit content together, hosting tech troubleshooting bridges where multiple engineers solve an issue, video conferencing meetings allowing people to see each other, from where work is delivered does not matter anymore.

Rpa in Infrastructure Management

Wearing what feels comfortable, sitting comfortably, eating homemade food, personalizing your room, life was never better balanced between work and personal life better than now. With nobody to micromanage, the only way to measure a worker is through outcomes. Attendance swipes are a thing of the past. People managers who have no idea of the work done by their team members will become redundant starting2020.
New digital companies will take over like a storm to embrace this opportunity, just like AGILE took over like a religion to manage software development projects.

Existing digital workforce companies are already providing opportunities for companies to hire talent who can work remotely on a need basis from around the world and save potential hiring costs and free from commitments. Just like Uber and Lyft transformed the taxi business, we could see a wave of disruption transforming and killing the traditional brick and mortar IT behemoths to more agile and digital workforce capabilities hiring top talent on the click of a mobile app, and being able to get talent requirements fulfilled in minutes instead of having to wait for weeks or months to get somebody to join. This will be like the DevOps of Hiring for managers who have new projects and budgets looking for people to get things done.

Every other aspect of the business has changed, reducing time to market, and hiring talent is the only area still very traditional and inefficient. It’s not too late for somebody to realize and use this uncertain economic environment as a cradle of opportunity to offer enterprises as a solution.

The next question that comes up is if the borders are removed, how do you secure and still be compliant with your compliance norms. This is completely dependent on the level of sensitivity of data to which an employee/contractor has access. From using privacy screens in the laptops to using technology like VDI, SaaS-based EDR, NGAV, unified agents, CASB’s, you have literally every control that you can think of on-premise that you can enforce in a laptop used by an employee.

When companies hire you in the future, they will ship you an asset to your home location and expect you to use that asset for work. When you have moved out, you will be sent return shipping on which you can put the asset and send it back.

Another main setback that prevented a revolution is that IT companies had to pay for bench talent to provide for the demand. This will also be disrupted by new entrants. New disruptors will be willing to share up to 70% of the revenue earned by somebody back to them, but if there is a loss of billable revenue, the same will be immediately passed on to the concerned employee. These measures will weed out people who are just not meant for the IT workforce that demands constant skill up-gradation, essentially leaving IT to only the high potential workers who are dynamic.

About the Author –

Hariharan is the global head of Cybersecurity at GAVS. He is responsible for strategic and tactical leadership around emerging technologies such as cloud transformation, cloud-native microservices development, software-defined networking, cloud security, DevOps Security, Security and Automation, Security & AI.

An unprecedented crisis and its unprecedented opportunities

Machine learning service provider

Bindu Vijayan

We will never forget these times, most of us, the regular, morning-news addicts, switch on our TVs, hoping to see declining numbers in the coronavirus infected list.  Country to country, we go feverishly through the good news that we are finally seeing, with the curve flattening. There is a lot of fear and trepidation as to how we will pick up and reintroduce our ways of living and working. Even as we are experiencing just how effective it is to be working from home, it is but natural that companies will resume regular ways of working – back to the office (do we really need to continue paying the real-estate gods as much?), resume travel (do we need to, when virtual meetings were working so perfect?) as soon as the travel embargoes are lifted, it would soon be back to business, all of us more determined than ever, the whole world is raring to go.

Clear communication, as often as it takes, would be the backbone of the new disruptive work practices as these practices will leave employees with some degree of confusion/unrest, particularly in the threat of the current recession. Our lives have been disrupted in every way under the COVID 19 threat, and it is very important that employee morale is high.  It is important for Managers to address employee concerns with sensitivity, everyone is going to have questions on the future of the company, the business, and if their roles are going to be seeing changes. Employees must be told about the changes that are going to be affected, the precautions that are being taken, and also taught/ guided how to function best under these circumstances. If someone has recovered from COVID 19, support him/her without stigma and discrimination. Maintaining employee morale through various activities during these times will bring the much-required boost – plan on virtual awards and recognitions, do as much online as possibly can. And let the communication and interaction be two way – find out the office sentiment, how employees are feeling and make adjustments and improvements accordingly, and communicate constantly.

Going back to our offices after this crisis requires renewed vigilance, given the nature of the coronavirus. Resuming work at the office premises would mean having the whole bunch of employees back, which in itself is a very tricky situation – from social distancing back to human density – it is very important that workplaces are maintained in high levels of hygiene. COVID 19 established the fact that there is definite risk in crowds, and for companies to plan to have employees back at their premises imply a deeper than ever responsibility to workplace hygiene and health. Managing the numbers at our workplace is going to be critical if we are to keep safe from the threat of another attack by COVID 19. Hygiene and cleaning processes need to be increased to its maximum capacity across the workplaces and common areas. Surfaces (e.g. desks and tables) and objects need to be wiped with disinfectant regularly. Alcohol based hand rub dispensers should be maintained at prominent places across the facility. Keep promoting hand-washing through posters and monitors across the facility so that it is a constant reminder for employees to take precautions.

Having to be careful with numbers would require companies to redesign workplaces to have employees coming back. Even though it might not be entirely viable, it can be a mix of having employees continue work from home in rotation, perhaps every week, or whatever works best for the functions, while others work out of the office in redesigned (read larger, increased physical distances) workspaces.  Allocating more space to employees can be achieved only through rotation shifts in order to support social distancing for the rest of the required period as per WHO / local health authority guidelines.  Plan work schedule charts for the various functions to work out of their offices, and maintaining strict schedules will not only decrease the risk of infection but also help employees to plan better, as well as ease anxieties and confusion.

To make the best out of the situation, let’s take the opportunity to accept this as a huge learning time – rethink on travel, travel only if it is really necessary and save money, it can be diverted into more important areas. Promote collaboration across geos, virtual meetings have been a big success during this time, and lets continue to collaborate not just for work and meetings but also to have online employee events across geos. If anything, using more online meetings due to the situation has only brought about an increased sense of camaraderie.  We have seen our colleagues in New York city working at the BronxCare, helping patients in ICU, working alongside the medical staff, and it has been a proud moment for every GAVSian across the world to celebrate them, GAVS’ heroes.

And lastly, as we leave this traumatic time behind us, let’s be careful to ensure that we don’t have to go through the situation again.  Follow WHO guidelines to take control measures that focus on prevention and on active surveillance for early detection and treatment.  The opportunities that this pandemic has shown us are multitude – Newspapers report “our planet is detoxing as humans stay lockdown” – Lower carbon emissions are reported.  Rob Jackson, a professor of Earth system science at Standford University says that carbon output could fall by more than 5% this year, the first dip since a 1.4% reduction after the 2008 financial crisis. The air is cleaner and it is quieter too. Decibel readings at a busy intersection in India were 90 pre-pandemic but it recently measured at just 68, reports Boston University. Water quality is reported to have improved across the globe – from Venice, famous for its canals, its waterways are benefiting from the lack of usual boat traffic brought on by thousands of visitors. The wildlife that usually shies away from humans is seen in abundance, be it the Ridley turtles in the beaches of Orissa, India, to the otters in Singapore, to the whales and deer in Japan, to the orcas in North America.  There is so much of the natural world that is suddenly thriving when we gave it a little space….

This has been a time of unprecedented learning opportunities even as our lives got turned upside down. But true as human spirits go, here is something remarkable I read on Linkedin; it reflects hope, positivity, and genuine empathy – here is an excerpt from a post by Dr. Joerg Storm “Next year, I don’t want to hear about the Oscars, Grammys, Tonys or Golden Globes….. I want to see nurses, doctors, ambulance crews, firefighters, healthcare support workers, delivery guys, shop workers, truck drivers, grocery store workers, and all other essential workers get free red carpet parties with awards and expensive goodie bags. “

Keep Calm and Be a Great Leader in a Time of Pandemic

Katy Sherman

We live in scary times. While governments call for social distancing, it becomes more important than ever to stay connected as a community. For many of us the measures around COVID-19 mean we work from home and manage remote teams. While virtual teams are not unusual, today’s situation brings its own challenges. Today it is not only about being remote, it’s about facing fears. We fear for our jobs, our health, our families and friends.

How do we help each other stay productive and connected while we are worried and isolated?

This is what every leader should do to support their teams and help them get through the difficult times:

1) Make sure everybody has what they need to work remotely. Technology goes a long way in creating inclusive collaborative environment. Ask frequently, be prepared to act to resolve issues. Know how to navigate the company to obtain resources through management, HR, and Helpdesk.

2) Mentor team members on time management, especially people who are not used to work from home. Share expectations and establish norms of how to be available throughout the day, and when to go offline. While some people struggle with home environment being too distracting, others find it difficult to disengage at the end of the day and would stay at their desks until late. Give guidance based on the unique needs of each individual.

3) Get into a habit of checking in on people without agenda – have a coffee break together, chat about things not related to work, allow to unwind. Keep your finger on the pulse! Your team members can experience anxiety, be dealing with personal issues or worried about their communities. Some will need time off, or more flexibility than usual to provide child care, buy groceries during sporadic shortages, or take care of family members.

4) Simulate reality through video chats. Being on camera helps us stay focused, engaged in the conversation, as well as look and feel professionally. It also allows to read the non-verbals and better understand the vibe of the conversation. Turn your video on every time you’re in a meeting, this will encourage others to do the same.

5) Take care about yourself! Wash hands, sleep, exercise, go for a walk, drink water. Keep calm. Don’t spread frustration and panic. Remember, people are looking up to you, so lead by example.

I am sure we will get through this as a community. Lead the way and help others!

Microsoft Cloud Solution Provider

About the Author:

Katy is passionate about:

•Leadership and vision • Innovation, technical excellence and highest quality standards • Agility achieved through teamwork, Agile, Scrum, Kanban, TDD, CI/CD, DevOps and automation • Breaking silos and promoting collaboration of Development, Testing and Operations under cross-functional umbrella of Software Engineering • Diversity of personalities, experiences and opinions.

Things Katy does to spread the word:

•Speak at Technology conferences (including as an invited and key-note speaker) • Blog and participate in group discussions

•Collaborate with schools, universities and clubs • Empower girls and women, help them learn about Technology and become engineers