I’m really excited by a just-finished OSS analysis (part 2)
As the title suggests, this is the second part in a series describing a process flow visualisation, optimisation and decision support methodology that uses simple log data as input. Yesterday’s post, part 1 in the series, showed the visualisation aspect in the form of a Sankey flow diagram. This visualisation is exciting because it shows […]
I’m really excited by a just-finished OSS analysis
In your travels, I don’t suppose you’ve ever come across anyone having challenges to capture and/or optimise their as-is OSS/BSS process flows? Once or twice?? 🙂 Well I’ve just completed an analysis that I’m really excited about. It’s something I’ve been thinking about for some time, but have just finished proving on the weekend. I […]
Are modern OSS architectures well conceived?
“Whatever is well conceived is clearly said, And the words to say it flow with ease.” Nicolas Boileau-Despréaux. I’d like to hijack this quote and re-direct it towards architectures. Could we equally state that a well conceived architecture can be clearly understood? Some modern OSS/IT frameworks that I’ve seen recently are hugely complex. The question […]
Making a basic assessment of OSS value
“…as technology gets more complicated, it becomes more difficult for buyers to acquire the skills needed to make even a basic assessment of value. Without such an assessment, it’s hard to get a project going, and in particular hard to get one going the right way.” Tom Nolle. Have you noticed that over the last […]
The OSS “out of control” conundrum
Over the years in OSS, I’ve spent a lot of my time helping companies create their OSS / BSS strategies and roadmaps. Sometimes clients come from the buy side (eg carriers, utilities, enterprise), other times clients come from the sell side (eg vendors, integrators). There’s one factor that seems to be most commonly raised by […]
Can you solve the omni-channel identity conundrum for OSS/BSS?
For most end-customers, the OSS/BSS we create are merely back-office systems that they never see. The closest they get are the customer portals that they interact with to drive workflows through our OSS/BSS. And yet, our OSS/BSS still have a big part to play in customer experience. In times where customers can readily substitute one […]
The 3 states of OSS consciousness
The last four posts have discussed how our OSS/BSS need to cope with different modes of working to perform effectively. We started off with the thread of “group flow,” where multiple different users of our tools can work cohesively. Then we talked about how flow requires a lack of interruptions, yet many of the roles […]
OSS work practices that are repulsive
“I believe in the principle that deep work and constant availability are repulsive concepts (in the magnetic sense).” Tyler Mumford in comment 2 to this post. This blogging thing really amazes me at times. I’m regularly left shocked at the serendipitous connections that form when writing posts. Take today’s post. I did a web search […]
Completing an OSS design, going inside, going outside, going Navy SEAL
Our most recent post last week discussed the research organisations like DARPA (Defense Advanced Research Projects Agency) and Google are investing into group flow for the purpose of group effectiveness. It cites the cost of training ($4.25m) each elite Navy SEAL and their ability to operate as if choreographed in high pressure / noise environments. […]
Stealing Fire for OSS (part 2)
Yesterday’s post talked about the difference between “flow state” and “office state” in relation to OSS delivery. It referenced a book I’m currently reading called Stealing Fire. The post mainly focused on how the interruptions of “office state” actually inhibit our productivity, learning and ability to think laterally on our OSS. But that got me […]
Stealing fire for OSS
I’ve recently started reading a book called Stealing Fire: How Silicon Valley, the Navy SEALs, and Maverick Scientists Are Revolutionizing the Way We Live and Work. To completely over-generalise the subject matter, it’s about finding optimal performance states, aka finding flow. Not the normal topic of conversation for here on the PAOSS blog!! However, the […]
ONAP’s fourth release, Dublin, now available
ONAP Doubles-Down on Deployments, Drives Commercial Activity Across Open Source Networking Stack with ‘Dublin’ Release. ONAP’s fourth release, Dublin, brings an uptick in commercial activity – including new deployment plans from major operators (including Deutsche Telekom, KDDI, Swisscom, Telecom Italia, and Telstra) and ONAP-based products and solutions from more than a dozen leading vendors – […]
Lightning strikes in OSS
Operators have developed many unique understandings of what impacts the health of their networks. For example, mobile operators know that they have faster maintenance cycles in coastal areas than they do in warm, dry areas (yes, due to rust). Other operators have a high percentage of faults that are power-related. Others are impacted by failures […]
282 million reasons for increased OSS/BSS scrutiny
“The hotel group Marriott International has been told by the UK Information Commissioner’s Office that it will be fined a little over £99 million (A$178 million) over a data breach that occurred in December last year… This is the second fine for data breaches announced by the ICO on successive days. On Monday, it said […]
The great OSS squeeeeeeze
TM Forum’s Open Digital Architecture (ODA) White Paper begins with the following statement: Telecoms is at a crucial turning point. The last decade has dealt a series of punishing blows to an industry that had previously enjoyed enviable growth for more than 20 years. Services that once returned high margins are being reduced to commodities […]
Step-by-step guide to build a systematic root-cause analysis (RCA) pipeline
Fault / Alarm management tools have lots of strings to their functionality bows to help operators focus in on the target/s that matter most. ITU-T’s recommendation X.733 provided an early framework and common model for classification of alarms. This allowed OSS vendors to build a standardised set of filters (eg severity, probable cause, etc). ITU-T’s […]
RIP John Reilly
Sadly, I’ve just heard about the passing of John Reilly, a distinguished fellow of the TM Forum and giant of our industry. As the fellowship suggests, John was a significant contributor to some of the TM Forum’s most significant and enduring works. Unfortunately I never had the chance to meet John in person, but he […]
What if most OSS/BSS are overkill? Planning a simpler version
What are the key features / functions of an OSS and BSS? You may recall a recent article that provided a discussion around the demarcation between OSS and BSS, which included the following graph: Note that this mapping is just my demarc interpretation, but isn’t the definitive guide. It’s definitely open to differing opinions (ie […]
OSS that repair virtualised networks – the dual loop approach
In a recent article, we talked about Network Service Assurance (NSA) in an environment where network virtualisation exists. One of the benefits of virtualisation or NaaS (Network as a Service) is that it provides a layer of programmability to your network. That is, to be able to instantiate network services by software through a network […]
OSS change…. but not too much… oh no…..
Let me start today with a question: Does your future OSS/BSS need to be drastically different to what it is today? Please leave me a comment below, answering yes or no. I’m going to take a guess that most OSS/BSS experts will answer yes to this question, that our future OSS/BSS will change significantly. It’s […]