Is your service assurance really service assurance?? (Part 5)
In yesterday’s fourth part of this series about modern network service assurance, we wrote this: I also just stumbled upon OpenTelemetry, an open source project designed to capture traces / metrics / logs from apps / microservices. It intrigued me because just as you have the concept of traces / metrics / logs for apps, […]
Is your service assurance really service assurance?? (Part 2)
In yesterday’s article, we asked whether what many know as service assurance can rightfully be called service assurance. Yesterday’s, like today’s, post was inspired by an interesting white paper from the Netrounds team titled, “Reimagining Service Assurance in the Digital Service Provider Era.” Below are three insightful tables from the Netrounds white paper: Table 1 […]
Is your service assurance really service assurance??
I just came across an interesting white paper from the Netrounds team titled, “Reimagining Service Assurance in the Digital Service Provider Era.” You can find a copy here. It’s well worth a read, so much so that I’ll unpack a few of the concepts it contains in a series of articles this week. It rightly […]
Three OSS project responsibility sliders
Last week we shared an article that talked about the different expectations from suppliers and clients when undertaking an OSS implementation project. The diagram below attempts to demonstrate the concept visually, in the form of three important sliders. When it comes to the technical delivery, it makes sense that most of the responsibility falls upon […]
A modern twist on OSS architecture
I was speaking with a friend today about an old OSS assurance product that is undergoing a refresh and investment after years of stagnation. He indicated that it was to come with about 20 out of the box adaptors for data collection. I found that interesting because it was replacing a product that probably had […]
I’m really excited by a just-finished OSS analysis (part 3)
This is the third part of a series describing a really exciting analysis I’ve just finished. Part 1 described how we can turn simple log files into a Sankey diagram that shows real-life process flows (not just a theoretical diagram drawn by BAs and SMEs), like below: Part 2 described how the logs are broken […]
I’m really excited by a just-finished OSS analysis (part 2)
As the title suggests, this is the second part in a series describing a process flow visualisation, optimisation and decision support methodology that uses simple log data as input. Yesterday’s post, part 1 in the series, showed the visualisation aspect in the form of a Sankey flow diagram. This visualisation is exciting because it shows […]
I’m really excited by a just-finished OSS analysis
In your travels, I don’t suppose you’ve ever come across anyone having challenges to capture and/or optimise their as-is OSS/BSS process flows? Once or twice?? 🙂 Well I’ve just completed an analysis that I’m really excited about. It’s something I’ve been thinking about for some time, but have just finished proving on the weekend. I […]
Are modern OSS architectures well conceived?
“Whatever is well conceived is clearly said, And the words to say it flow with ease.” Nicolas Boileau-Despréaux. I’d like to hijack this quote and re-direct it towards architectures. Could we equally state that a well conceived architecture can be clearly understood? Some modern OSS/IT frameworks that I’ve seen recently are hugely complex. The question […]
Making a basic assessment of OSS value
“…as technology gets more complicated, it becomes more difficult for buyers to acquire the skills needed to make even a basic assessment of value. Without such an assessment, it’s hard to get a project going, and in particular hard to get one going the right way.” Tom Nolle. Have you noticed that over the last […]
The OSS “out of control” conundrum
Over the years in OSS, I’ve spent a lot of my time helping companies create their OSS / BSS strategies and roadmaps. Sometimes clients come from the buy side (eg carriers, utilities, enterprise), other times clients come from the sell side (eg vendors, integrators). There’s one factor that seems to be most commonly raised by […]
Can you solve the omni-channel identity conundrum for OSS/BSS?
For most end-customers, the OSS/BSS we create are merely back-office systems that they never see. The closest they get are the customer portals that they interact with to drive workflows through our OSS/BSS. And yet, our OSS/BSS still have a big part to play in customer experience. In times where customers can readily substitute one […]
The 3 states of OSS consciousness
The last four posts have discussed how our OSS/BSS need to cope with different modes of working to perform effectively. We started off with the thread of “group flow,” where multiple different users of our tools can work cohesively. Then we talked about how flow requires a lack of interruptions, yet many of the roles […]
Completing an OSS design, going inside, going outside, going Navy SEAL
Our most recent post last week discussed the research organisations like DARPA (Defense Advanced Research Projects Agency) and Google are investing into group flow for the purpose of group effectiveness. It cites the cost of training ($4.25m) each elite Navy SEAL and their ability to operate as if choreographed in high pressure / noise environments. […]
Stealing Fire for OSS (part 2)
Yesterday’s post talked about the difference between “flow state” and “office state” in relation to OSS delivery. It referenced a book I’m currently reading called Stealing Fire. The post mainly focused on how the interruptions of “office state” actually inhibit our productivity, learning and ability to think laterally on our OSS. But that got me […]
The great OSS squeeeeeeze
TM Forum’s Open Digital Architecture (ODA) White Paper begins with the following statement: Telecoms is at a crucial turning point. The last decade has dealt a series of punishing blows to an industry that had previously enjoyed enviable growth for more than 20 years. Services that once returned high margins are being reduced to commodities […]
Step-by-step guide to build a systematic root-cause analysis (RCA) pipeline
Fault / Alarm management tools have lots of strings to their functionality bows to help operators focus in on the target/s that matter most. ITU-T’s recommendation X.733 provided an early framework and common model for classification of alarms. This allowed OSS vendors to build a standardised set of filters (eg severity, probable cause, etc). ITU-T’s […]
What if most OSS/BSS are overkill? Planning a simpler version
What are the key features / functions of an OSS and BSS? You may recall a recent article that provided a discussion around the demarcation between OSS and BSS, which included the following graph: Note that this mapping is just my demarc interpretation, but isn’t the definitive guide. It’s definitely open to differing opinions (ie […]
OSS change…. but not too much… oh no…..
Let me start today with a question: Does your future OSS/BSS need to be drastically different to what it is today? Please leave me a comment below, answering yes or no. I’m going to take a guess that most OSS/BSS experts will answer yes to this question, that our future OSS/BSS will change significantly. It’s […]
Cool new feature – An OSS masquerading as…
I spent some time with a client going through their OSS/BSS yesterday. They’re an Australian telco with a primarily home-grown, browser-based OSS/BSS. One of its features was something I’ve never seen in an OSS/BSS before. But really quite subtle and cool. They have four tiers of users: Super-admins (the carrier’s in-house admins), Standard (their in-house […]