Shining a Light on Shadow IT

Too often, Shadow IT systems—those not authorized by IT—are used by the business to perform work. Here are a few common examples:

  • A cloud storage system (such as SharePoint) may be authorized and managed by IT, but employees may use external cloud applications (such as Dropbox or Google Drive) when working with external vendors.
  • A collaboration tool (such as Slack or Basecamp) may contain important information and documentation that are effectively invisible to the IT portfolio.
  • Vast spreadsheets may exist across disparate programs, requiring manual reconciliation and long email chains for even the most minor changes.

Continue Reading

Please share with your network:
Tutorial Running a VSM Workshop - Abraic

Tutorial: Running a Value Stream Mapping Workshop

A Value Stream Mapping (VSM) workshop is designed to plan process improvements by mapping the current flow of information and materials, generating an ideal future state for that flow, and putting forth a high-level plan to achieve the future state.

Here is a tutorial explaining the process and expected outcomes from a VSM workshop:

Continue Reading

Please share with your network:

Improving Business Processes: How to Run a Value Stream Mapping Workshop

Value Stream Mapping (VSM) has its origin in manufacturing, but has been successfully adopted for business processes. Why should IT consider conducting a VSM workshop?

Continue Reading

Please share with your network: