<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Tech Help</title>
    <link>https://oit-pmo.byu.edu/tech-help</link>
    <description>Tech Help</description>
    <language>en-US</language>
    <lastBuildDate>Fri, 05 Apr 2024 20:45:13 GMT</lastBuildDate>
    <atom:link href="https://oit-pmo.byu.edu/tech-help.rss" type="application/rss+xml" rel="self" />
    <item>
      <title>Are autonomous cars the answer to safer transportation?</title>
      <link>https://oit-pmo.byu.edu/are-autonomous-cars-the-answer-to-safer-transportation</link>
      <description>Tech help on understanding the market for autonomous cars</description>
      <pubDate>Fri, 05 Apr 2024 20:45:13 GMT</pubDate>
      <guid>https://oit-pmo.byu.edu/are-autonomous-cars-the-answer-to-safer-transportation</guid>
      <content:encoded><![CDATA[<html lang="en">                    <head>                <meta charset="utf-8">                <meta property="op:markup_version" content="v1.0">                                    <link rel="canonical" href="https://oit-pmo.byu.edu/are-autonomous-cars-the-answer-to-safer-transportation">                                <meta property="fb:article_style" content="default">            </head>                            <body>                <article>                    <header>                                                                            <h1>Are autonomous cars the answer to safer transportation?</h1>                                                                            <h3 class="op-kicker">Tech Help</h3>                                                                                                    <time class="op-published" dateTime="April 05, 02:45 PM">April 05, 02:45 PM</time>                                                                            <time class="op-modified" dateTime="April 29, 10:53 AM">April 29, 10:53 AM</time>                                            </header>                    <figure> <img src="https://brightspotcdn.byu.edu/7e/41/39f392be4de9936ea5de6dbca529/screenshot-2024-04-05-at-2-32-00-pm.png"></figure><p>In Utah, with all its open spaces and beautiful scenery, why does it still feel like some people treat the driving test as optional? It might not just be a Utah thing  it seems like everywhere, people are in a hurry, breaking rules, and causing trouble on the roads, especially on the I-15 with its frequent accidents. This makes me think that autonomous vehicles will eventually be a safer choice than human drivers. But does that mean that humans won't be able to drive at some point? I honestly don't know, but my AI business professor seems to think so. He has a Ph.D. and has taken computer science classes, which I have not. But before we get sidetracked, I would like to explain a bit more about the tool: Autonomous vehicles.</p><p>Autonomous vehicles are transportation devices capable of moving from one point to a predetermined destination with little to no human interaction. Notice that I said "little to none" because there is a spectrum of automation. If you're curious about which category your car falls into, keep reading!</p><p>Now, lets explore the spectrum of automation that I mentioned earlier:</p><p>Level 0 - No Automation: The driver is completely in charge of the vehicle and manages all driving tasks.</p><p>Level 1 - Driver Assistance: The vehicle can manage either the steering or the acceleration/deceleration, but not at the same time. You might know this as "cruise control."</p><p>Level 2 - Partial Automation: The vehicle combines automated functions like steering and acceleration, but the driver needs to stay alert and involved. Tesla vehicles are a common example of this level, as they could potentially achieve levels 3 or 4, but the company currently chooses not to in order to limit liability for any incidents.</p><p>Level 3 - Conditional Automation: The driver can step back from certain driving tasks under specific conditions but must be ready to intervene when the system requests. At this level, the manufacturer assumes more liability for any accidents that occur, which often means that only large companies able to handle potential lawsuits venture into this territory.</p><p>Level 4 - High Automation: The vehicle can handle all driving functions under specific conditions, though human intervention is still an option. </p><p>Did you know theres already a vehicle operating at Level 4 automation in California? Its called "Waymo," equipped with Google technology to navigate roads without any human interaction. These vehicles are in their beta phase and are operating as taxis in San Francisco. Impressively, theyre turning out to be more affordable than a conventional Uber ride. Does this herald the end of Uber as we know it, or will it challenge Uber to evolve and stay competitive in a future dominated by autonomous taxis? I can't be sure! But what I do know is that on my next trip to San Francisco, Im definitely going to try out this new technology.</p><p>And finally, there's Level 5: these vehicles are completely automated, meaning no human input is required except for setting the destination. The key difference between Level 4 and Level 5 is that Level 5 vehicles don't have any driving hardware, such as a steering wheel or brakes, for a human to use. This means there's no option for a person to take over driving duties; the car is designed to do it all on its own. This is a concept for now and there are not vehicles ready for consumption any time soon.</p><p>No doubt that were exceedingly fortunate to live in an age where the boundaries of technology are expanding right before our eyes. I can only imagine, streets lined with self-driving cars, smart cities that respond to our needs, and innovations that we've never dreamed of, all becoming part of our daily lives. It's a time of profound transformation and opportunity, and its happening in our lifetime! How lucky we are to witness and be a part of this incredible journey into the future.</p>                                    </article>            <script src="https://brightspotcdn.byu.edu/resource/00000173-da06-d043-a7ff-dece7d790000/_resource/brightspot/analytics/search/SiteSearchAnalytics.5eb1a8a326b06970c71b3a253fbeaa64.gz.js" data-bsp-contentid="00000189-41f1-daf2-a1c9-71fd23c90000"></script></body>            </html>]]></content:encoded>
    </item>
    <item>
      <title>Leveraging AI for Enhanced Project Management and Agile Coaching</title>
      <link>https://oit-pmo.byu.edu/leveraging-ai-for-enhanced-project-management-and-agile-coaching</link>
      <description>In the field of technology, Artificial Intelligence (AI) has become an important tool for improving efficiency and effectiveness.</description>
      <pubDate>Fri, 05 Apr 2024 16:32:28 GMT</pubDate>
      <guid>https://oit-pmo.byu.edu/leveraging-ai-for-enhanced-project-management-and-agile-coaching</guid>
      <content:encoded><![CDATA[<html lang="en">                    <head>                <meta charset="utf-8">                <meta property="op:markup_version" content="v1.0">                                    <link rel="canonical" href="https://oit-pmo.byu.edu/leveraging-ai-for-enhanced-project-management-and-agile-coaching">                                <meta property="fb:article_style" content="default">            </head>                            <body>                <article>                    <header>                                                                            <h1>Leveraging AI for Enhanced Project Management and Agile Coaching</h1>                                                                            <h3 class="op-kicker">Tech Help</h3>                                                                                                    <time class="op-published" dateTime="April 05, 10:32 AM">April 05, 10:32 AM</time>                                                                            <time class="op-modified" dateTime="April 05, 10:32 AM">April 05, 10:32 AM</time>                                            </header>                    <figure> <img src="https://brightspotcdn.byu.edu/d3/2a/cef88cc94bf3b551eec3fd5c1a7a/960x0.webp"></figure><p>In the field of technology, Artificial Intelligence (AI) has become an important tool for improving efficiency and effectiveness. </p><p>For student project managers and agile coaches, AI offers a variety of capabilities that can enhance our workflow, decision-making processes, and overall project success. By using the power of AI, we can overcome more of the challenges of project management and set a new standard for excellence at BYU Office of Information Technology.</p><p>AI technologies can be particularly beneficial for project management and agile practices. For instance, AI-powered tools can help us write reports, build diagrams, and track project progress. This use of AI not only saves time but also reduces the likelihood of human error, allowing us to focus on the more strategic aspects of our projects.</p><p>In agile coaching, AI can help with enhancing team dynamics and productivity. Agile methodologies thrive on collaboration, adaptability, and continuous improvement. AI tools can be used to analyze team performance data, identify patterns, and suggest optimizations for task distribution. AI can also help by identifying team members' strengths and areas for improvement, therefore building a more unified and high-performing team. By integrating AI into agile practices, coaches can create a more productive and adaptive team environment that is better fit to meet project goals.</p><p>Adopting AI in project management and agile coaching is not without its challenges. However, the benefits far outweigh the difficulties. AI's ability to process large amounts of data at high speeds gives us the ability to make more informed decisions with a higher efficiency that would be simply unattainable through our efforts alone. As we explore the potential of AI, we are not only enhancing our current projects but also equipping ourselves with the skills and knowledge needed for a future where AI plays a bigger role in the workplace.</p>                                    </article>            </body>            </html>]]></content:encoded>
    </item>
    <item>
      <title>Organizing Chaos</title>
      <link>https://oit-pmo.byu.edu/organizing-chaos</link>
      <description>Use this ServiceNow tool to categorize, filter, and display tasks in a whole new way!</description>
      <pubDate>Wed, 17 Jan 2024 16:40:32 GMT</pubDate>
      <guid>https://oit-pmo.byu.edu/organizing-chaos</guid>
      <content:encoded><![CDATA[<html lang="en">                    <head>                <meta charset="utf-8">                <meta property="op:markup_version" content="v1.0">                                    <link rel="canonical" href="https://oit-pmo.byu.edu/organizing-chaos">                                <meta property="fb:article_style" content="default">            </head>                            <body>                <article>                    <header>                                                                            <h1>Organizing Chaos</h1>                                                                            <h3 class="op-kicker">Tech Help,Innovative Solutions,Agile,FAQs</h3>                                                                                                    <time class="op-published" dateTime="January 17, 09:40 AM">January 17, 09:40 AM</time>                                                                            <time class="op-modified" dateTime="January 17, 11:56 AM">January 17, 11:56 AM</time>                                            </header>                    <figure> <img src="https://brightspotcdn.byu.edu/94/da/94427ef2476d8b257da2282d55ab/taskboard.jpg"></figure> <a href="https://brightspotcdn.byu.edu/6c/ab/b1f04fba41ab893817c645445aeb/labels-blogpost.pdf" target="_blank">Click Here to View Resources</a>!                                    </article>            </body>            </html>]]></content:encoded>
    </item>
    <item>
      <title>Synergizing Cybersecurity and Agile Methodologies</title>
      <link>https://oit-pmo.byu.edu/synergizing-cybersecurity-and-agile-methodologies-a-project-management-imperative</link>
      <description>A Project Management Imperative</description>
      <pubDate>Tue, 09 Jan 2024 20:39:18 GMT</pubDate>
      <guid>https://oit-pmo.byu.edu/synergizing-cybersecurity-and-agile-methodologies-a-project-management-imperative</guid>
      <content:encoded><![CDATA[<html lang="en">                    <head>                <meta charset="utf-8">                <meta property="op:markup_version" content="v1.0">                                    <link rel="canonical" href="https://oit-pmo.byu.edu/synergizing-cybersecurity-and-agile-methodologies-a-project-management-imperative">                                <meta property="fb:article_style" content="default">            </head>                            <body>                <article>                    <header>                                                                            <h1>Synergizing Cybersecurity and Agile Methodologies</h1>                                                                            <h3 class="op-kicker">Agile,Innovative Solutions,PMO General,Tech Help</h3>                                                                                                    <time class="op-published" dateTime="January 09, 01:39 PM">January 09, 01:39 PM</time>                                                                            <time class="op-modified" dateTime="April 29, 11:01 AM">April 29, 11:01 AM</time>                                            </header>                    <figure> <img src="https://brightspotcdn.byu.edu/ef/a7/e5bf2c9643a3a2cabd0bf64279e3/3aed10de-3a15-444e-8e9d-a5d7fb117888.png"></figure><p>In an era where digital threats loom large, project management has evolved to encompass the ever-growing importance of cybersecurity. </p><p>Traditional project management methodologies often struggle to adapt swiftly to the dynamic landscape of cybersecurity threats. However, the agile approach presents a compelling framework that harmonizes well with the challenges posed by cybersecurity vulnerabilities.</p><p><b></b></p><b>The Intersection of Cybersecurity and Agile Methodologies</b><p></p><p>While traditional project management methodologies focus on extensive planning and linear execution, they can falter when faced with the rapidly evolving threat landscape of cybersecurity. Agile methodologies, on the other hand, thrive on adaptability, collaboration, and iterative development, making them an ideal fit for managing cybersecurity risks in modern projects.</p><p><b></b></p><b>Key Points for Project Management:</b><p></p><p><b>1. Leadership &amp; Integrity</b></p><p>Leadership plays a pivotal role in fostering a cybersecurity-centric culture within agile teams. Project managers need to champion security initiatives, emphasizing the criticality of cybersecurity in all phases of development. Integrity in upholding security standards amidst fast-paced development cycles is non-negotiable. Integrating security measures without impeding progress is a testament to effective leadership.</p><p><b>2. Innovative Solutions and learning</b></p><p>Agile methodologies encourage innovative problem-solving approaches. Leveraging this flexibility within security frameworks enables the creation of adaptive solutions to counter emerging threats. Continuous learning is indispensable in the realm of cybersecurity. Encouraging team members to stay updated with evolving security practices ensures a proactive stance against potential vulnerabilities.</p><p><b>3. Productivity &amp; Cybersecurity</b></p><p>Contrary to common belief, robust cybersecurity measures do not inhibit productivity; they safeguard it. While short-term gains might seem impacted by stringent security protocols, the long-term benefits in averting disruptions and data breaches significantly enhance productivity. Prioritizing security within agile frameworks ultimately leads to more sustainable and efficient project outcomes.</p><p><b></b></p><b>Implementing Cybersecurity in Agile Environments</b><p></p><p>In project management, seamlessly integrating cybersecurity into agile practices involves several strategic steps:</p><p>Educate and Train: Ensure all team members understand the importance of cybersecurity and provide regular training on security best practices.</p><p>Embed Security in Development: Integrate security checkpoints within each iteration of the development process rather than treating it as a separate phase.</p><p>Collaboration and Communication: Foster open communication channels where cybersecurity concerns can be addressed promptly and collaboratively.</p><p>In a landscape where cyber threats constantly evolve, the amalgamation of cybersecurity principles with agile methodologies is no longer a choice but a necessity. By embracing a proactive approach and aligning cybersecurity practices within agile frameworks, project managers can safeguard their projects while nurturing an environment of innovation and productivity.</p><p>Remember, the successful implementation of cybersecurity in agile environments requires a collective effort. When project managers lead by example, champion integrity, foster innovation, and prioritize cybersecurity, they pave the way for a more secure and resilient project management ecosystem.</p>                                    </article>            </body>            </html>]]></content:encoded>
    </item>
    <item>
      <title>Why and How to Build Your Own DevOps Query</title>
      <link>https://oit-pmo.byu.edu/why-and-how-to-build-your-own-devops-query</link>
      <description>Queries queries queries</description>
      <pubDate>Tue, 21 Nov 2023 18:16:54 GMT</pubDate>
      <guid>https://oit-pmo.byu.edu/why-and-how-to-build-your-own-devops-query</guid>
      <content:encoded><![CDATA[<html lang="en">                    <head>                <meta charset="utf-8">                <meta property="op:markup_version" content="v1.0">                                    <link rel="canonical" href="https://oit-pmo.byu.edu/why-and-how-to-build-your-own-devops-query">                                <meta property="fb:article_style" content="default">            </head>                            <body>                <article>                    <header>                                                                            <h1>Why and How to Build Your Own DevOps Query</h1>                                                                            <h3 class="op-kicker">Program Granite,FAQs,Tech Help</h3>                                                                                                    <time class="op-published" dateTime="November 21, 11:16 AM">November 21, 11:16 AM</time>                                                                            <time class="op-modified" dateTime="November 21, 11:17 AM">November 21, 11:17 AM</time>                                            </header>                    <figure> <img src="https://brightspotcdn.byu.edu/ef/b4/eb6a83c84a78b07bf09424d2e3a6/screenshot-2023-11-20-112621.png"></figure><p><a href="https://brightspotcdn.byu.edu/83/ed/bb2e71e64d68a304056405c09294/why-and-how-to-build-your-own-devops-query.pdf" target="_blank">Use these resources to learn about query creation in DevOps</a></p>                                    </article>            </body>            </html>]]></content:encoded>
    </item>
    <item>
      <title>5 Tips to Protect Yourself Against Malware</title>
      <link>https://oit-pmo.byu.edu/5-tips-to-protect-yourself-against-malware</link>
      <description>Helpful Tips by Sydney Dawson</description>
      <pubDate>Thu, 09 Nov 2023 23:50:17 GMT</pubDate>
      <guid>https://oit-pmo.byu.edu/5-tips-to-protect-yourself-against-malware</guid>
      <content:encoded><![CDATA[<html lang="en">                    <head>                <meta charset="utf-8">                <meta property="op:markup_version" content="v1.0">                                    <link rel="canonical" href="https://oit-pmo.byu.edu/5-tips-to-protect-yourself-against-malware">                                <meta property="fb:article_style" content="default">            </head>                            <body>                <article>                    <header>                                                                            <h1>5 Tips to Protect Yourself Against Malware</h1>                                                                            <h3 class="op-kicker">Tech Help</h3>                                                                                                    <time class="op-published" dateTime="November 09, 04:50 PM">November 09, 04:50 PM</time>                                                                            <time class="op-modified" dateTime="November 09, 04:53 PM">November 09, 04:53 PM</time>                                            </header>                    <figure> <img src="https://brightspotcdn.byu.edu/f6/95/ea49edd44fd4a32b1258f491f7e3/screenshot-3.png"></figure><p>We are surrounded by technology. It is an incredible asset but with it comes the dangers of malware.</p><p>This can include viruses, worms, trojans, ransomware, spyware, adware, and botnets. These are all</p><p>incredibly dangerous, especially when you have sensitive content on your computer. Here are 5 tips for</p><p>protecting yourself and your computer against the dangers of malicious content:</p><p>1. Install anti-virus software</p><p>BYU has an awesome anti-virus software called Sophos. It is partnered with CAS and a free resource to</p><p>download for all students. You can download it here (<a href="https://infosec.byu.edu/antivirus">https://infosec.byu.edu/antivirus</a>)</p><p>2. Perform regular software updates</p><p>Developers frequently release updates and patches that address security vulnerabilities. That is why it is</p><p>important to keep your operating systems, browsers, and apps up to date.</p><p>3. Avoid suspicious websites and links</p><p>Unsecure and sketchy websites, especially those that offer free downloads, often hold malware. It is</p><p>important to stick to reputable sites and sources for downloads. To be even more secure, it is wise to</p><p>check the URL for authenticity because these can not be faked. In addition to websites, use caution</p><p>when opening unknown email attachments. Phishing emails are often used to plant malware on your</p><p>devices. Verify the sender before opening any email attachments, especially when on your work</p><p>computer.</p><p>4. Backup your data</p><p>Keep your important files and documents regularly backed up on an external storage device. This can</p><p>include cloud-based storage, external software like google drive, or a physical hard drive. This way in the</p><p>event of a malicious attack you will not lose all your valuable data.</p><p>5. Set unique passwords</p><p>By setting different passwords for each site, you are protecting yourself from a total takeover. This means</p><p>that if a cyber criminal gets into one account, they cant use that same password to access all your other</p><p>accounts. If you are concerned about remembering all these unique passwords, you can use a password</p><p>manager. A Password manager is a place to store your passwords so that they are secure. They have two-factor authentication and put your security as their top priority. They can also be used to generate</p><p>random passwords.</p><p>By implementing these 5 tips, your computer will have a stronger defense system and you as a user will</p><p>be more aware of how to avoid any accidental exposures to malware.</p>                                    </article>            </body>            </html>]]></content:encoded>
    </item>
    <item>
      <title>How to Create a Task Board and Backlog for Kanban Teams</title>
      <link>https://oit-pmo.byu.edu/how-to-create-a-task-board-and-backlog-for-kanban-teams</link>
      <description>When assigned to an IT operations team, or any other team that works on tasks from many different focus areas, you may need to create a board and backlog that can handle different work types other than user stories.</description>
      <pubDate>Tue, 17 Oct 2023 19:53:06 GMT</pubDate>
      <guid>https://oit-pmo.byu.edu/how-to-create-a-task-board-and-backlog-for-kanban-teams</guid>
      <content:encoded><![CDATA[<html lang="en">                    <head>                <meta charset="utf-8">                <meta property="op:markup_version" content="v1.0">                                    <link rel="canonical" href="https://oit-pmo.byu.edu/how-to-create-a-task-board-and-backlog-for-kanban-teams">                                <meta property="fb:article_style" content="default">            </head>                            <body>                <article>                    <header>                                                                            <h1>How to Create a Task Board and Backlog for Kanban Teams </h1>                                                                            <h3 class="op-kicker">Agile,FAQs,Tech Help</h3>                                                                                                    <time class="op-published" dateTime="October 17, 01:53 PM">October 17, 01:53 PM</time>                                                                            <time class="op-modified" dateTime="October 18, 12:34 PM">October 18, 12:34 PM</time>                                            </header>                    <figure> <img src="https://brightspotcdn.byu.edu/24/83/24e5cc684d71b2b208ca008bcfab/screenshot-2023-10-17-at-13-52-23.png"></figure><p>When assigned to an IT operations team, or any other team that works on tasks from many different focus areas, you may need to create a board and backlog that can handle different work types other than user stories. </p><p>This allows the team to track incidents, along with other work types that they are responsible for, on the same board. A feature that the scrum board does not allow since it is configured to track a single focus and prevent interruptive work like incidents. </p><p>Here is a walkthrough of how the board and backlog are made in ServiceNow:</p><p><a href="https://brightspotcdn.byu.edu/03/9e/632be9f54aaba406801ab50db66d/how-to-create-the-task-board-and-backlog-for-kanban-teams.pdf" target="_blank">Task Board Walkthrough</a></p>                                    </article>            </body>            </html>]]></content:encoded>
    </item>
  </channel>
</rss>
