Nectar Services Corp
  • Twitter
  • Facebook
  • LinkedIn
  • Careers
  • Support
  • Solutions
    • UC Experience Management
    • Contact Center Experience Management
    • Nectar for Avaya
    • CX Assurance
    • Nectar for Cisco
    • placeholder
    • Nectar for Microsoft
    • placeholder
    • Nectar for SIP
  • Products
    • UC Experience Management
    • Contact Center Experience Management
    • Nectar 10 Collaboration Tools Diagnostics & ReportingPowerful, Easy-to-Use UC Monitoring, Diagnostics and Reporting for Multi-Vendor Ecosystems
    • CX AssuranceNectar’s Advanced CX Testing and Monitoring for Contact Centers
    • placeholderIf I put a description in here
    • FoundationSuperior Health & Performance Monitoring & Management
    • placeholderIf I put a description in here If I put a description in here
    • DiagnosticsAdvanced Monitoring, Management, Reporting and Diagnostics
    • placeholderIf I put a description in here If I put a description in here
    • Nectar Perspective IconPerspective Voice Monitoring Software for VoIP QualityEasy-to-Deploy Synthetic Testing
  • Services
    • Professional Services
    • Technical Support
  • Partners
    • Partners
    • Partner Program
    • Partner Portal
  • News and Events
  • Blog
  • Company
    • About Nectar
    • Mission, Vision and Values
    • Leadership
    • Contact Us
    • GDPR Notice
    • Terms of Use
    • Cookies Policy
  • Resource Library
    • Case Studies
    • Videos
    • Collateral
    • White Papers
  • Home
  • Blog Post
  • Hindsight May be 20/20, But Let’s Keep the Horses in the Barn
 

Hindsight May be 20/20, But Let’s Keep the Horses in the Barn

Return to all news

Hindsight May be 20/20, But Let’s Keep the Horses in the Barn

by Matt Christopher / Friday, 10 July 2015 / Published in

The Significance of Proactive Monitoring to Minimize Negative User Impact and Optimize User Satisfaction
Matt Christopher
July 10, 2015

Given the complexity of a UC deployment with its variety of software, servers, circuits, gateways, routers, switches, and devices, user-impacting issues are understandably unavoidable. When you consider the number of potential steps between a problem occurring and it ultimately being addressed and factor in human latency, the calculus of optimizing user experience by minimizing time to resolution can be daunting, to say the least. The ideal IT Pro environment eliminates as many steps between the issue and resolution and condenses the time between each remaining step. Proactive tools give IT Pros the best chance at success.

Hindsight may indeed by 20/20 and looking back at incident may eventually make the cause of a system failure obvious. Wouldn’t it be better, though, to close the barn door before the horses are out? Given the complexity of UC, I believe a mixed metaphor is forgivable.

Steps to Resolution

The theory of problem resolution is fairly straightforward: the problem is reported, the root cause is identified, and the issue is resolved. The reality is much more complex:

resolution_steps

System Failure

It is important to accept the reality that system failure is inevitable. There are too many moving parts to not have something go wrong occasionally. The key is to identify these failures, remove them as quickly as possible, and control the user impact.

User Impacted

Unless there are monitoring tools in place, the only way the IT Pro knows if the system fails is when users are impacted. The time between system failure and user impact is, for the most part, inconsequential.   It is once users are impacted that IT is held accountable in the user’s mind. At this point, the key is how quickly an impacted user reports the failure so IT is aware they are being evaluated.

Issue Reported

If the world were fair, the clock would start for IT once the issue was reported. Unfortunately, the reality is that the clock starts ticking once the first user is impacted. In an ideal scenario, when the first user is first impacted by the system failure, the issue is reported.   The nightmare scenario is that users do not initially report the failure and the number of users impacted continues to increase and the overall dissatisfaction with the UC deployment begins to grow exponentially. That ideal scenario is rare; the nightmare all too common.

Investigation

Only once the system failure has been reported can IT begin to investigate the issue. Much like a criminal investigation, the success of a UC failure investigation is dependent on the quickness of the report and the amount of information/evidence. If a user opens a ticket immediately after a bad call and can report on the time of the call, the parties involved, and which modalities were used, the IT pro can focus their search and stands a better chance of quickly identifying the root cause and re-mediating the situation. If the user waits a week and reports a series of poor calls with fuzzy details, the crime scene becomes much broader and the investigation much longer.

Failure Recreation

Unless you have data about the specific call that caused the issue to report the failure, IT must try to recreate the failure. The IT Pro must be watching the system when the failure surfaces in order to truly identify the root cause. If the failure is constant, this can be easy. If the failure was an isolated an incident, it will be impossible to recreate the situation. On the bright side, if the failure was an isolated incident, it likely will not happen again. The absolute worst case for the IT Pro is the intermittent issue. Trying to recreate an intermittent failure and correctly identify the root cause makes looking for a needle in a haystack seem like a cakewalk.

Root Cause Analysis

If the IT Pro is fortunate enough to recreate the user scenario and the user-experienced failure, the next step is to determine the root cause of the failure. Considering the variety of paths and components that a UC conversation passes through, it can be daunting to find the exact location and circumstances that created the failure. Often, root cause analysis is the longest part of the resolution process. It can also be the most frustrating because there is no satisfying progress to report to users or management that may be monitoring the situation.

Resolution

Once the root cause has been accurately identified, the issue can finally be resolved. Fortunately, an accurate root cause identification makes the resolution fairly quick. If nothing else, it is generally predictable and the IT Pro tool can articulate the plan to resolution and report against progress.

Restoration

Once the resolution has been completely implemented, the system functionality is restored. If only restoration were the end of the process. . .

User Notification

Once the system restoration has been completed, the IT Pro can notify the impacted user(s) that the problem has been identified, the issue has been resolved, and functionality has been restored. User notification is an important step because it lets users know they can start trusting their communications platform again. It also reinforces to users that IT is responsive and capable of responding to and resolving user issues.

User Acknowledgement

Though user notification is an important step in the process, it is not the most significant. It merely opens the door for the lynch pin of the process: user trust. Before users can begin to trust the UC system again, they must first acknowledge the issue has been resolved and they should not expect the same problem to reoccur.

User Satisfaction

There are a lot of variables that determine the time between user acknowledgement of issue resolution and user trust in the deployment.   Time between user impact and acknowledgement is critical, but so is the user’s perception of the magnitude of the impact. The user’s trust of the system before the failure is another important consideration. Regardless, the ultimate goal of the IT Pro is to restore user satisfaction.

There are 11 steps from system failure to user satisfaction, with progression between each subject to human latency and the potential for human error. The mission of the IT Pro can indeed seem daunting. Is there anything that can bring hope? Fortunately, there is.

Be sure to check out our next blog post where we explore methods and tools to reduce the overall time to resolution by bypassing certain steps and reducing human latency in those that remain. Contact us today to learn more about our modern solutions to system failure and other issues enterprises face. 

  • Tweet
  • Share

What you can read next

Nectar 2020 Predictions: The Biggest Opportunities in the UC Industry
Nectar to Provide Generation-e with Comprehensive Monitoring and Diagnostics for their Skype for Business Solution Offer
Nectar Gains More Recognition for its Commitment to Partner Success

Want To Know More?

Request a Demo

Collateral

  • Nectar Foundation Datasheet
  • Nectar Diagnostics Datasheet
  • Nectar Perspective Datasheet
  • Nectar CAM Datasheet
  • Nectar UCMP for SBCs Solution Brief
  • Nectar for Sonus SBC Solution Sheet
  • Nectar UCMP for Avaya Solutions Brief
  • 2015 Frost & Sullivan Report: Nectar Skype for Business Proactive Network Management and Monitoring Solutions for Enterprises
  • Nectar UCMP for Cisco Solution Brief

Case Studies

  • Teck Resources Mines Nectar for UC Quality of Service
  • UCRight and Fresno Unified School District Employ Nectar for SIP
  • ConvergeOne leverages Nectar UCMP/UCD to serve their UC customers
  • Nectar Converge One Large Bank Case Study
  • NACR leverages Nectar’s UCD For Optimized Lync UC Experience
  • G3 Comms
  • Clear Channel Case Study
  • Major Global Financial Services Firm Achieves UC Consolidation Goals
  • Sheppard Mullin Selects Nectar to Monitor its Global Unified Communications Network 

Media

  • UC Network Health Domain Video
  • Nectar UCMP for Skype for Business Online Video
  • Nectar’s Evolution – Dynamic QoS Orchestration for Cisco Networks
  • Nectar Services Corporation
  • TMC Interview with Nectar CEO
  • UC Strategies: Microsoft and Nectar Video Interview
  • Support
  • Contact Us
  • Site Map
  • Terms of Use
  • GDPR Notice
  • License Agreement
  • Cookies Policy
Nectar Services Corp

© Nectar Services Corp. 2006- Every Conversation Matters 2012- Advanced Performance Management Solutions for Enterprise and Contact Center Network Monitoring and Management.

TOP