All Posts

Maintaining a Secure Environment: Understanding Its Components
August 19, 2019
Natalie Timms
In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a secure environment. We’ve…
How to Protect Yourself When Your Software Vendor Has Been Acquired
August 19, 2019
Patrick Hubbard
While we all know mergers and acquisitions are common in competitive markets, end users often don’t get insight into the reasoning behind the purchase or takeover. While these decisions sometimes…
Top 10 Acronyms: ITIL 4 Terms to Remember
August 15, 2019
Tim Lawes
Implementing ITIL can be a big experience for your organization, especially with a sea of acronyms to remember. We're giving you a head start with our top 10 ITIL acronyms,…
The Most Important Skill You’re Not Hiring For
August 15, 2019
Scott Driver
Anyone who’s hired for a technical team can understand this scenario. You’re hiring for “X” positions, so of course you receive “X” times infinity applications. Just because you’re looking for…
5 Self-Service Portal Benefits to Boost Employee Experience
August 14, 2019
Baxter Overman
Service portal adoption can be one of those never-ending goals service desk agents and SysAdmins have. Whether you already have a service portal implemented or are just exploring the benefits,…
Virtualization – How We Got Here and Does It Have a Future?
August 14, 2019
Paul Stringfellow
In over 20 years I’ve spent in the IT industry, I’ve seen many changes, but nothing has had a bigger impact as virtualization. I remember sitting in a classroom back…
How Will AI Change Federal Networking?
August 13, 2019
Mav Turner
Machine learning (ML) and artificial intelligence (AI) could very well be the next major technological advancements to change the way federal IT pros work. These technologies can provide substantial benefits…
What Is Problem Management? Understanding the Basics
August 13, 2019
Tim Lawes
When thinking about problem management in your IT organization, it’s a good idea to first understand how ITIL differentiates problems and incidents within the service management framework. Problems are defined…
Maintaining a Secure Environment: Use Cases Build a Security Policy
August 12, 2019
Natalie Timms
Security is a key operational consideration for organizations today because a breach can lead to significant losses of revenue, reputation, and legal standing. An entity’s environment is an ecosystem comprised of…
Create Post-Mortem Reports from Notebook Templates, Export to PDF
August 9, 2019
Baron Schwartz
We’ve released two enhancements to Notebooks that streamline collaborations to help you create post-mortem Notebooks more easily, and share them in a format that’s easy for any audience to access.…
1106182