What do The Guru, The Expert, The Maven, The Trailblazer, The Leading Light, The Practice Leader, The Heavyweight, The Opinion Shaper, and The Influencer all have in common? These are…
The advantages of capacity management are plentiful. Simply put, IT capacity management is an ideal arrived at through the construction of a set of processes and monitoring efforts.
The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an…
As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not…
For the sake of your customers, and for the sake of all your organization’s stakeholders (both internal, and external) it’s crucial to understand how IT and ITSM affects your customer…
If you are old enough, you might remember that commercial that played late at night and went something like this… “It’s 10 p.m., do you know where your children are?” …
The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…
What is Agile Service Management in an IT Service Management (ITSM) context? Is it an official term? Is there a body of knowledge behind it? Before answering that question, it’s…
We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering. Today, we’ll be considering the culture of protection the…