We live in the digital age, and we can access data ubiquitously and quickly. The internet and the...
Author - Joseph Mathenge
SLA Breaches: How To Define, Handle & Avoid SLA Breaches
When it comes to service management, the main determinant of quality and customer satisfaction is...
What Is InfoSec? Information Security Explained
The need to secure your organization’s information has gone from an operational job to a strategic...
Incident Management: The Complete Guide
Technology is everywhere, and we depend on it. Whether it be home, work, school, health, or civic...
What Is Hardware Asset Management? Benefits & Lifecycle of...
In 1982, Alan Kay famously stated: “People who are really serious about software should make their...
Business Process Management vs Business Process Automation:...
Even though the business world’s focus is on technology, what runs business is process. Processes...
Enterprise Chatbots: How To Use Chatbots in the Workplace
In the mid-1960s, well before my time, Joseph Weizenbaum at the MIT Artificial Intelligence...
IT Security Policy: Key Components & Best Practices for...
Back in 2017, The Economist declared that the world’s most valuable resource is data. And a cursory...
The Network Operations Center (NOC): How NOCs Work
In ITIC’s 11th annual Hourly Cost of Downtime Survey, published in 2020, 40% of enterprise...
Value Stream Mapping (VSM) Tutorial with Examples & Tips
It is often said that a picture is worth a thousand words. The human brain processes images 60,000...