The cloud is well and truly becoming the default mode for running software in the digital age. And...
Author - Joseph Mathenge
Agile ITSM: How Agile & Service Management Can Work Together
We live in the digital age, and we can access data ubiquitously and quickly. The internet and the...
SLA Breaches: How To Define, Handle & Avoid SLA Breaches
When it comes to service management, the main determinant of quality and customer satisfaction is...
What Is InfoSec? Information Security Explained
The need to secure your organization’s information has gone from an operational job to a strategic...
Incident Management: The Complete Guide
Technology is everywhere, and we depend on it. Whether it be home, work, school, health, or civic...
What Is Hardware Asset Management? Benefits & Lifecycle of...
In 1982, Alan Kay famously stated: “People who are really serious about software should make their...
Business Process Management vs Business Process Automation:...
Even though the business world’s focus is on technology, what runs business is process. Processes...
Enterprise Chatbots: How To Use Chatbots in the Workplace
In the mid-1960s, well before my time, Joseph Weizenbaum at the MIT Artificial Intelligence...
IT Security Policy: Key Components & Best Practices for...
Back in 2017, The Economist declared that the world’s most valuable resource is data. And a cursory...
The Network Operations Center (NOC): How NOCs Work
In ITIC’s 11th annual Hourly Cost of Downtime Survey, published in 2020, 40% of enterprise...