If there is one thing that businesses around the world have learned this year, it is this: nothing...
Author - Joseph Mathenge
The Incident Commander (IC) Role Explained
When users can’t log in, access data, or process transactions, they aren’t happy. No one is happy...
Business Process Modeling Notation (BPMN): Getting Started with...
When it comes to improvement, businesses around the world have pinpointed value streams and...
Using Mean Time to Identify (MTTI) as a Service Desk Metric
The state of ITSM in 2020 is characterized by great workplace upheaval. Millions have been made to...
Professional DevOps Skills: What to Look For
The value of DevOps has continued to increase as digital transformation and cloud adoption...
Impact of Redundancy on Availability
When it comes to measuring customer satisfaction, there is no greater determinant than availability...
Change Management in the Cloud
Cloud technologies are now firmly established as the norm for enterprise IT. In fact, most...
Risk Assessment vs Vulnerability Assessment: How To Use Both
We’ve all heard the quote “Information is the lifeblood of an organization”. Whenever I hear it, I...
Scrum vs Kanban: A Comparison of Agile Methodologies
Companies must be agile. Companies must deliver digital services quickly; they must align with...
Incident Management vs Problem Management: Differences Explained
In this article, we’re explaining the differences between incident management and problem...