IT Service Management, Meet Marketing!
IT service management is sometimes described as a customer-focused approach to making information technology available.
IT service management is sometimes described as a customer-focused approach to making information technology available.
According to certain industry analysts and software vendors, we are now midway between a stage 10 years ago when few applications used machine learning, and a stage 10 years into the future when apparently, most applications will function with it.
Labour-saving devices, robots, and automation – Weren’t they all supposed to improve the quality of life, by removing manual work and drudgery?
If you thought virtual reality (VR) and augmented reality (AR) were just gimmicks for people with too much time on their hands, you could be in for a surprise.
Some IT security attacks start from the most innocent mobile apps and in ways that let cyber-criminals simply pick up confidential communications without having to hack into anything at all.
Ever since marketing figured out that companies could do better by asking customers what they wanted, rather than just trying to tell them, businesses have moved massively to the notion of working backwards from the customer.
It’s tempting to see IT self-service as the simple way to hand off responsibilities to end-users.
Scenario planning, in which you seek to identify higher risk and higher probability causes of business interruption, attracts both supporters and cynics.
Does it sound strange that many organisations believe they are exposed to major problems with Internet of Things device security, yet few of them have taken any measures to resolve those problems?
Business no longer controls all its data, now that the data is spread out over systems that could be in-house, in the cloud, or in somebody’s pocket.
If you’ve already moved all your systems and applications to the cloud, you may feel there is little left for you to manage other than your organisation’s data and your IT department’s skillsets.
The title of this blog post could almost have read “Never send a human to do a machine’s job”.
Small businesses using low-end routers for their networks may be highly vulnerable to hackers.
“Give me your gut!” (as in “gut feeling”) has long been the cry of business continuity management in meetings, trying to make sense of complex situations or cut through to the essentials.
In theory, BYOD or bring your own device lightens the load in terms of IT sourcing, because it transfers the work (and cost) of acquiring a device to the user of that device.
Vendors like to go to the movies, meaning they like to see their products and logos in Hollywood productions, and are usually prepared to pay for the privilege.
If you have already installed mobile apps on your smartphone to go beyond the stock selection provided with the device, you may well have noticed how a mobile app asks for permission to access certain resources or take certain actions.
Do you dream of a work environment in which everybody automatically thinks “business continuity” and acts accordingly?
What used to be IT sourcing at the physical system level is turning into an exercise at the virtual cloud level, but with a new actor, the cloud broker.
In this age of big data, business analytics are likely to form an increasingly large part of business continuity planning and management.
A while ago, we asked in this blog if World Backup Day was really a good idea. Our logic? If everybody focuses on one day in the year to get their backups right, then spends the other 364 days ignoring the issue, things won’t change for the better.
Sometimes, IT can teach business a thing or two. In a recent survey on private cloud computing use, there was a statistic on the use of multipathing.
Malware (Sneakyware) is the software that gets into your system and causes havoc, unless you detect it and neutralize first.
Power blackouts in business can range from a minor inconvenience to a major threat. Diggers slicing through power cables, extreme weather conditions bringing down power lines, or other local failures can all interrupt the supply of electricity.
IT has no shortage of four-letter words. It’s not clear what the latest variations on the “BYO” or “bring your own” theme add.
There are hacks and there are business continuity hacks. Some hacks are bad news, especially when they target IT security and jeopardize business continuity, but others – the other kind of hack – could save the day in certain circumstances.
Don’t take this title too literally. Ransomware, the malware that extorts money from victims to prevent a disaster, will surely continue to be active, at least in the short term.
Machine learning, if you have not already met it, is the capability of a machine (a software application) to modify its rules and algorithms according to new data.
Do the formalism of IT service management and the agility of DevOps mean that one can only succeed if the other fails?
A well-known IT security solution vendor recently published a white paper about planning for business continuity, and listed typewriters as examples of equipment that should be safeguarded to prevent interruptions to an enterprise’s activities.
Get Started
For urgent inquiries, call us on 1300-BCPLAN (Intl. +612 9098 9000)
As an executive in any business, it is understandable that you want to ensure it is 100% safe, because your business is only as strong as its weakest link.
+612 9098 9000
subscribe our newsletter go get the latest updates and news from Opscentre
Copyrights © 2024 OpsCentre | Powered by PixxelStudio86.