Stephen Watts – BMC Blogs BMC Software Fri, 21 Sep 2018 22:27:39 +0000 en-US hourly 1 Stephen Watts – BMC Blogs 32 32 ITIL V4: Intro to the 2019 ITIL Update Tue, 18 Sep 2018 00:00:35 +0000 ITIL V4, the latest version of the world’s most popular ITSM framework, is scheduled to be released in Q1 of 2019. Announced nearly two years ago at the itSMF USA Fusion 2017 conference, the new ITIL update will focus on integrating ITIL guidance with best practices from the worlds of DevOps, Agile, and Lean. ITIL […]]]> IT Disaster Recovery Planning: How To Craft A Plan For Your Organization Thu, 13 Sep 2018 00:00:03 +0000 In today’s digital world, technology disruption for even a few hours can result in significant financial consequences to your business. In fact, according to Gartner, the average cost of IT downtime is $5,600 per minute or more than $300,000 per hour. For large organizations, that number tops half a million dollars. It’s no wonder, therefore, […]]]> Why Business Value is Key to IT Success Tue, 11 Sep 2018 00:00:13 +0000 In today’s digital era, CIOs must shift their priorities from cost cutting to driving revenue, and from process engineering to exploiting data if they want to achieve a set of broader business outcomes. Furthermore, understanding how to measure and communicate the business value of IT helps to foster a level of transparency that breaks down […]]]> Future of Java for the Enterprise Thu, 06 Sep 2018 00:00:05 +0000 In recent months, it has been revealed that Java is once again undergoing some significant changes. In addition to a vote that changed the name of enterprise Java, currently Java EE, to Jakarta EE — the brand is having its governance handed over to The Eclipse Foundation. For those used to coding robust, complex enterprise […]]]> What is an “Advanced Persistent Threat”? APTs Explained Mon, 27 Aug 2018 00:00:52 +0000 We live in an increasingly digital world and keeping organizations secure in this environment has become more demanding than ever before. Persistent threats have hidden and continuous computer hacking processes that target a specific entity. These threats are covert, focus on accomplishing a specific task and can happen continuously over time. They are considered persistent […]]]> How Customer Experience Strategy is driven by IT Wed, 01 Aug 2018 00:00:39 +0000 Your business success depends on keeping your customers happy; IT Service Management (ITSM) gives you the technology and systems to achieve that goal. Delighting your customers means getting service management right. In this article, you’ll learn why ITSM is critical to enhancing the customer experience and growing your business. How IT Service Management Practices Can […]]]> What is Ransomware as a Service? RaaS Explained Thu, 19 Jul 2018 00:00:19 +0000 Software is shifting away from locally-installed apps to Software as a Service web applications that run in the cloud. Criminals are cashing in on this trend, which has led to the creation of Ransomware as a Service (RaaS), a growing threat to business. RaaS refers to various online malware exploits that bad actors can use […]]]> What Exactly Does a System Architect Do? Thu, 12 Jul 2018 00:00:03 +0000 The system architect role is vital to the successful definition, design, delivery, and support of any IT project. A system architect analyzes and recommends the right combination of IT components to achieve a specific business, department, team, or functional goal. They objectively analyze desired processes and outcomes and advice on the right combination of IT […]]]> Top 17 Digital Transformation Books for 2018 and Beyond Tue, 10 Jul 2018 00:00:15 +0000 CIOs face a number of challenges when it comes to the concept of digital transformation or DX. And there is often immense pressure to launch big digital changes to gain a competitive advantage, for example, creating a roadmap to keep critical processes and technology current. All this must be done while laying the groundwork for […]]]> BMC’s Remedyforce Reviews and Ratings: The Ultimate Roundup Fri, 06 Jul 2018 15:00:29 +0000 Businesses depend on technology to gain a competitive advantage and deliver better solutions to their customers. Additionally, there’s even more pressure on IT service organizations to keep pace in an ever-changing business landscape. Many IT organizations, however, are struggling to meet these new demands because the technology and processes they have are inflexible and outdated. […]]]>