When it comes to service management, the main determinant of quality and customer satisfaction is...
Author - Joseph Mathenge
What Is InfoSec? Information Security Explained
The need to secure your organization’s information has gone from an operational job to a strategic...
Incident Management: The Complete Guide
Technology is everywhere, and we depend on it. Whether it be home, work, school, health, or civic...
What Is Hardware Asset Management? Benefits & Lifecycle of...
In 1982, Alan Kay famously stated: “People who are really serious about software should make their...
Business Process Management vs Business Process Automation:...
Even though the business world’s focus is on technology, what runs business is process. Processes...
Enterprise Chatbots: How To Use Chatbots in the Workplace
In the mid-1960s, well before my time, Joseph Weizenbaum at the MIT Artificial Intelligence...
IT Security Policy: Key Components & Best Practices for...
Back in 2017, The Economist declared that the world’s most valuable resource is data. And a cursory...
The Network Operations Center (NOC): How NOCs Work
In ITIC’s 11th annual Hourly Cost of Downtime Survey, published in 2020, 40% of enterprise...
Value Stream Mapping (VSM) Tutorial with Examples & Tips
It is often said that a picture is worth a thousand words. The human brain processes images 60,000...
7 Business-Critical IT Policies & How To Implement Them
Organizations know that policies are critical to any mission. How do you handle data? How to do you...