The scarcity of qualified talent in the IT sector is especially pronounced…
Modernizing legacy systems is back on the front burner. Here’s an interesting article from my colleague, Joe Kim, in which he reminds us not to forget about the network. The…
Simply put, the service catalog is like a restaurant menu for requesters. The process of submitting a service request should be easy for users, just like customers at a restaurant.
Working in IT? Feeling lost given everything that’s going on in the industry? Are you confused about what to focus on and how to best apply your knowledge? If you…
For a lot of organizations, moving to Office 365 might be one of the first, or possibly biggest, migrations to a public cloud. There can be a lot of stress…
Security is always an important topic with our government customers. Here’s an applicable article from my colleague, Joe Kim, in which he offers some tips on compliance. Ensuring that an…
As part of achieving SOC-2 certification, we had to implement stricter requirements around AWS authentication. Database Performance Monitor has had multi-factor authentication (MFA) for access to the AWS web-app console…
Successful incident management will prevent these problems from interrupting business processes (any longer than necessary) or impacting other IT services.
Flood of Kobolds vs. Epic Boss Fight I had a group where I was running a dragon-themed adventure. Before you gasp and say mockingly, “In Dungeons & Dragons, there are…
New ITSM technology is changing our world. Leaders in ITSM processes are honing in on alternatives for the manual completion of simple tasks.
Short-Circuiting your Adventure I’ve noted that preparation and planning are some of the hallmarks of both a good DM and IT professional, but sometimes planning gets short-circuited. In the past,…