It’s an exchange that happens almost every day in every business office: Employee peeks over the divider and asks her coworker, “Hey, how do I connect this to Bluetooth?” Maybe…
My Leslie Knope Moment Long-time listener, first time caller Liz Beavers here… Head Geek? It’s like when Leslie Knope won the election for Pawnee City Council. I’m pinching myself. Throughout…
You’ve been contemplating adopting a new ITSM solution for some time. The current one handles the bare minimum—it helps your team churn through a ticket queue—but you know there are…
Okay, good. You have a change management practice in place. You know how to define it, its benefits, how to get the process started, and how to measure its success.…
For some, change is something to look forward to. For others, it may be scary and anxiety-inducing. If the latter describes your organization, it may be time to rethink your…
Configuration items (CIs) in the configuration management database (CMDB) stores information regarding the relationships among its assets. IT configuration management is becoming increasingly critical in order to maintain service levels…
In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in the service…
In life, risks can be perceived both negatively and positively. Taking a risk can sometimes yield great results, but other times, a risk is a yellow light of caution. For…
We all know how important communication is. For it to be effective, it depends on factors including its presentation, the tone, details of the message, and even non-verbal cues like…
Self-service can be an ideal solution in many cases. Just think about the number of times you’ve troubleshooted issues with your car, fixed the WiFi in your home, or replaced…