26 Results Found
In a recent post, I gave an overall description of a service portfolio and the key components of a portfolio. Here, I will describe how a cloud services provider might implement an ITIL service portfolio. A cloud services provider will regularly have a set of services under development, a set of service in live operation, and a set of services that are retired.
As mentioned in last week’s post, interviews that require ITIL Intermediate level knowledge will most likely be targeted to specific process areas and activities. If I interviewed someone for a job that required ITIL Intermediate level knowledge, in addition to other questions about the specific technical responsibilities of the job, I might ask the following questions:
Most organizations quickly realize that knowledge management must be integrated with incident management in order to improve the quality of service and the efficiency of providing assisted service. What is not as quickly recognized is the value of integrating knowledge management with problem management.
We asked for your top IT horror stories, and you delivered. Read the most unexpected and cringe-worthy IT nightmares from fellow IT professionals.
IT organizations could benefit from degree deflation. By deemphasizing college degrees during the hiring process, an open pipeline to more candidates could emerge, leading to diminished skills gaps and potentially lower payroll.
Learn how to boost your visibility on LinkedIn by listing your skills and certifications and leveraging the courses you’ve taken for professional development. This is especially important to catch the eyes of recruiters and when applying for jobs.
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.
Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.
If you’ve been wondering what are some good IT pranks for April Fools’ Day—or any other time of the year—this is the post for you. Whether you’re an IT pro with decades of experience or a noob who is about to learn that holding CTRL+SHIFT+ESC is a faster way to access the task manager (you’re welcome), we have an IT prank for you.