Archive of month: 2013

Does cloud computing spell death to ITIL?

I recently overheard someone suggest that cloud computing could be “the death of ITIL.” This underscores a claim I’ve made for some time…that most people STILL think of ITIL as “an operations thing.” Certainly, cloud providers will continue to need to use mature, well-underpinned processes to manage the applications, storage, infrastructure, and facilities that the […]
Read More

Making sense of cloud computing – Part 1

One of our customers asked us to produce a short course on Cloud Computing. While it’s always easy to chalk this up to yet another round of IT Buzzword BINGO, the business models driving the interest in cloud computing are real, important, and must be understood if you want to be able to sustain your […]
Read More

Common sense isn’t so common

Sounds like we’re having a few of the usual pseudo-debates on a number of the LinkedIn groups again…I always hesitate to get involved in these conversations because so much of this is common sense, but then again, perhaps common sense isn’t so common. Certification v Experience Isn’t this silly? It was silly for CNAs, MCSE’s, CISSPs, and […]
Read More

Integrating ITIL with project management

One of the many issues facing organizations trying to get substantial traction with ITIL initiatives is the incorrect perception that ITIL is “for operations.” I can’t begin to count the number of developers and project managers who have openly asked in one of my Foundations classes “this isn’t for projects, right?” Well, yes, of course […]
Read More

ITIL hands make light work…

Today’s post really is meant to remind all of us (myself very much included) why ITIL and IT service management matter. 20 years ago, if my email service went down, hardly anyone even noticed (On my BITNET account, I probably could send e-mail to about 5 people). Now, an e-mail outage can disrupt world commerce […]
Read More

Changing the way we think about change management

One of the more challenging problems with deploying ITIL processes is our desire to make workflows linear. We teach the lifecycle one domain at a time, and teach processes in association with the book in which they are described. Reality is seldom so tidy, however. Processes like Change Management, Service Asset and Configuration Management, and […]
Read More

Request Fulfillment is really obvious…and really important

One of the new processes in ITIL v3 is the Request Fulfillment process. The premise is simple enough; we get a number of routine service requests from users, so how do we deal with them and get them taken care of in a way that minimizes the pain? Users want us to facilitate the approvals […]
Read More

CEH

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by […]
Read More

CISSP

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description In this course, students will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification. Who Should Attend? This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and […]
Read More

CISM

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description The focus of this course is in-depth coverage of the four domains required to pass the CISM exam: Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Who Should Attend? Experienced information security managers and those who have […]
Read More