Service Delivery

The Phenomenon of BYOD

October 24th, 2012

Bring Your Own Device (BYOD) phenomenon started when smartphones and tablets with more convenient form factor became ubiquitous among consumers. These devices with their touch-screen interfaces and powerful processors allow employees who brought them to work to be more productive on the go.  Assuming of course they could somehow get connected to the in-house WiFi.

Building Super Secure Security

September 7th, 2010
Tags: , ,

Can a resilient and fail-safe security system be created?  Given time and money can the ultimate secure network technology be developed?  Defense Advanced Research Projects Agency (DARPA) intends to fund an initiative to find out and in June 2010 announced the Clean‐Slate Design of Resilient, Adaptive Secure Hosts (CRASH).  It relies on human biology to

Subcontracting Issues within Cloud Computing Services

August 10th, 2010

Multi-cloud relationships and subcontractors can be an issue when using some cloud providers.  For example, a Customer might start out slow with Cloud Computing and enter into a SaaS service just to get a feel for how all of this works and to satisfy an immediate need that the internal IT department cannot quickly fulfill.

IT is a Love Hate Relation

June 5th, 2010

Business grudgingly relies on IT to manage the books, usually to automate boring repeatable tasks fast and cheaply and sometimes to create a unique value to the business (when possible).  IT is rarely viewed as an equal partner in business and more as a utility player that makes things happen….slowly.  When the world of IT

What is ITIL?

March 15th, 2007
Tags:

The IT Infrastructure Library (ITIL) is a series of eight books and is referred to as the only consistent and comprehensive best practice for IT service management to deliver high-quality IT services. Although produced and published by a single governmental body, ITIL is not a standard and is generally referred to as a framework.  There