Federal Leader's Playbook
Is CMDB important for your organization? It may sound like the tool is usually not the issue, it’s the process, the communication, the governance around it. Many contractors want to be the best at service delivery and enabling service delivery. Experts believe that a new set of tools may be emerging soon which will allow for more accurately passed and faster data. Listen as the experts discuss their challenges of trying to chase this “ghost” tool.
info_outlineFederal Leader's Playbook
Why does shadow IT exist? Guest star Brian Sheely discusses the concept and why its important for it to be happening in the background for organizations.
info_outlineFederal Leader's Playbook
IT is beginning to spread into all aspects of the business process. Its beginning to bleed over into the business process and we're learning that these tools are able to capture that information and make it relevant. A new trend of coming to one spot for multiple services is emerging.
info_outlineFederal Leader's Playbook
Special Guest Brian Sheely discusses the importance of ITSM tools and whether or not we are using them effectively. New pieces of technology added to your organization may not always solve all your problems. Listen as the experts share their opinions on when its a good idea to adopt these "shiny new tools."
info_outlineFederal Leader's Playbook
Lean why its important to tie the IA world into the operations world. There are many tools used for service management but organizations fear to make many technical integrations. Providing manually created reports wont keep up with any threats and other quickly changing technology.
info_outlineFederal Leader's Playbook
With ITSM tools asking organizations to feed it information about their work, the ability to generate valuable information is not as mature as it should be. Many believe that if they could have their system automated that it will reduce their team and their own workload, but organizations aren't quite there yet. Applications need to be approved, authorized, secured and available for groups to meet mission critical requirements while still keeping security needs in mind.
info_outlineFederal Leader's Playbook
With ITSM tools asking organizations to feed it information about their work, the ability to generate valuable information is not as mature as it should be. Many believe that if they could have their system automated that it will reduce their team and their own workload, but organizations aren't quite there yet. Applications need to be approved, authorized, secured and available for groups to meet mission critical requirements while still keeping security needs in mind.
info_outlineFederal Leader's Playbook
Is the word assessment seen favorable in your eyes? Do you know where you are today? How do we measure maturity? Listen and the experts will give their opinions on where your organization should stand in the market.
info_outlineFederal Leader's Playbook
Priority and teams change. You must be able to communicate the effective models used by your organization. Listen as the experts discuss complaints without strategy, bad advice from vendors and other common Myths and Misconceptions in ITSM.
info_outlineFederal Leader's Playbook
In this episode, Acuity's Federal business and technology consultants kick off season one by defining IT Service Management. They will also discuss the value of the concept, the set of related tools that organizations are leveraging to bring it to life, and the necessary operational adjustments required to enable higher performance, better situational awareness, and more efficient and effective agency outcomes.
info_outlineWhy does shadow IT exist? Guest star Brian Shealey (Kinetic Data) discusses the concept and why its important for it to be happening in the background for organizations.