What manufacturing SMEs need to know about hacks and cybersecurity
Cyber-attacks are on the rise, and hackers are getting bolder. This has forced manufacturing SMEs to implement new technical capabilities.
Unfortunately, many of them don't...
iOS Business Chat – Apple enters the live service market
The iOS 11 update from Apple, will offer businesses the ability to provide live service functionality via iMessage, Maps, Safari and Spotlight searches. Here...
How to become a service-centric organisation
Deliver real transformation by moving beyond IT-only service management
The provision of tech service and support to internal or external customers, be they staff or...
When AI Tools Collide: Herding Digital Cats
If you’re part of an IT organization today, chances are you’re wrangling more AI tools than you have coffee mugs...
CSM and ESM – simplifying the service management acronym maze
Ever since the early days of the IT Helpdesk and its expansion into other areas of the business, we have seen the industry come...
The role of ITSM in the big IT security debate
Recent events such as WannaCry and other hacking threats have caused budget holders to refocus on network and end-point IT security – but they...
Cloud vs on-premises vs hybrid – which is best?
Service technology solutions can be deployed in several different ways. But which is right for you and which offers the security you require?
At a...
SaaS users are starting to feel the financial pinch in 2017
Trump, Brexit, market turmoil and currency fluctuation are leading to price hikes for SaaS users.
We are big fans of Software as a Service (SaaS)...
ITSM – that’s all folks! – one year on
A year ago I wrote an article on why application convergence could spell the end for niche IT Service Management products – One year...
Crouching employee, hidden sentiment
The literal meaning of Crouching Tiger, Hidden Dragon, from the Ang Lee film set during the Qing Dynasty and the reign of the Qianlong...






























