While the total number of incidents/service requests, the potential impact of restricted access, and ease of automation will all vary by service, type of support, company, industry, etc., automation is subject to the greatest variability. Executing on a vision is certainly easier said than done,...
Tag(s): automation, self-service, service desk, outsourcing

 
The state of security in 2014 can be summed up in four words: We are falling behind. External breaches are occurring more frequently and becoming more complex, and internal threats have extended beyond malicious employees (past and present) and current employee mistakes to include vendors, who...
Tag(s): technology, trends, security management

 
Reporting is like food. Some dishes are simple, requiring few ingredients; some are more complex, requiring more (and more unique) ingredients. We all have our own flavor preferences. IT reporting is much the same. Depending on your department and your management’s desires, your business’s...
Tag(s): technology, reporting-and-analytics, supportworld

 
Asset management is a time-consuming task, and larger organizations have a greater need for dedicated toolsets. What features should IT look for when selecting this type of software?
Tag(s): asset management, technology, trends

 
It’s estimated that well over two billion people are connected to the Internet today. With the explosion of smartphone technology, it’s not hard to imagine that sometime in the next ten years, that number will hit ...
Tag(s): technology, future of support, SaaS, software as a service - SaaS, supportworld

 
We live in a world where database and analytical technologies are maturing at an amazing pace. Capabilities that were once the sole province of extremely large companies and governments are trickling down to our own companies and even ...
Tag(s): technology, supportworld

 
Over a hundred years ago, we began communicating electronically, and today, new technologies are helping us communicate in vastly different ways. These technologies are the cause and consequence of the social media revolution.
Tag(s): desktop support, social media

 
Securing personal devices requires an in-depth knowledge of not only the unique aspects of mobile devices but also the unique approaches to securing mobile devices that aren’t owned by company. Multiple platforms and multiple mobile device management (MDM) solutions only complicate the BYOD...
Tag(s): byod, security management

 
I am the Cherwell service desk’s worst nightmare. There, I said it (and they’d tell you so, too). Why? Because I’m in love with technology, but I’m a minimalist. Laptops are too bulky; I want to be able to do everything I need to from my phone...or, better yet, from my watch. I’m constantly...
Tag(s): byod, future of support, mobile device support

 
Overenthusiastic advocates of any initiative often jump into action before thinking things through, but just because one organization saved money by using peer-to-peer support, that doesn’t mean it will work in every organization in the same way.
Tag(s): best practice, community, desktop support, service desk, social networking tools, social IT, supportworld