Monthly Archive: October 2015

Security Threats

7 Tips For Protecting Yourself From Online Security Threats

The biggest online security threat for any individual is ignorance. Put simply, ignorance is not knowing something you should know, or choosing to ignore facts that affect you. Unfortunately, some people don’t give enough thought, and sometimes none at all, to online security issues and the measures they need to take to [...]

Continue Reading

Posted by Joe the IT Guy | Leave a comment

Software Asset Management

How to Write a Software Asset Management Process – Part 2

  In a previous blog we examined the meta-activities that should be undertaken to provide the best possible prospect of Software [...]

Continue Reading

Posted by Joe the IT Guy | 1 Comment on How to Write a Software Asset Management Process – Part 2

Building ITSM House Part 4

Building Your ITSM House, Part 4

Can you feel the excitement?  All of the hard work is paying off – our ITSM house that we’ve been building is taking shape!  In Part 1 [...]

Continue Reading

Posted by Joe the IT Guy | Leave a comment

Software Asset Management

How to Write a Software Asset Management Process – Part 1

In viewing many efforts at creating and maintaining a Software Asset Management (SAM) process in different organizations, it’s come to [...]

Continue Reading

Posted by Joe the IT Guy | 4 Comments on How to Write a Software Asset Management Process – Part 1

Categories

IT Humor




IT SELF-SERVICE FUTURE

Back to ITSM Blog

More ITSM bloggers

About me

Joe

So in case you hadn't worked it out yet, I'm Joe! Hello there. I'm a native New Yorker and I love everything connected to IT service management (ITSM). I'm a passionate blogger and Twitter addict, and I'm also the resident IT guy at SysAid Technologies.