SlideShare a Scribd company logo
1 of 20
Download to read offline
World®
’16
Case	Study:	Going	From	Zero	to	100	in	ITSM	
Without	a	Seat	Belt	at	Michigan	State	University
Ahmed	Issawi - Chief	ITSM	Tool	Architect	- Michigan	State	University
AMX19S
AGILE	MANAGEMENT
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	
of	warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
In	this	case	study	hear	about	the	struggles	and	successes	experienced	at	
Michigan	State	University,	going	from	no	ITIL	foundation	to	
implementing	an	IT	Service	Management	(ITSM)	program	based	on	CA	
Service	Management.	Learn	about	years	of	starting	and	stalling	due	to	
having	little	senior	leadership	support,	but	then	getting	a	major	boost	
from	a	new	ITSM-believing	CIO.	Learn	about	changing	the	culture	from	
using	pen	and	paper	to	using	Request,	Incident	and	Problem	
management,	while	breaking	barriers	of	resistance	with	second	level	
Support	teams	who	want	more	of	the	same	and	less	responsibility.	
Takeaways	from	this	session	include	that	you	are	not	the	only	team	
struggling	with	ITSM,	how	to	overcome	senior	leadership	barriers	and	
how	to	sell	ITSM	and	ITIL	to	a	skeptical	staff.
Ahmed	
Issawi
Michigan	State	
University
IT	Service	
Management	
System	Architect
ITIL	is	a	trademark	of	AXELOS	LTD.
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
THE	GREEN	BINDER
THE	SEARCH
ONWARD	AND	FORWARD
PROCESS?	WHAT	PROCESS?
THE	COLD	WINTER
ORGANIZATIONAL	CHANGES
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Green	Binder
§ Started	by	using	a	green	binder
– Every	call	was	considered	a	ticket
§ Outlook	forms	rule!	(no	they	don’t)
– Incidents	became	logs	and	were	sent	to	2nd	level
§ Please	help!
– We	had	to	beg	2nd	level	to	take	a	log
Welcome	to	the	Paper	Era!
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Green	Binder
§ Started	learning	about	ITIL	
– Version	2
– Not	everyone	bought	it
§ ITIL	in,	nothing	out
– ITIL	was	hung	out	to	dry
– No	one	followed	process
ITIL?	What	is	that?
ITIL	is	a	trademark	of	AXELOS	LTD.
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Search	Begins
§ The	Magic	Pill
– Technology	will	save	us	all!
– Crazy	requirements
§ RFP
– New	system	had	to	cure	all	our	aliments
– Multiple	vendors	respond
RFP	Opened	for	Request	system
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Search	Continues
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
A	Decision	is	Made
§ Price	was	a	driving	factor	
– Not	the	Ultimate	factor
– Price	had	to	be	justified	
§ Vendor	offered	more	bang	for	the	buck
– Received	a	lot	of	tools
– Not	ready	for	a	full	suite
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Process?	What	Process?
§ System	rolled	out
– ITIL	was	ignored
– No	buy-in	from	2nd	level	support
§ Processes?
– Used	old	process	in	the	new	system
– Square	peg	in	round	hole
Out	With	the	Old,	in	With	the	Old
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Cold	Winter
§ Stuck	on	version	11.2
– ITIL	still	ignored
– Patches	are	ignored,	no	one	owned	the	system
– No	Metrics	out	of	system
§ Everything	is	an	Incident
– All	tickets	and	calls	are	incidents
– How	do	you	know	what's	broken?
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Cold	Winter
§ Here	comes	12.1!
– BOXI	allowed	for	reports,	but	metrics	were	off
– No	standardized	reports	(Reports	are	the	wild	west)
– No	baseline	was	ever	taken
§ Rise	of	Shadow	systems
– No	one	followed	process
– Other	systems	can	do	it	better
More	of	the	Same
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Organizational	Changes
§ New	CIO	è New	Vision	
– Technical	“Debt”
– ITIL	pushed	hard
§ Service	Management	Office	is	born
– Processes	start	to	get	unified
– New	procedures	had	teeth
– ITSM	Suite	was	now	pushed	as	department	standard
New	Regime,	New	Rules
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Organizational	Changes
§ Change	Management
– Moved	from	3	different	systems	to	CA	ITSM	solution
– First	step	in	using	Configuration	Items
§ Request	Process
– Request	process	changed	(Not	everything	is	an	incident!)
– Areas	are	changed	to	Configuration	Items	
– Pushed	process	to	whole	department	(Had	to	sell	CI’S)
– Started	changing	process	to	match	the	system,	rather	than	
changing	the	system	to	match	process
Forward	We	Go!
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Upgrade
§ New	Version	rolled	out
– Advance	Availability	is	great!
– Allowed	us	to	roll	new	processes	out
– Knowledgebase	is	now	standard
– Incident	has	Priority	Matrix	now;	Urgency	and	Impact	define	Priority
– Brought	status	number	down	from	20	to	6
– Change	authentication	method
– Started	using	CA	Mail	eater
– Mobile	Application	is	rolled	out
CA	Service	Management	12.6	è 14.1
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Upgrade
§ Patch	2	installed
– 2nd Level	Support	loves	the	custom	queries
– A	few	hiccups	but	CA	Support	was	great
§ Rollout
– Trained	department	like	it	was	a	brand	new	system
– Old	system	is	set	to	view	only	and	set	to	retire
– Resolve	all	these	old	system	tickets
CA	Service	Management	14.1	Patch	2
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Present	and	Future
§ Present
– Finished	rolling	out	CA	Service	Catalog	and	Unified	Self	Service
– Presented	to	rest	of	University
– Departments	started	lining	up	for	access;	not	only	to	system,	but	
process	also
§ Future
– Asset	Management	
– Configuration	Management	Data	Base
– CA	Service	Management	14.1.3	/	Jaspersoft
Moving	on	Up!
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agile	Management
For	more	information	on	Agile	Management,	please	visit:	
http://cainc.to/9Zed5W

More Related Content

What's hot

Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...
Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...
Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...CA Technologies
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyCA Technologies
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementCA Technologies
 
CA PPM : Aligning Projects With Strategy
CA PPM: Aligning Projects With StrategyCA PPM: Aligning Projects With Strategy
CA PPM : Aligning Projects With StrategyCA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Business Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration FabricBusiness Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration FabricCA Technologies
 
Hypermedia-Driven Orchestration in Microservices
Hypermedia-Driven Orchestration in MicroservicesHypermedia-Driven Orchestration in Microservices
Hypermedia-Driven Orchestration in MicroservicesCA Technologies
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...CA Technologies
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...CA Technologies
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
 
Digical is the Imminent Reality
Digical is the Imminent RealityDigical is the Imminent Reality
Digical is the Imminent RealityCA Technologies
 
Securing your API Portfolio with API Management
Securing your API Portfolio with API ManagementSecuring your API Portfolio with API Management
Securing your API Portfolio with API ManagementCA Technologies
 

What's hot (12)

Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...
Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...
Technology Primer: Use Zero-Config Agents in CA Application Performance Manag...
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API Management
 
CA PPM : Aligning Projects With Strategy
CA PPM: Aligning Projects With StrategyCA PPM: Aligning Projects With Strategy
CA PPM : Aligning Projects With Strategy
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Business Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration FabricBusiness Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration Fabric
 
Hypermedia-Driven Orchestration in Microservices
Hypermedia-Driven Orchestration in MicroservicesHypermedia-Driven Orchestration in Microservices
Hypermedia-Driven Orchestration in Microservices
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
 
Digical is the Imminent Reality
Digical is the Imminent RealityDigical is the Imminent Reality
Digical is the Imminent Reality
 
Securing your API Portfolio with API Management
Securing your API Portfolio with API ManagementSecuring your API Portfolio with API Management
Securing your API Portfolio with API Management
 

Viewers also liked

PROJECT POWERPOINT FINAL
PROJECT POWERPOINT FINALPROJECT POWERPOINT FINAL
PROJECT POWERPOINT FINALNicole Wolfgang
 
DHBR2011.08 持続的成長のS字曲線
DHBR2011.08 持続的成長のS字曲線DHBR2011.08 持続的成長のS字曲線
DHBR2011.08 持続的成長のS字曲線Kenichi Takara
 
ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...
ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...
ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...CPV
 
CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016
CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016
CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016Peerasak C.
 
ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)
ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)
ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)ビジネスイノベーションハブ
 
SAFe Implementation Unicorns at McKesson
SAFe Implementation Unicorns at McKessonSAFe Implementation Unicorns at McKesson
SAFe Implementation Unicorns at McKessonCA Technologies
 
Learn How CA Services Can Help You Optimize Your PPM Journey
Learn How CA Services Can Help You Optimize Your PPM JourneyLearn How CA Services Can Help You Optimize Your PPM Journey
Learn How CA Services Can Help You Optimize Your PPM JourneyCA Technologies
 
Agile Management Opening Keynote
Agile Management Opening KeynoteAgile Management Opening Keynote
Agile Management Opening KeynoteCA Technologies
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationCA Technologies
 
Tech Talk: How to Create and Steer an Agile Business
Tech Talk: How to Create and Steer an Agile BusinessTech Talk: How to Create and Steer an Agile Business
Tech Talk: How to Create and Steer an Agile BusinessCA Technologies
 
Agile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedAgile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedCA Technologies
 
Advanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFAdvanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFCA Technologies
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Technologies
 
Case Study: Using Process Automation in CA Service Catalog to Deliver Service...
Case Study: Using Process Automation in CA Service Catalog to Deliver Service...Case Study: Using Process Automation in CA Service Catalog to Deliver Service...
Case Study: Using Process Automation in CA Service Catalog to Deliver Service...CA Technologies
 

Viewers also liked (20)

PROJECT POWERPOINT FINAL
PROJECT POWERPOINT FINALPROJECT POWERPOINT FINAL
PROJECT POWERPOINT FINAL
 
Resume
Resume Resume
Resume
 
DHBR2011.08 持続的成長のS字曲線
DHBR2011.08 持続的成長のS字曲線DHBR2011.08 持続的成長のS字曲線
DHBR2011.08 持続的成長のS字曲線
 
M2M May TH ceo lr
M2M May TH ceo lrM2M May TH ceo lr
M2M May TH ceo lr
 
Polygons (1)
Polygons (1)Polygons (1)
Polygons (1)
 
HR Summit Brochure
HR Summit BrochureHR Summit Brochure
HR Summit Brochure
 
Superstitions
SuperstitionsSuperstitions
Superstitions
 
ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...
ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...
ESCRITO ESTA EN ACCION. LA OBRA DE DIOS Y LA MALDAD DEL SER HUMANO. HECHOS 23...
 
CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016
CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016
CROSS-BORDER BUSINESS HANDBOOK : Going global with Facebook 2016
 
ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)
ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)
ビジネスモデルキャンバス基礎編(スマホオンライン学習サービス)
 
SAFe Implementation Unicorns at McKesson
SAFe Implementation Unicorns at McKessonSAFe Implementation Unicorns at McKesson
SAFe Implementation Unicorns at McKesson
 
Superstition
SuperstitionSuperstition
Superstition
 
Learn How CA Services Can Help You Optimize Your PPM Journey
Learn How CA Services Can Help You Optimize Your PPM JourneyLearn How CA Services Can Help You Optimize Your PPM Journey
Learn How CA Services Can Help You Optimize Your PPM Journey
 
Agile Management Opening Keynote
Agile Management Opening KeynoteAgile Management Opening Keynote
Agile Management Opening Keynote
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
 
Tech Talk: How to Create and Steer an Agile Business
Tech Talk: How to Create and Steer an Agile BusinessTech Talk: How to Create and Steer an Agile Business
Tech Talk: How to Create and Steer an Agile Business
 
Agile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, SucceedAgile Communities of Practice: Set Up, Sustain, Succeed
Agile Communities of Practice: Set Up, Sustain, Succeed
 
Advanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFAdvanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUF
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
 
Case Study: Using Process Automation in CA Service Catalog to Deliver Service...
Case Study: Using Process Automation in CA Service Catalog to Deliver Service...Case Study: Using Process Automation in CA Service Catalog to Deliver Service...
Case Study: Using Process Automation in CA Service Catalog to Deliver Service...
 

Similar to Case Study: Going from Zero to 100 in ITSM Without a Seat Belt at Michigan State University

Recruiters Guide to Attract and Retain Millennials
Recruiters Guide to Attract and Retain MillennialsRecruiters Guide to Attract and Retain Millennials
Recruiters Guide to Attract and Retain MillennialsChris Bennett
 
HarveyNashKPMG_CIOSurvey2016
HarveyNashKPMG_CIOSurvey2016HarveyNashKPMG_CIOSurvey2016
HarveyNashKPMG_CIOSurvey2016Harley Porter
 
Campus Consortium EdTalks: The Future of IT in Education Featuring University...
Campus Consortium EdTalks: The Future of IT in Education Featuring University...Campus Consortium EdTalks: The Future of IT in Education Featuring University...
Campus Consortium EdTalks: The Future of IT in Education Featuring University...Campus Consortium
 
Implementing AI Successfully
Implementing AI SuccessfullyImplementing AI Successfully
Implementing AI SuccessfullyAlex Ermolaev
 
The 10 Most Successful CSOs Redefining Success in 2023.pdf
The 10 Most Successful CSOs Redefining Success in 2023.pdfThe 10 Most Successful CSOs Redefining Success in 2023.pdf
The 10 Most Successful CSOs Redefining Success in 2023.pdfInsightsSuccess4
 
NCWIT Scorecard 2010 Women in Technology Workforce
NCWIT Scorecard 2010 Women in Technology WorkforceNCWIT Scorecard 2010 Women in Technology Workforce
NCWIT Scorecard 2010 Women in Technology WorkforceKevin Carter
 
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertM3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertCA Technologies
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
10 Best CEOs to Watch.pdf
10 Best CEOs to Watch.pdf10 Best CEOs to Watch.pdf
10 Best CEOs to Watch.pdfCIOBulletin1
 
2015-southeast-asia-staffing-trends
2015-southeast-asia-staffing-trends2015-southeast-asia-staffing-trends
2015-southeast-asia-staffing-trendsKaren Chuan
 
Embracing Digital Technology: A New Strategic Imperative
Embracing Digital Technology: A New Strategic ImperativeEmbracing Digital Technology: A New Strategic Imperative
Embracing Digital Technology: A New Strategic ImperativeCapgemini
 
Recruiting Trends- SEA Staffing 2014
Recruiting Trends- SEA Staffing 2014Recruiting Trends- SEA Staffing 2014
Recruiting Trends- SEA Staffing 2014Charlie Lam
 
Embracing digital technology a new strategic imperative - capgemini consult...
Embracing digital technology   a new strategic imperative - capgemini consult...Embracing digital technology   a new strategic imperative - capgemini consult...
Embracing digital technology a new strategic imperative - capgemini consult...Rick Bouter
 
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...CA Technologies
 
The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations?
The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations? The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations?
The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations? CBIZ, Inc.
 
Mobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and AnalyticsMobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and AnalyticsKate Morphett
 

Similar to Case Study: Going from Zero to 100 in ITSM Without a Seat Belt at Michigan State University (20)

Recruiters Guide to Attract and Retain Millennials
Recruiters Guide to Attract and Retain MillennialsRecruiters Guide to Attract and Retain Millennials
Recruiters Guide to Attract and Retain Millennials
 
HarveyNashKPMG_CIOSurvey2016
HarveyNashKPMG_CIOSurvey2016HarveyNashKPMG_CIOSurvey2016
HarveyNashKPMG_CIOSurvey2016
 
Campus Consortium EdTalks: The Future of IT in Education Featuring University...
Campus Consortium EdTalks: The Future of IT in Education Featuring University...Campus Consortium EdTalks: The Future of IT in Education Featuring University...
Campus Consortium EdTalks: The Future of IT in Education Featuring University...
 
Implementing AI Successfully
Implementing AI SuccessfullyImplementing AI Successfully
Implementing AI Successfully
 
HMI Plan Book
HMI Plan BookHMI Plan Book
HMI Plan Book
 
The 10 Most Successful CSOs Redefining Success in 2023.pdf
The 10 Most Successful CSOs Redefining Success in 2023.pdfThe 10 Most Successful CSOs Redefining Success in 2023.pdf
The 10 Most Successful CSOs Redefining Success in 2023.pdf
 
HIMS Business Transformation Instructor Notes
HIMS Business Transformation Instructor NotesHIMS Business Transformation Instructor Notes
HIMS Business Transformation Instructor Notes
 
BIMTECH Information Bulletin - 2017
BIMTECH Information Bulletin - 2017BIMTECH Information Bulletin - 2017
BIMTECH Information Bulletin - 2017
 
NCWIT Scorecard 2010 Women in Technology Workforce
NCWIT Scorecard 2010 Women in Technology WorkforceNCWIT Scorecard 2010 Women in Technology Workforce
NCWIT Scorecard 2010 Women in Technology Workforce
 
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertM3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and Alert
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
10 Best CEOs to Watch.pdf
10 Best CEOs to Watch.pdf10 Best CEOs to Watch.pdf
10 Best CEOs to Watch.pdf
 
2015-southeast-asia-staffing-trends
2015-southeast-asia-staffing-trends2015-southeast-asia-staffing-trends
2015-southeast-asia-staffing-trends
 
Abraçar a Tecnologia Digital - A nova estratégia imperativa
Abraçar a Tecnologia Digital - A nova estratégia imperativaAbraçar a Tecnologia Digital - A nova estratégia imperativa
Abraçar a Tecnologia Digital - A nova estratégia imperativa
 
Embracing Digital Technology: A New Strategic Imperative
Embracing Digital Technology: A New Strategic ImperativeEmbracing Digital Technology: A New Strategic Imperative
Embracing Digital Technology: A New Strategic Imperative
 
Recruiting Trends- SEA Staffing 2014
Recruiting Trends- SEA Staffing 2014Recruiting Trends- SEA Staffing 2014
Recruiting Trends- SEA Staffing 2014
 
Embracing digital technology a new strategic imperative - capgemini consult...
Embracing digital technology   a new strategic imperative - capgemini consult...Embracing digital technology   a new strategic imperative - capgemini consult...
Embracing digital technology a new strategic imperative - capgemini consult...
 
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
 
The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations?
The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations? The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations?
The Talent Gap Crisis - Is Manufacturing Sexy Enough for the Next Generations?
 
Mobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and AnalyticsMobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and Analytics
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Case Study: Going from Zero to 100 in ITSM Without a Seat Belt at Michigan State University