Information on the affordable and dependable IT support services offered by SysArc to small and mid-sized clients throughout the Virginia, Maryland and Washington DC area.
Freshservice is an online ITIL service desk with a fresh twist. It puts a refreshing user experience on top of powerful ticketing and asset management capabilities, and is the most user-friendly app in the space. In addition to core functionalities like Incident, Problem, Change, Release and Asset Management, Freshservice also lets you put your knowledge base on the cloud.
Freshservice offers a plug and play ITIL solution for organisations looking to align themselves to best practices without getting any expert implementation help. It has been developed by the team of experts behind Freshdesk, the leading customer support software that is currently being used to support over 5 million customers across the world.
EnterpriseWise SYSPRO™ Support Program - Santa Clarita ConsultantsSupply Chain Coalition
For 28 years, we have provided SYSPRO™ implementation and support. You will find no one better to give SYSPRO™ support than the team at Santa Clarita Consultants. Learn more at http://www.scc-co.com/syspro-support-services.
This SYSPRO™ User Support Program is recommended for all SYSPRO™ users -
Business IT Services and Consulting, Cloud Solutions, Data Backup, Network Security and Business Continuity. Leader in IT Support since 1984 in Dallas, Fort Worth, Arlington & Amarillo Area.
www.CTGManagedIT.com
Information on the affordable and dependable IT support services offered by SysArc to small and mid-sized clients throughout the Virginia, Maryland and Washington DC area.
Freshservice is an online ITIL service desk with a fresh twist. It puts a refreshing user experience on top of powerful ticketing and asset management capabilities, and is the most user-friendly app in the space. In addition to core functionalities like Incident, Problem, Change, Release and Asset Management, Freshservice also lets you put your knowledge base on the cloud.
Freshservice offers a plug and play ITIL solution for organisations looking to align themselves to best practices without getting any expert implementation help. It has been developed by the team of experts behind Freshdesk, the leading customer support software that is currently being used to support over 5 million customers across the world.
EnterpriseWise SYSPRO™ Support Program - Santa Clarita ConsultantsSupply Chain Coalition
For 28 years, we have provided SYSPRO™ implementation and support. You will find no one better to give SYSPRO™ support than the team at Santa Clarita Consultants. Learn more at http://www.scc-co.com/syspro-support-services.
This SYSPRO™ User Support Program is recommended for all SYSPRO™ users -
Business IT Services and Consulting, Cloud Solutions, Data Backup, Network Security and Business Continuity. Leader in IT Support since 1984 in Dallas, Fort Worth, Arlington & Amarillo Area.
www.CTGManagedIT.com
Inextrix Technologies Pvt. Ltd is one of the well known IT companies based in India. The company has been catering to its customers across the world since 2010.
Traditionally, royalty management systems were not high on the priority list of corporate decision-makers. When royalty management was simpler, the potential returns didn’t seem to justify the investment.
Several factors have combined to change that.
Digital storage has allowed companies to accumulate huge libraries of assets—and huge numbers of potential royalty obligations. IP has become more complex, touching a wide audience, numerous demographics, and a multitude of device types.
Without clear visibility into royalties, many companies are forced to overpay deliberately in order to mitigate the risk of a dispute. Those who don’t take that approach, or don’t properly track their obligations, face an increasing number of disputes, audits, and lawsuits.
To take a recent example, Jillian Michaels, the fitness trainer and former host of NBC’s “The Biggest Loser” reality show, filed a $10 million lawsuit against entertainment company Lionsgate over YouTube videos posted to its channel. Michaels alleges that Lionsgate posted more videos to YouTube than were permitted under her contract, and failed to pay her any royalties.
Implementing a royalty management system is not without its challenges. However, better systems can help companies achieve big efficiency gains, mitigate risk, and assist in identifying opportunities to monetize IP. By avoiding the biggest royalty management mistakes when putting in place a system, companies can maximize their chances of a smooth implementation and realize their desired return on investment.
The first question asked by many ITSM organizations is why should I automate any of my processes? Won’t it be expensive to purchase a product to implement automation? Once they have been implemented won’t I need to maintain those automation’s with an expensive resource (like a code developer) going forward?
The short answer to these questions is that it depends on the product that you are using for ITSM. Hopefully, your product includes some form of automation out of the box. At a minimum, it should allow you to integrate calls to an external workflow automation tool. If your ITSM product does include some form of automation tool, with any luck it is possible to create that automation without a need to write a lot of code that will need to be maintained in the future.
Before you get to reap the benefits of ERP software, it needs to be successfully implemented. With one report suggesting that 21% of companies’ ERP projects had failed, it’s not always a straight forward task.
That’s why we’ve listed 5 reasons why ERP implementations fail so you can ensure that yours goes smoothly.
If you would like more information on any of the products discussed in this video please visit www.kerridgecs.com.
Connect with us:
Website: www.kerridgecs.com
Twitter: @kerridgecs
Linkedin: https://www.linkedin.com/company/kerridge-commercial-systems?trk=biz-companies-cym
Facebook: https://www.facebook.com/KerridgeCommercialSystems
Instagram: https://www.instagram.com/kerridgecs/
How Cloud Predictive Dialer is the Go To Technology for Start Up?Naina Rajput
Cloud predictive dialer comes with various features that help startups to reap business benefits. Let's understand more about cloud predictive dialer for the startup.
This presentation covers ways organizations can leverage Interactive Voice Response (IVR) internally for self-service support inquiries, contact agent relief and maximum ROI.
A presentation created for Veritas Business Critical Services Premier, highlighting the service offerings to simplify support, maximize return and protect your infrastructure.
Managed IT Services vs. Break-Fix [Infographic]resourceone
This infographic explains the difference between managed IT services and a break-fix model. In fact, businesses that switch from break-fix to managed IT services can save money. Learn more about managed IT services and how it works in this infographic.
The RES Acquisition, One Year Later: A New Introduction to Ivanti Unified IT ...Ivanti
It’s been just over a year since Ivanti acquired RES. We’ve enjoyed getting to know so many of you as new members of the Ivanti family. In this special webinar we will discuss the steps we’ve taken to integrate the RES products into the Ivanti portfolio and we’ll introduce you to all Ivanti has to offer. Did you know, for example, that many RES customers have combined RES automation with Ivanti ITSM to transform their IT organization? Or that they are now using Ivanti Patching products to keep their company safe.
Join Ivanti CMO, Steve Morton, and RES founder and Ivanti Chief Technology Innovation Officer, Bob Janssen, as they discuss the acquisition, answer your questions, and more.
Inextrix Technologies Pvt. Ltd is one of the well known IT companies based in India. The company has been catering to its customers across the world since 2010.
Traditionally, royalty management systems were not high on the priority list of corporate decision-makers. When royalty management was simpler, the potential returns didn’t seem to justify the investment.
Several factors have combined to change that.
Digital storage has allowed companies to accumulate huge libraries of assets—and huge numbers of potential royalty obligations. IP has become more complex, touching a wide audience, numerous demographics, and a multitude of device types.
Without clear visibility into royalties, many companies are forced to overpay deliberately in order to mitigate the risk of a dispute. Those who don’t take that approach, or don’t properly track their obligations, face an increasing number of disputes, audits, and lawsuits.
To take a recent example, Jillian Michaels, the fitness trainer and former host of NBC’s “The Biggest Loser” reality show, filed a $10 million lawsuit against entertainment company Lionsgate over YouTube videos posted to its channel. Michaels alleges that Lionsgate posted more videos to YouTube than were permitted under her contract, and failed to pay her any royalties.
Implementing a royalty management system is not without its challenges. However, better systems can help companies achieve big efficiency gains, mitigate risk, and assist in identifying opportunities to monetize IP. By avoiding the biggest royalty management mistakes when putting in place a system, companies can maximize their chances of a smooth implementation and realize their desired return on investment.
The first question asked by many ITSM organizations is why should I automate any of my processes? Won’t it be expensive to purchase a product to implement automation? Once they have been implemented won’t I need to maintain those automation’s with an expensive resource (like a code developer) going forward?
The short answer to these questions is that it depends on the product that you are using for ITSM. Hopefully, your product includes some form of automation out of the box. At a minimum, it should allow you to integrate calls to an external workflow automation tool. If your ITSM product does include some form of automation tool, with any luck it is possible to create that automation without a need to write a lot of code that will need to be maintained in the future.
Before you get to reap the benefits of ERP software, it needs to be successfully implemented. With one report suggesting that 21% of companies’ ERP projects had failed, it’s not always a straight forward task.
That’s why we’ve listed 5 reasons why ERP implementations fail so you can ensure that yours goes smoothly.
If you would like more information on any of the products discussed in this video please visit www.kerridgecs.com.
Connect with us:
Website: www.kerridgecs.com
Twitter: @kerridgecs
Linkedin: https://www.linkedin.com/company/kerridge-commercial-systems?trk=biz-companies-cym
Facebook: https://www.facebook.com/KerridgeCommercialSystems
Instagram: https://www.instagram.com/kerridgecs/
How Cloud Predictive Dialer is the Go To Technology for Start Up?Naina Rajput
Cloud predictive dialer comes with various features that help startups to reap business benefits. Let's understand more about cloud predictive dialer for the startup.
This presentation covers ways organizations can leverage Interactive Voice Response (IVR) internally for self-service support inquiries, contact agent relief and maximum ROI.
A presentation created for Veritas Business Critical Services Premier, highlighting the service offerings to simplify support, maximize return and protect your infrastructure.
Managed IT Services vs. Break-Fix [Infographic]resourceone
This infographic explains the difference between managed IT services and a break-fix model. In fact, businesses that switch from break-fix to managed IT services can save money. Learn more about managed IT services and how it works in this infographic.
The RES Acquisition, One Year Later: A New Introduction to Ivanti Unified IT ...Ivanti
It’s been just over a year since Ivanti acquired RES. We’ve enjoyed getting to know so many of you as new members of the Ivanti family. In this special webinar we will discuss the steps we’ve taken to integrate the RES products into the Ivanti portfolio and we’ll introduce you to all Ivanti has to offer. Did you know, for example, that many RES customers have combined RES automation with Ivanti ITSM to transform their IT organization? Or that they are now using Ivanti Patching products to keep their company safe.
Join Ivanti CMO, Steve Morton, and RES founder and Ivanti Chief Technology Innovation Officer, Bob Janssen, as they discuss the acquisition, answer your questions, and more.
The quarterly voice and speech technology newsletter from Business Systems, offering you the latest news and insights on call recording, quality montioring, speech analytics, PCI Compliance and much more. Featuring our latest case studies, webinars (including our latest one 'What are the most successful contact centres doing right?') and sponsored guides.
Service Desk or Helpdesk is nowdays have become an Important part of any Organization.
BPO/KPO s have maintained their own Heldesk if there is ny Technical DIfficulty.
The Project will guide you to how an Techincal officer works.
Ticketing system will help you manage all your customer complaints and support tickets using those tickets you can provide better service to the customers.
How can you increase profits while your money is literally going out the door? We have identified 10 common service problems companies experience and provided some solutions to those problems, which will help you fix your revenue leakage as well as increase efficiencies and drive more revenues.
SAP Field Service Management -Planning & DispatchingAshish Saxena
In many industries such as the medical devices industry, Food processing, Manufacturing, etc., any machine downtime means lost production volume which results in loss of thousands of dollars of revenue. According to Analyst firm Aberdeen Research, 82 percent of companies have experienced unplanned downtime over the past three years and that unplanned downtime can cost a company as much as $260,000 an hour!
Call Management Services Should be Part of Every Business Telephone SystemMahindra Comviva
Today’s sophisticated call management systems integrate various other devices including mobiles and tabs so that an all inclusive call management can be achieved by the business.
Help and Support Portal Whitepaper - CRMJettyCRMJetty
Support Portal Whitepaper translates the features of a dedicated support system tailored to meet organizational needs in the easiest way. It makes tasks simple and smart.
Your Challenge
Service desk managers with immature service desk processes struggle with:
Low business satisfaction.
High cost to resolve incidents and implement requests.
Confused and unhappy end users.
High ticket volumes and a lack of root-cause analysis to reduce recurring issues.
Wasted IT time and wages resolving the same issues time and again.
Ineffective demand planning.
Our Advice
Critical Insight
Don’t be fooled by a tool that’s new. A new service desk tool alone won’t solve the problem. Service desk maturity improvements depend on putting in place the right people and processes to support the technology.
Service desk improvement is an exercise in organizational change. Engage specialists across the IT organization in building the solution, and emphasize how everyone stands to benefit from the initiative.
Organizations are sometimes tempted to track their work under a single ticket type. Unfortunately, the practice obscures the fact that incidents, requests, and projects require radically different amounts of time and resources, and can create the impression that IT is underperforming. Distinguish between incidents, requests, and projects, and design specific processes to support and track the performance of each activity.
Remember, the value of any IT service management (ITSM) tool is a function of the processes it supports and the adoption of those processes. The ITSM tool with the best functionality is worth little if you do not build the right processes, configure the tool to support them, and work to improve tool adoption in your organization.
Impact and Result
Increase business satisfaction.
Reduce recurring issues and ticket volumes.
Reduce average incident resolution time and average request implementation time.
Increase efficiency and lower operating costs.
Enhance demand planning.
Now more than ever, IT needs to raise its internal profile and demonstrate ROI. An IT intranet is the perfect vehicle for doing so. Here we share ten ways an IT intranet can contribute to corporate goals.
IT Service Management (ITSM) Model for Business & IT AlignementRick Lemieux
Today’s multi-faceted business world demands that Information Technology provide its services in the context of a fully integrated corporate strategic model. This transformation becomes possible when IT evolves from its technological heritage into a Business Technical Organization, or an “internal service provider.” This paper describes how the itSM Solutions reference model integrates five widely used service management domains to create a powerful model to guide IT in its journey into the business leadership circle.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Dit yvol3iss17
1. New Service Desk Success in 8 Steps
Page 1 of 3
Instructor Portal
Downloads
Newsletters
---------------------------------------------
DITY™ Newsletter
Vol. 3.17 • April 24, 2007
New Service Desk Success
in 8 Steps
Print page
digg (discuss or comment) on this article. Show your support for DITY!
1
digg
Subscribe Its Free!
RSS Stay up to date!
PDF Pass it around!
dugg!
It’s pretty common for Users to go around a new Service Desk, but what do you
do when IT groups go around the new Service Desk too? Lack of trust in a new
Service Desk cuts both ways and success depends on winning the hearts and
minds of customers and internal IT groups – and it takes just 5 minutes…
By Janet Kuhn
As a Project Manager at a large medical services organization we
implemented a modern Service Desk with phone access and self-help (letting
Users enter Incidents directly in the new system.) Our technical groups were
looking forward to the new Service Desk as a way to reduce interruptions to
their daily work.
However, after implementing the new Service Desk, our technical support groups still got
calls directly from Users. It seems many Users were uncertain about what constituted a
reportable Incident, and were also uncertain about how to contact the Service Desk or use
the self-help feature.
Then we found out the IT side had concerns too – our technical groups did not want to
lose their connection with Users. They had worked hard to build bridges with the business,
and they did not want to destroy them by refusing to take support calls.
To resolve these issues we created the “Five-Minute Rule” to make Users more
comfortable with the new Service Desk and teach them the benefits of going through, instead
of around, the Service Desk. Ditto for our technical groups.
Following I introduce the eight key steps that make up my “Five-Minute Rule” that you
too can use to ease the introduction of a new Service Desk into your own organization.
http://www.itsmsolutions.com/newsletters/DITYvol3iss17.htm
4/24/2007
2. New Service Desk Success in 8 Steps
Page 2 of 3
The Five-Minute Rule
The structure of these eight steps is very important, and when followed carefully teaches
both Users and IT that they will not “lose” their relationships, and because IT is better able
to focus on the resolution of an Incident or Problem, the quality of those relationships
increases.
The “Five-Minute Rule” lets a user call and discuss the Incident with a Technical Analyst
within a technical group for a maximum of five minutes, concluding with either the user or
the Technical Analyst opening a Service Desk ticket.
1. Receive the User call.
2. Ask User if he/she has logged the call with the Service Desk.
3. If Yes, ask the User for the ticket number and assure them him/her that keeping
track of that number is the key to getting the issue resolved. [This reinforcement is a
key step and you should not skip it.]
4. If No, ask him/her to log the call with the Service Desk. Explain that the Service
Desk will:
Assign a trouble ticket to make sure the call is not lost;
Keep track of the call so that if a Technical Support Analyst gets called away
for another purpose, the Service Desk always knows where the call is;
Issue automatic warnings to the Service Desk and Technical Support groups if
a ticket is open for longer than the agreed service levels;
Assign the call to the correct Technical Support Analyst because sometimes
multiple problems contribute to the interruption of the service;
5. If the User still hesitates to log the Incident with the Service Desk:
Sign in and log the Incident for them, referencing your name and a summary
of the conversation in the text field;
Give the User the ticket number and explain that although eventually you
may be assigned to work on the Incident, this will protect the User for all the
reasons stated above
6. Try to find out why the User called Technical Support directly;
7. If the Incident prevented the User from using the on-line Service Desk feature, give
them the Service Desk’s telephone number for follow up;
8. If they did not know who to call or did not want to call the Service Desk, explain
http://www.itsmsolutions.com/newsletters/DITYvol3iss17.htm
4/24/2007
3. New Service Desk Success in 8 Steps
Page 3 of 3
that there are new procedures, and refer them to their supervisor – or your
supervisor, if necessary.
Be pleasant, but firm, and assure the User that the new procedures will help everybody
work more effectively and efficiently.
Summary
Had we allowed Users and Technical groups to continue to bypass the Service Desk, the
organization would not have received the full benefit of a mature Service Desk and Incident
Management process.
However, had we hardened our stance on allowing the Technical groups to accept calls
directly from the Users, we might have lost “buy-in” to the new processes by the Technical
groups, as well as the very essence of trust and communication between the Users and the IT
department that we were trying to build.
During the genesis of our new Service Desk this procedure was highly effective. The
“Five-Minute Rule” ensured that no matter how a User placed a call, the call was entered
into the Incident Management system. Equally as important, the Five-Minute Rule allowed
the Technical groups to assume responsibility for managing the necessary adjustments to
the new environment.
Please forward this story to a manager, co-worker or a friend.
Where to go from here
digg (discuss or comment) on this article. Show your support for DITY!
Subscribe to our newsletter and get new skills delivered right to your Inbox, click here.
Download this article in PDF format for use at your own convenience, click here.
Use your favorite RSS reader to stay up to date, click here.
Related programs
Foundation Certification in IT Service Management
ITSM Practitioner – Support and Restore (IPSR)
Stabilization 1 Workshop (Service Desk, Incident Management, Problem Management)
Related articles
Debunking the Myth of 'Over Servicing' Customers
Looking in the mirror: Part 1
Serving Up Service -- Help Desk Evolution
Browse back-issues of the DITY Newsletter, click here.
Home
Methodology
About Us
Products
Contact Us
http://www.itsmsolutions.com/newsletters/DITYvol3iss17.htm
4/24/2007