Weak Link in Continual Service Improvement

It’s difficult to make a case than any of the ITIL books are more important than any of the others. There are convincing arguments that can be made in support of any one of the five core books being the most important. While there are both things I like and things I don’t like about the current Continual Service Improvement (CSI) book, organizations that fail to properly attend to this aspect of service management are at a severe disadvantage.

Read more

Powershell Security Model: Script Security Officer, Part 2

In the first post in this series, we explored the security need for an IT professional to identify who the author of a piece of code (like a PowerShell script) is. The challenge with that is producing evidence of the identity of the author that’s formatted in a way that the consumer of that script can use it.

That interaction is somewhat like the interaction between a speeder and a police officer. The officer needs to prove the identity of the driver in much the same way that an IT pro needs to identify a scripter. The officer can ask for a driver’s license, but what can an IT Pro ask for?

Read more

Cloud Computing Success Factors from CIOs

The 2013 CIO Executive Forum in Charlotte, NC was a great event. Seldom do you get to rub elbows with top company C-Level executives, and less often do you get to hear what they really think about the most pressing matters in IT today.

Cloud computing was the over riding theme of almost every presentation and discussion. I can paraphrase the cloud conversations pretty simply, “It’s not a question of if, but rather how to adopt cloud successfully.”

Read more