Business Service Management

The Future of Unified Communications in Retail

The Retail Challenge—Large and Small Approaches

Realizing the IT Management Value of Infrastructure Management

Delivering Infrastructure Management

Understanding the Business Value of Infrastructure Management

Leveraging Your Existing Infrastructure for Enterprise Data Protection

Virtual Machine Environments: Data Protection and Recovery Solutions

Lowering Costs of Data Protection through Deduplication and Data Reduction

Getting Started—How to Evaluate Vendors

Identifying High Impact Areas for Automation

Roadmap for the Automation Journey

Introduction to IT Process Automation

Business Processes

Data Center Virtualization

Policy Enforcement

Application Infrastructure Management

Data Center Service Level Agreements

Data Center Auditing

Automating Server Provisioning

Data Center Automation

Run Book Automation Benefits and Best Practices

Common RBA Use Cases

Key Ingredients for Run Book Automation Systems

Run Book Automation

Automating the Service Lifecycle

Service Operations and Business Service Management

Service Transition, Change, and the Service Desk

The Business Value of IT Operations Service Life Cycle Management

Protecting Business Data

Roadmap for Successful ITIL Service Support Implementation

Supporting Compliance Through ITIL

Effective Incident and Problem Management

Effective Change Management

ITIL Overview and Challenges

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Maintain the Integrity of Election Systems

Roadmap to Implementing Service-Oriented Systems Management Services

Quality Delivery

Performance Testing

Functional Testing—Verifying Quality

Development—Quality Practices

Design—Building Quality In

Requirements — Quality from the Beginning

What’s Your Quality Level?

Costs of Quality, Barriers to Quality, Benefits of Quality

What Is Application Quality, and Who Cares?

Quality Application Delivery

Identity Management Standards

A Ciso Guide to Modern Security Architecture

Implementing a Fabric Architecture to Secure the Entire Organization, Meet the Demands of Compliance and Governance, and Proactively Manage Risk

Practicing Enterprise Change Management

Managing Change in Enterprise Conten

Managing Change in System Configurations

Managing Change in the Software Development Lifecycle

Examining the Nature of Enterprise Change Managemen

Enterprise Change Management

Effective Service Availability Management and Capacity Planning

Active Directory Security

Trends in Internet Access Protection for Business Integrity and Compliance

The Evolving Landscape of Protecting Internet Access

Protecting Business Internet Usage

Applying the Provisioning Technology

User Management

Provisioning and the Management of Users

Protection at the Client Level

Email Content Dangers

A Primer on BSM

Integrating BSM with ITIL and Six Sigma

Achieving IT Value

Achieving Operational Value

Achieving Management Value

End User Experience Monitoring

Implementing Business Service Management

IT Service Management Evolution

The Alignment of IT and Business

The Power of Business Service Management

Communications for the Modern Workplace

Additional Azure Services

What is Power BI?

Enterprise Automation Brings Confidence and Control to Managing File Transfers

Implementing a Sender Validation Solution in Your Company

Sender Validation Solutions

Spam and Spam Filtering Methods

Communications-Enabled Business Processes for Service and Solution Providers

Communications-Enabled Business Processes in the Enterprise Environment

Download Group Policy Administrative Template