Use this tool to assign levels of severity (ranging from 1-5) to IT incidents, and separate critical incidents from typical incidents, which will be handled by the lower...
|
|
Use this template to outline the incident manager's role and responsibilities, including required duties, education, and experience. While the incident manager may not...
|
|
This workbook of the blueprint, Modernize Enterprise Storage, will guide you through activities that evaluate current storage infrastructure and plan for future storage...
|
|
Data continues to grow at an exponential rate, and your current storage solutions will not meet all your future needs. Info-Tech’s methodology for storage modernization...
|
|
This tool will help you evaluate your longlist by displaying the results of a voting exercise on Info-Tech's Disruptive Technology Matrix, and compiling a list of...
|
|
Use this tool to map out your end-user computing roadmap, and then to keep your team on track.
|
|
Performing a user group analysis can save you thousands of dollars in licensing and hardware, as well as hours of work every time Microsoft releases an update.
|
|
Use this template as a starting point for external communications regarding your end-user computing strategy.
|
|
Use this template to document your end-user computing strategy in detail.
|
|
Review your software contracts to leverage your unique position during negotiations and find substantial cost savings.
|
|