Operations | Monitoring | ITSM | DevOps | Cloud

ITSM

The latest News and Information on IT Service Management, Service Desk and related technologies.

What is Service Request Management? Examples and Benefits

Modern businesses must offer essential services and support to internal and external clients and employees to run efficiently. Unfortunately, not all service requests are easy to understand. Employees might need additional direction from the service provider and expectations about the caliber of service they can expect to use the service offered fully.

Boosting Customer Experience with RFID-enabled Self-checkout in Retail Industry

In recent years, self-checkout systems have become increasingly popular in retail stores. These systems enable customers to scan and bag their items themselves, reducing the time spent waiting in line and improving the overall shopping experience. However, traditional self-checkout systems require customers to manually enter the product code or scan the barcode, which can be time-consuming and frustrating.

How RFID technology can optimize asset utilization in offices

Offices are complex environments where assets are always moving, from furniture and equipment to files and documents. Tracking these assets can be a difficult and time-consuming process. RFID technology can help optimize asset utilization in offices by providing real-time visibility and location tracking of these assets.

RFID solutions for efficient inventory management in retail

Introduction: Efficient inventory management is the backbone of any successful retail business. With the rise of e-commerce, consumers have more options than ever, which means retailers must prioritize a streamlined supply chain to stay competitive. Radio Frequency Identification (RFID) solutions have become increasingly popular in recent years as a way to improve inventory management.

New Chrome and Edge zero-day exploits: How to patch CVE-2023-2033 and CVE-2023-2136

Two new zero-day exploits that affect the Chromium browser core were reported on April 14th. And since both Chrome and Microsoft Edge are based on it, Google advised to update the browsers. The vulnerabilities CVE-2023-2033 and CVE-2023-2136 can lead to remote code execution and have already been fixed. But that doesn't mean that's the end of the problem.

Micro Product Demo: Ivanti Neurons for Security Operations Management in 151 seconds

Ivanti Neurons for Security Operations Management provides your organization with centralized management of security events to identify all events that require triage and assigns the remediation activity automatically or manually to the right team. In this video, we look at the capabilities across Security Operations Management, Security Event Management, Security Incident Management, Incident and Change Management, DevOps, and Visibility.

PAM Masterclass Episode 3: Essentials of privilege elevation and delegation management

In this episode, you'll gain an in-depth understanding of ManageEngine PAM360's privilege elevation capabilities to provision time-based, application- or command-based, role-based, and requirement-based access privileges to non-admin users, along with some real-world use cases.

IT Service Catalog With Simple Steps in 2023 - Infraon

Description: In today's video, we'll discuss the importance of creating an IT service catalog in 2023. We explore the origins of service catalogs, what to expect from a modern IT service catalog, and the benefits of using a service catalog. We also provide simple steps to help you create your IT service catalog. Part 1: Origin of service catalogs - We'll start by exploring the origins of service catalogs, discussing how they have evolved over the years and what they look like in modern IT environments.