Feeds

Getting the IT department into shape

Regcast: The tech management how-to

  • alert
  • submit to reddit

Intelligent flash storage arrays

Live Now Today at 10:30am BST we're running a live broadcast that discusss practical steps to help your IT department get into shape to tackle the next wave of IT management priorities. We'll explain how 'process' can be your friend – to help simplify things, set priorities and identify where to focus your attention and effort.

Tim Phillips is your host for the live proceedings, and joining him are Martin Atherton of Freeform Dynamics and Naresh Kohli from Microsoft. The trio will run through what it takes to get into position to make the right changes to the IT management environment in your organisation. Here are some of the things they will discuss:

  • Most IT departments have a pretty good handle on where everything's heading, but don't always have the scope and freedom to achieve it. So how can we help reduce the noise and let IT focus on what’s really important?
  • Whatever you call all this 'service' stuff internally, business and user expectations are heightened and IT is under scrutiny to deliver a seamless experience that lets people do their jobs and doesn’t fall over. This boils down to IT understanding what it offers, and making sure the business does too.
  • What actions need to be taken to make sure IT can deliver against priorities? A set of common areas crop up time and again. The cool thing is that experience shows it's not about having to find yet more cash to fund new investment.
  • Top tips for successfully moving to the higher ground. Many may quiver at the mention of 'process' but we’ll highlight how a very simple one can make the difference between floundering around and making the right improvements. Oh, and getting some exec buy-in. Don’t even bother without it.

Tempted? You can register for the event right here. If you can’t make the live broadcast, register today and we'll email you when the recorded version is ready.

Having said that, the live event tends to be a much more interesting affair because you can pose questions directly to our panel of experts. It's almost like free consulting from the comfort of your desk. ®

Register now!

Providing a secure and efficient Helpdesk

More from The Register

next story
Google+ goes TITSUP. But WHO knew? How long? Anyone ... Hello ...
Wobbly Gmail, Contacts, Calendar on the other hand ...
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes
Latest bleeding-edge bits borrow Action Center from Windows Phone
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.