Fresh Links Sundae – September 9, 2012 Edition

Fresh Links Sundae encapsulates some pieces of information I have come across during the past week. They maybe ITSM related or not entirely. Often they are from the people whose work resonates with me, and I hope you will find something of value.

Because people are often the most critical factor for ITSM success, Stephen Mann relays some people-oriented guidance from his colleague, Eveline Oehrlich, and his own on how to put together the best roles and skill sets in place. Staffing For IT Service Delivery Success: Think Employee, Think Customer, Then Repeat (Forrester Blogs)

Many organizations try to minimize the presence of shadow IT because they can present unmanaged risks. Instead of trying eliminating shadow IT, Bob Lewis suggests how embracing shadow IT might help improving outcomes from the revenue and costs perspectives. Stop stomping out shadow IT (IS Survivor Publishing)

Finding competitive advantage through continuous innovation is already an established idea, and IT can be a major contributor to that movement. Damon Edwards explains how the DevOps concept can enable the IT organization to be better leveraged by the business. Use DevOps to Turn IT into a Strategic Weapon (dev2ops)

One key benefit of the problem management process is to enable organizational learning. Barclay Rae suggests one important thing to do in order to get the most out of a problem management exercise. Problem Management Success – Start Using Causal Closing Codes (BarclayRae Website)

If you are working on putting together a Release Management process for your organization, Alicia Choo posted a sample operating procedure document that may help in your endeavor. My take on ITSM and IT Governance: Release Management (Choofca’s Brain Dump)

Referencing to several government-published resources on the BYOD movement, Martin Grobisen talks about the importance of formulating and putting a policy in place to address BYOD. Time to Implement a BYOD Policy (ITSM Lens)

With social media being one of the many options for building a brand, Anna Farmery outlines five steps to leverage social media for marketing. Five-Step Social Media Marketing Plan (The Engaging Brand)

Hiring consultants can be expensive and sometimes without the desired results, Patrick Gray outlines several ways to avoid wasting money and get the most benefits out of the consult’s help. How to win friends and waste money on consultants (TechRepublic)

Although effectiveness leadership can encompass different things to different people, Jeff Haden talks about the personal lessons he learned about leadership and suggests five ways he has used to improve his own effectiveness. 5 Leadership Lessons You Won’t Learn in B-School (Inc.com)

Because the IT organization is often entrusted by its company with access to many vital assets, Don Tennant suggests that trustworthiness is the most important, foundational characteristic for people in an IT organization. Don also outlines a few ideas for detecting deception when a breach has occurred. Tips on Detecting Deception in Your IT Organization (From Under The Rug)

Leave a Reply