The DevOps Movement fits perfectly with ITSM

In my thirteen year journey of studying high performing IT organizations, I’ve started to see a new and unsettling trend.  Whenever I mention ITIL and IT Service Management in presentations and briefings, people in the audience snicker. When I ask why, they roll their eyes, and talk about the shrill, hysterical bureaucrats that suck life out of everyone they touch, doing everything they can to slow the business down, preventing everyone from getting work done. Read more

The Developers that Ruin the Show

“Previously on <TV show name>…”, we discussed how a business can slide into the blame game, where the need for accountability can cause staff to avoid ownership, and where every failing can result in additional processes that produce more cost than benefit.

code-707069_1280We’re preaching the virtues of trust, but as many a broken marriage will narrate, trust that is broken is often never recovered. For every grade-A star, there is a problem developer lurking behind his three monitors, about to ruin the party for everyone. How shall we fix a problem like Maria?

We’ll look at several common party poopers, and I’m sure you’ll even find yourself reflected in one of the categories. I certainly do. Each of these citizens starts with a low level of trust, and as you retrain them and increase their trust levels, you can drop the obsolete processes that originally served as safeguards. Read more

Refocus and Revisit your ITSM Stats and Metrics

IT has a huge amount of statistics, but are they just pointless or do they provide a basis for the progression and management of service? During this webinar, we will discuss three distinct approaches that can help us to better manage and control our IT services: delivering the deliverables, performance versus quality, component criteria optimizing. Read more

Elevating Business in the Cloud

Are you keeping pace with the rapid evolution and impact of cloud on businesses today? Are you leveraging your cloud investment to connect with your digitally savvy customers and employees? Are you prepared to seize the opportunities available from the next wave of cloud technology?

Read more

How to give your LinkedIn Profile a Makeover.

With thousands and thousands of blogs about sales and marketing out there, it’s tough to know which ones are the ones worth reading. Between the news, LinkedIn, Twitter, and email, most people are inundated with generic, untargeted content.

Hence why, rather than labeling myself a ‘blogger’ I have dubbed myself a serial ‘Re-Blogger’. Finding targeted and interesting content in weird and wonderful places and sharing it to those that in normal circumstances may have missed it.

Read more

Money-Making is Where Money is Made

When it comes to inventing new tech ideas, it’s so tempting to target the consumer market.  You’re living out your daily life and out of that context you think: what about this new cool app that could do this and that … consumers would love it. Right?

The problem with retail apps is that they’re asking consumers to spend a little bit extra on top of what they’re already spending.  While a good deal of their budget is dedicated to entertainment, that money is not currently untouched – it’s all being spent already.  So when you come along with your cool app and ask someone to spend, you’re asking them to switch their spend from something they’re already enjoying so much that they’ve been willing to pay for it.

If you’re going to be successful in the consumer space, you need to take one of two approaches: Read more

8 Emerging Tech Trends You Can’t Ignore

“IT executives are always preparing for the next big thing in IT. We’re seeing technologies with overlapping software and systems support. We also see a sharp rise in the role of IT in business as it relates to mobile and cloud-based device implementation.”

This is an expert from an article I read on ‘IT Marketing World’ By Freelance writer, Dave Landry. 8 Emerging Tech Trends You Can’t Ignore.

“Observations made about today’s technologies has prompted the following trends. They are the least speculative and are expected to have real-life consequences with regard to how we work and do business.” Read more

Architecture and modeling in Visual Studio

I’d like to take a closer look at the use of CodeMaps in Visual Studio to debug and to document our solution. The following link to Architecture and Modeling has some very cool videos detailing how to use Code Maps to find the root cause of a bug. Further to debugging Code Maps can be used to assist in documenting program flow and dependency chains visually. Lets start with a very basic example of how to generate a CodeMap. First off if you don’t know what a Code Map is then let me explain. When browsing your VS project files and looking at the ‘References’ link that appears above a method declaration, if you pay careful attention you’ll see the link ‘Show on Code Map’. See below. Read more

Simple C# Licensing (Rhino Licensing)

What is Software Licensing?

Software licenses typically provide users with the right to one or more copies of the software without violating copyrights. The license also defines the responsibilities of the parties entering into the license agreement and may impose restrictions on how the software can be used. Software licensing terms and conditions usually include the usages of the software, warranties and disclaimers and protections if the software or its use infringes on the intellectual property rights of others.

About Rhino Licensing –

Rhino Licensing uses Public-key cryptography, also known as asymmetric cryptography, it’s a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt cipher text or to create a digital signature. The term “asymmetric” stems from the use of different keys to perform these opposite functions, each the inverse of the other – as contrasted with conventional (“symmetric”) cryptography which relies on the same key to perform both. You encrypt a value using the one key, and it can only be decrypted using the other key. In the case of license key generation, we store our private key on the server, and distribute the public key with our application. When the user receives a license key, the application is able to verify that it came from us by using the public key. If someone tampers with the license key it will be invalid and the software will no longer execute.

Read more