Published 24 Mar 2015
P3M3® v3.0 is – in the world of best practice guidance – the “big one”. This latest version, the newest since 2008, will provide PPM consultants and organizations they work with the evidence for whether projects, programmes and portfolios are working or not and their return ...
Best Practice|Management|Maturity models|P3M3|Processes|Project and programme management (PPM)
Published 03 Sep 2015
Continuing her series on the Most Common Questions from PRINCE2 2009 Foundation Training , Lead Trainer Michelle Rowland addresses some of the most frequently asked questions from Chapters 7 through to 10 of the PRINCE2 2009 textbook . Chapter 7 Why do we have t...
Best Practice|Methodologies|PRINCE2|Project Management|Project sponsorship|Qualifications|Training
Published 04 Nov 2015
Though a performance analytics and testing company, SOASTA use ITIL ® best practice to consider key processes for any application lifecycles and have applied them to their development methodology. In this blog, Dan discusses a little of what they have learned so far. ...
Best Practice|Change management|End-user experience|Methodologies|Processes
Published 06 Jan 2016
What's the point of ongoing professional development? In "My CPD Life", a short series of blog posts to coincide with the launch of the AXELOS Professional Development Programme , experienced practitioners share their views on the value of keeping your skills and kno...
Adopt and adapt|Capabilities|Career planning|CPD|IT Service Management (ITSM)|Skills|Training
Published 11 May 2016
I read an interesting comment by AXELOS Head of ITSM Kaimar Karu that “…the ITIL of the future is from practitioners, for practitioners.” As a result, I keenly awaited the release of the ITIL ® Practitioner Guidance so that I could use it to assess and improve my ITIL prac...
Adopt and adapt|Continual Service Improvement (CSI)|IT Service Management (ITSM)|ITIL|Processes
Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...
Published 06 Aug 2018
What does migrating IT services to the cloud mean for ITIL ® ? I’ve heard various comments along the lines of “it’s no longer our infrastructure , it’s the responsibility of the cloud provider so why are we bothering with ITIL?” I find this really surprising as cloud integ...
Business Relationship Management|Career progression|Cloud Computing|Continual Service Improvement (CSI)|Governance|IT services|ITIL
Published 04 Mar 2019
There is a famous saying, that what happens in Vegas stays in Vegas, but I’m going to break the code here and share my views and feedback from Pink19 . Although this was my first experience of Vegas, I knew what to expect having enjoyed several movies based in ‘Sin City...
Best practice|Certification|Customer needs|IT service management (ITSM)|IT services|ITIL|Value
Published 27 Mar 2019
What does ITIL ® 4 have to do with the eternal, human practice of storytelling? Though you might already believe it instinctively, there is substantial research into the importance of narrative and storytelling to human beings. For example, a study that exposed people...
Behaviour|Benefits realization|Collaboration|IT service management (ITSM)|IT services|ITIL