Lisez ce livre électronique et découvrez quelques stratégies qui vous aideront à passer du papier au format numérique en accélérantles processus dans votreentreprise.
Guide complet pour abolir l’utilisation du papier
Read this article to find out more about best governance practices with latest COBIT insights of the industry's framework.
A guide for tailoring a governance system for information and technology
Advice on how to make Change Management work in the real world, and not just in theory.
How to make Change Management work in the real world
Software that enables medical device companies to continuously analyze and improve the efficiency of operations through a single solution.
This webinar will show you the benefits of adopting ISO 20000 as an IT service provision validation mechanism for ITIL implementations.
ITIL and ISO 20000: Fundamentals and necessary compliance synergies
Certaines activités de base, ordonnées de manière logique, visent à promouvoir des directives simples mais efficaces pour un programme de gestion EHS.
Comment améliorer la gestion de la santé, de la sécurité et de l’environnement – SSMA
On this webinar, you will see exclusive insights on key steps and factors on how to start the Six Sigma journey.
How to start your Six Sigma journey
Read this article and learn how your company can gain more effective continuous improvement activities through lean thinking.
Lean thinking: Eleven ways to link training with application
In this White Paper, Rick Leopoldi discusses the processes and methods to define, characterize, and develop a Service Catalog as part of IT Service Management.
IT Services Management – An Overview of the Development of a Service Catalog
In this White Paper, Rick Leopoldi discusses incident and problem management methods, along with best practices for service desk implementation.
ITSM Incident and Problem Management Methods
In this white paper, PECB discusses the main clauses of ISO 27001, its links with other standards and guidelines and more.
ISO 27001 – Information Technology Security Management
Overview of how effective and accurate creation of personas for business end users could act as a catalyst for value provisioning of IT services.