Skip to content

I.T. as I see IT

Technology Suggestions, Opinions, and Visions.

Menu
  • About Marcel Shaw
Menu

Tag: Security

Avoid Ransomware Attacks with IT Asset Management

Posted on August 31, 2017

When installing a home security system or a panic alarm system, it is important to perform a discovery so that you can document all vulnerabilities around the property you wish to secure….

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Five Future Technologies to Watch for IT Service Management

Posted on September 21, 2016

As technology advances at such a rapid pace, many IT solutions become outdated very quickly. If organizations want to stay competitive and up-to-date with current technology, they need to stay informed about…

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Three Reasons You Need ITAM for the Internet of Things (IoT)

Posted on June 29, 2015

It was 1984, and I was off to the only movie theater in the town where I lived. The movie was called Terminator and although it was science fiction, the story line…

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Three Reasons ITAM Should be Part of Your Security Strategy (Part 2 of 2): Government Security Requirements

Posted on May 15, 2015

If you have ever lost your wallet, I am pretty sure you did not worry about the actual wallet. I live about 45 miles away from Washington, D.C. and two miles from…

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Questions to consider regarding Shadow IT

Posted on October 8, 2014

What is Shadow IT? Shadow IT refers to IT devices and applications that an organization does not track or manage. In many cases, the organization does not even know these devices or…

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Recent Posts

  • 5 AI Technologies to watch in 2023 and 2024
  • How AI with RPA will Impact Software Development
  • 10 Technology Related Predictions for 2021
  • Three Ways Artificial Intelligence (AI) will Impact the Travel Industry
  • 12 Technology Predictions for 2019
  • How Artificial Intelligence (AI) will Disrupt 3 Key ITSM Technologies
  • IoT vs. Mobile Devices: What’s the Difference?
  • Why Should Amazon Buy Uber?
  • Avoid Ransomware Attacks with IT Asset Management
  • Why is Change Management Critical for Software Asset Management?
  • Five Reasons the Data Center Needs Software License Optimization (Part 2)
  • Five Reasons the Data Center needs Software License Optimization (Part-1)
  • Rise of the Chief Data Officer (CDO) and the Impact to ITSM
  • Can RFID Help You Meet ITAM Objectives?
  • Five Future Technologies to Watch for IT Service Management
  • Three Tips for IT Asset Management (ITAM) Discovery
  • How IT Asset Management (ITAM) Can Integrate With Your CMDB
  • Eight Questions to Ask About Your ITSM Software Solution
  • Five Tips for Improving the ITSM End-User Experience
  • Three Ways to Avoid a Software Audit
  • Tracking Bigfoot and Missing IT Assets: A Tale of Poor Discovery Techniques
  • Three Keys to an Efficient ITSM Self-Service Portal
  • Help Desk vs Service Desk: What’s the difference?
  • Three Reasons Government Needs ITAM
  • Three ITSM Projects for Your Five-Year Plan (PART 5 of 5): Self Service

Archives

Pages

  • About Marcel Shaw
©2025 I.T. as I see IT | Design: Newspaperly WordPress Theme