SLAs for Mapped Business Services
We can all agree that bad service availability is equal to bad service quality and bad quality leads to angry customers and loss of revenue. On the other hand, good service quality gives us happy cust...
We can all agree that bad service availability is equal to bad service quality and bad quality leads to angry customers and loss of revenue. On the other hand, good service quality gives us happy cust...
This video tackles the initial setup of Microsoft Azure integration with ServiceNow. Most often, customers have not set up a "service principal" which is a special credential needed in Azure to make t...
Staying in theme with previous posts I have worked on, I will continue to look at ways to approach security within the operations management applications. Previously I covered credential management an...
We have a great set of new articles in the HI Knowledge Base to help you with troubleshooting MID Server issues! Frankie Thompson (frankiendaisy), a staff software engineer, and Chris Thompson (christ...
OverviewCPU usage on the host that the MID Server(s) is installed on can be affected by a number of factors including:Other processes running on the hostType of probes running on MID ServerNumber of M...
Affected CustomersCustomers that cancel import/export in Geneva or Helsinki will be affected.Problem Symptoms CancelProbe is not getting processed - stays in the ecc_queue output ready state.Nullpoint...
Business reasons to commit to a CMDBAs you prepare next year's budget or review this year's budget don't make the mistake of introducing more tools without thinking through your people, processes, and...
An SNMP device is a device that is managed using the Simple Network Management Protocol (SNMP). This includes routers, switches, printers, PDUs, UPSs, Netware servers, load balancers and various other...
Part IThis will be a multi part series, first starting with a general understanding of privileged access account security in ServiceNow, with a follow up post on implementation specifics on an externa...
In my last blog, I described how you could use Event Rules to create meaningful alerts, while also introducing flexibility to cater for some variations. The example in the blog was fairly simple, so i...
Workflows can be very complex and complicated. Sometimes, workflows can even be a little unpredictable, even on occasion, they just don't seem to work right. In most cases when there is an issue with ...
NOTE: MY POSTINGS REFLECT MY OWN VIEWS AND DO NOT NECESSARILY REPRESENT THE VIEWS OF MY EMPLOYER, ACCENTURE. THE FOLLOWING ARTICLE IS A SUGGESTED METHOD FOR DEVELOPING AND TESTING ORCHESTRATION CODE, ...
I am drowning in IT security toolsIn a recent Google search for IT security I was presented with 798 million results on ways to secure my IT environment. After clicking on a few of the many results; i...
NOTE: MY POSTINGS REFLECT MY OWN VIEWS AND DO NOT NECESSARILY REPRESENT THE VIEWS OF MY EMPLOYER, ACCENTURE. THE FOLLOWING ARTICLE IS A SUGGESTED METHOD FOR DEVELOPING AND TESTING ORCHESTRATION CODE A...