A closer look at ITIL

Dubie, Denise
August 2005
Network World;8/1/2005, Vol. 22 Issue 30, p27
Trade Publication
Presents an interview with computer software vendor, Managed Objects' director for service management, Michele Hudnall, on the functions of the Information Technology Infrastructure Library (ITIL). Reasons behind the popularity of ITIL; Level of ITIL adoption in the U.S.; Ways by which vendors can help information technology organizations adopt ITIL; Stages of process maturity for ITIL.


Related Articles

  • First Things First. Scheraga, Dan // Chain Store Age;Feb2005, Vol. 81 Issue 2, p44 

    Focuses on a case study which aimed to solve the information technology problem faced by French retail company Auchan. Details of the problem encountered by the IT staff of the company; Use of a business-service-management application from Managed Objects to address the issue; Status of the...

  • Information Technology Use Spreads Unevenly in Hospitals. Brockenbrough, Gina // O&P Business News;8/1/2006, Vol. 15 Issue 15, p54 

    Focuses on the uneven use of information technology among hospitals in the U.S., according a survey conducted by the American Hospital Association. Challenges faced by hospitals with the high cost of information technology systems; Other obstacles for information technology use; Profiles of...

  • nLayers' InSight boosts mapping tools. Musich, Paula // eWeek;1/10/2005, Vol. 22 Issue 2, p24 

    The article states that new component discovery and dependency mapping tools, along with new partnerships, are helping one management software vendor make its case to users looking for compliance and information technology consolidation help. nLayers Inc., based in San Jose, California, last...

  • In Brief.  // Network World;11/5/2007, Vol. 24 Issue 43, p14 

    The article offers news briefs related to computer software. Intego has identified the first fake codec Trojan malware for the Apple Macintosh. According to a survey conducted by Managed Objects, 54% of information technology (IT) managers said that their teams did enough to prevent outages....

  • Practical IT Education. Deepening of Technology, Expansion of Work, and Development into Headwaters: A Systematic Effort to Achieve Higher Levels. Fujio, Yoshinori // Issues in Informing Science & Information Technology;2006, Vol. 3, p243 

    A practical IT education is a combination of lectures and exercises, as well as learning and putting into practice the theory of a fundamental system technology. The following is presumed. It is important to execute such education by directing the accumulation of knowledge and the expansion of...

  • Research on SDH-Based Time Comparison with Applied-information Technology. Ying Yao; Shou-gang Zhang // Applied Mechanics & Materials;2014, Issue 540, p423 

    This paper proposed two kinds of precepts on time comparison for SDH network in practice. The precepts are the method of double-end bi-directional and the method of single-ended one-way. The computational model and network configuration of those precepts are given in this paper. Through the...

  • Information Technology Literacy (ITL). McMahon, Maureen // Information Technology Literacy (ITL) -- Research Starters Educa;4/1/2018, p1 

    While there are several definitions of Information Technology Literacy (ITL) within different organizations, the common thread is being able to apply knowledge from one program to another, from one machine to another, and from one situation to another. Having the basic skills of word processing...

  • NET BUZZ. McNamara, Paul // Network World;9/26/2005, Vol. 22 Issue 38, p112 

    This article highlights some of the presentations at the DemoFall show in Huntington Beach, California. Start-up company Teneros is serious with the three most-dreaded words in any workplace: electronic-mail is down. The company's first of a series of Application Continuity Appliances provides...

  • IT Strategy in Hard Times.  // ITNOW;Dec2011, Vol. 53 Issue 6, p58 

    Adam Davison MBCS CITP is the author of the new IT Strategy blog: www.bcs.org/itstrategy


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics