Hi [[ session.user.profile.firstName ]]

The 6 Service Management Tools

CIO’s must also keep the lights on. Many CIOs dream of being the reference person for Business Processes, Information Management and Innovation. Fine, but beforehand they must deliver consistent daily service. Reality check: this means, using charge-back fees that actually reflect IT usage, outsourc
CIO’s must also keep the lights on. Many CIOs dream of being the reference person for Business Processes, Information Management and Innovation. Fine, but beforehand they must deliver consistent daily service. Reality check: this means, using charge-back fees that actually reflect IT usage, outsourcing in a non-biased way, managing suppliers with precise and aligned Service Level Agreements and communicating with the board with understandable IT Policies.

Only 6 documents are needed, the trick is to define them with sufficient detail and do it in a specific order. Join David Royston to hear how this is can be achieved.

After obtaining an MSc in Computer Science from Geneva University in 1987, David Royston joined Switzerland’s largest IT service company: Fides Informatique. In 1993 Mr Royston was hired by Swiss TV in Geneva as their first CIO. For 7 years he led the digital revolution, delivering innovative and reliable solutions such as a new digital newsroom, a computer aided broadcast facility and the first European ATM video network. After obtaining an MBA in 1999, David Royston was hired as a Director at Unicible, one of Switzerland’s major IT service companies.

While working in the latter position, Mr Royston realized how difficult it was for clients to negotiate with experienced suppliers. As a result, in 2002, David Royston founded his own consulting firm with a sole aim: to help companies to deal with their IT service suppliers. David also writes regularly in Business papers such as AGEFI and Banque & Finance.
Recorded Apr 15 2010
49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Royston, CEO, Royston Consulting
Presentation preview: The 6 Service Management Tools
Recommended for you:
  • Date
  • Rating
  • Views
  • VMAX3 Revolutionizes Mainframe Storage VMAX3 Revolutionizes Mainframe Storage Brett Quinn, Senior Director of VMAX Mainframe Product Management, EMC Recorded: May 31 2016 30 mins
    EMC is proud to extend VMAX3, the industry’s premier data services platform, to the mainframe, bringing automated storage performance, improved TCO, operational simplification and an industry-first data protection.

    In this webcast, EMC’s technical mainframe experts will detail VMAX3’s recently announced mainframe capabilities that will help you Automate, Modernize, and Reduce the Risk of your mainframe storage infrastructure, such as:VMA

    zDP (z Systems Data Protector) – The industry's first automated data protection providing availability with data integrity

    Simple Service Level Objectives – Predictable automated performance management built on the trusted VMAX3 HYPERMAX architecture

    Increased Performance & Scalability – 3x more FICON ports and 2x the processing power in 1/3 the space
  • VMAX3 Revolutionizes Mainframe Storage VMAX3 Revolutionizes Mainframe Storage Brett Quinn, Senior Director of VMAX Mainframe Product Management, EMC Recorded: May 31 2016 30 mins
    EMC is proud to extend VMAX3, the industry’s premier data services platform, to the mainframe, bringing automated storage performance, improved TCO, operational simplification and an industry-first data protection.

    In this webcast, EMC’s technical mainframe experts will detail VMAX3’s recently announced mainframe capabilities that will help you Automate, Modernize, and Reduce the Risk of your mainframe storage infrastructure, such as: VMA

    zDP (z Systems Data Protector) – The industry's first automated data protection providing availability with data integrity

    Simple Service Level Objectives – Predictable automated performance management built on the trusted VMAX3 HYPERMAX architecture

    Increased Performance & Scalability – 3x more FICON ports and 2x the processing power in 1/3 the space
  • VMAX3 Revolutionizes Mainframe Storage VMAX3 Revolutionizes Mainframe Storage Brett Quinn, Senior Director of VMAX Mainframe Product Management, EMC Recorded: May 31 2016 30 mins
    EMC is proud to extend VMAX3, the industry’s premier data services platform, to the mainframe, bringing automated storage performance, improved TCO, operational simplification and an industry-first data protection.

    In this webcast, EMC’s technical mainframe experts will detail VMAX3’s recently announced mainframe capabilities that will help you Automate, Modernize, and Reduce the Risk of your mainframe storage infrastructure, such as:

    zDP (z Systems Data Protector) – The industry's first automated data protection providing availability with data integrity

    Simple Service Level Objectives – Predictable automated performance management built on the trusted VMAX3 HYPERMAX architecture

    Increased Performance & Scalability – 3x more FICON ports and 2x the processing power in 1/3 the space
  • Meet Unity - New Standard in Flash Optimized Affordable Storage Meet Unity - New Standard in Flash Optimized Affordable Storage Jason Salo Recorded: May 31 2016 54 mins
    Unity is the new baby of the EMC family. It’s an incredible engineering achievement – it’s a storage solution built from scratch without missing a beat. With Unity, we managed to change the car’s engine while barreling down the highway. It’s faster, denser, less expensive, and simpler than everything else on the market. Unity is focused at external storage use cases that start small - and go up to 500 SSDs/HDDs. Join this free webinar to see it in action and ask any questions you might have.
  • Meet Unity - New Standard in Flash Optimized Affordable Storage Meet Unity - New Standard in Flash Optimized Affordable Storage Jason Salo Recorded: May 31 2016 54 mins
    Unity is the new baby of the EMC family. It’s an incredible engineering achievement – it’s a storage solution built from scratch without missing a beat. With Unity, we managed to change the car’s engine while barreling down the highway. It’s faster, denser, less expensive, and simpler than everything else on the market. Unity is focused at external storage use cases that start small - and go up to 500 SSDs/HDDs. Join this free webinar to see it in action and ask any questions you might have.
  • Что новенького про .... Новое семейство СХД ЕМС Unity? Что новенького про .... Новое семейство СХД ЕМС Unity? Игорь Виноградов Recorded: May 31 2016 75 mins
    Семейство систем хранения данных на флэш-дисках EMC UNITY

    EMC Unity обеспечивает непревзойденную простоту и максимум преимуществ, в числе которых быстрое развертывание, усовершенствованное управление и бесперебойное расширение системы хранения данных в облаке.

    Гибридные платформы и платформы на флэш-дисках оптимизируют производительность твердотельных дисков, а также предлагают все возможности сетей хранения данных и NAS. Вы всегда на связи благодаря управлению в облаке и упреждающей поддержке.

    Узнайте больше на нашему вебинаре и на странице http://russia.emc.com/unity.
  • Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Marc Lindenblatt, Presales Engineer Proofpoint Recorded: May 31 2016 40 mins
    Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor

    Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
    Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

    Erfahren Sie in dem Webcast
    • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
    • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
    • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
  • Assumption of Attack Webinars series #4: Hybrid Cloud Security (Francais) Assumption of Attack Webinars series #4: Hybrid Cloud Security (Francais) Amine Belaouedj, EMEA Sr Sales engineer at Trend Micro Recorded: May 30 2016 30 mins
    Le 18 février, nous avons lancé notre série de webinaires intitulée « Assumption of Attack » illustrant la protection exhaustive et avancée qu'offre notre suite logicielle Smart Protection Suite, une solution particulièrement efficace face aux cybercriminels.

    Le cinquième épisode de notre série de webinaires portera sur la sécurité du Cloud hybride.

    Que vous souhaitiez mettre l'accent sur la sécurité des environnements physiques, virtuels ou cloud, vous découvrirez comment protéger vos données et éviter les interruptions d'activité tout en vous conformant aux réglementations.
  • Assumption of Attack Webinars series #6: Web and Collaboration (English) Assumption of Attack Webinars series #6: Web and Collaboration (English) David Byrne, Senior Sales Engineer, Trend Micro. Recorded: May 30 2016 18 mins
    You should assume that during 2016 your data will be subject to an attack from Cyber Criminals. Therefore you need to ask yourself… Where are you most vulnerable? What door has been left open?

    Our final webinar will look behind Door 6, Web and Collaboration. How can you secure real-time collaboration and inappropriate content from impacting your business?
  • Assumption of Attack Webinars series #6: Web and Collaboration (Spanish) Assumption of Attack Webinars series #6: Web and Collaboration (Spanish) Antoine Mahuzier, Senior Sales Engineer, Trend Micro. Recorded: May 30 2016 14 mins
    Este es el último seminario de nuestra serie de seminarios Web titulados “Assumption of Attack” que lanzamos el 18 de febrero para demostrar cómo nuestra solución líder de mercado Smart Protection Suite proporciona una protección multicapa para su empresa.

    Nuestro sexto y último seminario Web abrirá la puerta n.º 6 para hablar de la "Web y la colaboración". ¿Cómo puede lograr una colaboración en tiempo real segura y evitar a la vez que el contenido inapropiado tenga un impacto negativo en su negocio?

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The 6 Service Management Tools
  • Live at: Apr 15 2010 8:00 am
  • Presented by: David Royston, CEO, Royston Consulting
  • From:
Your email has been sent.
or close
You must be logged in to email this