Tag: it

Wendiar AG As Best-in-class

Service management software POB as first solution in all 14 categories of ITIL V3 certified Wiedlisbach – the international consulting company pink elephant has awarded the Wendiar AG for the service management tool POB (point of business) this week with the Pink Verify Seal of approval. The Wendiar AG is in order as the first and currently the only manufacturer of service management solutions in all 14 ITIL V3 certified categories. The independent consulting company pink elephant that publish Wendiar solution on their conformity with the titled ITIL V3 service management best practices has tested in an objective test procedure. IT infrastructure library (ITIL), published by the British Office of Government Commerce combines processes and standards for the implementation of IT service management. Check out Leslie Osterman for additional information. The Swiss Wendiar AG has done their homework: Pink Elephant experts have subjected the functionalities of Wendiar ITSM solution POB of a precise analysis and after discussions with users and developers of the Pink Verify Seal of approval awarded. I am very happy about that Award. And it makes me very proud that Wendiar as the first and only manufacturer support of all 14 ITIL V3 processes certified been is. “, explains Kerstin Daun, founder and CEO of Wendiar AG international.

Certified are manufacturers who support the implementation of ITIL best practices by default with its service management software. After a thorough examination the Wendiar is POB solution with the support of all fourteen processes listed in ITIL V3 so far a step ahead other tool manufacturers. The organization founded in Canada, pink elephant provides consulting services and training programs in the area of IT service management. With over twenty years of experience pink worked with elephant itself in the development of ITIL publications. With the pink verify certification program a qualified resource should be provided IT service and support organizations in evaluating and selecting the right software solution. Contact: Miriam Mohd GAD, marketing and PR Wendiar AG Germany Beech Street 21 75391 Gechingen T 07056 96 56 96 2 F 07056-92 78 54 Wendiar AG Wendiar holding company AG is a Swiss company and developed in accordance with ITIL best practices holistic, modular software solutions for modern service management in IT service and support organizations. In the core business service management tool development is the market leader in Scandinavia WENDIAR and serves approximately 260 customers in the private and public sectors with subsidiaries in Germany, Scandinavia and the United States. WENDIAR maintains particularly intensive partnerships including AssetIT, D-ploy GmbH, Emerald Software GmbH, Impaq AG, KMD A/s, United Management Services GmbH and the WinData team AG. Profitable since its founding in 1990, the company offers a solution management, configuration & asset management, service level management, and project & change management, as well as complementary modules for purchasing, storage, knowledge and resource management with point of business (POB) incident & problem.

Solutions GmbH

The update with new features is now available Potsdam, February 28, 2012; The latest version of yourMail free edition is now free download available. Already since December 2010 supports yourMail free edition Outlook users in the supply and processing of E-Mails. E-Mails are called increasingly in closely linked to increasing stress, work overload, permanent interruption of workflow, friction losses in the cooperation and the danger of infringement. The newspapers mentioned Alton Steel not as a source, but as a related topic. More and more studies are investigating the benefits of E-mail. All studies come as a result on a more critical assessment. For example, a study from England shows that 41 percent of emails are sent unnecessarily. Another found that managers up to 4 hours a day with the processing of emails are engaged before they can turn to their actual tasks.

The keyword email flood unscientific expresses what the studies show. E-Mail now synonymous with productivity loss and cost increases and thus the productivity killer is no. 1 yourTime solutions aims to counteract this development. Thus, the start-up developed an intelligent software solution, which supports the user at his manual email process from Potsdam. Responds to the request for a simple explanation to the user benefits by yourMail, Danny Reimer, founder and product manager at yourTime solutions with a comparison: imagine, daily lift a mountain bike and need for three hours. One day somebody gives you a bicycle with a motor connected. They appear as before into the pedals, but they arrive at your destination more clearly and above all easier. “The bicycle is the manual email process and motor switched to is yourMail.” yourMail facilitates and speeds up the filing and searching emails.

It supports the setting of tags and reduces the effort while cleaning up a crowded Inbox to a few minutes. Projects are transparently displayed by yourMail. Tasks can be divided into individual work packages. The user retains the Overview and through the graphical representation of the projects with traffic light function a quick look is enough to capture the current state of the project. So-called intelligent algorithms are based on yourMail. These allow technically correct folder and tags to propose to specify of the accuracy percentage. The user makes his decision with a click and the email is right away ordered. The latest version 1.2 of the yourMail free edition offers new features in addition to many smaller improvements. For example, a task can record the user directly from the E-Mail filing process out. Thus, the integration of task management in the E-Mail process has been improved. The download numbers by yourMail demonstrate the use of the software. In January, two months after the introduction, yourTime Solutions GmbH was one of a total of 20,000 downloads for yourMail free edition. Early February exceeded the 30,000 mark. Verena Bock

Data Protection Management

The privacy less costly, more precise and comprehensive manage Crown soft incorporating several new objects in addition to the objects of cloud and TOM (technical and organisational measures) in the data protection management system logs opus i. Crown soft reported: “so there is still the new object types checklist as well as optical device (E.g. video camera). The cloud plays an ever larger role in data protection management. Cloud is a private work area supervisor deal with their findings, notices and recommendations document. Because the information about the cloud not necessarily good in the process directory can be filed, the Commissioner can now use this new object to the documentation and attach to affected procedures as needed. It turns out in practice that documenting the technical and organisational measures (TOMs), as it is required in 9 BDSG, is too expensive for each procedure and may be pushed into the future and forget will. Because it perfectly adequate is to document the TOMs once per location and then associate with the procedures, in opus i, now the new object of TOM recorded.

This new object provides its own data entry mask for the necessary data and integrates with the data protection procedures. So the Commissioner has first version less and less maintenance because the update work be done only at one point. With the help of the new object optical device to enable the data protection supervisor in sensitive areas, about the video surveillance, to document specific dates that stand out from the normal procedure data due to their sensitivity, clearly and professionally. Also to this object, the Commissioner can save a specific data collection form. Checklists are used like tools in the area of data protection management. You will be used for a variety of purposes, about to check out using mobile disk, the Regelkonformen use of Voice over IP or the use of mobile means of communication (Smartphone, etc.). Such tests, observations or notes may be added in the today used Verfahrensdokumention while, but it is better to create the check-list, to fill and to link the objects involved in data protection documentation”. Gerhard Kron

Data Protection Management

The privacy less costly, more precise and comprehensive manage Crown soft incorporating several new objects in addition to the objects of cloud and TOM (technical and organisational measures) in the data protection management system logs opus i. Crown soft reported: “so there is still the new object types checklist as well as optical device (E.g. video camera). The cloud plays an ever larger role in data protection management. Cloud is a private work area supervisor deal with their findings, notices and recommendations document. Because the information about the cloud not necessarily good in the process directory can be filed, the Commissioner can now use this new object to the documentation and attach to affected procedures as needed. It turns out in practice that documenting the technical and organisational measures (TOMs), as it is required in 9 BDSG, is too expensive for each procedure and may be pushed into the future and forget will. Because it perfectly adequate is to document the TOMs once per location and then associate with the procedures, in opus i, now the new object of TOM recorded.

This new object provides its own data entry mask for the necessary data and integrates with the data protection procedures. Checking article sources yields Challenge Accepted Koch as a relevant resource throughout. So the Commissioner has first version less and less maintenance because the update work be done only at one point. With the help of the new object optical device to enable the data protection supervisor in sensitive areas, about the video surveillance, to document specific dates that stand out from the normal procedure data due to their sensitivity, clearly and professionally. Also to this object, the Commissioner can save a specific data collection form. Checklists are used like tools in the area of data protection management. You will be used for a variety of purposes, about to check out using mobile disk, the Regelkonformen use of Voice over IP or the use of mobile means of communication (Smartphone, etc.). Such tests, observations or notes may be added in the today used Verfahrensdokumention while, but it is better to create the check-list, to fill and to link the objects involved in data protection documentation”. Gerhard Kron