blog-main.jpg

Inside the Barrel

Blog - Cask

By
By Cask
All Data Centers, whether great or small, have one thing in common; they have a heat transfer (cooling) problem. Not even ten years ago, cooling problems were solved with the purchase and insta...
Continue Reading
By Cask
San Francisco, CA (Cask), April 29, 2014 – Cask LLC, a provider of Technology Investment and Lifecycle Advisory Services, and Apptio, the leading provider of Technology Business Management (TBM...
Continue Reading
By Cask
San Francisco, CA (Cask), April 29, 2014 - Cask LLC, a provider of Technology Investment and Lifecycle Advisory Services, and Apptio, the leading provider of Technology Business Management (TBM...
Continue Reading
By Cask
The 3-day ITIL Foundation course offers candidates a general awareness of the key elements, concepts, and terminology used in the ITIL Service Lifecycle, including the linkages between Lifecycl...
Continue Reading
By Cask
Successful business leaders understand the importance of establishing key metrics to measure effectiveness and efficiency of service delivery against organizational goals and initiatives. It is...
Continue Reading
"Was all this legal? Absolutely not." - Jordan Belfort, The Wolf of Wall Street. For those who haven't seen Leonardo DiCaprio's latest film, The Wolf of Wall Street - the premise of the movie c...
Continue Reading
One of the things that fascinates me the most about ServiceNow is not the tool or the platform, neither the applications nor the power of the technology. What truly fascinates me is the Service...
Continue Reading
In my last post on March 5, 2014, I discussed the differences and similarities between Cost Estimation/Analysis and Economic Benefits Analysis. Further, I introduced the concept of Capabilities...
Continue Reading
Project Management best practices such as PMBOK and PRINCE2 encourage the creation of important artifacts during early stages of a project's life. These artifacts, such as a Work Breakdown Stru...
Continue Reading
Department of Defense (DoD) Acquisition professionals continue to be challenged with integrating cyber security in their programs. If you've heard the clich
Continue Reading