As VAR and MSP sales and marketing organizations catch the buyer persona buzz, are client personas and user experiences being overlooked?
I get a lot of questions on how to best organize IT documentation in general, and so I thought I would take a few minutes to share my experiences in terms of what we’ve seen working well at MSPs and IT Service Providers to-date. Of course, every provider has a unique way of doing things, but there are many similarities in the data we’ve collected over the years. Let me also add a foreword that this is by no means the “de facto” standard on how to organize your documentation, it is meant more as an tool to help fast track you as you embark on a mission to tame the documentation beast. With that said, here are some concepts and screenshots to get you started.
Why is documentation so important? Imagine being told to go through your day with a blindfold on - constantly having to search for any information that would help you find your next step. It’d be pretty difficult wouldn’t it, and you’d probably waste a significant amount of time. That’s what it’s like without documentation.
HATech specializes in transforming their customers’ operations, product, and development practices into one integrated, agile process that is focused on achieving the customers’ business goals. With a full suite of professional services covering consultancy, architecture, implementation, and staff augmentation plus managed support services, HAtech brings BizDevOps best practices and tooling expertise to customers across the leading public and private cloud platforms. Their customers benefit from reducing software release cycles from months to minutes.
Every MSP should be looking for additional services that are easy to setup, simple to manage, achieve predictable results, and generate consistent revenue. Backup-as-a-Service is one of the logical “next steps” for every MSP that is already responsible for the care of their customer’s most critical systems. Some simply haven’t made the jump yet (e.g. the customer is still managing their own backups), while others just haven’t moved their management of backups to a recurring service model.
It has become commonplace to say that the state of cybersecurity has changed. It’s true—cybercriminals continue evolving their methods of attack. It’s not just malicious actors you have to worry about either—with the world growing more interconnected, it’s more likely than ever that insiders will accidentally cause a data breach.
A Survey of IT Leaders’ Thoughts on WannaCry, Petya, and Vault 7.