1300 130 447
74% of organisations make a knowledge base available to end users Source - HDI Report
About the Knowledge Base
Search all the Knowledge Base
Testimonial: I have found that the new HDAA Knowledge Base reduces the time it takes me to research industry stats & reliable information for the ITSM sector. It’s easy to use search functionality encompassing KCS principles, helps to filter & tailor my searches more accurately & there are numerous new services now available through the website. Every time I return to the site there is new information published. Very impressive. Chris Powderly, Support & Services Manager, Allens
Subject: Decentralised Service Desk Timeline Request: Responses collated Aug 2019 Request Deanne's customer base is currently spr...
Read More >> Login or register
Subject: Major Incident Classification Timeline Request: Responses collated July/Aug 2019 Request One of our members is currentl...
Subject: Sharing Operational Procudures Timeline Request: Responses collated June 2019 Request How does your Service Desk team ...
Subject: Customer Satisfaction Survey Tools Timeline Request: Responses collated March 2019 Request A fellow Member is und...
HDI members are a group of community-minded problem solvers. They take their jobs of managing people, process, and technology quite seriously, but they also love to help each other...
Subject: Service Catalogue Status in Member Organisations Timeline Request: Responses collated July 2014 Request A fellow member is...
There is a movement within the industry to make the most of their ITSM tool investment and the focus on integrating IT and other business unit workflows. Request ...
Communication is a key facet and responsibility of Support Centres. As the Single Point of Contact, keeping customers informed of what is happening in IT and how it is affecting th...
Outsourcing any IT functions and tasks is a decision to be made in light of your capability to deliver agreed service levels. It is not uncommon to look for approaches and methods ...
Password security and policies are our first line of defence against data loss, theft or corruption. Strong password policies lead to strong security for your internal networks as ...