Deploying AIOps in ITOM should not require writing and maintaining manual rules

There is a lot of interest around AIOps, with multiple studies finding that organizations are adopting AI at an increasing rate.  In a recent Forrester report 68% of companies surveyed have plans to invest in AIOps-enabled monitoring solutions over the next 12 months. Gartner forecasts that by 2022, 40% of all large enterprises will combine … continue reading

6 steps enterprises must take to excel in the converged enterprise

In 2020, the focus is no longer solely on transformation. Rather, all eyes are on ways to grow and remain competitive in a world where enterprise mobility is a must. Modern businesses are more dependent than ever on data and analytics with a constant barrage of new and necessary tools. With this increased dependency comes … continue reading

Shadow IT: Cracks in the company armor

If IT were a superhero, shadow IT would be its underestimated nemesis. That’s because today’s shadow IT — accounts that employees create without a business’s authorization or awareness — appears at first glance to be harmless. That makes the havoc it can wreak even more of a threat. In the daily course of their work, … continue reading

COVID-19: Surviving remote work

For years, the view towards remote work has been shifting, especially in the tech industry where remote work is achievable.  There are a number of concrete benefits to remote work, according to a 2019 survey from OpenVPN, including higher productivity, less time spent on commuting, improved employee retention, fewer overhead costs, and access to a … continue reading

Cyber insurance: A crucial part of any cybersecurity strategy

The threat landscape has been expanding rapidly, and companies are under immense pressure to respond. A lot of companies are investing in trying to prevent attacks, but as evidenced by the massive influx of data breaches and cyberattacks, it’s impossible for a company to predict 100% of possible attacks. That’s where an emerging market is … continue reading

Why enterprises are running to the edge

The popularity of edge computing has greatly increased as more industries are adopting IoT devices and are increasing their demand for low-latency processing and real-time, automated decision-making solutions. Both the evolution of technologies surrounding edge computing, such as 5G, and the industry demand for its benefits, such as speed and low latency, have created a … continue reading

The lines between data center and campus networks are blurry

In tech, as in life, change is the only constant. From the days when all of our computer processing took place in mainframe terminals, to the decentralized shift to local servers, to the era of cloud computing, we’ve experienced one transformative wave of innovation after another over the past several decades. Today, we stand at … continue reading

How will augmented reality drive change in cybersecurity?

Augmented reality is a powerful technology with far-reaching implications. That said, there’s one sector in which it hasn’t yet reached its full potential: Cybersecurity.  AR technology could bring about some incredibly positive changes, up to and including solving the talent shortage.  I’d like you to imagine the following scenario.  An automated intrusion detection system flags … continue reading

Is ITSM ready to manage the future’s AI infrastructure?

Artificial intelligence (AI) is maturing as a concept, and the excitement in the air is causing much anticipation of the potential fruit-bearing ahead. As conceived and hypothesized, the appeal of AI is complete automation of traditionally man-powered processes – all driven by patterns in data and machines’ “reaction” to it. Whether compete automation is achievable, … continue reading

Container security: 5 current trends you can’t afford to ignore

Enterprise confidence in containers continues to accelerate – not just in terms of the number of businesses now running containerized applications, but also in how many of those deployments span the entire application lifecycle. A recent survey by Market Cube finds that 87% of IT professionals are utilizing containers, and 90% of those are using … continue reading

Creating a multi-layered security architecture for your databases

Data security has never been more important than it is today. Considering the amount of data collection most modern apps require, it’s imperative to keep private and proprietary data safe and secure — and with measures like HIPAA, PCI DSS and the European Union’s GDPR, it’s also the law. Keeping databases secure from existing and … continue reading

Ensuring high availability and disaster recovery for SQL Server in the cloud

Failure is an option in IT, including in public clouds — despite their resilient, carrier-class infrastructures. And many of the failures that regularly cause downtime are excluded from the cloud service providers’ money-back service level agreement guarantees. For this reason, the customer, specifically the IT operations staff, is responsible for ensuring uptime for all SQL Server … continue reading

Network automation – To plan or not to plan is the question

“A man who does not plan long ahead will find trouble at his door.” – Confucius As the network evolves into a more dynamic environment due to the introduction of new concepts such as virtualization and software-defined everything, it is becoming imperative that operators automate as much as possible. Whether it be software-defined WAN, data … continue reading

5 ITSM trends and topics that will fuel digital transformation

Digital transformation is the buzzword that every CIO and most top-level managers are so concerned about. So, for all the hype around it, what is digital transformation, and is it really happening? Yes, it’s happening. With time, DX has become the driving force of businesses. Over the last few decades, the organizations that have disrupted … continue reading

Next Page »

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!