Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

If everyone is AIOps - which AIOps is right for you?

With so many IT vendors claiming they provide AIOps platforms, how do you understand the differences between them, and decide what flavor of AIOPs to choose for your organization? Join us in a CTO Perspective discussion with Elik Eizenberg, CTO and co-founder at BigPanda, to find the answer. Read the skinny for a brief summary, then either lean back and watch the interview, or if you prefer to continue reading, take a few minutes to read the transcript. Enjoy!

Automated Anomaly Detection: The next step for CSPs

Today’s telecom engineers are expected to handle, manage, optimize, monitor and troubleshoot multi-technology and multi-vendor networks, in a competitive and unforgiving market with minimal time to resolution and high costs for errors. With the ongoing growth in operational complexities, effectively managing radio networks, current and legacy core networks, services, and transport and IT operations is becoming a radical challenge.

How Can a Shared Slack Channel Improve Your Data Quality?

Have you ever heard anyone saying: “Our data is great, we’ve never had any data quality issues“? Ensuring data quality is hard. The magnitude of the problem makes us believe that we need some really big actions to make any improvements. But the reality shows, often the simplest and most intuitive solutions can be incredibly impactful. In this article, we’ll look at one idea to improve the process around data quality, and make it more rewarding and actionable.

3 Ways to Upgrade Your IT Strategy with Business KPIs

As companies accelerate their digital transformation, technology innovations are now a critical component of any business strategy. Industry leaders are spending more money on technology than their counterparts, prioritizing growth and customers. CEOs now see CIOs and tech leaders as their primary partners in driving business innovation.

Little Code, Big Impact: Easily Scale your Security Automation with Splunk SOAR

The great Ricky Bobby from Talladega Nights once said, “If you ain’t first, you’re last.” Whether we’re talking about a NASCAR race or responding to a security alert, being able to quickly discover attacks and adversaries and respond rapidly is critically important to reducing risks and managing threats to your organization. How do we suggest you do that? With a SOAR (Security Orchestration Automation & Response) tool.

SNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table

By 2024 there’ll be an estimated 83 billion connected devices on our networks. All these devices, made by a wide variety of vendors, use different types of software, making everything more complicated for IT staff trying to get network devices working together. Simple Network Management Protocol (SNMP) acts like a magic wand to untangle that ball of yarn with a simple gesture.

Integrating a Cloudsmith repository with a Semaphore CI workflow

At Cloudsmith, we believe that packaging should be at the centre of any modern build and deployment process. In fact, we think that Continuous Packaging is the glue that ties Continuous Integration and Continuous Deployment or Delivery together. So with that in mind, in this blog, we will take a walk through how easy it is to integrate Cloudsmith with a Semaphore CI workflow and push the artifacts and packages that you build to a private repository. TL:DR – It’s super easy.

What's new in security for Ubuntu 21.04?

Ubuntu 21.04 is the latest release of Ubuntu and comes at the mid-point between the most recent Long Term Supported (LTS) release of Ubuntu 20.04 LTS and the forthcoming 22.04 LTS release due in April 2022. This provides a good opportunity to take stock of some of the latest security features delivered in this release, on the road to 22.04 LTS. Ubuntu 21.04 brings with it a vast amount of improvements and features across a wide variety of packages.

Incident Reporting and Crime Detection: The Role of Computer Vision

One of the most important uses of Artificial Intelligence (AI) and Machine Learning (ML) lies in the detection and prevention of criminal activities. Today, companies are widely using AI-powered computer vision devices to predict and detect crimes ranging from frauds and theft to violence and cybercrimes. The developments in computer vision technologies enabled authorities to simplify incident reporting and crime detection more efficiently.

How a CIO dashboard helps you run IT like a business

Today’s business demands that IT transform from a cost center to an innovation engine. To foster a business mindset, IT leaders need full visibility into operations so they can achieve desired business outcomes. At ServiceNow, we run IT like a business to deliver value quickly, improve productivity, and create great user experiences. The CIO Dashboard is one of the capabilities our IT leadership uses daily to advance business outcomes that help us scale.