Operations | Monitoring | ITSM | DevOps | Cloud

Save $1M with Software Asset Management

In this new series of Now on Now stories, we share how we use ServiceNow products internally to transform our operations and create great experiences. We hope our stories will inspire our customers and partners to harvest even more business value and resiliency from the Now Platform®. For more information, visit the Now on Now Workflows Book of Knowledge.

Deep Learning Toolkit 3.4: Grid Search, Causal Inference and Process Mining

With a turbulent year and 2020 coming to its end, I’d like to thank you for your continued interest in my blog posts. In my last .conf talks I received a lot of positive feedback combined with the ask to have more posts with such content, so thanks for motivating me and here we go! Recently, my colleague Dimitris wrote about how you can set up DLTK on a AWS GPU Instance.

Splunk AR: Object Detection

The Splunk Augmented Reality (AR) team is excited to share more with you. In our first AR post, "Splunk AR: Taking Remote Collaboration To The Future is Already Here," from .conf20, we talked about our new Remote Collaboration feature, which helps field workers and remote experts collaborate in AR. In today’s post, we'll talk about our advancements in Object Detection. This new feature makes it even easier to deploy Splunk AR with your assets.

Where is Your Next Release Bottleneck?

A typical modern DevOps pipeline includes eight major stages, and unfortunately, a release bottleneck can appear at any point: These may slow down productivity and limit a company’s ability to progress. This could damage their reputation, especially if a bug fix needs to be immediately deployed into production. This article will cover three key ways using data gathered from your DevOps pipeline can help you find and alleviate bottlenecks in your DevOps pipeline.

10 Elasticsearch Configurations You Have to Get Right

Elasticsearch is an open source, distributed document store and search engine that stores and retrieves data structures. As a distributed tool, Elasticsearch is highly scalable and offers advanced search capabilities. All of this adds up to a tool which can support a multitude of critical business needs and use cases. To follow are ten of the key Elasticsearch configurations are the most critical to get right when setting up and running your instance.

Boosting Monitoring Efficacy for Telecom via Correlation Analysis

In the first and second part of the blog series, we discussed the importance of correlation analysis in root cause analysis in general and in the context of promotional marketing. In a similar vein, in this blog we walk through how to leverage correlation analysis to address challenges in the telecom space.

Why do businesses need network mapping software?

Networks are rapidly becoming larger and more complex, with numerous different technologies playing into their expansion. Network mapping is increasingly important for network administrators tasked with handling these growing networks. Network mapping provides network admins with a visual map so they can check network performance, the status of connected devices, monitor the network, and analyse networks before initiating troubleshooting efforts.

ITOM basics: Process monitoring

Monitoring the performance of server infrastructure is crucial to any organization. While metrics such as health and availability will sometimes suffice for measuring overall efficiency, getting visibility into more details, such as the underlying processes, tasks, and scheduled jobs, is often crucial for not just identifying a performance problem but also isolating its root cause.

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration of a group membership could lead to a security incident? This blog elaborates the most common misconfiguration or security loopholes that can cause damage to the sensitive data in your network.