Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

A Beautiful ITSM Union: ITIL and DevOps

Since the launch of ITIL 4, incorporating DevOps into service management strategy has been a hot topic. On the surface, both DevOps and ITIL are frameworks that can help facilitate successful operations surrounding IT services. But that doesn’t mean that IT pros need to choose one or the other. Like most great marriages, it’s how these two methodologies complement each other that makes them an ideal pair when it comes to ITSM.

Reimagine All You Have Learned: APM and the Skills Gap

APM tools have been formerly and primarily siloed in the application development arena, with only the most important and mission-critical applications having their APM instrumentation extended into production use due to complexity and cost. In the modern world of application monitoring, the requirements for Dev and Ops need to be tightly integrated.

Three Ways Agencies Can Improve Cloud Security and Performance

The Federal Cloud Computing Strategy (FCCS) makes it clear government agencies have significant responsibilities for protecting cloud-hosted data. The FCCS states the need for agencies to develop their own governance models and create service level agreements to ensure they’ll have continuous access to log data and prompt notification from their cloud service provider if there’s a breach.

How to Ensure and Optimize Application Performance

Application performance management (APM) involves managing the availability and efficiency of software applications by obtaining and translating IT metrics into business outcomes. Because application performance hiccups are inevitable, it’s crucial to have a robust APM solution in place so IT teams can resolve problems faster and more efficiently, lessening the impact on users and the bottom line. One factor muddling application performance optimization is the speed of change.

IT Pros on the Future of Automation and AI in ITSM

Think about your last online order. If you’re a frequent online shopper and have created profiles for sites you visit often (*raises hand*), then you’re probably familiar with customized recommendations. Based on your purchase history, location, and other factors, the website may suggest other items you might be interested in buying. And if you’re on the site long enough, chatbots may appear asking if you have questions or need assistance locating something.

You Were Built for This: Celebrating IT Pro Day 2020

The year 2020 has been a rollercoaster. With nearly every aspect of our daily lives flipped on its head, it’s hard to think of a single thing that went as planned or any of us were prepared for. That is, until it comes to our IT teams. The success of organizations during the reality of an unprecedented global pandemic is due in large part to IT pros’ preparedness and ability to adapt and manage through substantial change.

Proactive Security Strategy for the Public Sector (10 Steps, Part Two)

In the first of these two articles, we covered the first five steps public sector organizations should take to change how they think about their cybersecurity to overcome this challenge. So far, we’ve explored: considering risk, tech environment knowledge, effective cyberhygiene, security at every level, and security as a trust-builder. We’ll continue by looking at the final five steps on this journey to build a stronger security strategy.

Better Together: Benefits of Connecting Configuration, Change, and Release Management

Both the technology and infrastructure we use have changed how we deliver services to our customers (or employees in this case). But how are our businesses adapting to these changes? How are we identifying relationships across new environments? Are we understanding the implications of what’s being introduced? In order to keep business applications and operations running smoothly, it’s crucial to understand the value of three key ITIL practices: configuration, change, and release management.