Operations | Monitoring | ITSM | DevOps | Cloud

The Rise of the Machines: ITOM Meets Automation

I started in the IT industry in networking. I had a negative experience in high school trying to learn computer programming*, so I was relieved route/switch had much less to do with computer programming. With the rise of the machines, this isn’t the case anymore. Now in addition to learning router or switch operating systems, routing protocols, and overlay technologies, today’s savvy network engineer needs to throw in things like Python, Ansible, and Jinja.

Node.js Logging Guide-Best Tips and Tools to Use in 2020

When applications experience performance issues, developers may rely on heuristics and find the root cause of issues by directly looking into their code. However, in modern application environments, several services, third-party APIs, and cloud-based components can make it difficult to pinpoint the root cause of an issue. Application logs can help developers detect and resolve issues faster.

10+ Frameworks and Tools to Consider for PWA Development

From AliExpress to Forbes, Starbucks, Instagram, George, Trivago, Uber, and Medium, a vast number of top brands have switched to the PWA environment and recorded a significant rise in their ROI. Especially, in terms of faster app loading & higher customer engagement and retention rate. These brands have not just unveiled the numbers publicly, but have also encouraged others to step into the PWA development world.

Business Continuity Planning and Effective Communication - by Laura Toplis

With many companies utilizing remote-working during the COVID-19 pandemic, effective communication is more important than ever. Unfortunately, being in the middle of responding to a global pandemic will not prevent your organization from suffering from other business disruptions. Likely disruptions you may face are: Cyber/ phishing attacks – these attacks can cripple your regular communication methods such as email, or may exploit ineffective communications to extract illegal payments.

How to encrypt a file using Azure Logic App

This blog will brief on how to encrypt a text file using Azure Logic App out of the box. In this blog, we will use keys from the Azure Key Vault to encrypt the file. Consider a scenario in which I receive an e-mail with high importance along with the attachments. When it happens, I wish to back up those attachments carrying sensitive information in Azure Storage blobs in an encrypted format. As mentioned above I will use keys from Azure Key Vault to encrypt the files.

How to choose the right compliance management software for your business

While keeping data safe from modern cyberthreats is difficult enough, you also have to keep in mind compliance with common regulations, i.e., ensuring your company’s compliance to SOX, which deals with transparency in disclosures from public companies. Nowadays, it’s not enough for businesses to rely on dismissive financial documents that satisfy the intermittent audit; you need to level up your game, and create detailed day-to-day records of activities.

Five worthy reads: How should your business approach multi-cloud adoption?

Businesses are emphasizing remote work options, and workers are now accessing more applications and data from their respective locations using the cloud. Even before opting for the current work-from-home mode, it was predicted that 83 percent of the workload will be on cloud for all enterprise activities. It was also predicted that 73 percent of workers from all the departments will be telecommuting by 2028. Looking at the on-going trend, these are highly likely to happen.