Operations | Monitoring | ITSM | DevOps | Cloud

The Importance of Community Knowledge in Tech

Tools alone aren’t enough. How you use them and the expertise you tap into make all the difference. In this Short, we explore why even the best tools need the proper guidance to unlock their full potential. Open-source communities are goldmines of knowledge and support Connecting with experts can save you serious time and headaches While enterprise support is valuable, the community often has your back. Get practical tips to get the most out of your tools, and remember: it’s not just what you use; it’s how you connect, learn, and grow along the way.

Managing Up: Improving Upward Influence

The concept of managing up is simple -- in order for you to influence decision-makers, you need to learn how to speak their language and show initiative when it comes to solving problems. Even as an entry-level manager, you can have a lot of influence over decisions just by working closely with your direct manager and even executives. In this stream, we'll be talking with IT leaders about how they manage their managers through constant communication, proper expectations, and frank discussions about business impact so that they're able to better influence decisions on a broader scale.

Introduction to Facts in Puppet

Unlock the full potential of your Puppet infrastructure with a deep dive into Puppet Facts. This guide explains how Puppet uses facts to gather real-time data, making your code more dynamic, adaptable, and aware of the systems it manages. Discover the different types of facts, from simple structured data to secure trusted facts, and learn how to leverage them for enhanced visibility and standardization across your entire estate.

ITAM strategies to secure BYOD, Daniel Spicer, CSO, Ivanti

How can IT and security teams get better visibility into devices and endpoints that are accessing their network? Ivanti’s latest research report, “Securing the Borderless Digital Landscape” (ivanti.com/borderless-security) found that poor device visibility and unmanaged BYOD are prime attack vectors for threat actors.