Operations | Monitoring | ITSM | DevOps | Cloud

Clinical Mobility in Healthcare with Strategic Mobility Group (SMG3) | Zebra

Explore how Strategic Mobility Group (SMG3) is revolutionizing clinical mobility in healthcare with their EDGE platform, featuring the Zebra HC50. Join Eric Holmes as he showcases how SMG3 streamlines the management of thousands of mobile devices in hospitals, ensuring seamless integration and optimal performance for healthcare professionals. Discover their comprehensive solutions, including device configuration, life cycle management, and user interface customization, tailored to the unique needs of hospital units like the NICU and ED.

The Evolution of Patch Management with Eric Schultze | Security Insights, Ep. 51

Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

How to Detect Cloud Configuration Changes Before They Cost You

In this video, see how ScienceLogic helps IT teams take back control. By delivering real-time insight, intelligent policy recommendations, and automated enforcement, ScienceLogic keeps your cloud environment compliant, cost-efficient, and secure. From real-time change detection to automated remediation, you’ll get the visibility and control needed to move fast and stay ahead of disruption.

How to Transform IT Operations with PowerFlow for ServiceNow

IT teams today face a flood of tickets, disconnected tools, and complex hybrid infrastructure. ScienceLogic PowerFlow for ServiceNow simplifies it all—automating workflows, enriching data, and accelerating resolution at scale. In this video, see how PowerFlow brings intelligent automation to transform your IT operations, with real-time ticket enrichment and seamless ServiceNow integration. It’s scalable, efficient, and built for today’s hybrid environments.

VictoriaMetrics Features & Community Call - May 2025

Join us for this new monthly call, where we'll discuss cool features that are either new or that we'd like to highlight to the user community. We'll also look at some of the questions that were asked by users that could be of interest to others. We'll talk about how to optimise data collected by default in-stack helm chart, incl. topics such as: Cardinality explorer Stream aggregation Unused metrics And more! We look forward to seeing you there!

How to Automatically Detect Linux Configuration Drifts

When a quick Linux fix during an outage slips through unnoticed, it can silently break compliance and put your infrastructure at risk. In this video, we dive into how ScienceLogic helps IT and security teams detect and resolve these hidden issues automatically—before they become bigger problems. We demonstrate how ScienceLogic identifies unauthorized Linux configuration changes, flags policy violations, and restores compliance through intelligent automation. From configuration drift detection to enriched ServiceNow tickets and automated remediation, it’s all about eliminating the guesswork and staying ahead of risk.

How to Pinpoint Root Cause in Real Time

When systems fail, it’s not just about knowing that something went wrong—it’s about understanding why it happened and pinpointing the root cause fast. ScienceLogic Skylar AI automatically analyzes massive volumes of data, detects patterns, and delivers clear, human-readable insights. The result? Your team knows exactly where to start, acts faster, and keeps issues from escalating.

Understanding Risk Appetite in Organizations

Understanding Risk Appetite in Organizations Risk appetite guides organizations in assessing their risk tolerance and aligning actions with risk management strategies. Frameworks like NIST CSF 2.0 aid in prioritizing risks and measuring outcomes. Organizations need to evaluate security investments against acceptable risk levels, factoring in costs of vulnerabilities. Exposure management offers a comprehensive view of risk, while internal and external influences shape risk decisions. The link between vulnerability scores and exploitability requires careful prioritization of security measures.