Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Answering the 5 Whys During Root Cause Analysis

In today’s IT’s landscape, a variety of tools are available to us to help with root cause analysis process. Leveraging your tools and using them optimally is necessary to any system but it’s important to remember that tools do not have access to all the information available for them to be able to truly solve every problem So to truly get to the true root cause, you need a process that will take us beyond the scope of tools.

Accelerating Root Cause Analysis of IT Incidents

The moment after an incident is resolved is perhaps the most relaxing for any IT team. When your system is finally functioning properly it puts the entire organization at ease, but the most daunting task is yet to come: root cause analysis (RCA). Akin to football teams watching previous plays to pinpoint areas of improvement, root cause analysis goes through data and finds what initially caused the incident.

Managing Digital Experience Using Synthetic Monitoring

IT monitoring and management have traditionally been focused on an enterprise’s IT backbone; e.g. its data centers, servers, networks, etc. However, with more and more employees working from home these days, and customers or partners scattered around the world, organizations have all found it is critical to monitor and manage an extended network connection to ensure a supreme digital experience for their employees, customers, or partners.

Weather an IT Incident Storm

Ever watch news coverage of an incoming hurricane? You’ve got those correspondents out there in the elements, wearing their yellow rain ponchos, fighting the wind, and describing the scene to an audience watching at home. That situation reminds me of life as an engineer managing a large-scale IT infrastructure. Although I’m no longer a sysadmin there were certainly days where I had to put on my metaphorical poncho and weather an incoming storm.

Your IT Infrastructure Can Be Vulnerable - Even Without A Cyber Attack

On Friday afternoon, 17 July 2020, many internet users experienced connectivity issues around the same time. Even sites like Discord, Feedly, Politico, Shopify and League of Legends were inaccessible. Initially, it was suspected that there was some kind of Denial-of-Service (DOS) attack, but we’ve since learnt that the outage was caused by issues with CloudFlare’s DNS service.

Eliminate the Fog: The Path to Microsoft 365 Monitoring Visibility

I’ll go out on a limb and venture a guess that everybody reading this blog has had challenges adjusting to life in a post COVID world. I certainly have. My latest challenge? Navigating the simultaneous use of a face mask in public venues while wearing glasses to read stuff that’s more than 20 feet away. Just like ski and water goggles, my prescription specs also fog up when simply taking a leisurely stroll through the grocery store.

Tame IT Chaos by Leveraging Advancements in Machine Learning and Artificial Intelligence

Information Technology (IT), like many other industries, is tapping into the latest advancements in Machine Learning (ML) and Artificial Intelligence (AI) to solve a decades-old problem in the IT management world. History can teach us many things, and by diving into years of accumulated IT data, we can find meaningful insights and use them to guide the future.

Artificial Intelligence and IT - Keys to a Great AIOps Solution

Artificial Intelligence (AI) – once the basis of Science fiction is now reality. Though it is often accused of being a mere buzzword, it is very difficult to overstate its impact on the human experience, and as AI’s integration becomes more global it is necessary to understand its potential. It is important to zero in on what AI has to offer Information Technology and how integrating an AIOps driven IT department is beneficial to an enterprise.

Network Telemetry - An IT Executive's Guide

Telemetry is the collection of measurements or other data at remote or inaccessible points and their automatic transmission to receiving equipment for monitoring. In network telemetry, network devices such as routers, firewalls and switches push real-time data continuously to one or more centralized locations for storage, processing and analysis.