Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Dear ITSM - We need to talk...

Dear IT Service Management, After ten years of working in different areas of tech, I've seen a lot of things, from cybersecurity to DevOps to ITSM. I've discovered that no matter what industry you're in, they all have one thing in common: they're overcomplicated to bits (ha, pun intended. Get it? Bits... tech...). ITSM is no exception. When talking to customers and industry experts, the pain points experienced are essentially the same.

7 Strategies to Reduce Website Downtime

Website administrators and business owners know the frustration and potential revenue loss that can come with website downtime. It’s like throwing a party and locking the front door—your guests (or, in this case, customers) cannot get in. To help you keep those digital doors open and the party going, here are some practical strategies you can use to minimize website downtime.

The Definitive Guide to ITSM Frameworks [+Free Downloadable Cheat Sheet]

If your organization is looking for guidance on IT Service Management (ITSM), there are many possible sources of help. Though some approaches are more popular than others, several ITSM frameworks can be useful to organizations. These procedures can be used alone or blended, so your organization can take what it needs from one or all of these ITSM best practice guidance bodies.

Securing Your Environment: A Guide to Windows Application Whitelisting

A simple and quick way to protect your data environment is by implementing Windows application whitelisting, a strategy that lets only trusted software run on your system. This not only safeguards you from malicious applications but also gives you application control, ensuring stability and security. This guide will help you understand what Windows application whitelisting is and the tools and technologies you can use to enforce whitelisting policies and best practices for whitelisted software management.

How to Disable Early Launch Anti-Malware Protection in Windows 8 and 10

With the release of Windows 8, Microsoft introduced Early Launch Anti-Malware (ELAM) as a cybersecurity measure to protect against early boot threats. However, you may need to disable it for troubleshooting, software compatibility, or performance reasons. In this article, you will learn how to disable Early Launch Anti-Malware Protection and enhance the benefits of overall security for your IT infrastructures.

Top 10 Change Management Tools

Changes to software are inevitable and fundamental part of growth for any organization, however, change is often not straightforward. It can affect numerous aspects of a company and requires collaboration among all stakeholders. This is where change management tools come in to assist you with this. There’s currently a wide range of change management tools available, each providing benefits to specific scenarios and weaknesses to others.

A guide to scaling OpenTelemetry Collectors across multiple hosts via Ansible

OpenTelemetry has emerged as a key open source tool in the observability space. And as organizations use it to manage more of their telemetry data, they also need to understand how to make it work across their various environments. This guide is focused on scaling the OpenTelemetry Collector deployment across various Linux hosts to function as both gateways and agents within your observability architecture.