Operations | Monitoring | ITSM | DevOps | Cloud

Remote Work

The latest News and Information on Remote Work and related technologies.

Fostering Psychological Safety in Remote Teams

Psychological safety is a crucial component of any organization’s culture. Psychologically safe organizations are free to create, discuss, disagree, take risks, and make mistakes. These organizations are often the ones we see as key innovators in their unique industries. In other words, cultivating a culture of psychological safety is paramount in order to succeed.

Empire Office Selects Goliath Technologies to Gain Critical Insights into Remote Worker Trends

Goliath Technologies, a leader in end-user experience monitoring and troubleshooting software, announced today that it was selected by Empire Office to anticipate, monitor, and document Empire’s end-user experience across their Citrix environment.

3 ITSM Strategies to Help your Remote Workforce Thrive

Remote workforces are becoming the new normal. What could be achieved earlier with a simple visit to your colleague’s desk will now require you to communicate flawlessly across miles. ITSM tools that were earlier used only when systems had issues are now being used to make delivery of different business services easier. Quite naturally, not all organizations are prepared for this ‘new normal’.

How important is network compliance for your remote work environment?

With a majority of the workforce now adopting a work-from-home routine, maintaining the normal functioning of your network and ensuring compliance with industry standards is not an easy job. When employees are working remotely, it is especially crucial to ensure network compliance with industry standards and internal policies to secure your network from cybersecurity breaches.

#ITConnections - Maintaining Service Level Agreements in a Challenging Environment

With the workforce moving outside the usual areas of your Service Level Agreements, it can be challenging to adapt and ensure service quality. Through SLA reporting, you can monitor and manage your SLAs, setting up custom alerts before they have been breached and you could be affected by an outage.

How OpsRamp's intelligent Escalations Enables Remote Workers

OpsRamp alert escalation policies allow an administrator to configure escalation rules that determine which alerts that need attention, which users are required to take action, and what actions should be taken. In this interactive session we'll dive into why this is more important than ever as organizations adopt remote work strategies and need to be able to not only understand the signal from the noise, but also get to the root cause faster and ensure information is getting to the right people at the right time to reduce meantime to resolution.

How implementing a BYOD initiative helps prepare remote workers for COVID-19 era challenges

As the COVID-19 pandemic continues to force employees to work from home, businesses are facing new and unique challenges to ensure business continuity. When remote work is mandated due to COVID-19, the transition isn’t smooth for many businesses; not every business has the infrastructure to make the abrupt shift, even given the immediate need to go remote.

Empire Office Gains Critical Insights into Remote Worker Trends with End-User Productivity Report

Empire Office is the United State’s largest commercial furniture dealer, providing creative and cost-effective workspace solutions. Based in Manhatten, NY, the epicenter of the COVID-19 outbreak, they were mandated to immediate stay at home orders, forcing their entire workforce to work from home. Fortunately, their Senior Vice President and CIO, Michael Pfaeffle, had already enabled the teams to work remotely by investing in Citrix XenApp a few years prior.

Cybersecurity use cases for better remote workforce management

In the new normal, if your business has chosen remote operations, this might attract malicious actors. Hackers prey on the remote workforce whose vulnerability has increased in multifold ways. While infrastructural concerns, such as working outside the corporate IT network and using home Wi-Fi are inevitable, other issues, including using personal devices and retaining privileges to access more than required business resources add to the magnitude of this vulnerability.