Operations | Monitoring | ITSM | DevOps | Cloud

%term

Overcoming The Black Box Problem With Machine Learning in IT Operations

Chronically understaffed and constantly stressed-out IT Ops and NOC teams are overwhelmed by today’s IT noise. Artificial Intelligence (AI) and Machine Learning (ML) can help these teams because ML (and AI) are exceptionally good at processing enormous volumes of very complex data in real-time, or near real-time, and surfacing actionable insights. But ML successes in IT Ops are still hit-or-miss.

How to Enhance Your ServiceNow Investment with Nexthink

In describing why Nexthink is a critical partner in their value-offering Morten Grønneb?k, Chief Commercial Officer at BusinessNow, said “What we were experiencing as a consultancy company was that SLAs might be green out there, but your customers or end-users’ satisfaction was often red.” Indeed, prior to Nexthink, BusinessNow was increasingly faced with a major issue: clients’ IT departments were blind to IT issues at the end-user level, although data centers seemed oper

How to Raise the Bar on the ITIL's Recommendations for Critical Incident Management

According to the ITIL, the framework of best practices for delivering IT services, there is a recommended process flow for how to handle major incidents. Clearly, the IT community would be well served to follow the ITIL’s systematic and professional approach, whose benefits, according to CIO Magazine.

GDPR Log Management - Compliant Logging Best Practices

The EU General Data Protection Regulation (GDPR) was authored in 2016 and became applicable on May 25th of 2018. You can read the regulation in its entirety in this PDF. If you have legal questions about GDPR and how it applies to your organization, you should seek the advice of a professional who is familiar with the regulation.

Using Terraform for container security as code with Sysdig Secure

In the following tutorial you can learn how to implement container security as code. You probably have a CI/CD pipeline to automatically rebuild your container images. What if you could define your container security as code, push it into a Git repository to version control changes and then enforce your policy in your container orchestration tool like Docker or Kubernetes using Sysdig Secure?

All the Security and Compliance Features Announced at AWS Re:Invent 2018

Yet another Re:Invent has concluded, leaving behind a trail of announcements, new features, and vendor swag (how many T-shirts can we possibly own?). Security was a hot topic at this year’s conference; so much so that it was mentioned in-depth within the first 10 minutes of Andy Jassy’s keynote and numerous times afterwards, as well as during Werner Vogel’s keynote the following day.