Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Blackhawk Network makes the right connections to avoid costs

Blackhawk Network may be the most omnipresent company you’ve never heard of. As the market leader in card-based financial solutions and the largest provider of 3rd party prepaid cards, you’ve probably purchased or used one of Blackhawk Network’s gift cards, without ever knowing it was them. That’s how they like it.

Forecasting with FB Prophet and InfluxDB

I think that a lot of people immediately associate the word “time series” with “forecasting”. After all, who doesn’t want to be able to predict the future? While we can’t do that quite yet, we can produce forecasts with confidence intervals. In this tutorial, we’ll learn how to make a univariate time series prediction with Prophet and InfluxDB.

World Economic Forum In Davos - Growth in Global Technology Risk

Hey there, While the World Economic Forum (WEF) in Davos always dominates the news agenda across a variety of topics I wondered what discussions around technology occurred this year, particularly from a cybersecurity perspective. During my reading, I came across the global risks report 2020 published by WEF and thought sharing some of the key points would help you in case you have to argue about the importance of cybersecurity.

A Day in the Life of IT is Anything but Ordinary: Industry Predictions for 2020 and Beyond

Did you happen to catch the important news unveiled in Ivanti’s January 7 press release? Ivanti enters the next decade with an augmented leadership team. Jim Schaper, Ivanti’s current Chairman of the Board, has been appointed Chief Executive Officer, and the company’s longtime CEO Steve Daly has retired but will continue to serve as a Board Member. You can learn more about the new Ivanti leadership team in one of our recent blog posts.

Bi-directional replication with Elasticsearch cross-cluster replication (CCR)

Elasticsearch cross-cluster replication (CCR) was released as a beta feature in Elasticsearch 6.5, and as a Generally Available (GA) feature in Elasticsearch 6.7. CCR allows multiple indices to be replicated to one or more Elasticsearch clusters. Replicating indices to additional Elasticsearch clusters solves several use cases, including high availability (HA) across datacenters, disaster recovery (DR), and CDN-like architectures to co-locate data closer to application servers (and users).

How Threat Intelligence Can Improve Your Security

A new cyberattack occurs roughly every 39 seconds. Each of these attacks leaves behind a variety of evidence, including IP addresses, log events and malicious files. This evidence can be incredibly valuable to security teams but only if it’s analyzed and placed in context. There is simply too much attack data from too many sources to be useful when data is in a raw format. Threat intelligence is the solution for making raw data actionable.

Checklist for publishing a guest post to Fyipe.

Here’s a quick checklist to publish articles or guest posts on Fyipe Blog. We invite anyone to publish stories to any of our publications. If you wish to contribute. Please send an email to [email protected] with your draft article. Please make sure your draft article follows guidelines in this post. Here’s what all this means for you as a writer: Educate your readers and teach them something new. Cut all the fluff. Get to the point — fast. Do not waste their time.

The value UEM delivers in digital upgradation of enterprises' IT administration

2020 has arrived. Most companies are striving to become digitally transformed, business applications are moving to the cloud, and day-to-day IT operations are becoming more mobile-oriented with executives using a diversified range of devices. Employees don’t just use company-provided desktops; they often work on the go with corporate-owned, personally enabled (COPE) laptops, mobile devices, and iPads; bring your own device (BYOD); etc.