Operations | Monitoring | ITSM | DevOps | Cloud

What Makes a Perfect Incident Management Checklist? We Asked the Experts!

The perfect incident management checklist doesn’t need to be a fantasy. In fact, it shouldn’t be! The perfect incident management checklist should cover several topics, be broken down into bite-size sections, and help team members quickly identify tasks that fall under their responsibility. We asked our experts what should be included in the perfect incident management checklist. Here are their answers.

Building Workflows, Part 1 - Core concepts and the Workflow Builder

At incident.io, we’re building tools to help people respond to incidents, often by automating their organisations’ process. Much of this is powered by our Workflows product, which customers can use to achieve things like: Workflows as a product feature are incredibly powerful, and we’re proud of the value they provide to our customers. Behind-the-scenes, though, building something like workflows can be difficult.

Building Workflows, Part 2 - the executor and evaluation

This is the second in a two part series on how we built our workflow engine, and continues from Building workflows (part 1). Having covered core workflow concepts and a deep-dive into the Workflow Builder in part one, this post describes the workflow executor, and concludes the series with an evaluation of the project against our goals.

Ninja Quick Guides: How to Use Winget to Install and Update Software Remotely

Whether your organization has a few remote employees or your entire workforce has gone remote, you need an easy way to install and update software remotely. By using a tool called winget, you can natively deploy software through Windows. In this article, we’ll take a look at what winget is, how it works, and how you can use it.

Should you use open-source databases?

You are not the only one asking this seemingly popular question! Several companies are torn between the rise in appeal of open-source databases and the undeniable challenges inherent to their adoption. Let’s explore the trends, the drivers and the challenges related to open-source database adoption.

Using automation to deliver reliable managed security services

As a Cloud Service Provider (CSP), Managed Service Provider (MSP), or Managed Security Service Provider (MSSP) you are instrumental in delivering effective and reliable managed security services to your clients. With cybercriminals taking advantage of less secure environments and becoming more advanced with their security breaches, this is becoming increasingly complex.

AIOps for Real: Characteristics of a Platform That Add Value and Drive Change

When you’re investing in automation solutions, ultimately, tangible results need to follow quickly. Getting a return on investment (ROI) out of an automation project after two years is something that would have been OK in the not-so-distant past but is no longer acceptable nowadays. With the current speed of change, where new technologies come and go and existing ones evolve at lightning speed, IT teams require much faster time to value on automation investments.

IT Monitoring for Government

Today’s blog comes from Kevin Howell, CEO of UK partner – Howell Technology Group (HTG) about their work supplying secure cloud technologies and remote working solutions to government and regulated customers. HTG are a trusted industry leader in the UK, who offer virtual desktops, managed services and efficient modern workplace solutions. Their solutions are also available with the UK Government’s Digital Market place under the G-Cloud Framework.

Debunking Myths About Cyberattack Complexity in 2022

Stoking fears about the threat landscape is a popular approach, and one that I don’t particularly care for. Many will tell you that the threat landscape is constantly changing, that threats are getting more complex, and that actors are getting more sophisticated. “The whole world is getting more difficult and scarier, so buy our stuff!” There’s a ton of media sensationalism too, with the popular image of the hacker sitting at a computer, wearing a dark hoodie.