Operations | Monitoring | ITSM | DevOps | Cloud

What Is Serverless Architecture? + Pros and Cons

Serverless architecture is a bit of a misnomer. The term itself implies your applications aren’t running on any servers, which isn’t the case. Serverless architecture means a cloud provider—such as Google, Amazon Web Services (AWS), or Microsoft Azure—provides and owns the back-end infrastructure, which has its own pros and cons. Serverless architecture is sometimes also referred to as function as a service (FaaS) or serverless computing.

Project management for non-project managers

When the pandemic hit, the pressure to adapt ServiceNow training offerings grew exponentially. An increasing number of customers from the Americas, Europe, India, and Australia wanted more virtual classes, more flexibility in scheduling, and more customization. Answering basic project planning questions in a timely manner became more difficult for the ServiceNow custom training and adoption team. With the rising demand, our team resources—spread across the globe—had to scale.

Burning Green - 3.5 million PCs Show Heavy e-Waste in Corporate IT

Almost since the moment the world shut down at the start of the pandemic, we’ve heard what a blessing remote and hybrid work is for environmental sustainability. With fewer of us driving and flying for work, it can feel like hybrid work is the sustainable solution we’ve dreamed of for so long. Yet at the same time, attention is also being cast on big tech companies like Facebook and Google for their role in producing (and curbing) e-Waste.

How to Setup AWS CloudWatch Agent Using AWS Systems Manager

Before we jump into this, it’s important to note that older names, and still in use in some areas of AWS, are often referred to SSM which stands for Simple Systems Manager. AWS Systems Manager is designed to be a control panel for your AWS resources so you can manage them externally without having to SSH into the resources individually. What is important to remember with AWS Systems Manager is that features contained within the tool may occur additional pricing.

Using Log Management for Compliance

It’s that time of the year again. The annual and dreaded IT and security audit is ramping up. You just received the documentation list and need to pull everything together. You have too much real work to do, but you need to prove your compliance posture to this outsider. Using log management for compliance monitoring and documentation can make audits less stressful and time-consuming.

Insider Risk: The Call is Coming from Inside the House

In IT, we tend to think of threats as external. Hackers, scammers, bots, and DDoS attacks are all external in origin. But surprisingly, insider risk is often one of the biggest network security challenges facing IT. As they say, sometimes it’s the ones closest to you that can hurt you the most.

The 10 Most Common HTTP Status Codes

As a typical Internet user, nothing is more frustrating than waiting for a web page to display, only to receive a “Page Not Found” 404 error status code. Sure, we try reloading the page, and sometimes that gets the gremlins to start working, but most times, the issue is out of our hands. For all of us typical users, we either go onto the next thing or find a different site. There’s a lot going on in the background that most of us are completely unaware of.

What a delayed SD-WAN or SASE decision could cost you

Winners make good decisions fast, execute them quickly, and see higher growth rates and/or overall returns from their decisions. That’s according to a McKinsey study, ‘Decision-Making In The Age Of Urgency’. But the same study also pointed out that ineffective decision-making has significant implications for company productivity today. On average, survey respondents said they spent 37 percent of their time making decisions.

What Healthcare Companies Need from Network Management and Network Monitoring

IT pros in the healthcare industry have one of the toughest jobs imaginable. Herculean task number one is protecting patient data, with failure to do so bringing hefty HIPAA fines and more than a little bad press. Gargantuan task number two is stopping breaches (and then doing forensics if one busts through). Failing either of these is not exactly a confidence booster. Don’t forget, almost all hacks and breaches either attack the network itself or go across it to reach their target.

4 compelling reasons why you need a network discovery tool and 5 ways OpManager helps

Businesses now scale exponentially and so do their networks. Managing a hybrid IT environment that comprises wired, wireless, and virtual networks can be a challenging task for network administrators. However, continuous monitoring of these devices for fault and performance is crucial. Network discovery is key to successful monitoring solutions.