Operations | Monitoring | ITSM | DevOps | Cloud

Digital Wellbeing and the Overlapping Roles of HR and IT

Who oversees employee digital wellbeing? Nexthink’s Meg Donovan (Chief People Officer) and Tim Flower (Global Director of Business Transformation) recently sat down to answer this question on the minds of so many business leaders. Of course, Human Resources departments have traditionally shouldered the responsibility of managing employee wellbeing. But a recent Nexthink survey reveals that unreliable IT services and equipment is the third biggest contributor to employee turnover and burnout.

Product Growth KPIs Dashboard for Enterprises

There can be as many as 64 important business metrics for your company to track (according to nTask). That can sound daunting. But if your organization doesn’t have the capacity to track all of them, it should at least track the most important ones according to its business model, stage and focus areas. For example, key product metrics not only provide information to product managers, but also other relevant stakeholders across the organization.

Do you need a business case to migrate to the cloud? The answer is clear!

Summary The cloud is always innovating. One of the more recent and large breakthroughs has been the advancement and improvements in CPU architectures. Specifically with ARM CPU processors, where we are seeing adoption across all forms of computing, not only cloud, but also laptops with Apple’s M1, and of course in the past decade with mobile phones. The more recent availability in cloud computing therefore is not surprising, given the progress made in all other areas of technology.

Black Friday Requires Dynamic Integration Infrastructure Management

Life for an IT architect in retail would be so much easier if people would just spread their shopping out across the year. Since 1941 American Thanksgiving has been a holiday on the fourth Thursday of November and most American companies and schools take the following day as a holiday too with major retailers offering price reductions on this day to kick start the Christmas shopping season. Since 2005 it has been the busiest shopping day of the year.

How Kambi migrated from an in-house Graphite solution to Grafana Cloud

When you’re a sports betting technology company and you realize your in-house, on-prem Graphite solution for monitoring metrics is no longer a sure-thing, what do you do? That was the dilemma at Kambi, a quickly growing business – with a passion for using open source technology – that has about 500 different micro services in production and around 200,000 incoming metrics messages per second.

Infrastructure as Code: All you need to know

Using Code to create and manage deployments is more time-efficient and less tedious when compared to using CLI or even UI. In this blog, we explore the buzz around the usage of Infrastructure as Code (IaC) and how Terraform can be used to implement IaC. In this blog post, we will explore the good, the bad, and the ugly sides of infrastructure as code so you can make an informed decision on how (and why) to incorporate it into your workflow.

Build VS Buy: How to get the most out of your SCOM monitoring

Microsoft's System Center Operations Manager, SCOM, is one of several monitoring platforms available on the market. It is widely adopted and has great potential to help you create a stable and robust IT environment. To succeed with that, however, is not always straightforward. To fully benefit from SCOM, the right resources need to be in place and optimized- time, competence, and money.

Solving specific use cases with CFEngine policy and providing reusable modules

With the release of build.cfengine.com, I have been working to migrate some of our own security related policy into modules of their own. CFEngine Build and the cfbs tooling allows us to organize policy into modules, which are easy to update independently and share with other users. Let’s take the scenic route and look at what life is like with cfbs. One of our security policies requires that the password hashing algorithm in /etc/login.defs is set to SHA512.