Operations | Monitoring | ITSM | DevOps | Cloud

Unlocking Data Literacy Part 1: How to Set Up a Data Analytics Practice That Works for Your People

Does your team know how to use data analytics to their advantage? For the vast majority of companies, the answer may be “no.” According to Accenture, only 21% of people are confident in their data literacy skills, and just 32% of companies have realized tangible, measurable value from their data. While the definition of data literacy varies depending on who you ask, at its core, the term means equipping anyone in your organization to know how to use data in a business context.

Are Your Employees' Tickets Resolved or Are They on Vacation?

Every year during the holidays, our customer, a multinational professional services organization, has thousands of IT tickets built up due to employees on vacation. As the IT teams reached out and didn’t receive a response, their performance metrics ticked up, impacting their quarterly goals and customer satisfaction. In defense of these employees, we all know what it is like to come back to an overflowing inbox.

IT Beware: The Chip Shortage is Coming, Here's What You Can Do

According to CEOs of Intel, IBM, Cisco & other major tech companies, the current semiconductor chip shortage will impact price and availability of IT hardware for the next 12 to 18 months. News coverage about the shortage reveals many factors impacting the production crunch, but there is one common underlying issue – many IT departments are updating their asset plans now based on unknown conditions (which I’ll make ‘known’ at the end of this article 😊).

Portainer and Canonical Expand Partnership Launching Business Charm for Charmed Kubernetes

Auckland, New Zealand – Portainer announced the launch of its Portainer Business Charmed Operator, allowing for seamless integration with Canonical’s Charmed Kubernetes distribution. The new Portainer charm allows users of Canonical’s Charmed Kubernetes distribution to automatically install and integrate Portainer Business as part of the Kubernetes cluster deployment process, using Juju, the Charmed Operator framework.

Why Net at Work employees are sleeping soundly again

Net at Work is a German IT company with over 100 employees that provides its customers with solutions and tools for digital communication and collaboration. Their product NoSpamProxy offers reliable protection against spam and ransomware, legally compliant email encryption and more. Customers of Net at Work are using it as a SaaS solution, and it is being monitored with the agentless network monitoring software PRTG Network Monitor from Paessler AG.

Why LogDNA Received the EMA Top 3 Award for Observability Platforms

We’re honored to be included in Enterprise Management Associates’ EMA Top 3 Award for Observability Platforms. This award recognizes software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate—all the things we’re passionate about at LogDNA.

Streamlining order management in telecommunications

Most people wouldn’t consider order management the most exciting part of business, but perhaps they should. For Deutsche Telekom, order management sits at the very heart of our business operations. It’s the activation point, the moment when things start to get real. Done badly, it can create disparate silos, inefficient orchestration, slow delivery times, high costs, and a poor customer experience. We don’t want that.

3 ways OpUtils' IP address tracker fosters effective IP management

How a network’s IP address space is structured, scanned, and managed differs based on the organization’s size and networking needs. The bigger your network is, the more IPs you need to manage, and the more complex your IP address hierarchy gets. As a result, issues such as IP resource overutilization and address conflicts become challenging to avoid without an IP address management (IPAM) solution in place.

NIST 800-53 compliance for containers and Kubernetes

In this blog, we will cover the various requirements you need to meet to achieve NIST 800-53 compliance, as well as how Sysdig Secure can help you continuously validate NIST 800-53 requirements for containers and Kubernetes. NIST 800-53 rev4 is deprecated since 23 September 2021 Read about the differences between versions down below →