Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Want to Improve Your Postal Service Operations? Be More Proactive with Your Mobile Device Management

Editor's Note: This conversation was first started by John Wyer in 2021. Steve Mulroy picked it up in 2024 and added some new perspectives and recommendations for your consideration. I know your mail carriers are probably using mobile devices for everything these days – or supposed to be, anyways. Yet, in speaking with them casually, they’ve expressed three concerns about their current mobile technology: 1. Outdated devices or software.

Driving sustainability and excellence: a FinOps story at Platform.sh

FinOps Professional Sumaira Nazir defines herself by her commitment to growth. With a master's degree in psychology and a background in both business analysis and project management, Sumaira’s passion for self-improvement means she’s always in pursuit of her next professional milestone. In fact, this love of learning is part of what drew her to Platform.sh.

How to Identify Advanced Persistent Threats in Cybersecurity

Cyber threats are a major concern. Individuals, governments, and businesses all feel the impact. The emergence of advanced persistent threats is one of the most alarming forms of cyber espionage (APTs). These hacks are notable for their intricacy, tenacity, and broad penetration capabilities, whether they target a mobile or web application. APTs can harm the target network, including heightened geopolitical tensions, data theft, and protracted service interruptions.

Making serverless applications reliable and bug-free

Building applications using serverless technology on AWS—like AWS Lambda and Amazon API Gateway—can be incredibly powerful. You get to scale effortlessly and focus on writing code without worrying about managing servers. But as your application grows and spreads across hundreds or even thousands of cloud resources, keeping track of errors and fixing issues quickly becomes a big challenge.

Ask the Experts: Is On-Device AI Going to Prove to Be Hype or Helpful?

Your frontline workers need AI, and they need it now. They need guidance. They need information. And it’s getting harder to find a co-worker or manager that can provide these things. Everyone’s busy. In fact, in Zebra’s latest Global Shopper Study, 85% of the retail associates surveyed said they believe AI will help them be more productive, and 78% said AI/machine learning would boost efficiency and customer service. Three-quarters said the same for generative AI (GenAI).

3 Switch Features You Should Never Change

In separate incidents this past month, I’ve helped clients troubleshoot network problems that turned out to be due to misconfigured switches. In all cases, the errors turned out to be things that I don’t think should ever have been changed from their default settings. So I thought it might be useful to have a brief discussion about how switches work and what features should or should not be used in normal office environments.

What is Network Access Control? A Complete Guide to NAC

Network access control (NAC) is a critical component of any organization’s cybersecurity strategy. As companies adopt increasingly flexible work environments and emerging technologies like the Internet of Things (IoT), their networks have expanded rapidly. More users, devices, and access points mean more potential vulnerabilities that attackers could exploit. Implementing NAC solutions lets organizations stay securely connected despite relying on a complex, dynamic infrastructure.

The hidden challenges of Internet Resilience: Key insights from 2024 report

The result of responses from over 300 digital business leaders in North America and EMEA across technology platform providers, financial services, retail, and other industries, our research showed that almost half the surveyed organizations are losing upward of $1M monthly in terms of total economic impact (TEI) due to outages and service degradations.