Missed our webinar on remote work digital experience? Watch the recording here. It’s no secret that many IT departments are scrambling to support hundreds, and in some cases, thousands of new remote workers. Last week over 700 IT Operations leaders and professionals registered for our Remote Work digital experience webinar because right now these people are facing unprecedented pressure to keep their companies productive and their employees free of technology disruptions.
ITSM is a hot topic for people who manage IT infrastructure. There are new developments coming out every few months that tend to show where the industry is headed. ‘Automation’ has been all the craze for the past few years, yet it is still quite relevant even today. Then there is ‘digital transformation’, another significant industry jargon that gets thrown around a lot. Last year was all about the release of ‘ITIL V4’ – a major step towards the future.
Often, when companies are new to Amazon Web Services (AWS), they aren’t focused much on the cost. They’re more likely fixated on taking advantage of the scalability and flexibility offered by the cloud. As a company’s AWS cloud infrastructure grows, it will find that its cloud costs grow as well. As the number of AWS accounts increases over time, there’s a higher chance of overspending on unnecessary cloud resources.
With a huge number of employees around the globe working remotely during the COVID-19 pandemic, delivering uninterrupted business services to customers has become a major challenge. This requires strict monitoring of all critical business applications in order to accommodate an increased amount of requests, which can cause a critical downtime if not monitored appropriately.
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of creating and enforcing a solid cybersecurity strategy for employees who work remotely.
Editor’s note: Rancher Labs’ William Jimenez provides an introduction to CIS Scan. Then Saiyam Pathak takes over with a hands-on demo. Cluster security is critical to any successful Kubernetes strategy. Recent research by AimPoint revealed that 44 percent of respondents had delayed application production due to security concerns around Kubernetes containers. Yet securing Kubernetes is a complex machine with many moving parts, integrations and knobs and levers.