Operations | Monitoring | ITSM | DevOps | Cloud

%term

Is It the End of Abundance in Tech?

After 15 years working on SQL Server and believing the world revolved around databases, I came to SolarWinds where I could learn more about operational technology and its role in full-stack observability. I've had fun watching these two industries collide, delivering on the promise of better value for businesses. I recently read “End of Abundance in Tech” by Ben DeBow, and it encouraged me to think about what the next big market shift will mean for my industry.

Key Considerations When Choosing an MDR Provider for MSPs

Organizations face a constant fight against cyber threats. One such solution that is gaining prominence in this battle is Managed Detection and Response (MDR). In this article, we’ll take a look at what MDR is and how it helps organizations protect themselves, explore the different types of MDR solutions available, and outline some of the key considerations you should keep in mind when selecting an MDR provider.

Azure Cost Analysis at the Service Name and Meter level

Azure provides a wide array of services, each with its own pricing model. Conducting detailed cost analysis helps organizations understand where their money is being spent within Azure. It allows them to identify areas of overspending or underutilization and optimize their resources accordingly. By analysing costs, organizations can identify unused or underutilized resources and either scale them down or decommission them altogether.

Kubernetes: Everything You Need To Know

Find out what Kubernetes is and how it helps in your digital transformation journey in this super easy beginner’s guide. This quick video guide explains how Kubernetes works and deep dives into the Kubernetes architecture. The video also answers questions on – why Kubernetes matters in today’s modern enterprise and discusses the benefits of going down the Kubernetes road.

Tech Talk: How To Navigate the Cyber Threat Landscape Next Year

Johan Dreyer, Field CTO, Mimecast joins Neha Kulkarni for a little serious and light-hearted conversation on the challenges and priorities of cyber threats and how to navigate these challenges. In this edition of Tech Talk, Johan discusses how the threat landscape is evolving in the backdrop of a hybrid workspace and the steps security teams can take to gain visibility into the state of remote endpoints. He also talks about the new-age tactics threat actors are implementing to execute a breach and building a security-first mindset.

The Power of Synthetic Data to Drive Accurate AI and Data Models

We live in a data-rich world - every click, swipe, like, share, and purchase online generates data points companies use to optimize offerings. However, even vast real-world data has limitations in developing robust artificial intelligence (AI) and data models, particularly with regard to AIOps (Artificial Intelligence for IT Operations). Enter synthetic data.