Operations | Monitoring | ITSM | DevOps | Cloud

%term

What is a Checksum & How to Use One

Checksums play an important role in various fields, from data integrity verification to cyber security. They are essential tools for ensuring the accuracy and security of data transmission and storage. While exploring what a checksum is, you will discover its significant role in cyber security, how to use checksums effectively, and best practices for their implementation.

Scaling into the unknown: growing your company when there's no clear roadmap ahead

During a recent episode of ⁠The Debrief⁠, we spoke with Jeff Forde, Architect on the Platform Engineering team at Collectors, about building an incident management program at various stages of growth. In that episode, we called it growth from zero to one, one to two, and two to three. But what happens once you’ve scaled beyond three and answers to question you may have become that much harder to find.

CSM to ITSM Migration: A Panel Discussion #ITSM #ITSolutions

Three Ivanti customers at various stages of migration – Maxar's Allison Hull, Fareway Stores' Steve Clime, and Memorial Health Ohio's Barbara Munger – give their firsthand perspectives on a successful journey from Cherwell Service Management to Ivanti Neurons for ITSM. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Top Datadog Competitors and Alternatives

Datadog is widely recognized for its comprehensive range of products and tools, making it quite a challenge to find a suitable alternative. When seeking an alternative to Datadog, it's essential to conduct a thorough comparison of features, performance, limitations, and other vital aspects. This task requires a deep dive into the details, and it might not be as straightforward as it seems at first glance.

Software Change Impact Analysis: 3 Benefits of Knowing What Your Code Will Do Before You Merge

When’s the last time you did something without knowing how it could turn out? Surprises can add a little excitement to your day-to-day, but one place they’re not really welcome is in infrastructure code. That’s why we have change impact analysis, a method of predicting the effect one change can have on other parts of a system before you make it. Software change impact analysis, as you might imagine, assesses how changes to a piece of software can affect other parts of the same system.

WAN Management: Optimize User Experience and Maximize Cost Savings

For IT operations teams running modern networks, the work can be challenging and thankless. These teams don’t ever receive congratulatory messages from executives when a video conference operates flawlessly—they only hear complaints when those sessions are problematic.

Investigating Mysterious Kafka Broker I/O When Using Confluent Tiered Storage

Earlier this year, we upgraded from Confluent Platform 7.0.10 to 7.6.0. While the upgrade went smoothly, there was one thing that was different from previous upgrades: due to changes in the metadata format for Confluent’s Tiered Storage feature, all of our tiered storage metadata files had to be converted to a newer format.

Unleash superior workflow oversight for Power Automate Flows

Azure Power Automate is a cloud-based service provided by Microsoft that allows users to create automated workflows between their favourite apps and services to synchronize files, get notifications, collect data, and much more. With Azure Power Automate, users can seamlessly integrate various Microsoft and third-party applications, such as Microsoft 365, Dynamics 365, Salesforce, Twitter, and Dropbox, among others.