Transformation. Transformative. Transform. All mean making a thorough or dramatic change in form, appearance, or character of something. Transforming is precisely what we’ve been doing for the last couple of…
It’s been twenty years since the corporate scandals of Enron, WorldCom, and Tyco. The collapse of these giant corporations ruined the lives of the employees who tirelessly worked for leaders…
Despite all the attention cloud systems and enterprise cloud migrations receive, legacy software still plays an active role throughout enterprises. In many cases, critical business processes supported by legacy applications…
Data continues to be a major driver of business operations, and as a result, it’s becoming more common to see cross-functional teams working within IT. In 2022, for example, data-related…
In this episode of TechPod, Head Geek™ Thomas LaRock sits down with George Westerman—senior lecturer at the MIT Sloan School of Management and principal research scientist at J-WEL Workforce Learning—to talk about the…
Putting machines to work to enhance our everyday lives has been well-ingrained in our society for at least a couple of centuries now. IT workers use machine learning (ML) in…
IT monitoring is a requirement of the modern IT organization for ensuring the health and security of all layers in the IT stack. But, as inclusive as organizations try to…
Have you ever heard the mantra “Don’t deploy on Fridays?” There are blog posts, tweets, and t-shirts shouting this slogan to anyone who will listen. Maybe your organization follows this…
“Who has access to sensitive financial data in our organization?” Assuming you have a definition of what “sensitive financial data” means for your organization, can you easily answer this question?…
Traditional systems monitoring solutions poll various counters (typically simple network management protocol [SNMP]), pull in data and react to it. If an issue requiring attention is found, an event is…