Enterprise

Latest Posts in Enterprise

When Legacy Systems Still Make Sense: The Role of Legacy Tech in Your Hybrid Digital Transformation

Despite all the attention cloud systems and enterprise cloud migrations receive, legacy software still plays an active role throughout enterprises. In many cases, critical business processes supported by legacy applications…

How to Build Unified Cross-Functional Teams in Today’s Hybrid IT Landscape

Data continues to be a major driver of business operations, and as a result, it’s becoming more common to see cross-functional teams working within IT. In 2022, for example, data-related…

George Westerman | Building the Culture for Digital Transformation — SolarWinds TechPod 052

In this episode of TechPod, Head Geek™ Thomas LaRock sits down with George Westerman—senior lecturer at the MIT Sloan School of Management and principal research scientist at J-WEL Workforce Learning—to talk about the…

Put the Machines to Work for You: A Modern Approach to Increase IT Agility

Putting machines to work to enhance our everyday lives has been well-ingrained in our society for at least a couple of centuries now. IT workers use machine learning (ML) in…

The Visibility Gap: How to Avoid Blind Spots in IT Monitoring

IT monitoring is a requirement of the modern IT organization for ensuring the health and security of all layers in the IT stack. But, as inclusive as organizations try to…

Building and Monitoring Robust Automatic Deployments

Have you ever heard the mantra “Don’t deploy on Fridays?” There are blog posts, tweets, and t-shirts shouting this slogan to anyone who will listen. Maybe your organization follows this…

Can They Really See That Data? Auditing Access Controls Across Environments

“Who has access to sensitive financial data in our organization?” Assuming you have a definition of what “sensitive financial data” means for your organization, can you easily answer this question?…

Do You Need an Alert for Your Alerts? Building Smarter Monitoring Systems

Traditional systems monitoring solutions poll various counters (typically simple network management protocol [SNMP]), pull in data and react to it. If an issue requiring attention is found, an event is…

Do You Know Where Your Cloud Is? Understanding Shadow IT

The public cloud has greatly increased the flexibility of businesses everywhere. Need another petabyte of storage? You’re but a few mouse clicks or a couple lines of code away from…

Not All Metrics Are Good Metrics

The old saying goes like this: “If you don’t measure it, you can’t fix or improve it.” This reflects the obvious notion you can’t measure what you don’t monitor. But…