author:


ITSM

ITSM: The 4 Wins of Lean


Part 1 of this series introduced IT Service Management (ITSM) and a few of the adaptable frameworks available to fit the needs of an organization. This post focuses on the benefits of using a couple of the principles from the Lean methodology to craft …


author:


Database

How AI Is Transforming the Data Center


There have been so many changes in data center technology in the past 10 years, it’s hard to keep up at times. We’ve gone from a traditional server/storage/networking stack with individual components, to a hyperconverged infrastructure (HCI) where it’s all in one box. The …


author:


ITSM

Q&A: Breaking Down IT Silos


One of the most frustrating challenges in IT, historically, is working within silos. Given today’s complexity and specialization throughout IT, it’s more important than ever that teams work together toward goals that benefit the entire business. Following our own advice, I talked with a …


author:


Applications

5 Ansible Playbook Steps to Success


There are many configuration management, deployment, and orchestration tools available, ranging from open-source tools to automation engines. Ansible is one such software stack available to cover all the bases, and seems to be gaining more traction by the day. In this post, we’ll look …



author:


Security

You Too Can Stink at Information Security!


“Security? We don’t need no stinking security!” I’ve actually heard a CTO utter words this effect. If you subscribe to a similar mindset, here are five ways you too can stink at information security. Train once and never test Policy says you and your …




author:


Networks

3 Ways AI Is Changing Social Media


Social media has become a mainstream part of our lives. Day in and day out, most of us are using social media to do micro-blogging, interact with family, share photos, capture moments, and have fun. Over the years, social media has changed how we …


author:


Security

4 Keys to Successful Cyberdefense Automation


Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial intelligence and machine learning to ascertain the severity of potential threats and remediate them through the appropriate automated responses. …