All Posts

Application Dependency Mapping: Security and Ongoing ADM
December 19, 2018
Larry Smith, Jr.
Well, here we are. Finally, on the last post of this series. If you have not been following along, you can find the previous posts: part one, part two, part three, part four, and part…
ITIL Alternatives: What Are Other ITSM Frameworks?
December 18, 2018
Tim Lawes
In this post, we will examine the rise and domination of ITIL, looking into how prevalent it actually is, and why that may be so. We’ll also take a look…
Surviving and Thriving in the Ephemeral World of Containers and Functions
December 18, 2018
Lee Calcote
With containers, microservices, and FaaS becoming even more integrated into hybrid and cloud environments, you must remain diligent to make sure you’re navigating these aspects of the modern app development…
The Cost of Monitoring – With the Wrong Tool
December 17, 2018
Leon Adato
or “It’s not just the cost of buying the puppy, it’s the cost of feeding the puppy that adds up” This is a story I’ve told out loud many times, on conference…
All I Want For Christmas Is … RESTCONF?
December 13, 2018
John Herbert
As somebody not lucky enough to have a nice clicky interface with which to manage and automate all my equipment, I have to develop my own tools to do so.…
How Digital Transformation is Changing IT Service Management Solutions
December 11, 2018
Matt Cox
In this article, we will look at ITSM through the lens of constant digital transformation, examining how the rise of AI is affecting humans in the IT space; the move…
Application Dependency Mapping
December 11, 2018
Larry Smith, Jr.
So far in this series, we have covered Application Performance Monitoring. If you haven’t already, read part one, part two, part three, and part four. In the last post, we stressed the importance of…
What is Your IT Legacy?
December 10, 2018
Leon Adato
Where are you in your career arc right now? Trusting simple statistics, I can say that the majority of you are either just starting out, or somewhere in the middle.…
You Are Here – A Reference Model for IT Infrastructure Security
December 7, 2018
Chris Grundemann
We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along…
To Infinity and Beyond!
December 6, 2018
Ryan Adzima
I’ve covered a lot in this series of posts around artificial intelligence (machine learning); from the beginning (Not Another AI Post…) to why I love it (My Affection for AI)…
1127182