Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this…
“Too many secrets.” – Martin Bishop One of the pivotal moments in the movie Sneakers is when Martin Bishop realizes that they have a device that can break any encryption…
The Dream of the Data Center For me, it started with OpenStack. I was at a conference a number of years ago listening to Shannon McFarland talking about using OpenStack…
Pre-planning and practicing internal communication in anticipation of the next incident is so crucial to improving your overall organizational response to incidents.
One of my biggest pet peeves with AI is the word itself. Words matter, especially in IT. Whether you’re trying to nail down a scope of work for a project,…
Automating processes within your service management strategy reduces repeat work to make it easier for your team to get stuff done. Your service management solution should allow you to customize…
Hopefully, you have been following along with this series and finding some useful bits of information. We have covered traditional APM implementations in part one, part two, and part three. In this post,…
With the popularity of Agile methodologies and the ubiquity of people claiming they were embracing NetOps/DevOps, I could swear we were supposed to have adopted a new silo-busting software-defined paradigm…
I’m 98% confident if you ask three data scientists to define Artificial Intelligence (AI), you will get five different answers. The field of AI research dates to the mid-1950s, and…