All Posts

Policy and Controls – A Foundation for Threat Protection
August 14, 2018
Natalie Timms
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
Culture of Data Protection: Data Quality, Privacy, and Security
August 10, 2018
Karen Lopez
As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design. To Reward, We Must Measure. How…
What Is Root Cause Analysis?
August 10, 2018
Tom Hollingsworth
If you work in engineering or support, you’ve probably spent a lot of time troubleshooting things. You’ve probably spent just as much time trying to figure out why things were…
How to Eliminate Silos Using DevOps
August 9, 2018
Michael Mazyar
For too long, development and operations teams have operated in a vacuum, independent of one another. These silos limit communication between teams, often at the expense of the company.
The Human Side of IT
August 9, 2018
Phoummala Schmitt
The technology industry is about technology. Technology is the fastest changing industry there is, but the often-overlooked part of this industry is the humans that work with the technology. Humans…
Are Women in Technology Receiving Bad Advice?
August 8, 2018
Melissa Connors
IEEE ProComm 2018 Recently, I attended the IEEE ProComm 2018 conference in Toronto. I had the opportunity to hear about research and ideas involving professional communication. This was exciting for…
Building an IT Service Desk Automation
August 7, 2018
Jason Yeary
Service desk automations are designed to streamline processes and remove the tedious areas of service delivery, so your service providers and technicians can focus on exceeding employee service expectations.
The Echo Chamber: Visibility and Mapping Webinar
August 6, 2018
Leon Adato

“The Echo Chamber” is a semi-regular series where I reflect back on a talk, video, or essay I’ve published. More than just a re-hashing of the same topic, I’ll add insights as to what has changed, or what I would say differently if I were doing it today.

How Well Do You Know Your IT Environment?
August 3, 2018
Tom Hollingsworth
Do you know what’s in your data center? How about your wide area network (WAN)? If you had to draw a map or produce a list of all the things…
How to Plan for Major Incidents in ITSM
August 2, 2018
Tim Lawes
A “major incident” can be a nightmare for any business – that much seems agreed upon. In practice, however, defining what a major incident is and how to respond to…
1138181