IT service management (ITSM) is a general term that describes a strategic approach to designing, delivering, managing and improving the way businesses use information technology services. Continued…
Quote of the Day
“ITSM addresses people, processes, technology and suppliers, as these all are part of the end-to-end value stream.” – Gary Case
A fine-tuned change request template minimizes user discontent
Follow this example to make a useful, direct and simple change request template for everything from device requests to application upgrades.
An ITSM program evolves from subpar to superb
Lone Star College CIO Link Alander, using software from ServiceNow, has developed a first-class ITSM program that’s driving a service approach across college departments, from legal and finance to HR.
Texas college CIO pushes into enterprise service management
In part two of this ITSM case study, CIO Link Alander describes how he has extended his mature ITSM program to get a real-time grip on big IT projects and launch an enterprise service management approach for automating business processes in other departments.
3 stages of ITSM and 5 ways to enhance your ITSM strategy
Dennis Drogseth of Enterprise Service Management Associates explains the three stages of a typical ITSM program, from help desk to service desk to business-aligned ITSM. In this expert tip, he also offers five ways to change your ITSM strategy from a reactive help desk to business driver.
What are the benefits of ITSM for fast-moving businesses?
‘Better, faster, cheaper’ is what companies should expect from a well-run ITSM program, according to ITIL expert Gary Case. But for many organizations, it will take resources and training to get there. Here are six benefits of ITSM that will help CIOs make the case.
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
b. a while
Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible. Continued…
Quote of the Day
“Storage at the edge continues to grow in a lot of ways, both for video surveillance, telemetry and actual applications that are being pushed to the edge, such as clickstream analytics happening in near real time.” – Greg Schulz
7 key questions IoT storage designers must answer
Don’t skip these considerations when planning your organization’s IoT storage. Get a complete understanding of your data and how it’s collected, processed, analyzed, managed and secured to determine the right kind of storage.
Managing storage for IoT data at the enterprise edge
Managing data storage for IoT applications has businesses and vendors rethinking all the aspects of edge computing in this new age of enormous and endless data generation.
Edge computing technology can ease bandwidth pressure points
Storage professionals weigh in on the benefits of edge computing technology, where it works best and when it should take a back seat. IoT data is one prime use case for storage at the edge.
Fog computing brings new business opportunities and disruptions
As fog computing has to play a role in an IoT world, we need to start talking about the business opportunities and disruptions fog computing will bring.
IoT initiatives and other emerging workloads force data center change
Digital economy trends, such as IoT initiatives and other emerging workloads, are linked to software-defined storage and cloud use that’s changing the nature of IT.
If you don’t _______ your data effectively, you risk losing it.
b. back up
Supervised learning, in the context of artificial intelligence (AI) and machine learning, is a type of system in which both input and desired output data are provided. Continued…
Quote of the Day
“Software developers in organizations that pursue an ML/AI strategy must know what is involved in supervised machine learning to become part of the process.” – Torsten Volk
How to make a wise machine learning platforms comparison
Making an effective machine learning platforms comparison begins with identifying important machine learning platform features, including data, automation, integration and ease of use. Organizations should also examine algorithm and model support.
What developers must know about supervised machine learning
An ML/AI process can only get so far teaching itself. Expert Torsten Volk outlines how developers perform supervised machine learning.
What do businesses do with the top machine learning platforms?
It sounds like the stuff of sci-fi, but machine learning is everywhere. The top machine learning platforms enable everyday technologies like recommendation engines, chatbots, email spam filters and even self-driving cars.
Machine learning in networking: What’s the next step?
The benefits of machine learning in networking are multifold, but often networks themselves must change to enjoy the advantages.
How to win in the AI era? For now, it’s all about the data
In today’s AI era, data is what will separate winners from losers in the race to exploit artificial intelligence, according to deep learning pioneer Andrew Ng.
Some employees fear that computers will take over their jobs with the _______ of machine learning, but that is not the case.
Google Duplex is an artificial intelligence (AI) chat agent that can carry out specific verbal tasks, such as making a reservation or appointment, over the phone. Continued…
Quote of the Day
“By relegating synthesized digital-assistant voices to history’s dustbin, Duplex has leapt over that uncanny valley clear to the other side.” – James Kobielus
Bot security through AI openness
As the use of AI systems increases and worries about AI and bot security mount, some organizations are looking to boost AI openness to handle potential security problems.
Vendors race to adopt Google Contact Center AI
Leading contact center vendors, including Cisco and Genesys, were quick to adopt the Google Contact Center AI platform, which was released this week.
Addressing the ethical issues of AI is key to effective use
Ethical issues of AI loom large as enterprises roll out new technologies that have the potential to trick people into thinking they’re human and to function with greater autonomy.
Predictions on a silver platter: How AI Is creating more effective human interactions
Artificial intelligence can help service providers anticipate what customers need and want before the customer even knows. Sisense’s Guy Levy-Yurista examines how AI will offer high-value service.
Threats of AI include malicious use against enterprises
Businesses need to be aware of the potential threats of AI as the technology becomes more prevalent and the bar for effective use drops, enabling anyone with malicious intent to orchestrate sophisticated attacks.
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware. Continued…
Quote of the Day
“A VNF refers to the implementation of a network function using software that is decoupled from the underlying hardware. This can lead to more agile networks, with significant Opex and Capex savings.” – Darien Hirotsu
AT&T Spark highlights big changes in networking market
At the AT&T Spark event, executive Amy Wheelus explained how AT&T has redefined the role of networking vendors, as it revamps its data centers to support future 5G applications.
Nuage Networks, Talari SD-WAN tack on multi-cloud connectivity
Support for multi-cloud connectivity is the name of the game these days for SD-WAN vendors, as proved by recent announcements from Nuage Networks and Talari.
Service providers use NFV open source to innovate the network
NFV open source deployments grow, as service providers implement it in new applications. But continued code contribution, governing and testing challenges remain.
NFV vs. VNF: What’s the difference?
NFV versus VNF: Is there a difference? The two networking approaches have related but distinct meanings, according to SDN engineer Darien Hirotsu.
Network configuration tools: A primer
Network configuration tools are more essential for engineers now than ever, as networks transition from manual configuration to new strategic approaches.
Application streaming and virtualization can help you _______ greater network efficiency.
Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system. Continued…
Quote of the Day
“To determine how they should schedule Windows 10 updates, IT professionals must understand a number of basic concepts related to Windows as a service.” – Robert Sheldon
Reduce update-related downtime after a Windows 10 OS upgrade
After a Windows 10 OS upgrade, IT pros and users must adjust to the Windows-as-a-service update cadence. Learn how to minimize the downtime associated with updates in Windows 10.
Microsoft subscriptions aren’t right for everyone
Microsoft subscriptions might be the new normal, as the software vendor makes a strong push toward cloud services. Learn what IT needs to know to prepare.
How to solve Windows 10 updates problems
This guide is an all-in-one resource for IT administrators struggling to handle Windows 10 updates problems. Learn how automatic updates work, what problems could crop up and what tools IT can use to solve them.
Configure a complete enterprise DaaS deployment
Planning and constructing a successful enterprise DaaS deployment takes work. Get to know the top vendors and considerations before launching a project.
How do the Windows 10 servicing channels work?
IT can use the features and functionalities of the Windows 10 servicing channels to configure updates for specific groups of devices. Learn about the use cases for each of these update configurations.
The complexity of replacing some legacy systems with new desktops depends on the antiquity of the systems that are still _______.
Buffer overflow is what happens when a program or process attempts to write too much data to the buffer, a segment of computer memory reserved for temporary data storage. Continued…
Quote of the Day
“We are still seeing a lot of the same techniques to hack applications as we have previously seen. For example, buffer overflows, along with poor coding still remain two of the biggest application security issues.” — David Smith
How do buffer overflow attacks work?
Home-grown apps are susceptible to buffer overflows, as are Windows and Linux apps. Part one of this two-part series shows how hackers can take control of your programs.
How can attackers exploit a buffer underflow vulnerability?
A vulnerability was recently discovered in the strong Swan open source VPN, and it caused a buffer underflow. Learn how attackers were able to exploit this vulnerability.
Spectre variant gives buffer overflow a new twist
New variants of the Spectre microprocessor bugs use buffer overflow-style attacks to run malicious code.
The unlikelihood of ‘IoT, secure by design,’ and what we can do about it
The ‘secure by design’ concept is a great idea in theory, but without automatic updates, IoT security will always be an issue. Minim’s Alec Rooney discusses.
Understanding the exploit market: How data breaches happen
Quickly upgrading software with the latest patches is essential when you understand how data breaches happen and how the exploit market can work against you when you have network and system vulnerabilities.
What type of security attack vector exploits the tendancy of people’s desire to be helpful?
Stress testing is the process of determining the ability of a computer, network, program or device to maintain a certain level of effectiveness under unfavorable conditions. Continued…
Quote of the Day
“Stress testing helps determine an application infrastructure’s breaking point and assists in exposing traffic bottlenecks.” – Amy Reichert
Windows troubleshooting tools to improve VM performance
Despite all the technological advancements in the data center over the last several years, administrators still need to roll up their sleeves and look under the hood of VMs with help from these Windows troubleshooting tools to keep workloads running smoothly.
Cloud application performance hinges on a solid testing plan
With the underlying hardware out of their reach, dev teams face a challenge when it comes to ensuring cloud application performance. Learn how quality control testing and related tools can help.
Learn the value of exploratory testing vs. scripted testing
In this episode of the Test and Release podcast, we dive into exploratory testing vs. scripted testing with Matt Heusser of Excelon Development. While each approach can be effective, these software testing methods can also supplement each other.
Five critical tests for cloud application performance, security
To ensure optimal cloud application performance and security, development teams must conduct regular tests around load, latency, user experience and more.
Which software testing tool best fits your project?
Expert Tom Nolle dug deep into two AI strategies and explained which software testing tool is best for your project and organization. Applitools focuses on new technology, while Functionize uses a more traditional style.
Ethical hacking is also known as penetration testing, intrusion _________________.
a. testing, and red teaming
b. testing and red teaming
Google Transfer Appliance is a high-capacity storage server that enables enterprises to transport large volumes of data to Google Cloud Storage. Continued…
Quote of the Day
“Organizations really aren’t all that fired up about migrating core back-end apps to the cloud. It’s the time and expense involved that stops them.” – Melanie Posey
Resistance to all-in cloud ERP systems is large
The big vendors would like customers to become users of cloud ERP systems. The reality is that on premises-to-cloud migrations are difficult, and some companies don’t want core data in the cloud. Hybrid may be the path of many.
Google cloud features evolve to turn up the heat on AWS
Google cloud features evolved significantly in 2017, with new services, such as its sneakernet service and managed instance groups, in an attempt to chase market leader AWS.
Google cloud data transfer appliance eases move to public cloud
Google has added a physical storage device akin to AWS Snowball to speed cloud data transfer from enterprise data centers to Google’s public cloud.
Google Cloud Platform services engage corporate IT
Google Cloud Platform services expanded in scope this year, but the company’s moves to address enterprise IT will make the biggest difference in 2018.
Three questions to ask before you migrate apps to public cloud
Before you migrate apps from on premises to public cloud, answer these three questions about requirements, migration approaches and popular tools.
Cloud computing can help a small business launch ________.
b. more quickly
Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming. Continued…
Quote of the Day
“Employees who copy files into their personal cloud-based file storage services and then access them later for work can unintentionally introduce security breaches.” – Diana Hwang
How does a WDC vulnerability put hardcoded passwords at risk?
Several serious vulnerabilities and a hardcoded backdoor were found in Western Digital’s My Cloud NAS devices and put hardcoded passwords at risk. Nick Lewis explains how this backdoor works and what organizations can do to mitigate it.
Wasabi Technologies eliminates cloud storage egress fees
Startup Wasabi Technologies shifts to a simplified pricing model, with no egress charges. What will it take for the big public cloud providers to follow suit?
How to meet HIPAA compliance requirements with personal cloud storage
As the adoption of personal cloud storage continues to rise, health IT must be discerning in choosing services that meet HIPAA compliance requirements.
Igneous Systems rocks unstructured data protection for NAS
Unstructured data protection provider Igneous Systems adds support for Dell EMC Isilon OneFS, Qumulo File Fabric and Pure Storage FlashBlade. Igneous targets large enterprises and data-centric organizations.
Google dives into elusive cloud file storage market
Storage has become synonymous with the cloud, but Google’s Filestore cloud file storage service highlights one of the major shortcomings across the major public clouds.
Instead of choosing _______ Dropbox, Google Drive and iCloud, people often use more than one cloud storage service.