IT Operations Management

Each IT environment is unique.  And while monitoring solutions often provide hundreds of agents to monitor different aspects of your environment (or take an agentless approach)—there is always a need to customize your monitoring solution to fit your IT environment.  Sometimes, this is done through configuration changes. However, configuration changes usually only get you so…

+ read more

wheaps
By: wheaps
Sep 27, 2017
12:56 pm
Reads:
363
Score:
5

I haven’t blogged in quite some time. I was looking around at some of my old blogs and wondered if my account was still active. As you can see, I was able to log in. I figured, what the heck, why not do a blog… here you go! I’ve been doing a lot of work…

+ read more

Tobin Isenberg
Sep 5, 2017
2:55 pm
Reads:
291
Score:
2

During the month of July, we hosted an essay contest inviting employees and customers to describe why they loved using Micro Focus products. We received a number of great responses and are excited to announce the winners.

netiqcoolguys
Aug 17, 2017
10:20 am
Reads:
2,123
Score:
5

During the month of July, we hosted an essay contest inviting employees and customers to describe why they loved using Micro Focus products. We received a number of great responses and are excited to announce the winners.

netiqcoolguys
Jun 30, 2017
9:35 am
Reads:
814
Score:
Unrated

Customers often employ virtualization technologies (for example, Citrix and VMWare) to rapidly deploy servers with pre-installed software. NetIQ AppManager supports this practice, but requires a unique identity for each physical and virtual agent computer. Upon initial agent startup and communication with the management server, AppManager stores a unique AgentID in the Windows registry. Because AppManager…

+ read more

By: stagga
Jun 28, 2017
4:05 pm
Reads:
368
Score:
5

Today’s “always on, always available” business culture has unintended consequences for your IT team.  IT services are expected to be instantly available at all times—and the first line that normally gets hit with complaints and ire is your IT Help Desk.  If your goal is continuous IT service delivery, then surely an important area to…

+ read more

wheaps
By: wheaps
May 19, 2017
2:08 pm
Reads:
2,213
Score:
Unrated

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
1,282
Score:
5

More and more organizations are digitally transforming their business by moving to the cloud.  This isn’t surprising—but it does present a challenge to the IT team who is increasingly becoming a “broker” for these cloud services.   IT (despite not controlling the underlying infrastructure, platforms, or even applications providing the cloud service) is still on the…

+ read more

wheaps
By: wheaps
May 3, 2017
3:17 pm
Reads:
1,234
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow