IT Operations

More and more organizations are digitally transforming their business by moving to the cloud.  This isn’t surprising—but it does present a challenge to the IT team who is increasingly becoming a “broker” for these cloud services.   IT (despite not controlling the underlying infrastructure, platforms, or even applications providing the cloud service) is still on the…

+ read more

wheaps
By: wheaps
May 3, 2017
3:17 pm
Reads:
622
Score:
Unrated

It’s amazing how little clarity and visibility we have into the true state of any IT environment, despite getting more and more monitoring tools looking at them.  Sometimes, a common cause for this is actually too many monitoring tools.  Each one may be great for its specialized task, but they fail to communicate with each…

+ read more

wheaps
By: wheaps
Sep 26, 2016
3:10 pm
Reads:
975
Score:
Unrated

It’s a complex world out there. There’s no denying it.  This is especially true in the IT world—where admins are expected to keep systems running smoothly.  However, no matter how you slice it: there’s no way around the true complexity of IT. Physical and virtual machines, networks, operating systems, and applications all have to work…

+ read more

wheaps
By: wheaps
Jul 26, 2016
3:38 pm
Reads:
1,142
Score:
Unrated

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
2,403
Score:
5

Is there anything more annoying than using a Unified Communications (UC) or VoIP telephony service—and suddenly everyone sounds like malfunctioning androids trapped in some sort of infinite echo chamber? Hello? (Hello.) Can anyone hear me? Allusions to Pink Floyd aside—even today, UC/VoIP quality is still an issue, despite all the IT monitoring we do. But…

+ read more

wheaps
By: wheaps
Feb 27, 2015
3:30 pm
Reads:
2,383
Score:
Unrated

There’s little doubt we live in a noisier IT world. The simple reason: we have created nosier IT environments. Yes–nosier. As IT professionals, we now have more insight into and more oversight over our infrastructure, systems and applications than we’ve ever had before. We can (and probably do) monitor just about everything nowadays. However, what…

+ read more

wheaps
By: wheaps
Dec 4, 2014
5:42 pm
Reads:
2,437
Score:
5

It’s death by irrelevant data today. I don’t know about you—but I can’t open a web browser, check my email, update my social status or catch up on the news without being inundated by inane information. What?! Another “You Won’t Believe What Happens Next” video? Get outta here! No really, get out of here! Of…

+ read more

wheaps
By: wheaps
Oct 7, 2014
5:32 pm
Reads:
2,125
Score:
5

It’s all the buzz: the battle for the Internet of Things is heating up.  With analysts predicting 50+ billion connected devices by 2020, that’s going to have an impact on your IT world, no matter what happens or who wins. As an IT professional, how can you begin to prepare for the “IT of (Every)thing”—a…

+ read more

wheaps
By: wheaps
Jul 8, 2014
2:02 pm
Reads:
15,036
Score:
Unrated

I had the fantastic opportunity to participate in a live Cloud discussion: Get off my Cloud:  Floating the Risks of Big Data Storage on Huff Post Live during their inaugural week of going live with streaming news and discussions leveraging Google+ Hangouts to bring in live guests. This Cloud and technology thing might be catching…

+ read more

Aug 24, 2012
8:23 am
Reads:
5,100
Score:
Unrated

Travis just posted, “Unlike the Weather, You Can Choose Your Cloud”, discussing the recent power outages we experienced here in the Northern VA area last week. As a native of this area, thunder storms and hurricanes do pass our way and affect us during this time of year. Late May of 2008, we had a…

+ read more

Jul 12, 2012
8:46 am
Reads:
7,833
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow