When Does an Incident Become a Problem?
09/13/18 Dealing with incidents is a common, if not everyday, function of just about every IT department. Incidents may be indicative of underlying problems (and they quite often a…
09/13/18 Dealing with incidents is a common, if not everyday, function of just about every IT department. Incidents may be indicative of underlying problems (and they quite often a…
09/12/18 When it comes to IT, things go wrong from time to time. Servers crash, memory goes bad, power supplies die, files get corrupted, backups get corrupted…there are so many th…
09/12/18 If you use ACID transactional databases, you’ve probably heard of lock wait timeouts and deadlocks. What are these? And how are they different? Inevitably, many of us will…
09/11/18 The question is: How do you approach ITSM and ITIL governance structure in a way that promotes buy-in on all levels of the organization? The post Success Factors for ITSM …
09/11/18 In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your net…
09/10/18 It’s similar to the thought parents think about their kids: “Where has the time gone?” followed by a rush of memories, each one distinct and unique, carrying their own par…
09/07/18 Have you ever read about TV ratings? Almost every person that watches TV has heard of the ratings produced by the Nielsen Media Research group. These statistics shape how …
09/06/18 Key performance indicators (KPI) are values that every business can measure and track – values that show the effectiveness of your performance as an organization toward yo…
09/06/18 In part one of this series, we discussed the different types of databases available on the market today. In part two, we discussed how to choose the right database for you…
09/06/18 In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this p…
This article details how Netflix transitioned from relying on unlabeled data and anomaly detection to a supervised learning approach for identifying faulty deployments. Initially, …
09/05/18 What do The Guru, The Expert, The Maven, The Trailblazer, The Leading Light, The Practice Leader, The Heavyweight, The Opinion Shaper, and The Influencer all have in commo…