Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Service Management, Service Desk and related technologies.

SaaS Management Platforms: A Selection of The Best Options For 2026

Managing software subscriptions can get complicated fast. One tool might handle billing, another tracks usage, and before you know it, you're juggling multiple dashboards just to keep everything in check. A SaaS management platform helps bring order to that chaos, giving businesses a clear view of their software ecosystem. We’ve spent years working with IT teams, reviewing solutions, and analyzing what actually makes a difference.

What the Octopus Can Teach Us About AI (w/ Steve Wunker)

Tim and Tom sit down with Steve Wunker — Managing Director of New Markets Advisors, author, and early pioneer of the smartphone — to explore the big ideas behind his latest book, AI and the Octopus Organization. Steve breaks down why AI shouldn’t just “bolt onto” old processes, how distributed intelligence reshapes the firm, and what leaders can learn from one of nature’s most adaptable creatures. From organizational plasticity to the changing role of middle managers, Steve offers a pragmatic roadmap for thriving amid rapid AI-driven transformation.

Shift Happens: How to Make Your ITSM Incidentally Awesome

A modern service desk goes far beyond basic ticketing, serving as the central engine for IT operations. This THWACKcamp session from SolarWinds Day reveals how to streamline and standardize ITSM workflows, transforming the service desk into a strategic asset that eliminates administrative headaches. SolarWinds Sr. PMM Lauren Okruch and THWACK MVP Jeremy Mayfield, Director of IT at National Sugar Marketing, explore how modern service desks go beyond ticketing to become the hub of IT operations.

Secure the Mobile Edge: Android 16 & iOS 26 STIGs Require MTD

Whether it’s Warfighters deployed in the field or remote analysts supporting missions across the globe, mobile devices make these operations possible. But, these endpoints (and your data) need serious protection. That’s where the Defense Information Systems Agency’s Security Technical Implementation Guides (STIG) come in, setting the baseline for hardened endpoint and application security.

Overcoming Common Challenges in Asset Management Software Adoption

In a world full of digital chaos, organization is the key. The same is true for any asset management software. Using asset management software can improve how a company keeps track of its assets, uses them, and meticulously maintains them. But implementing asset management software is not always easy; there may be several hurdles, ranging from technical difficulties to employee resistance to change.

Complete IT Automation with One AIOps Platform. Is It Really Possible?

Today’s IT environments span thousands of devices, hybrid clouds, and distributed teams and complexity keeps rising. That’s why organizations are turning to AIOps-powered automation loops that never stop learning and improving. In this video, we break down how a modern AIOps platform delivers a complete automation cycle: Deep discovery and real-time detection Rapid analysis backed by machine learning Early prediction of emerging issues Instant automation without delays A closed loop that becomes smarter with every repetition.

Alloy Software: Trusted & Secure #soc2 #dataprotection

Choosing the right software vendor is about more than features, it’s about confidence. In this video, we explain what SOC 2 Type II certification is and why it matters when you’re trusting a platform with your operations and data. Alloy Software has completed an independent SOC 2 Type II audit. You don’t need to take our word for it — our security has been validated by an independent auditor. What this means for Alloy Software customers: your data is protected by verified practices for security, availability, and confidentiality, backed by a recognized industry standard.

Understanding External Attack Surface Management: How It Works and Why It's More Critical Than Ever

Attack surfaces can expand without your organization even realizing it. And, lacking visibility into your external-facing assets and the vulnerabilities they may contain can lead to significant security risks. External attack surface management (EASM) is a cybersecurity approach designed to safeguard your external assets and strengthen your organization's overall security posture.

The Rise of Intelligent Asset Tracking: What's Coming in 2026

The year 2026 is set to redefine how organizations approach asset tracking, shifting from basic location monitoring to a predictive, automated, AI-driven ecosystem. Over the past decade, industries have moved from barcode scanning to RFID and IoT-enabled visibility.