Operations | Monitoring | ITSM | DevOps | Cloud

How CSPs Can Drive Digital Transformation & 5G Success with Automation

Light Reading’s Phil Harvey recently sat down with Resolve’s Larry Lien at Network Virtualization and SDN Americas to explore how communication service providers (CSPs) are benefitting from automation, what types of processes can be automated, how to successfully navigate the automation journey, and how Automation Centers of Excellence can accelerate digital transformation.

The 5 Keys of a Successful ITAM Execution Framework

IT Asset Management (ITAM) is a deep and broad topic and like a lot of terms in our industry, it can mean different things to different people, so it is important to draw a line in the sand and establish a common denominator for the discussions by understanding what aspects are important to your organization, and more importantly why?

8 Citrix Virtual Apps and Desktops Policies You Should Consider Tweaking

You have just deployed a new Virtual Apps and Desktops Site for your customer. You thought about what policies should apply in the environment, however you can’t possibly know them all. So, what you will want to do is to before deploying anything to end-users is shift through all the Citrix Policies on offer and configure them appropriately based on business needs and end-user requirements. There are many policies available. Luckily, you will likely not need to touch 80% of them.

NGINX vs Apache - Which Web Server Is Right for You?

Today's IT and DevOps teams have not one, but two, feature-rich open source Web servers to choose from: NGINX and Apache HTTP Server (which is often called simply "Apache"). At a high level, both platforms do the same core thing: Host and serve Web content. Both also offer comparable levels of performance and security. Yet when you dive into the details, you'll find that there are many differences between NGINX and Apache.

Vagrant vs. Docker: Which Is Better for Software Development?

The last fifteen years have seen huge increases in developer productivity for several reasons, including the arrival of open source into the mainstream and the ability to better emulate target environments. In addition, the process of resetting a development environment back to the last known stable version has been vastly improved by Vagrant and then Docker.

Top 10 Web Applications for Data Visualization

Data visualization is an essential concept in the field of data science. So much so that whenever you want to analyze any set of data, you must always incorporate data visualization. Regardless, the majority of people still do not have a proper understanding of this concept and how to implement it. Therefore, in this article, we define data visualization and examine ten website applications for performing it.

Improving IoT security with log management

The Internet of Things (IoT) revolution has set the beginning of a new age of data transfer. Each day, a massive number of new devices get added to all kinds of network infrastructures, transferring gargantuan amounts of data back and forth. In the next decade, we expect the number of IoTs to grow to a staggering 80 billion connected devices – practically outnumbering the human population tenfold.

re:Invent Serverless Talks - Serverless SaaS Deep Dive

Have you ever have that dream where you’re in a class on Classical Tibetan Algebra? And you haven’t done any homework all semester? AND it’s the final? That was me in this session: I was WAY in over my head with this one. Tod Golding’s material was so high-level that I got a nose bleed. Seriously. My nose started gushing 10 minutes in. This Portland dewdrop is NOT used to the dry desert and casino AC air.

Monitor AWS IAM Access Analyzer findings with Datadog

As you monitor the health and performance of your infrastructure and applications, you also need to be able to identify potential threats to the security of those components. To help address this challenge, we’re pleased to announce that Datadog now integrates with AWS Identity and Access Management (IAM) Access Analyzer, a new IAM feature that helps administrators ensure that they have securely configured access to their resources.

Where is the enterprise network market heading in 2020?

The networking field is changing quickly with the emergence of new technologies. This change, along with the onset of digital transformation and increasing cloud-adoption, highlights how businesses have realized the importance of the third platform, as it interconnects mobile computing, cloud computing, social media, and information analytics. 2019 has been the year of edge computing and the dawn of the SD-WAN.