Operations | Monitoring | ITSM | DevOps | Cloud

AI in the UK: A Panel Discussion on the Future of Artificial Intelligence

Join our AI panel discussion with Josh Mesout, James Faure, Abdul Hummaida, Jonas Vermeulen, and Daniel Miodovnik, as they come together to explore the rapidly evolving landscape of artificial intelligence. The conversation delves into the real-world applications of AI, its future trajectory, and the critical considerations surrounding security, privacy, and responsible AI practices.

Breaking Down the Exposure Management Maturity Model

Register for the next webinar. The Exposure Management Maturity Model is crucial for effective vulnerability management. Organizations face challenges like limited attack surface understanding and the need for better collaboration between security and IT teams. Defining a risk appetite helps prioritize vulnerabilities, while asset visibility and classification identify critical assets. The session emphasizes business-driven vulnerability prioritization and operational remediation strategies, concluding with self-assessment opportunities and the development of risk-based KPIs.

How Asset Management Works: A Beginner's Guide for IT Asset Management

The Secret Behind How Asset Management Works: A Beginner’s Guide for IT Asset Management — In this video, we’ll simplify everything you need to know about IT asset management! Whether you’re a beginner or just curious about how asset management works, this guide will break down the concepts, tools, and strategies used by top organizations to track, manage, and optimize their IT assets. Our expert-led explanation uses real-world examples to help you understand key principles of asset management, so you can start building a smarter IT environment today. Watch till the end for actionable insights and tips you can apply right away!

Towards specialized efficient LLMs: Data Scaling Laws and Sparse Adapters

Welcome to the AI research bites. This series of short and informative talks showcases cutting-edge research work from ServiceNow AI Research team. The AI Research Bites are open to all, especially those interested in keeping up with the fast-paced AI research community.

Kentik in Motion: Unlocking the Power of Data Explorer

Kentik Data Explorer is the heart of Kentik, where raw network telemetry is transformed into actionable insights. Yet many users don’t realize just how much they can do with it, or how Data Explorer connects to other parts of the Kentik platform. In this session, we walk through the fundamentals of using Data Explorer effectively, provide real-world examples, and highlight how it ties into workflows such as alerting, dashboards, and troubleshooting.