Using AIOps

AIOps Automating routine practices, Improving the accuracy and time to identify issue and the ability of teams to work together

Security Tips for the Season

Illegal activity has progressed to the digital world, at the speed of e-business. Today it may well be the biggest industry sector out there. Stealing personal information and selling this on illicit dark websites is big business, as is creating and selling techniques to phish, deliver illicit payloads, and of course creating the illicit payloads [...]

Operational Data Provides a New Dimension to Security

Those who wish to harm your business are the proverbial needle in a haystack, and it’s been much easier to be the needle and hide than to be those hunting through the hay. Being small in a large environment makes it much easier to be sneaky. But there are some complex indicators of intrusion that [...]

Improving APM

We all know that when you add lanes to a highway, the improvement in journey time is short lived, as more vehicles start to use the new road, creating more traffic, there are then more chances for accidents and this results in slower journey times. The same seems to happen with technology, Moore's law is the [...]

How long will your users wait?

As businesses transition to embrace cloud services, application solutions are becoming significantly more complex and federated. Every additional component stitched to the core application can potentially introduce unforeseen nuances that can lead to unexpected events that cause issues. The basic relationship between any components you add to a process is geometric. Simply speaking, every component [...]

Can Good Ideas Survive Your Experts Scrutiny?

The history of computing can be described as waves. The first waves were purely of invention of basic ideas, where cogs gave way to vacuum tubes which gave way to transistors, and magnetic core memory gave way to dynamic RAM. The next waves created scale, where individual components gave way to integrated circuits and silicon [...]

Are you being courted by a buggy-whip vendor?

There was a time when buggy-whips were the height of technology. If you wanted your horse and cart to go faster, you invested in a better buggy-whip. And then came the automobile, and all of a sudden buggy-whips were obsolete; It really doesn’t matter how hard you whack a lump of iron exploding the remains [...]

Don’t get caught in the Splunk vs ELK trap

Being able to interrogate data about transactions that take place in your IT applications is critical when you need to ensure performance, availability, security and a desired user experience. Many companies have considered the two choices that are most often discussed, namely Splunk and the Elastic Stack. Both of these choices offer a pathway to [...]

Health Information Governance Strategies for Unstructured Data

Information governance becomes particularly important when exploring the use of unstructured data for healthcare analytics. While electronic health records still have the potential to standardize care by enabling advanced analytics and informing clinical decision-making, much of the data held within these systems – and a large proportion of the data used in conjunction with these [...]

How Businesses Are Using AI and Machine Learning to Leverage Events

How Businesses Are Using AI and Machine Learning to Leverage Events As professionals across disciplines in the healthcare, retail and financial services industries embrace data-driven decision-making and begin to experience the power of precision available at their fingertips, more marketers are turning to artificial intelligence to improve the efficacy of many parts of the sales [...]