Tag: IT

Startups Are Re-Defining Cybersecurity As A Driver For Growth

Startups Are Re-Defining Cybersecurity As A Driver For Growth

Imagine a world where businesses execute strategies without worrying about securing data. Now imagine a world where fast paced cybersecurity capabilities enable trusted data to become a source for growth. Guess what? Both are possible today.

AIOps: Hollywood Myth Versus Practical Reality

AIOps: Hollywood Myth Versus Practical Reality

When you say the words “artificial intelligence,” what comes to mind for many is some sort of super intelligent machine life-form we’ve all seen in sci-fi movies, a being that knows more than we do and can do more than we can. Complete awareness and interpretation of its environment, rapid learning and adaptation, and incomprehensibly fast cycling through the orient-observe-decide-act loop are implied AI characteristics in most films.

AIOps uses AI, automation to boost security

AIOps uses AI, automation to boost security

AIOps – When the 2020 coronavirus pandemic forced workers across the United States to stop congregating in offices and work from home, Siemens USA was prepared to protect its newly remote workforce and identify and repel potential data breaches.

Lessons from the DevOps shop floor

Lessons from the DevOps shop floor

DevOps – Recently I’ve been investigating just how much time and effort companies put into building, configuring, using and maintaining their messaging middleware environments. And here’s what I’ve discovered.

Is Observability the New Monitoring?

Is Observability the New Monitoring?

Monitoring – Since rejoining Nastel, after a long period away in the cloud, I’ve been wondering why people are now talking about ‘observability’ when they used to talk about ‘monitoring’. Why is there a new term? A new piece of technical jargon. I’ve been reading up on it and it seems that each vendor describes it slightly differently, and amazingly that difference is the key feature that makes their product different to everyone else’s. Some are talking about Java byte code instrumentation, some are talking about the complete absence of instrumentation – inferring things from the outside, some talk about Artificial Intelligence, some about DevOps. Some think observability is seeing the end to end application whereas monitoring is seeing the low level IT.

Why Do IoT Efforts So Often Fail? It's Complicated (In More Ways Than One)

Why Do IoT Efforts So Often Fail? It’s Complicated (In More Ways Than One)

I met recently with the CEO of a large company who had quite a story to tell. His company had launched about 300 Internet of Things (IoT) projects. Each time, he said, they failed.

Five Building Blocks For Accelerating Digital Transformation (Even In A Pandemic)

Five Building Blocks For Accelerating Digital Transformation (Even In A Pandemic)

Over the past few months, Covid-19 has been credited as the driving force leading digital transformation for many companies. Organizations that were not already pursuing digital innovation have been thrust into the digital arena and forced to make rapid changes. Regardless of what their strategy looked like coming into 2020, today’s leaders are managing an accelerated pace of change as everyone seeks to serve customers in new ways.

IoT Investment Is Not Just About The Money — It's About The Time

IoT Investment Is Not Just About The Money — It’s About The Time

In 2019, Vodafone’s annual Internet of Things (IoT) barometer (registration required) reported with optimism about the impact of the IoT as adoption surged during the year. After surveying close to 1,500 qualified executives involved in shaping their company’s IoT strategy, suppliers and requirements across a variety of industries and regions, Vodafone found some 34% were already using IoT solutions, and of those, some 76% described their IoT project as mission-critical.

6 Lessons IT Security Can Learn From DevOps

6 Lessons IT Security Can Learn From DevOps

DevOps has largely taken over the enterprise software development world. The mashup of software development and IT operations has brought faster software releases and more responsive application development to many organizations. And we know the big question left on everyone’s minds: What lessons can IT security learn from all of this?

The secret to exploiting your investment in messaging middleware!

The secret to exploiting your investment in messaging middleware!

Messaging Middleware – Large enterprises generally expend about ¼ of their entire IT budget on the systems and processes to connect the disparate systems that make up complex application stacks.