SecOps Response Service Earns Industry Accolades
BY Shawn JaquesShawn Jaques

As today’s high-risk digital environment drives the need for faster, more effective, and more efficient vulnerability remediation, SecOps Response Service from BMC has earned two recent industry awards validating its success in addressing this critical … [Read More...]

Top 5 Cyber Practices To Keep You Safe
BY Scott N. SchoberScott N. Schober

People assume that staying safe from cyber hackers requires a lot of money. While spending money in the right area is important, common sense features costing little to no money and are the most effective defenses to thwart a cyber attack. Let’s face it, no … [Read More...]

What Does a Service Desk Do that a Help Desk Doesn’t?
BY Joe HertvikJoe Hertvik

Many long term IT professionals grew up in an IT Help Desk environment. But as organizations move towards IT Service Management (ITSM) environments, the focus has shifted to providing an IT Service Desk for customers and employees rather than a Help Desk. … [Read More...]

IT Security vs IT Compliance: What’s the Difference?
BY Stephen WattsStephen Watts

For some IT professionals, the line between security and compliance becomes easily blurred and may seem like a moving target. How do we create comprehensive security programs while meeting compliance obligations? Is checking the compliance box really enough? … [Read More...]

Cloud Service Brokerages: How CSB’s Fit in a Multi-Cloud World
BY Stephen WattsStephen Watts

Cloud technology continues to both support and disrupt the evolution of digital business. Not surprisingly, spending on cloud computing infrastructure and platforms is expected to grow at a 30% CAGR from 2013 to 2018 compared with 5% growth for overall … [Read More...]

What is Apache HCatalog? HCatalog Explained
BY Walker RoweWalker Rowe

Here we explain what HCatalog is and why it is useful to Hadoop programmers. Basically, HCatalog provides a consistent interface between Apache Hive, Apache Pig, and MapReduce. Since it ships with Hive, you could consider it an extension of Hive. (We … [Read More...]

IBM’s zIIP for Mainframe Explained
BY Jim DeeJim Dee

  As a follow-up to Phil Grainger’s post about zIIP offload, I thought it was worth spending a few moments to focus on the characteristics of code that can run on a zIIP as well as code that could suffer minimum performance loss if it was rewritten to … [Read More...]

Cloud Governance vs Cloud Management: What’s the Difference?
BY Stephen WattsStephen Watts

While clouds have proliferated in enterprise organizations – public, private, hybrid– it has become increasingly important to define strategy around cloud governance and management. A first step in establishing a successful multi-cloud strategy is simply … [Read More...]

What is Infrastructure as Code? IaC Explained
BY Stephen WattsStephen Watts

Infrastructure as Code, or IaC, is a method of writing and deploying machine-readable definition files that generate service components, thereby supporting the delivery of business systems and IT-enabled processes. IaC helps IT operations teams manage and … [Read More...]

What is Knowledge Centered Support? KCS Explained
BY Stephen WattsStephen Watts

In the 21st century, digital is the way of life, especially inside any business or organization. With significant shifts in innovation and productivity, it seems that support functions can barely keep up. While technical support used to be an internal, … [Read More...]