John Fulton
Discovering Discovery: Selecting IT Discovery Tools Made Easy
BY John FultonJohn Fulton

Why the Confusion? (Part 1) This is the first of two blogs covering the common challenges in selecting the right discovery tool(s), why there can be confusion, and where to start with your own evaluation or assessment. The subsequent blog will provide more prescriptive guidance around evaluating and selecting discovery tools along with a pragmatic approach for peaceful co-existence when multiple tools are involved. Just like an opinion, everyone’s got one Some organizations collect them like individuals who collect bobbleheads or PEZ dispensers. Often, they arrive with high expectations (picture an ‘easy’ button) spreading across your environment and sometimes they have a love-hate relationship with your network and security teams. I’m not talking about IT personnel. I’m talking … [Read More]

Server Consolidation: 6 Steps for Addressing Server Sprawl
BY Joe RoushJoe Roush

Everyone who has ever been a systems administrator or infrastructure manager has at some point experienced server sprawl. Over the past few years, technologies like virtualization, Docker and cloud services have come along to help address this challenge. … [Read More...]

Data Breach Conundrum – Who’s on First?
BY Bev RobbBev Robb

The first recorded data breach of our century occurred in 1984 at TRW, a credit reporting agency. One stolen password posted to an electronic bulletin board could have permitted access to the credit histories of 90 million people. Computer experts warned that … [Read More...]

DevOps Engineer Roles and Responsibilities
BY Stephen WattsStephen Watts

DevOps isn’t magic, but it can look like it from the outside. In today’s job market, workers in innovative fields are creating new roles for themselves. The role of DevOps Engineer is one example. The DevOps Engineer is truly a renaissance person of cloud … [Read More...]

Introduction to Neural Networks Part II
BY Walker RoweWalker Rowe

In the previous post we introduced the concept of perceptrons, which take inputs from simple linear equations and output 1 (true) or 0 (false). They are the left-hand side of the neural network. But as Michael Nielsen explains, in his book, perceptrons … [Read More...]

Forrester Research: The Benefits of Enabling DevOps Through Jobs-as-Code
BY Tina SturgisTina Sturgis

BMC recently commissioned Forrester Consulting to conduct an independent evaluation of the benefits a Jobs-as-Code approach creates in driving greater efficiency across the software development life cycle (SDLC). They started with this hypothesis – by adopting … [Read More...]

When Delivering Medical Technology Products, Delay is Not an Option
BY Patrick McDonaghPatrick McDonagh

Boston Scientific Corporation has been a global medical technology leader for more than 35 years. Medical professionals worldwide use our stents, catheters, pacemakers, forceps, needles, and many other products to diagnose and treat 22 million patients a year … [Read More...]

Hackers Have Gone Into Uber Drive: How You Can Protect Yourself
BY Roger HellmanRoger Hellman

At the risk of sounding like a geek, I could not help but notice the discussion about whether the 2016 Uber hack was ransomware or just extortion. I searched the web and the consensus definition of ransomware is “a type of malware that encrypts files so they … [Read More...]

AIOps Leverages Natural Language Processing for Service Tickets
BY Patrick CampbellPatrick Campbell

As IT service delivery becomes more complex and dynamic, forward-thinking IT leaders are turning to Artificial Intelligence for IT Operations (AIOps). By leveraging machine learning and analytics on a big data platform, AIOps can help to resolve IT issues more … [Read More...]

4 Ways to Reduce the Pain of Multi-Cloud Compliance – Take the Trial and Learn How
BY Shawn JaquesShawn Jaques

Staying ahead of the competition in digital business means that companies must continually innovate and deliver improved services and products to the market. The speed and agility of public cloud has proven to be a cost effective, flexible platform, but it has … [Read More...]

Breach Recovery Checklist For You And Your Company
BY Scott N. SchoberScott N. Schober

No business or individual is immune to a cyber breach, yet I hear many people say they don’t think they will be affected. They believe that their company does not have anything valuable enough to be stolen, but every company and individual has data that is … [Read More...]