Joy Su
Panic-Free Audits: Staying Endpoint Compliant in an Increasingly Complex Environment
BY Joy SuJoy Su

When you hear of an upcoming audit, the first reaction is usually panic. It can take a lot of ongoing effort to maintain audit readiness over time—it’s definitely not the kind of thing you can prepare for overnight. Doubts creep in: Are we up-to-date on all our requirements, and in full compliance with SCAP, SOX, PCI, or HIPAA? How many new devices have we added since the last audit and are they all compliant? The list of potential device compliance pitfalls grows longer every day, and as your IT environment grows, managing all these areas gets more and more difficult. It’s no wonder organizations are now giving extra scrutiny to security threats and vulnerabilities. According to a recent Forbes Insights Survey on SecOps, in 2016, 60% of enterprises increased their emphasis on … [Read More]

GDPR, a price worth paying?
BY Alan WarhurstAlan Warhurst

With all the focus on data privacy and the increased cost and efforts organizations are putting into it, do we really need ANOTHER piece of legislation to have to comply with? I’ve spent the last twelve months following the GDPR story. At first it was part … [Read More...]

Cloud-based ITSM: The Competitive Equalizer for Mid-Market Companies
BY Kellyann LanspaKellyann Lanspa

This blog is the first in a three-part series on IT service management for small-to-medium enterprises (SME), in which we’ll discuss how medium-sized organizations can achieve both enterprise-class IT excellence and digital-native agility. In this installment, … [Read More...]

Enterprise Architecture Frameworks (EAF): The Complete Beginner’s Guide
BY Stephen WattsStephen Watts

Today’s computer and technology systems are complex – especially when they are responsible for so much of the productive activities within most organizations. Physical and cloud servers, applications, and enterprise software all must communicate and share data … [Read More...]

Machine Learning, Data Science, Artificial Intelligence, Deep Learning, and Statistics
BY Seth PaskinSeth Paskin

Machine learning. Data science. Artificial intelligence. Deep learning. Statistics. Most organizations, companies and individuals today are using these technologies – whether they know it or not. If your work involves computers, you’re likely familiar with at … [Read More...]

Building an IT Network for a Remote Facility
BY Joe HertvikJoe Hertvik

Let’s assume your organization is expanding. It’s adding a new processing facility or distribution center. As the IT Operations (IT Ops) group, your job is to add this new location to your corporate network, so they can enter, process, and ship orders, as well … [Read More...]

The Modern Family: IT Asset Management and Service Management
BY John FultonJohn Fulton

Do opposites really attract? Service management has evolved from humble beginnings as a “help desk” supporting the operational back office to handle internal IT support tickets. Today it is a modern solution which has shifted service management to the front … [Read More...]

Google Natural Language API and Sentiment Analysis
BY Walker RoweWalker Rowe

Here we discuss Natural Language processing using the Google Natural Language API. Our goal is to do sentiment analysis. Definition Sentiment analysis means seeing whether what someone writes is positive or negative. Business can use this to look at Twitter, … [Read More...]

3 Benefits of Tightly Coupling Service Desk to Endpoint Management
BY Raphael ChauvelRaphael Chauvel

For many professionals, the service desk represents the face of IT. The quality of the service desk experience will go a long way in defining the perception of the whole IT organization—especially for millennials who’ve grown up with technology and become … [Read More...]

The Network Troika – Security Availability and Performance
BY Bronna ShapiroBronna Shapiro

2017 was a banner year when it came to security breaches, but not in a good way. It has been reputed that ransomware netted $2 billion, which is 50% higher than in 2016. Thus, security is top of mind for both businesses as well as consumers - and it applies to … [Read More...]

GDPR – Some data recovery implications (part 3)
BY Phil GraingerPhil Grainger

Why Do I Need to Repeat Recovery Testing for GDPR? As we saw in my last blog on recovery and GDPR, the relevant part of the regulation says a company must have: “…. a process for regularly testing, assessing and evaluating the effectiveness of technical … [Read More...]