Joy Su – BMC Blogs BMC Software Fri, 16 Feb 2018 17:53:25 +0000 en-US hourly 1 Joy Su – BMC Blogs 32 32 Hybrid Cloud vs. Multi-Cloud: What’s the Difference? Thu, 21 Dec 2017 00:00:49 +0000 As cloud computing has proliferated in both scope and popularity, so have the ways in which businesses use the cloud to meet their needs. Today’s cloud ecosystem includes an acronym soup of services – SaaS, PaaS, IaaS, and the like – as well as a variety of different deployment models designed to suit organizations’ unique […]]]> Application Mapping for Multi-Cloud Environments: Start Here, Start There, Start Anywhere Tue, 07 Nov 2017 08:01:40 +0000 Why map? Application maps provide clear visibility into which parts of the IT infrastructure support a business service, from applications in a traditional data center to the various components of your multi-cloud environment. An application map makes it possible to document and monitor business services. It enables IT to assess the impact of potential changes, […]]]> How to Increase Cost Transparency with Asset Discovery and Dependency Mapping Thu, 14 Sep 2017 09:30:20 +0000 IT asset discovery solutions like BMC Discovery add a variety of different benefits to your services and multi-cloud environments – from reducing service outages, to improving security operations, to mitigating shadow IT. But Discovery’s deep well of data can also play a less obvious but just as critical role in your digital enterprise management strategy: […]]]> 4 Critical Capabilities for Deep Visibility and Service Awareness Wed, 13 Sep 2017 08:00:38 +0000 For IT teams, knowing what you have and where it lives used to be a relatively simple proposition. These days, it’s anything but. Your services and infrastructure now reach far beyond the data center into a multi-cloud ecosystem that can encompass private, public, and hybrid clouds – not to mention legacy on-premises applications, technology zombies, […]]]> The Secret Life of Your Network: 9 Threats Lurking in Your Data Center Wed, 17 May 2017 15:46:54 +0000 Picture a place filled with threats both known and imagined. Perhaps it’s a ramshackle house with creaky stairs and dusty furniture; a damp, shadowy basement with ominous shapes looming in the corners; or the deepest depths of the ocean. Or maybe it’s your data center. Yes, even a landscape of soothing hums and flashing lights […]]]>