Server Consolidation: 6 Steps for Addressing Server Sprawl

BY

Everyone who has ever been a systems administrator or infrastructure manager has at some point experienced server sprawl. Over the past few years, technologies like virtualization, Docker and cloud services have come along to help address this challenge. Nonetheless, at some point either someone is going to say "do we really need all those servers? … [Read more...]

Data Breach Conundrum – Who’s on First?

BY

The first recorded data breach of our century occurred in 1984 at TRW, a credit reporting agency. One stolen password posted to an electronic bulletin board could have permitted access to the credit histories of 90 million people. Computer experts warned that prevention of such incidents demanded greater security. Thirty-three years later—the data … [Read more...]

DevOps Engineer Roles and Responsibilities

BY

DevOps isn’t magic, but it can look like it from the outside. In today’s job market, workers in innovative fields are creating new roles for themselves. The role of DevOps Engineer is one example. The DevOps Engineer is truly a renaissance person of cloud infrastructure IT services. It is often difficult to understand this role because the … [Read more...]

Introduction to Neural Networks Part II

BY

In the previous post we introduced the concept of perceptrons, which take inputs from simple linear equations and output 1 (true) or 0 (false). They are the left-hand side of the neural network. But as Michael Nielsen explains, in his book, perceptrons are not suitable for tasks like image recognition because small changes to the weights and … [Read more...]

Hackers Have Gone Into Uber Drive: How You Can Protect Yourself

BY

At the risk of sounding like a geek, I could not help but notice the discussion about whether the 2016 Uber hack was ransomware or just extortion. I searched the web and the consensus definition of ransomware is “a type of malware that encrypts files so they cannot be opened, and prevents you from using your computer or accessing those files unless … [Read more...]

AIOps Leverages Natural Language Processing for Service Tickets

BY

As IT service delivery becomes more complex and dynamic, forward-thinking IT leaders are turning to Artificial Intelligence for IT Operations (AIOps). By leveraging machine learning and analytics on a big data platform, AIOps can help to resolve IT issues more efficiently and help to identify opportunities for automation. An AIOps platform that … [Read more...]

Breach Recovery Checklist For You And Your Company

BY

No business or individual is immune to a cyber breach, yet I hear many people say they don’t think they will be affected. They believe that their company does not have anything valuable enough to be stolen, but every company and individual has data that is valuable to a cyberthief that they might overlook. While we’re all focused on our money in … [Read more...]