IDC: Unlocking the Power of SaaS and AI: The Next-Generation of Intelligent Applications (March 27th)
IT - Operations

Migrate Off That Old SIEM Already!
Medium, Monday, February 5th, 2024
This is cross-posted from Google Cloud Community site, and written jointly with Dave Herrald.

If you are like us, you may be surprised that, in 2024, traditional security information and event management (SIEM) systems are still the backbone of most security operations centers (SOC). SIEMs are used for collecting and analyzing security data from across your organization to help you identify and respond to threats quickly and effectively.

But if you're still using an outdated SIEM, you're putting your organization at risk 'A.C. - are we a bit harsh here? Frankly no! If your SIEM takes a lot of efforts to maintain, whether on-prem on or via poorly engineering cloud model, you are not spending that time and effort on countering the bad guys'.


Data Center Sustainability Predictions, Hopes, And Questions For 2024
DataCenter Knowledge, Tuesday, February 6th, 2024
Industry experts outline the key challenges and opportunities for data center sustainability in 2024.

Amid the rapid growth of AI and video-streaming sectors, analysts look ahead to some of the most promising data center sustainability developments and forecast what work will need to be done for the industry to move closer to reaching its green aspirations.

Expect Innovations in Liquid Cooling Products and AI

Greater adoption of liquid cooling solutions is one of the innovations Dan Thompson, Principal Research Analyst for Data Centers at S&P Global Market Intelligence, believes will drive energy efficiency across the industry.


8 Dangers Of Shadow IT And How To Manage Them
SearchCIO, Tuesday, February 6th, 2024
Unauthorized devices, software and system changes -- and other forms of shadow IT -- can expose organizations to a range of security risks. Here are ways to manage them.

If an ounce of prevention is worth a pound of cure, then CIOs and their teams should be aware that allowing shadow IT can weaken an organization in more ways than one. But there are ways to minimize or eliminate the dangers.

Shadow IT occurs when employees get frustrated by the IT department's slow response to trouble reports, refusal to update a system or another situation where IT is not accommodating user requests or complaints. This frustration can result in the creation of an invisible or "shadow" IT activity, usually by employees with IT skills willing to bypass IT policies and procedures to get what they want.


13 Application Monitoring Best Practices For Enterprises
Solutions Review, Wednesday, February 7th, 2024
Application monitoring is a systematic process that involves tracking and analyzing various aspects of a software application's performance, behavior, and health.

It encompasses the continuous collection, measurement, and interpretation of data related to an application's infrastructure, code execution, user interactions, and overall functionality. The primary goal of application monitoring is to ensure that the application operates efficiently, meets performance expectations, and remains available to users without disruptions. It involves the use of monitoring tools and solutions to gather real-time insights into metrics such as response times, error rates, resource utilization, and user satisfaction.

See all Archived IT - Operations articles See all articles from this issue