Strategies for discovering and modernizing Legacy Workloads

Strategies for discovering and modernizing Legacy Workloads

IT teams are constantly being asked to do more with less. Eliminate bottlenecks. Speed processes. Bring solutions to the company faster. Unfortunately, many IT organizations are weighed down by legacy workloads. These entrenched processes can sometimes be the source...
The 14 Key Competencies of SAM (and ISO 19770-1:2017)

The 14 Key Competencies of SAM (and ISO 19770-1:2017)

You may have stumbled upon this blog and wondered, “What is ISO 19770-1:2017? Am I in the wrong place, or should I have prior knowledge in order to keep reading further?” Don’t worry, while this blog will be applicable to those who have experience, it’s all about how...
WHY YOUR DISASTER RECOVERY PLAN MUST INCLUDE INVENTORY TRACKING

WHY YOUR DISASTER RECOVERY PLAN MUST INCLUDE INVENTORY TRACKING

Disaster recovery needs to start with a pinpoint-accurate IT inventory. If you restore from backup–without restoring everything from backup–then it will throw a wrench in your dependencies. Worst-case scenario: the outage lasts longer and is harder to fix. Disaster...
THE BIGGEST SECURITY RISKS FOR REMOTE DATA CENTER MANAGEMENT

THE BIGGEST SECURITY RISKS FOR REMOTE DATA CENTER MANAGEMENT

Security is paramount in remote data center management. Administrators must do everything in their power to prevent a doomsday scenario in which attackers are able to steal credentials and take control of the access points that are used to control the data center...
PROTECTING IT THROUGH THE CORONAVIRUS OUTBREAK

PROTECTING IT THROUGH THE CORONAVIRUS OUTBREAK

As of this writing, we are about three months into the COVID-19 epidemic. You’ve been working from home for at least a quarter. Some of your workers, depending on where you live, may even be filtering back into the office. If you’ve lasted this long without a data...