Bob Aiello explains that software engineers and architects do an amazing job designing a system’s architecture that fully represents all of the parts of the system that are created during the development lifecycle. However, one of the biggest challenges is understanding how each part of the system depends upon the others.
Andrew Phillips details the challenges and advantages of two specific approaches to automating server management: agentless and agent-based automation. Agent-based automation refers to when a small piece of software—called an agent, service, or daemon—is installed on each target server, whereas agentless management automation software interacts with the remote-control functionality built into each host-operating system to perform the administrative tasks.
David Lawton writes that with a few changes to capital project business processes and the implementation of a content management interoperability services (CMIS) database, operations content can be extracted directly from originating tools and populated into a data model that helps operations manage the lifecycle configuration. Consuming the project content during the project provides a vehicle to transform and feed subsequent processes.
Target’s well-publicized disclosure that customers’ personally identifiable information (PII) had been compromised is the latest software “glitch” that is getting a fair amount of attention. Read on if you would like to know how to secure your systems without having to rely upon security scans that only detect the presence of a problem after it is already on your server.
Technology-driven companies, regardless of size and scale, are facing the increasing need to ship better code faster while meeting business requirements. This requires collaboration and interaction among the traditional information technology infrastructure library (ITIL), information technology service management (ITSM), and development teams for a truly agile organization to emerge.
In 2013, we saw a remarkable number of system glitches involving large trading systems and the exchanges themselves along with a significant number of large banking systems. Bob Aiello writes how these incidents put DevOps best practices and configuration management in the spotlight of many technology reports.
James Sullivan explains popular agile frameworks and outlines their costs and benefits. If you're worried that you are at a place where you cannot make the sort of investments that these agile frameworks require, James is here to discuss foundational agile practices that can provide you key benefits without the costs associated with these kinds of agile brands.
Analytics-driven management stands to end the key challenges that constrain change and configuration management. By applying powerful analytics to the overwhelming change and configuration data, IT Operations Analytics (ITOA) technology can turn massive amounts of information into clear, actionable insights.
Many large-scale projects require a remarkable number of deliverables that can be challenging to manage and maintain. This article explores the facility capital project information and the need for the owner/operator (O/O) to explore the individual deliverable documents to develop a listing of digital content necessary to support facility lifecycle processes.
Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed.