Configurations are an integral part of network devices, and it’s important to keep a watchful eye on these configurations to ensure networks function seamlessly. However, pouring over configurations can be quite a time-consuming...
Sizing up the CCPA: How the USA’s new privacy regulation measures up against the GDPR
The California Consumer Protection (CCPA) act took effect on January 1, 2020, and companies across the globe are scrambling to get their act together to...
Five worthy reads: Mastering cybersecurity with AI and machine learning
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the escalating...
How to build a successful ITSM practice
Imagine you’re in an IT service desk team facing one of the following situations: 1. A major incident impacts your service availability and brings down half...
Five worthy reads: The road to empowering employees through data democratization
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In the first Five worthy reads of...
The Vanadium: Windows 10 1909 feature pack rollout
The bi-annual feature update of Windows 10 has officially rolled out to mainstream users. With all the prerequisites met, the feature pack can be automatically downloaded and synchronized from...
Five worthy reads: Insider threats—what’s in the cards for 2020?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the growing...
Stopping shadow IT from looming over the cloud
After ages of struggling to get VPNs to reach work resources remotely, none of us could have dreamt of the sheer simplicity cloud applications are offering us right...