IT systems management and monitoring
Learn about the tools and technologies that enable more visibility into IT infrastructure, integration between IT management tools, tailored alerts for IT professionals and new areas of performance monitoring and management.
Top Stories
-
Tip
11 Oct 2024
How to evaluate AI for Windows Server environments
Organizations tasked with assessing AI workloads on Windows Server must weigh all the variables to determine the best approach to adopt this budding technology. Continue Reading
By- Dwayne Rendell, Triskele Labs
-
Podcast
11 Oct 2024
SecOps from the IT infrastructure operations perspective
The CrowdStrike outage capped a decade of deepening divide between SecOps and the rest of IT ops -- and should bring about its end, according to one industry veteran. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
18 Jul 2023
real-time monitoring
Real-time monitoring is the delivery of continuously updated data about systems, processes or events. Continue Reading
By- Nick Barney, Technology Writer
-
Definition
18 Jul 2023
flash memory card
A flash memory card -- sometimes called a storage card -- is a small storage device that uses non-volatile semiconductor memory to store data on portable or remote computing devices. Continue Reading
By- Kinza Yasar, Technical Writer
- Garry Kranz
-
Definition
17 Jul 2023
Microsoft System Center
Microsoft System Center is a suite of software products designed to simplify the deployment, configuration and management of IT infrastructure and virtualized software-defined data centers. Continue Reading
By -
Definition
14 Jul 2023
System Restore (Windows)
System Restore is a Microsoft Windows utility designed to protect and revert the operating system (OS) to a previous state. Continue Reading
By- Rahul Awati
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
12 Jul 2023
8 benefits of data center virtualization
Organizations with virtualized data center components can save on hardware, comply easier with regulations and increase speed. Consider virtualization for your infrastructure. Continue Reading
By -
News
11 Jul 2023
Microsoft repairs 5 zero-days for July Patch Tuesday
The company addressed 130 vulnerabilities and provided additional instructions to fully resolve several bugs, which will require extra attention from IT this month. Continue Reading
By- Tom Walat, Site Editor
-
Definition
10 Jul 2023
server hardware degradation
Server hardware degradation is the gradual breakdown of the physical parts of a server. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Brien Posey
- Christine Cignoli, Senior Site Editor
-
Definition
05 Jul 2023
Nagios
Nagios is an open source IT system monitoring tool. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
30 Jun 2023
Alpine Linux
Alpine Linux is a small, security-oriented, lightweight Linux distribution based on the musl C standard library and BusyBox utilities instead of GNU. Continue Reading
By -
Definition
29 Jun 2023
blade server
A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network. Continue Reading
By- Kinza Yasar, Technical Writer
-
Feature
29 Jun 2023
Cued by breach postmortems, fintech refines zero trust
In a quest to continuously improve, Mercury's security leader takes inspiration from other companies' lessons learned, then updates tools and practices accordingly. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
22 Jun 2023
uptime and downtime
In computing, uptime is a measure of how long a computer or service is on and available. Downtime is the measure of how long it is not available. Continue Reading
By -
Quiz
20 Jun 2023
10 WebAssembly questions to test your Wasm knowledge
Test your knowledge of WebAssembly with this tough, ten-question quiz on the benefits and applications of the new Wasm standard. Continue Reading
By- James Montgomery, Senior Features Editor
-
Tip
19 Jun 2023
Explore Red Hat's bring-your-own-subscription model for RHEL
Many organizations use pay-as-you-go models with public cloud providers to run their Red Hat products in the cloud. Explore how bring-your-own-subscription differs. Continue Reading
By- Ryan Arel, Former Associate Site Editor
-
Definition
16 Jun 2023
moves, adds and changes (MAC)
Moves, adds and changes (MAC) refers to a set of tasks that IT teams regularly perform to keep computing equipment up to date and aligned with user and business requirements. Continue Reading
By- Rahul Awati
- Meredith Courtemanche, Director of Editorial Training
-
News
15 Jun 2023
CISA SBOM standards efforts stymied by confusion, inertia
Efforts to establish SBOM standards and guidance have progressed, but unanswered questions persist -- including how the federal government plans to enforce its own requirements. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
15 Jun 2023
When and how to run databases on Kubernetes
Deciding whether to move your database onto Kubernetes requires careful consideration, especially when choosing among deployment options. Here's what to keep in mind. Continue Reading
By -
News
14 Jun 2023
HashiCorp Vault trims SaaS; Boundary hooks up Enterprise
HashiCorp Vault's appeal to a broader field of users gets a boost from a new entry-level cloud service, while a new Boundary Enterprise targets the high end of the market. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
14 Jun 2023
June Patch Tuesday settles two Exchange Server bugs
Microsoft's plans for upcoming security hardening in Kerberos and Netlogon protocols will have admins busy with testing over the next several weeks. Continue Reading
By- Tom Walat, Site Editor
-
Definition
09 Jun 2023
storage pool
A storage pool is capacity aggregated from disparate physical storage resources in a shared storage environment. Continue Reading
By- Sarah Wilson, Associate Site Editor
-
Opinion
08 Jun 2023
ESG study reveals benefits of modern IT service management
ITSM's evolution from a traditional help desk model to an integrated, automated approach has notable benefits for organizations, according to research by Enterprise Strategy Group. Continue Reading
By- Jon Brown, Senior Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
08 Jun 2023
Sysdig CNAPP runtime threat detection wins over BigCommerce
Sysdig's fast, comprehensive data collection, now part of a larger CNAPP product, sealed the deal with the e-commerce company. Next, it might replace vulnerability management tools. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
06 Jun 2023
Compare two Linux security modules: SELinux vs. AppArmor
Use SELinux or AppArmor to protect Linux servers, but examine the differences between them. AppArmor is easier to use but does not give admins as much control as SELinux. Continue Reading
By -
News
05 Jun 2023
Atlassian cloud preps threat tool as security boss departs
Atlassian Beacon shores up cloud security as it adds transparency around security issues, but the chief trust officer role at the company is also changing hands. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
05 Jun 2023
mean time to detect (MTTD)
Mean time to detect (MTTD) is a measure of how long a problem exists in an IT deployment before the appropriate parties become aware of it. Continue Reading
By- Meredith Courtemanche, Director of Editorial Training
-
Definition
01 Jun 2023
AIOps (artificial intelligence for IT operations)
Artificial intelligence for IT operations (AIOps) is an umbrella term for the use of big data analytics, machine learning and other AI technologies to automate the identification and resolution of common IT issues. Continue Reading
By- Kinza Yasar, Technical Writer
- Stephen J. Bigelow, Senior Technology Editor
-
Tutorial
30 May 2023
Manage IT infrastructure with NSX's multi-tenant features
VMware NSX now supports multi-tenancy, which can help admins manage complex IT environments. Explore what's new and get started with this step-by-step walkthrough. Continue Reading
-
Feature
25 May 2023
Learn about the Azure Stack HCI benefits for admins
The hyper-converged infrastructure offering promises to reduce the headaches associated with running virtualized workloads on hardware sourced from multiple vendors. Continue Reading
By -
News
24 May 2023
Event-Driven Ansible early adopters share lessons learned
Beta testers of the new Event-Driven Ansible tool from Red Hat said expanding automation and moving toward self-healing systems requires fresh skills and organizational shifts. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
16 May 2023
How CXL 3.0 technology will affect enterprise storage
Understand CXL 3.0 technology before its impacts on storage take serious effect. While the specification improves on previous generations, it could also demand more from storage. Continue Reading
By- Jim Handy, Objective Analysis
-
Definition
15 May 2023
Microsoft Monitoring Agent (MMA)
Microsoft Monitoring Agent (MMA) is a service used to watch and report on application and system health on a Windows computer. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
12 May 2023
disaggregated server
A disaggregated server is a server whose components and resources are divided into subsystems. Continue Reading
-
Tip
11 May 2023
Follow these steps to decommission Exchange Server
An Exchange Server migration includes a lot of moving parts but it's important to cover the training aspect to make sure your users aren't left behind. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
News
10 May 2023
Cloud repatriation vs. multi-cloud: IT seeks cost relief
Amid fiscal worries, IT orgs reassess cloud investments. Whether they go back on-premises or expand to multi-cloud, they face similar distributed computing management challenges. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
09 May 2023
Light May Patch Tuesday will weigh heavily on Windows admins
A zero-day that targets the Secure Boot feature will require extensive work from sysadmins to protect Windows systems from the Black Lotus bootkit. Continue Reading
By- Tom Walat, Site Editor
-
Definition
08 May 2023
ControlUp
ControlUp is a monitoring software company that sells tools IT professionals can use to manage, monitor and analyze virtual desktop and application performance. Continue Reading
By- John Powers, Senior Site Editor
-
Definition
08 May 2023
phased rollout
Phased rollout is a hardware or software migration method that involves incrementally implementing a new system. Continue Reading
-
Definition
08 May 2023
information systems (IS)
An information system (IS) is an interconnected set of components used to collect, store, process and transmit data and digital information. Continue Reading
-
News
03 May 2023
Observability maven 'cranky' about AIOps embraces GPT
Honeycomb's observability tools will add natural language queries via OpenAI's GPT API, a departure from its co-founder and CTO's broader stance on AI in IT ops tools. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
28 Apr 2023
Get a grip on your infrastructure with a custom MMC
Microsoft provides great administration tools, such as PowerShell and Server Manager. But don't neglect the venerable Microsoft Management Console for its flexibility. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Opinion
28 Apr 2023
At KubeCon 2023, observability and FinOps high on the agenda
With data sprawl increasing as IT budgets shrink, observability and FinOps were hot topics at KubeCon Europe 2023. Get an industry analyst's perspective on trends to watch. Continue Reading
By- Jon Brown, Senior Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Definition
28 Apr 2023
IT monitoring
IT monitoring is a process that gathers metrics on the operations of an IT environment. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
24 Apr 2023
configuration file
A configuration file, often shortened to 'config file,' defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
24 Apr 2023
systems operator (sysop)
In IT, a systems operator (sysop) is a person who runs computer servers and other devices on a daily basis in a data center. Continue Reading
By -
Tip
19 Apr 2023
Tips to avoid a bumpy Exchange 2010 migration to Office 365
Now that Exchange Server 2010 and Exchange 2013 are legacy products, administrators should make the push to migrate to avoid becoming the next ransomware target. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
Definition
19 Apr 2023
Microsoft Hybrid Configuration Wizard
The Microsoft Hybrid Configuration Wizard (HCW) is a tool provided by Microsoft to help organizations set up and configure a hybrid deployment between their on-premises Exchange Server and Exchange Online, which is part of Microsoft 365. Continue Reading
By- Katie Terrell Hanna
- Toni Boger, TechTarget
-
Definition
19 Apr 2023
service discovery
Service discovery is the automatic detection of devices and offered services over a network. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
19 Apr 2023
traceroute
Traceroute is a command-line utility that returns information about the communication route between two nodes on an Internet Protocol (IP) network. Continue Reading
-
Definition
14 Apr 2023
mutation testing
Mutation testing, also known as code mutation testing, is a form of white box testing in which testers change specific components of an application's source code to ensure a software test suite can detect the changes. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Tip
12 Apr 2023
Manage complex IT environments with AIOps and observability
As IT environments grow in complexity, AIOps and observability tools can provide valuable insights and identify problem areas -- but prepare for adoption hurdles along the way. Continue Reading
By -
News
11 Apr 2023
Microsoft mends Windows zero-day on April Patch Tuesday
What's old is new again as multiple security updates from the past made a comeback this month to push the total number of vulnerabilities addressed to 102. Continue Reading
By- Tom Walat, Site Editor
-
Definition
11 Apr 2023
IT incident report
An IT incident report is documentation of an event that disrupted the normal operations of an IT system or had the potential to do so as well as how the situation was handled. Continue Reading
-
Definition
06 Apr 2023
Windows Admin Center
Windows Admin Center (WAC), formerly Microsoft Project Honolulu, is a browser-based management tool from Microsoft that allows administrators to manage Windows servers and clusters from a centralized, graphical user interface. Continue Reading
By- Katie Terrell Hanna
- Tom Walat, Site Editor
-
Definition
06 Apr 2023
Resilient File System (ReFS)
A Resilient File System (ReFS) is a file system that Microsoft developed for use on a Windows operating system (OS) and is designed to overcome some of the limitations in the New Technology File System (NTFS). Continue Reading
By -
Definition
05 Apr 2023
pagefile
In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently. Continue Reading
-
News
29 Mar 2023
Comcast subsidiary survives March Madness with AIOps
AIOps alert reduction brought order to a chaotic environment at TV advertising specialist FreeWheel just in time for a big test of its resiliency during a wild NCAA tournament. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
28 Mar 2023
Deploy WebJEA to empower your users with PowerShell
Give your automation scripts a GUI that makes it easier for end users to get the information they need with a more streamlined approach. Continue Reading
By- Mike Kanakos, Align Technology
-
Tutorial
27 Mar 2023
How to secure passwords with PowerShell
Storing passwords in plain text is bad, but what methods are good? Try one of these approaches, such as secure strings or the SecretManagement module, to encrypt passwords. Continue Reading
-
Answer
24 Mar 2023
Beyond metrics, network SLAs should measure business ops
Enterprises need to ensure network service-level agreements provide a comprehensive view of network service performance to support business operations. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Definition
22 Mar 2023
Virtual Machine Disk format (VMDK)
VMware Virtual Machine Disk format (VMDK) is a format specification for virtual machine (VM) disk image files. Continue Reading
By- Rahul Awati
- Julia Anderson, TechTarget
-
Opinion
22 Mar 2023
Is observability as code overhyped?
Is observability as code as transformative as vendors claim or just another IT buzzword? Learn what to keep in mind when evaluating this emerging approach for your organization. Continue Reading
By- Brian Kirsch, Milwaukee Area Technical College
-
Tip
21 Mar 2023
Improve IT efficiency with a PowerShell self-service portal
You can jump over the technical barriers that impede automation efforts in your organization by exploring how to deploy a web-based portal that hosts your scripts. Continue Reading
By- Mike Kanakos, Align Technology
-
Definition
21 Mar 2023
IT service management (ITSM)
IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use IT. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
20 Mar 2023
HPE to acquire OpsRamp for GreenLake IT ops tools
IT automation specialist OpsRamp will become part of HPE's GreenLake portfolio, adding hybrid cloud visibility and notification tools to the IT conglomerate's SaaS offerings. Continue Reading
By- Tim McCarthy, News Writer
-
Tip
20 Mar 2023
Boost cluster security with Kubernetes vulnerability scanning
Performing vulnerability scans on Kubernetes clusters can help keep container environments secure and running smoothly. Learn what risks to look out for and compare tool options. Continue Reading
By -
Tip
20 Mar 2023
How to prepare for the next version of Exchange Server
The Exchange Server roadmap charts several twists and turns that shows Microsoft deviating from its typical course with the server-based email platform. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Tip
20 Mar 2023
Configure NIC teaming in Windows Server
NIC teaming maximizes network bandwidth and provides redundancy benefits. These steps guide users through NIC teaming configuration in Windows Server with GUI and PowerShell. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Definition
17 Mar 2023
black box AI
Black box AI is any artificial intelligence system whose inputs and operations aren't visible to the user or another interested party. Continue Reading
By- Kinza Yasar, Technical Writer
- Ivy Wigmore
-
Definition
16 Mar 2023
IT operations management (ITOM)
IT operations management (ITOM) is a strategic approach to managing an organization's information technology needs. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
16 Mar 2023
AMD Virtualization (AMD-V)
AMD-V (AMD Virtualization) technology refers to a set of hardware extensions and on-chip features for the AMD family of x86 microprocessors. Continue Reading
By -
Tip
16 Mar 2023
How to approach data loss prevention in virtual servers
As security risks evolve, organizations are turning to data loss prevention tools and methods to combat external and internal risks. Learn how to get started with DLP. Continue Reading
By- Brian Kirsch, Milwaukee Area Technical College
-
Definition
16 Mar 2023
Microsoft Edge
Microsoft Edge is a cross-platform browser created by Microsoft and installed by default on all new Windows devices. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
15 Mar 2023
defragmentation
Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
15 Mar 2023
Group Policy Management Console (GPMC)
Group Policy Management Console (GPMC) is a Microsoft Management Console snap-in that provides a graphical user interface that enables Active Directory (AD) administrators to manage Group Policy Objects (GPOs) from one console. Continue Reading
By- Andrew Zola
- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
News
14 Mar 2023
Microsoft stops two zero-days for March Patch Tuesday
The company corrects actively exploited vulnerabilities that affected Microsoft Outlook and the Windows OS in this month's batch of security updates. Continue Reading
By- Tom Walat, Site Editor
-
Definition
14 Mar 2023
Windows event log
The Windows event log is a detailed record of system, security and application notifications stored by the Windows operating system that is used by administrators to diagnose system problems and predict future issues. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
10 Mar 2023
NDIS (Network Driver Interface Specification)
Network Driver Interface Specification (NDIS) is a Microsoft Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should communicate with each other. Continue Reading
By -
Tutorial
09 Mar 2023
Build a PowerShell performance monitoring script step by step
A PowerShell performance monitoring script defines and keeps track of system metrics. Learn to set up and query performance counters and use the results to build an HTML report. Continue Reading
-
Definition
08 Mar 2023
log analytics
Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
News
08 Mar 2023
White House cybersecurity plan collides with SecOps reality
The White House Cybersecurity Strategy sets lofty goals. But recent market research suggests a significant number of enterprises don't follow existing SecOps best practices. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Mar 2023
SBOM graph database aims to be cloud security secret sauce
An open source consortium that includes Google plans to release a deployable beta of the GUAC project this month, a possible milestone for cloud-native SBOM. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
28 Feb 2023
Use Cockpit for Linux remote server administration
Linux admins can use Cockpit to view Linux logs, monitor server performance and manage users. Use the tool to help admins manage servers, regardless of experience level. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
27 Feb 2023
Compare Azure DevOps vs. Jira for IT ops project management
Azure DevOps and Jira can both be effective project management tools for software development and IT ops teams, but the two differ in terms of benefits, features and limitations. Continue Reading
By -
Definition
24 Feb 2023
memory dump
A memory dump is the process of taking all information content in RAM and writing it to a storage drive as a memory dump file (*.DMP format). Continue Reading
By -
Definition
21 Feb 2023
diskpart (Disk Partition Utility)
Diskpart is a command line utility in Windows operating systems (OSs) that is used to manage disks, partitions, and volumes. Continue Reading
By- Andrew Zola
- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
News
16 Feb 2023
Dynatrace security AI roots out Log4j, sets tone for roadmap
Dynatrace must prove itself beyond application security, but its AI's effectiveness against the Log4j vulnerability has some customers receptive to its product expansion plans. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
16 Feb 2023
How to filter Security log events for signs of trouble
Certain accounts, such as company executives, will draw unwanted attention from hackers. Learn how to catch these targeted attacks by checking Windows event logs. Continue Reading
-
News
16 Feb 2023
Dynatrace users make headway with AIOps
Dynatrace's aggressive NoOps vision hasn't come to fruition, but some customers have begun to see real-world results with root-cause analysis and automated rollbacks. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
15 Feb 2023
Microsoft remedies three zero-days on February Patch Tuesday
The company releases its security updates to shut down the vulnerabilities threat actors have been actively using for attacks in the wild. Continue Reading
By- Tom Walat, Site Editor
-
Definition
14 Feb 2023
boot
To boot (to boot up, to start up or booting) a computer is to load an operating system (OS) into the computer's main memory or random-access memory (RAM). Continue Reading
By -
Tip
09 Feb 2023
Considerations when getting started with distributed tracing
Distributed tracing has advantages over traditional logging and monitoring, especially for microservices, but it can also affect application performance through added complexity. Continue Reading
By- Brian Kirsch, Milwaukee Area Technical College
-
Opinion
08 Feb 2023
Why Wasm is the future of cloud-native app development
Just over a month into 2023, the popularity of WebAssembly is already on the rise. An industry expert explains why Wasm will have far-reaching effects on cloud-native development. Continue Reading
By- Paul Nashawaty
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
07 Feb 2023
Cisco samples OpenTelemetry-based observability tool blends
Updates set to ship this week and next quarter will unify data collection for Cisco's observability and security tools and catch them up with full-stack competitors. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
06 Feb 2023
failover cluster
In computing, a failover cluster refers to a group of independent servers that work together to maintain high availability of applications and services. Continue Reading
By- Rahul Awati
- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
Definition
03 Feb 2023
mission-critical application
A mission-critical application is a software program or suite of related programs that must function continuously for a business or business segment to be successful. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Tip
02 Feb 2023
Speed up onboarding with Active Directory user templates
Active Directory account templates are not difficult to make. But it helps to know how to use certain shortcuts, like variables, to create home directories and roaming profiles. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Feature
01 Feb 2023
Kepler project aims to help curb Kubernetes energy waste
Running Kubernetes clusters can lead to high costs and energy use. The researchers behind the Kepler project hope the tool will help IT pros track and curb cluster energy waste. Continue Reading
By- Emily Foster, Associate Site Editor
-
Tip
01 Feb 2023
What's new with the EXO v3 module for Exchange admins?
Microsoft made several significant improvements in the Exchange Online PowerShell v3 module for added reliability and performance when managing the hosted email platform. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Podcast
31 Jan 2023
ServiceNow workflow can smooth ERP edges with partner help
ServiceNow vice presidents Jeff Gore and Kirsten Loegering explain what's involved in implementing the platform to improve the employee experience on ERP and HR systems. Continue Reading
By- David Essex, Industry Editor
-
Tip
27 Jan 2023
EDR tools for Windows Server compared
Windows Server 2022 comes with native security technologies to protect the enterprise. But endpoint detection and response tools can be worth the price of admission. Continue Reading
By