Sheetal Kale

Database Management

The Keys to Ensure a Successful CMDB Implementation

February 8, 2017

Configuration Management Database (CMDB) Today’s modern enterprises are driven by IT. With the proliferation of new technologies such as Cloud, Mobility, Virtual Machines, and new hardware and software devices, the IT infrastructure is increasingly becoming more complex. For the IT

Read More
Business Ny

101 on Service Integration and Management (SIAM)

January 26, 2017

Service Integration and Management Enterprise IT architecture has evolved from the earlier monolithic, single supplier model to a best-of-breed approach in order to address IT needs of specific business services. The struggle for enterprises is that, as they consume IT

Read More
Sheetal Kale

Candidate Tracking and New Hire Onboarding – Future Automation

January 3, 2017

Candidate Tracking Systems Annually, $400 Billion are being spent on recruiting services and systems and even then, businesses are struggling to find the right talent, interested candidates are not finding their dream jobs, and star talent are still stuck in

Read More
Sheetal 200x203

The Paradigm Shift In Enterprise IT Operations Management

December 8, 2016

IT Operations Management Rapid change is the new constant with today’s Enterprises. There is a continuous shift in the technology landscape and the demands of the customers coupled with Enterprises wanting to stay competitive. This changing, fluid environment results in

Read More
Businesses

The Myths Vs Facts of Governance, Risk and Compliance

December 6, 2016

Governance, Risk, Compliance As disruptive technology changes the way businesses operate and communicate internally and externally, companies are facing increasing complexity of governance, compliance and risks. The need for a high degree of agility and transparency in the GRC program

Read More

Cloud Architecture – The Multi-Tenant Versus Multi-Instance Debate

August 3, 2016

Cloud Architecture Winston Churchill quotes, “We shape our buildings; thereafter they shape us”. We can truly extend this analogy to the cloud too. The way the cloud works, stores, governs, secures and manages user data in its varied forms is

Read More
Tosin Vaithilingam
Navigating Economic Uncertainty: Strategies for IT Leaders and MSPs Lately, it seems that each day brings news of more economic uncertainty. Companies that have been navigating the pandemic for the past two and a half ...
Drew Firment
Stop Focusing on Cloud Adoption and Start Focusing on Cloud Maturity For the past several years, most organizations have made it their priority to shift much of their applications and data from on-premises to the ...
Mark Greenlaw
Free Cloud Migrations are Expensive The cloud is becoming the primary place where work gets done. By 2025, Gartner estimates that enterprise spending on public cloud computing will overtake traditional IT hardware. Why? One reason ...
Sofia Jaramillo
Augmented Reality in Architecture Augmented reality (AR) is a growing field of study and application in the world of architecture. This useful tool can help us visualize architectural designs by superimposing them onto real-world scenes ...
Maxim Melamedov
Trouble is Brewing Cloud Paradise - 2023 Will Determine Company's Long-Term Plans for Cloud Use The relationship between developers and the cloud was practically love at first sight. For years, migration to the cloud in ...
Martin Mendelsohn
The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Gilad David Maayan
Network Security in the Public Cloud What is Network Security? Network security is a strategic approach to securing an organization’s resources and data across the corporate network. It helps protect organizations of all sizes, industries, ...
Gilad David Maayan
What is SASE (Secure Access Service Edge)? SASE (Secure Access Service Edge) is a term coined by Gartner to refer to a new architecture for networking and security that combines both functions into a single, ...