In the myriad of IT systems designed to protect an enterprise’s sensitive data, it’s the Security...
Author - Stephen Watts
Security Automation for 2020 and Beyond
Security automation refers to machine-actions that monitor, detect, troubleshoot and remediate...
Runbook Automation (RBA): An Introduction
IT systems are inherently complex beasts thanks to the very nature of modern technology which is a...
Workload Automation (WLA) vs Robotic Process Automation (RPA):...
Workload automation (WLA) and robotic process automation (RPA) are both tools that help businesses...
What is Security As Code?
Businesses have quickly and sophisticatedly embraced cloud technology to super-serve customers and...
A Primer on Service Level Indicator (SLI) Metrics
Keeping track of customer satisfaction is crucial for any company aiming to provide exceptional...
How to Write an SOP (Standard Operating Procedure)
I often help customers automate their business processes with Server Automation. I start by...
Introduction to Service Request Catalogs
Before discussing Service Request Catalogs, let’s make sure we’re on the same page. As it turns...
AWS Sagemaker vs Amazon Machine Learning
As Amazon Web Services (AWS) continues releasing a multitude of products and resources, finding the...
ACID: Atomic, Consistent, Isolated, & Durable
I don’t think it’s an overstatement to say that data is pretty important. Data is especially...