In my last article, I spoke of seeking advice and almost portrayed a level of caution when approaching cloud. The reality of the matter is, we all want what the cloud promises, an easier and more profitable platform for delivering services at … Continue reading
I absolutely love my job, and obviously have no qualms about telling people about it! On a daily basis, I help people solve complex business problems. Sometimes those business problems are rooted in human nature, not technology. When human nature … Continue reading
Problem to Solve: How can we use APM and NPM tools to help protect our Company’s Brand? Have you ever heard these screams come from the CIO’s Office? WHAT DO YOU MEAN CUSTOMERS ARE NOT GETTING TO OUR WEB PAGE…? … Continue reading
Problem to Solve: How can I use my APM NPM solution to better detect Unknown Anomaly conditions related to Cyber and/or Hacktivism? “You have to learn the rules of the game. And then you have to play better than … Continue reading
Problem to Solve: What can we do to protect VPN connections, remote employees working @ home, and B2B links from Cybersecurity / Hacktivism? Can you picture our happy dwarfs that work from home singing to themselves all day long “Remote .. Remote … It’s Work From Home We … Continue reading
Problem to Solve: How can we go about searching for potential Ransomware activity before our organization gets attacked? The evolution of security for so many has become a reactionary series of response and recovery. The latest highly publicized exploit leaves … Continue reading
Problem to Solve: What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism? OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂 So the … Continue reading
Problem to Solve: What can we do to protect our organization from Hacktivism, specifically for protecting our critical Unified Communication services? Have you ever had the joy of experiencing your company’s voice communications become unavailable? Well, if you think about it, … Continue reading
Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of protecting our Critical Application Services? Have your business critical application services ever become “unavailable”? We have all had this happen at one … Continue reading
In this last blog post of the PCPM series we are going to address several steps to ensure the success of your APM/NPM deployment in your patient care environment. 99.9% of these steps can be utilized by other business verticals as … Continue reading