Just by pressing a button. That's the cloud revolution. One person can activate a hundred machines by flipping a switch. And the process doesn't stop there. You can also configure them correctly and take advantage of their elasticity and availability to go even further. In this way, your ally is infrastructure as code, a practice that organises the infrastructure as if it were programming software. Because it is no longer enough to have interfaces and APIs to be able to programme the infrastructure. We want it to be easy to manage so as to boost the growth of our business.
Companies invest a lot of money in technology and equipment to organize their processes and to improve performance. The point is that data networks are increasing their extension, which makes it difficult to properly manage the system and its processes. Assuming a role of control over these technologies is the first step to detect of problems in advance and in a more proactive way by monitoring of environments.
Every organization looking at using network function virtualization (NFV) needs to consider monitoring. If you’re going to deploy a service, it’s really important that you know if it’s working — and what’s wrong if it’s not. That’s why monitoring — often called assurance — is a key part of every request for information, every request for proposal, every proof of concept, every NFV deal.
Here’s the challenge: the economics of on-premises monitoring are all wrong for the NFV business cycle.
We've been talking for years about running IT as a business. Multiple industry standards have taken their shot a guiding customers down this golden path, with varying degrees of success. The latest, and possibly most promising, is called IT4IT. This blog is meant as a quick introduction to IT4IT and our suggestions on how to get started.
In the article “Data Masking as Part of Your GDPR Compliant Security Posture” over on DEVOPSdigest, Zenoss talks about how to mitigate your application’s level of compliance by employing data masking or other pseudonymization techniques of personally identifiable information (PII) like names and email addresses. Zenoss suggests giving it a quick read to better understand how that strategy relates to GDPR.
Behind the scenes here at ServiceNow, the Knowledge Management and Multimedia teams work closely with subject matter experts to disseminate critical information to our customers. We've found that certain topics come up frequently, in the form of best practices that can help you keep your ServiceNow instances running smoothly.
IT organizations often find themselves monitoring effectively at small scale, but few have implemented solutions with the flexibility and capability to operate in elastically scaling environments.
IProject Portfolio Management provides a simplified, team-oriented approach to Project Portfolio Management and IT development by combining several individual applications. After you upgrade the instance, the default value of the Retain start on constraint on tasks after adding relations property is now set to true and cannot be changed back to false.
Part of my role, in ITSM Product Management, is delivering roadmap sessions to our customers and partners. I really enjoy this part of the job; showcasing some of the latest features that will be coming out in the next few releases (a glimpse of the future). More importantly, I love the feedback I receive and hearing how our customers are implementing their own new features and migrating applications and business services onto the ServiceNow platform. As I start to hear common themes (for example what’s ServiceNow’s position on SIAM and multi-vendor management?), I have a great opportunity to help influence our product roadmap and define priorities for our core product development teams.
I think we all understand at this point that the ServiceNow platform can do a whole lot more than just "IT". Many of you are using the platform for Customer Relationship Management and Customer Service Management. Are you really, though, using those processes as intended?