|
Managing Component Dependencies Bob Aiello explains that software engineers and architects do an amazing job designing a system’s architecture that fully represents all of the parts of the system that are created during the development lifecycle. However, one of the biggest challenges is understanding how each part of the system depends upon the others.
|
|
|
Managing Servers: With Agents and Without Andrew Phillips details the challenges and advantages of two specific approaches to automating server management: agentless and agent-based automation. Agent-based automation refers to when a small piece of software—called an agent, service, or daemon—is installed on each target server, whereas agentless management automation software interacts with the remote-control functionality built into each host-operating system to perform the administrative tasks.
|
|
|
Using Agile for Requirements Management Charuta Phansalkar writes on the necessity of capturing and understanding requirements using agile practices. Agile, when implemented effectively, will ensure that the customer's voice is clearly understood throughout the project, which results in maximum customer satisfaction.
|
|
|
A Configuration Management Interoperability Solution David Lawton writes that with a few changes to capital project business processes and the implementation of a content management interoperability services (CMIS) database, operations content can be extracted directly from originating tools and populated into a data model that helps operations manage the lifecycle configuration. Consuming the project content during the project provides a vehicle to transform and feed subsequent processes.
|
|
|
Why Target Needs a Secure, Trusted Application Base Target’s well-publicized disclosure that customers’ personally identifiable information (PII) had been compromised is the latest software “glitch” that is getting a fair amount of attention. Read on if you would like to know how to secure your systems without having to rely upon security scans that only detect the presence of a problem after it is already on your server.
|
|
|
The Bugs That Deceived Me Every time we look at the data, we perform an analysis that helps us make decisions—hopefully the right ones. In this article, Gil Zilberfeld describes a few traps where bug data misled him to make bad decisions. These traps are in the data itself, not the tools, and can lead us in the wrong direction.
|
|
|
2013's Biggest Configuration Management and DevOps Stories In 2013, we saw a remarkable number of system glitches involving large trading systems and the exchanges themselves along with a significant number of large banking systems. Bob Aiello writes how these incidents put DevOps best practices and configuration management in the spotlight of many technology reports.
|
|
|
Ways to Implement Agile without Breaking the Bank James Sullivan explains popular agile frameworks and outlines their costs and benefits. If you're worried that you are at a place where you cannot make the sort of investments that these agile frameworks require, James is here to discuss foundational agile practices that can provide you key benefits without the costs associated with these kinds of agile brands.
|
|
|
Why Change and Configuration Management Needs Analytics Analytics-driven management stands to end the key challenges that constrain change and configuration management. By applying powerful analytics to the overwhelming change and configuration data, IT Operations Analytics (ITOA) technology can turn massive amounts of information into clear, actionable insights.
|
|
|
Securing the Trusted Application Base Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed.
|
|