Data mining and analytics – an interview with David Chiu
ITC TV hosts Carlos Casanova and Charlie Betz chat with David Chiu about Using data to improve the effectiveness of IT operations. He talked about using data to prevent issues from happening. Data mining and analytics have the ability to greatly improve IT efficiency and security. Point monitoring tools have limitations, we are missing the tool to look at the entire IT ecosystems, this is the information that will allow us to really understand what is happening and to predict when things may go wrong based on the behaviour of the system.
RecordedDec 7 201610 mins
Your place is confirmed, we'll send you email reminders
Traditionally, the corporate office space was built to suit a 9-5 workday from Monday to Friday. However, the new generation and the global pandemic has forced the corporate office to change overnight. During this webinar, we will explore the history and evolution of the office, current technology deployed to help, and organizational, cultural, and personal factors that define the make up of the future workplace.
We will discuss four core principles (flexibility, safety, security, and value) that will serve as the foundation for a platform for the future workplace.
There are tasks being performed and called “IT problem management” at every type and size of business. But most of those fall short of the goals of true, proactive problem management – to resolve incidents, identify and address their root causes, and reduce occurrence and recurrence of incidents and problems.
How best to ensure your IT people, processes, and technologies are adequately prepared to deliver proactive problem management?
Learn more from experienced experts at this informative, valuable one-hour webinar.
Speakers:
• Bill Talbot – trusted adviser to more than 150 companies over more than 20 years, focused on IT asset management (ITAM)
• Mike Bombard – Chief Operating Officer, Virima Technologies
• Moderator: Ryan Schmierer, a recognized industry thought leader in the areas of Digital Transformation, IT Strategy, Service Management and Operations.
If you are an IT decision maker, or a change, configuration, or incident manager, you’ll want to attend this event. Bring your questions and experiences for a spirited discussion, and leave with ideas you can use.
There are tasks being performed and called “IT problem management” at every type and size of business. But most of those fall short of the goals of true, proactive problem management – to resolve incidents, identify and address their root causes, and reduce occurrence and recurrence of incidents and problems.
How best to ensure your IT people, processes, and technologies are adequately prepared to deliver proactive problem management?
Learn more from experienced experts at this informative, valuable one-hour webinar.
Speakers:
• Bill Talbot – trusted adviser to more than 150 companies over more than 20 years, focused on IT asset management (ITAM)
• Mike Bombard – Chief Operating Officer, Virima Technologies
• Moderator: Ryan Schmierer, a recognized industry thought leader in the areas of Digital Transformation, IT Strategy, Service Management and Operations.
If you are an IT decision maker, or a change, configuration, or incident manager, you’ll want to attend this event. Bring your questions and experiences for a spirited discussion, and leave with ideas you can use.
IT Chronicles with industry leaders Michael Dortch, Robert Roberts and Mike Bombard
Automation brings several obvious benefits to any IT estate. These include more consistent performance of critical and mundane tasks and compliance with business processes. But when intelligently applied, IT automation can deliver significant additional benefits and business value.
• Free up skills for more complex, higher-value tasks
• Ensure timely updates of CMDB data as changes occur across the environment
• Better cyber security through more consistent, more timely patch and update deployment
You need a clearly defined set of goals and a solid plan to achieve intelligent automation. And you need to ensure your IT management solutions are up to the tasks required.
Join industry experts Mike Bombard, Robert Roberts, Director of IT Operations and Support at Segra and Michael Dortch for an informative, thought-provoking discussion of the benefits and challenges of intelligent IT automation. You’ll learn things you can do now and things you should be thinking about to achieve and extend intelligent automation across your IT estate.
Michael Dortch - DortchonIT.com; Mike Bombard - Virima Technologies; Taylor Lehmann - CISO at Wellforce & Tufts
IT service management (ITSM) is evolving rapidly as more and more enterprises pursue digital transformation. At the same time, cyber security threats are growing in number, sophistication, and impact on the operations, revenues, and reputations of victimized companies. Meanwhile, at too many companies, service and security management are still operating in separate silos, with cooperation happening only after a threat becomes a successful breach.
How best to move to a structure in which service and security management are integrated, proactive enablers and accelerators of your business?
At many companies, this is one of the goals driving an increased focus on security operations, or SecOps. But there are technological, cultural, and organizational challenges to your efforts to bring IT service management and security management closer together.
Join Industry experts Michael Dortch, Mike Bombard and Taylor Lehmann for a stimulating and informative discussion of these challenges and how companies are addressing them successfully. You’ll learn things you can do now to improve both service and security management at your company.
Michael Dortch - DortchonIT.com; Mike Bombard - Virima Technologies; Taylor Lehmann - CISO at Wellforce & Tufts
IT service management (ITSM) is evolving rapidly as more and more enterprises pursue digital transformation. At the same time, cyber security threats are growing in number, sophistication, and impact on the operations, revenues, and reputations of victimized companies. Meanwhile, at too many companies, service and security management are still operating in separate silos, with cooperation happening only after a threat becomes a successful breach.
How best to move to a structure in which service and security management are integrated, proactive enablers and accelerators of your business?
At many companies, this is one of the goals driving an increased focus on security operations, or SecOps. But there are technological, cultural, and organizational challenges to your efforts to bring IT service management and security management closer together.
Join Industry experts Michael Dortch, Mike Bombard and Taylor Lehmann for a stimulating and informative discussion of these challenges and how companies are addressing them successfully. You’ll learn things you can do now to improve both service and security management at your company.
ITSM process expert Ryan Schmierer & IT Service Management technology expert Mike Bombard
Continual Service Improvements and minimizing the impact of Major Incident Management are critical to keeping your business running smoothly and out of the nightly news headlines.
This webinar, presented by ITSM process expert Ryan Schmierer and IT Service Management technology expert Mike Bombard will explore the role technology capabilities and process improvement can play to improve outcomes.
Ryan and Mike will discuss lessons learned from a major healthcare company case study and the challenges this company faced in managing major incidents. They will provide 5 things you can do today to improve major incident management and will discuss how by leveraging capabilities from discovery and infrastructure visualization tools will help your staff gain the insights they need to resolve issues quickly and continually make better-informed decisions.
The modern digital enterprise depends on EA, ITSM and IT project teams working together and sharing information as a cohesive unit. In this session, we will share some tips on how to make that a reality. In many organizations, Enterprise Architecture and Service Management & Operations are separate functions that rarely interact with each other and business users are the ones paying the price. This session will look at how architects can use operational insights to design better technology solutions; how operations staff can use architecture models along with other configuration data to better assess impacts, risks and diagnose issues; and how these functions together can enable a more agile business environment.
Minimizing the time taken to identify a security breach enables a company to mitigate the problem and limit the potential damage to its data and reputation.
Deploying an automated detection and response tool gives security practitioners the insight they need to respond to cyber-security attacks.
While still in its infancy, Artificial Intelligence and Machine learning technologies have the ability to recognize trends in data patterns, analyse and learn from them.The advances promise to bring huge value to business that can leverage this information.
Kevin talks about his book "World Class ITSM" which focuses on the journey of the Helpdesk to Service Management, where it has been proven to work and what is aspirational for the future of ITSM to do things better.
There are many aspects to security, whether it be mitigating personal risk from an unsecured wifi connection, to managing risk for an enterprise. Security is about trust and being able to identify all areas of risk, then mitigate them. Its also about being adequately prepared to handle a breach should the worse happen.
Jed talks about End User Computing (EUC) and how IGEL (@igel_technology) has revolutionized endpoint management software by standardizing the user experience with their Universal Management Suite.
Bryan talks to the 10 in Tech team about SparkInfluence, a new breed of advocacy and engagement platform to quickly educate and empower stakeholders to action, identify influencers, reach decision makers and affect change.
Steve Brodie talks about how to create a simple, repeatable way to collect and view information from any DevOps tool along the pipeline in the context of a single release, and deliver metrics that provide real business value.
As traditional security perimeters dissolve, companies are becoming more reliant on human-centric cyber security systems that can protect their most valuable assets at the intersection of users, data & networks.
Attacks are getting more sophisticated and more targeted. Endgame takes a different approach to security and extends traditional anti virus protection from malware, to exploits, malwareless attacks, and ransomware. Ashwini speaks to the 10 in tech team about the changing nature of security threats.
Improved server monitoring solutions provide IT staff with better visibility into their operations, enabling them to deliver more effective IT services. Jon Cavanaugh, Sr Sales Engineer / Mgr Operations at OP5 talks to the 10 in Tech team about how this drives better business outcomes.
How cloud based business phone systems are enabling true workforce mobility through ease of use voice communication from any device. Effectively eliminating the need for a traditional desk phones and PBX systems is discussed with Brian Peterson, Co-Founder & VP Engineering at Dialpad talks and the 10 in Tech team.
In today's digital marketplace, information is everywhere. You spend countless hours trying to stay up to date with news, informative how to's and vendor information for solutions you need to run your business.
IT Chronicles is built for you. We have taken what we know is missing and given you what you want. One destination that delivers all the current information from the best minds in the industry and a collective set of resources that help you get what you need.