Model choices: business use cases for SLMs and LLMs

For many years, businesses and their data science teams valued accuracy above all else when it came to a model’s performance. Increasingly, however, other factors and trade-offs have come into play depending on the business context of models.  From biases buried in training data to the costs associated with runtime and resourcing services underpinned by … continue reading

The C-suite conundrum: Are senior executives the Achilles’ heel of cybersecurity?

In today’s digital landscape, an organization’s C-suite and senior executives hold the most valuable corporate data and sign-off authorities, representing the highest potential risk over email. Whether it’s inbound spear phishing attacks or outbound mistakes resulting in a damaging data breach, the C-suite is vulnerable.  But what do cybercriminals want from these individuals? Are breaches … continue reading

Telemetry pipelines: The critical missing link in modern application monitoring and performance management

When it comes to telemetry data – meaning the logs, metrics, traces and other information engineers use to monitor applications, manage performance and troubleshoot outages– more is usually better. But there’s a big caveat: If you fail to manage telemetry data effectively, the data can quickly create more problems than it solves, leading to problems … continue reading

Empowering SMBs to compete with big brands using AI and SaaS technology

Business is moving fast. In today’s evolving landscape, small and medium-sized businesses (SMBs) are facing unprecedented challenges. However, they also have more opportunities to get creative and leverage technologies more so than ever before. As they strive to compete with larger brands, SMBs are increasingly turning to advanced technologies, such as Artificial Intelligence (AI) and … continue reading

ITOps Times Open-Source Project of the Week: Strimzi

The CNCF Technical Oversight Committee (TOC) has voted to accept Strimzi as a CNCF incubating project.  Strimzi simplifies the deployment and management of Apache Kafka clusters on Kubernetes, leveraging the operator pattern to ease installation, upgrades, and security tasks. Apache Kafka, known for its scalability and fault tolerance, is widely used for building event-driven architectures … continue reading

How IT leaders can get their cloud back in order

The evolution of cloud operations currently revolves around the offerings of the hyperscale cloud providers (hyperscalers). We should consider these “traditional cloud models,” and they typically offer decent value when organizations are just beginning their cloud journeys. But these plans tend to become extremely expensive once the organization starts scaling its cloud initiatives. According to … continue reading

Analyst View: Preparing for the best part of Wi-Fi 7

It is amazing how quickly technology is advancing. It seems like just yesterday we launched Wi-Fi 6, and we’ve already had a number of variants. This month, Qualcomm began sharing the coming capabilities, one of which, given the launch of the Apple Vision Pro – announced in June at Apple’s Worldwide Developers Conference –, is … continue reading

Three ways to avoid AI-related network performance problems

Artificial intelligence (AI) is upending almost every sector – from health care and education to manufacturing and retail. It’s even creeping into comedy. Ameca – billed as the ‘world’s most advanced humanoid robot,’ according to UK start-up Engineered Arts – recently attempted to tell a joke. The punchline is so poor that we will leave … continue reading

We Need to Think Differently – Your Hybrid Connectivity Isn’t Really Hybrid

With advancements in technology, and in particular that which carries data across our ether, hybrid connectivity has become increasingly popular as a means to optimize communications. Promising a seamless integration of multiple network technologies, it aims to provide enhanced reliability, flexibility, and performance. However, upon closer examination, what many believe to be hybrid connectivity isn’t truly hybrid. First … continue reading

Want to break down IT silos? Start with building the right team culture

For those of us who live and breathe technology, it’s easy to believe that we’re all one release away from solving the big challenges facing our organizations.  Unfortunately, the reality is more complicated than that.  For example, let’s talk about silos, the barriers that exist between different teams or departments within an organization. For years, … continue reading

Event-driven architecture explained

Event-driven architecture is an architectural design approach that relies on events to trigger actions across decoupled services. In this context, an event represents some sort of change in state – a customer logging in to an application, a shopper adding an item to a cart, or a user following a new account. Events may include … continue reading

Don’t Let WAN Bandwidth Get in the Way of Your AI Initiatives

New technologies emerge like baggage at an airport carousel. Every so often, a new one pops out from under that rubber flap we all stare at as we wait for our luggage. Cloud, virtualization, software-defined networks. They’ve all been around the carousel.  One of the most recent to emerge is artificial intelligence (AI) and its … continue reading

8 reasons enterprise automation is vital to cloud strategy success

The cloud is fast becoming the platform of choice to power almost every enterprise application, and with good reason – the cloud offers significant benefits including flexibility, security, and low total cost of ownership. However, that success is not without its challenges. Moving on-premises systems to the cloud and digitally transforming key processes has a … continue reading

The App-Aware NOC: The imperatives, and how to make it happen

Fire drills and ensuing all-hands-on-deck calls are nothing new for IT operations teams. I can remember working on a site reliability engineering (SRE) team for a large, global enterprise in the shipping industry back in the late 1990s. Early on in my tenure there, an issue occurred that affected the public facing site. Initially, we … continue reading

Next Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!