Nearly 90% of IT professionals feel that increased infrastructure complexity has affected their role in the last 3-5 years. Cloud computing and mobility are seen as the most important technologies for investment, and information security is the IT role that needs to adapt the most. While most IT professionals feel confident providing strategic guidance, only a third are completely confident and the majority only get occasional opportunities to provide guidance. Additional training in their areas of responsibility and a better understanding of the business are most needed for IT professionals to feel more empowered.
A look at IT decision making, budgeting, priorities and technology adoption among UK and Germany-based SMEs based on 500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations.
A look at IT decision making, budgeting, priorities and technology adoption among UK and Germany-based SMEs based on 500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations.
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsSolarWinds
IT Trends Report 2015: Business at the Speed of IT
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering organizational impact
(North America, Public Sector)
Cybersecurity breaches in the government seem to be all over the news. The sheer number and wild variety of sources for these breaches led us to wonder what federal agencies are really dealing with. SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies.
The results of our survey include:
Detailed insight into the threats, challenges, and sources of cybersecurity breaches the government faces in its IT infrastructure
Top hindrances in the implementation of appropriate IT security tools
Strategies and courses of action being deployed by federal IT professionals to remediate cybersecurity threats
These results demonstrate that a broad and concerning range of cybersecurity threats plague government agencies. Federal IT pros must consider taking a more pragmatic and unified approach to addressing the availability, performance, and security of their infrastructures.
Visit http://www.solarwinds.com/federal to learn more.
SolarWinds Federal Cybersecurity Survey 2015SolarWinds
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity.
Visit http://www.solarwinds.com/federal to learn more.
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering business impact in North America.
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
WINNER: Overall Best In Show at 2014 AFCEA® Cyber Conference Solutions Trail
In a 2014 survey by SolarWinds and Market Connections, federal government and military IT professionals stated that their biggest cybersecurity threats are people both malicious external attackers and clueless insiders. So how do Federal IT Pros prevent activity that can put their agencies security at risk and address these living cybersecurity threats when human behavior is out of their
control? Implementing continuous monitoring solutions can help federal agencies safeguard against human error and quickly identify vulnerabilities, compliance issues and other threats by automatically collecting data and reporting on the performance, availability and security posture of an IT infrastructure. While continuous monitoring of the performance of networks, applications, servers, and
more will not stop hackers from attempting to infiltrate a network or stop careless employees from accidental blunders, it can provide a first line of defense and critical insight into how the IT infrastructure is impacted. In this session you will learn: " The top cybersecurity threats plaguing agencies today and their sources " The types of continuous monitoring tools and technologies that can be leveraged by both IT operations and information security simultaneously to quickly detect and mitigate threats " How to overcome common obstacles and frustrations agencies face when implementing continuous monitoring solutions and what benefits they see upon implementation.
IT Alert Management Survey Results - February 2013SolarWinds
SolarWinds recently conducted a survey on IT Alert Management with participation from over 150 IT professionals. We learned about the challenges faced in managing alerts. Here are the findings…
SolarWinds Application Performance End User Survey (Australia)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
Improving Incident Response: Building a More Efficient IT InfrastructureEmulex Corporation
This webcast will focus on the results of a study Emulex commissioned from Forrester Consulting that evaluates the range of issues that enterprise IT staffs are facing while managing the performance of their business-critical application and business services. The results of the study, entitled “Improving Incident Response: Building a More Efficient IT Infrastructure,” indicate that a lack of network visibility negatively impacts the ability of IT staff to identify and resolve application performance issues, which leads to substantial business productivity loss.
Navigating IT Complexity - Research report by IDGShoreTel
The primary objective of this research program is to explore IT decision makers’ attitudes toward and acceptance of technology complexity with a focus on IP telephony solutions. More specifically, the survey was designed to identify the extent to which companies are struggling with IT complexity as a macro issue, the perceived contributors to IT
complexity, adoption of IP telephony, and attitudes/experiences regarding complexity in IP telephony solutions.
The research was conducted online among the CIO and Network World audiences between September 14, 2010 and October 4, 2010. Respondents were screened for title (IT manager and above or LOB executive), core job responsibilities (strategic focus), company size of 50 or more employees, and for the implementation or planned implementation of IT telephony solutions. A total of 324 qualified respondents are represented in this summary; 186 respondents are members of the CIO audience, 138 respondents are members of the Network World audience.
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
90% of Canadian executives indicate at least some degree of gaps in IT skills at their business exists. 59% of UK executives believe the cybersecurity threat level is increasing. Find out more on how companies are adopting new technology and how it's impacting their workforce.
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
SolarWinds and Market Connections conducted an online survey of 200 federal government IT decision makers and influencers in June 2015. The survey assesses how federal IT pros are adapting, managing and assuring oversight in the areas of shadow IT, mobile technology and IT shared services.
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
SolarWinds, a leading provider of powerful and affordable IT management software, announced the findings of its Little-Known Facts survey September 12, 2017. The results reveal that IT professionals in Hong Kong tend to go above and beyond the scope of their core responsibilities as the changing business landscape demands more of their attention, both inside and outside of the office. The survey supports IT Professionals Day, which is observed the third Tuesday of every September (September 19, 2017), to emphasize the need for greater appreciation for IT professionals and the critical role they play in modern business and the lives of nearly all technology end-users.
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
A look at which applications government IT Pros are using, where applications are stored, how application problems are identified, how application performance issues are addressed, and more.
Systems Administrators AUS Survey ResultsSolarWinds
A wide-ranging survey of Australia systems administrators that captures the rapidly evolving nature of the sysadmin role and their thoughts on life inside and outside of the workplace in October 2013.
Netadmin and Sysadmin Survey Results - AUSSolarWinds
A wide-ranging survey of Australian network and systems administrators that captures the rapidly evolving nature of these IT Pros’ roles and their thoughts on life inside and outside of the workplace
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsSolarWinds
IT Trends Report 2015: Business at the Speed of IT
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering organizational impact
(North America, Public Sector)
Cybersecurity breaches in the government seem to be all over the news. The sheer number and wild variety of sources for these breaches led us to wonder what federal agencies are really dealing with. SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies.
The results of our survey include:
Detailed insight into the threats, challenges, and sources of cybersecurity breaches the government faces in its IT infrastructure
Top hindrances in the implementation of appropriate IT security tools
Strategies and courses of action being deployed by federal IT professionals to remediate cybersecurity threats
These results demonstrate that a broad and concerning range of cybersecurity threats plague government agencies. Federal IT pros must consider taking a more pragmatic and unified approach to addressing the availability, performance, and security of their infrastructures.
Visit http://www.solarwinds.com/federal to learn more.
SolarWinds Federal Cybersecurity Survey 2015SolarWinds
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity.
Visit http://www.solarwinds.com/federal to learn more.
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering business impact in North America.
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
WINNER: Overall Best In Show at 2014 AFCEA® Cyber Conference Solutions Trail
In a 2014 survey by SolarWinds and Market Connections, federal government and military IT professionals stated that their biggest cybersecurity threats are people both malicious external attackers and clueless insiders. So how do Federal IT Pros prevent activity that can put their agencies security at risk and address these living cybersecurity threats when human behavior is out of their
control? Implementing continuous monitoring solutions can help federal agencies safeguard against human error and quickly identify vulnerabilities, compliance issues and other threats by automatically collecting data and reporting on the performance, availability and security posture of an IT infrastructure. While continuous monitoring of the performance of networks, applications, servers, and
more will not stop hackers from attempting to infiltrate a network or stop careless employees from accidental blunders, it can provide a first line of defense and critical insight into how the IT infrastructure is impacted. In this session you will learn: " The top cybersecurity threats plaguing agencies today and their sources " The types of continuous monitoring tools and technologies that can be leveraged by both IT operations and information security simultaneously to quickly detect and mitigate threats " How to overcome common obstacles and frustrations agencies face when implementing continuous monitoring solutions and what benefits they see upon implementation.
IT Alert Management Survey Results - February 2013SolarWinds
SolarWinds recently conducted a survey on IT Alert Management with participation from over 150 IT professionals. We learned about the challenges faced in managing alerts. Here are the findings…
SolarWinds Application Performance End User Survey (Australia)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
Improving Incident Response: Building a More Efficient IT InfrastructureEmulex Corporation
This webcast will focus on the results of a study Emulex commissioned from Forrester Consulting that evaluates the range of issues that enterprise IT staffs are facing while managing the performance of their business-critical application and business services. The results of the study, entitled “Improving Incident Response: Building a More Efficient IT Infrastructure,” indicate that a lack of network visibility negatively impacts the ability of IT staff to identify and resolve application performance issues, which leads to substantial business productivity loss.
Navigating IT Complexity - Research report by IDGShoreTel
The primary objective of this research program is to explore IT decision makers’ attitudes toward and acceptance of technology complexity with a focus on IP telephony solutions. More specifically, the survey was designed to identify the extent to which companies are struggling with IT complexity as a macro issue, the perceived contributors to IT
complexity, adoption of IP telephony, and attitudes/experiences regarding complexity in IP telephony solutions.
The research was conducted online among the CIO and Network World audiences between September 14, 2010 and October 4, 2010. Respondents were screened for title (IT manager and above or LOB executive), core job responsibilities (strategic focus), company size of 50 or more employees, and for the implementation or planned implementation of IT telephony solutions. A total of 324 qualified respondents are represented in this summary; 186 respondents are members of the CIO audience, 138 respondents are members of the Network World audience.
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
90% of Canadian executives indicate at least some degree of gaps in IT skills at their business exists. 59% of UK executives believe the cybersecurity threat level is increasing. Find out more on how companies are adopting new technology and how it's impacting their workforce.
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
SolarWinds and Market Connections conducted an online survey of 200 federal government IT decision makers and influencers in June 2015. The survey assesses how federal IT pros are adapting, managing and assuring oversight in the areas of shadow IT, mobile technology and IT shared services.
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
SolarWinds, a leading provider of powerful and affordable IT management software, announced the findings of its Little-Known Facts survey September 12, 2017. The results reveal that IT professionals in Hong Kong tend to go above and beyond the scope of their core responsibilities as the changing business landscape demands more of their attention, both inside and outside of the office. The survey supports IT Professionals Day, which is observed the third Tuesday of every September (September 19, 2017), to emphasize the need for greater appreciation for IT professionals and the critical role they play in modern business and the lives of nearly all technology end-users.
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
A look at which applications government IT Pros are using, where applications are stored, how application problems are identified, how application performance issues are addressed, and more.
Systems Administrators AUS Survey ResultsSolarWinds
A wide-ranging survey of Australia systems administrators that captures the rapidly evolving nature of the sysadmin role and their thoughts on life inside and outside of the workplace in October 2013.
Netadmin and Sysadmin Survey Results - AUSSolarWinds
A wide-ranging survey of Australian network and systems administrators that captures the rapidly evolving nature of these IT Pros’ roles and their thoughts on life inside and outside of the workplace
Systems Administrators UK Survey ResultsSolarWinds
A wide-ranging survey of UK systems administrators that captures the rapidly evolving nature of the sysadmin role and their thoughts on life inside and outside of the workplace in October 2013
Netadmin and Sysadmin Survey Results - UKSolarWinds
A wide-ranging survey of UK network and systems administrators that captures the rapidly evolving nature of these IT Pros’ roles and their thoughts on life inside and outside of the workplace
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network SolarWinds
Need more control over Linux performance monitoring and management? SolarWinds Server & Application Monitor delivers affordable, easy-to-use Linux performance monitoring and management for your multi-vendor network. Learn how.
SolarWinds Application Performance End User Survey (UK)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds Application Performance End User Survey (North America)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
A wide-ranging survey of US systems administrators that captures the rapidly evolving nature of the sysadmin role and their thoughts on life inside and outside of the workplace in October 2013
Kiwi Syslog Server is a log management software that collects, displays, alerts, reacts to, and forwards syslog messages and SNMP traps from network devices such as routers, switches, firewalls, and Windows® servers, and Linux® and Unix® hosts.
Learn how Kiwi Syslog Server help help you simplify syslog management in your network
Kiwi CatTools is a network automation tool that helps manage device configurations on routers, switches, firewalls.
From a simple, easy-to-use console, you can simplify network configuration management, device config backup, config change alerting, config compare, reporting and more.
SolarWinds Federal Cybersecurity Survey 2016SolarWinds
The results of SolarWinds' third annual federal Cybersecurity Survey, which explores the biggest barriers to improving IT security, including exposure during consolidation and modernization processes, threats from foreign governments and careless or untrained insiders. The findings also highlight how the implementation of IT security management tools help mitigate threats, strengthening security strategies.
IoT Report 2015: Business at the Speed of ITSolarWinds
A look at the current level of preparedness for Australian IT departments to meet the complex challenges and opportunities created by the internet of things (IoT)
Given the breadth and pace of innovation, all signs point to a widening skills gap. This will put further pressure on organizations of all sizes to rethink their workforce strategies. While the notion of a skills gap is a seemingly straightforward concept, below the surface, there are many nuances to the story. This CompTIA research report explores these issues, setting the stage for approaches to tackling the IT skills gap.
Trends, Potentials and Challenges in ICT MarketNovida Global
Trends, Potentials, Challenges in ICT Market has been discussed at co-developed MSc. Program by Yıldız Technical University and Warwick University. Presented by Işık Deliorman Aydın, Founder and CEO of Novida Strategic Management Services on March 2014.
The time to blaze a new IT trail is now and it will require fresh thinking, bold approaches and innovative solutions. Are you ready? For more information, visit http://bmc.co/1xcVhuV
Highlights from the EMC & VMware CIO Summit | ATLANTA 2013, where 50 CIOs discussed topics such as the Software-defined Data Center, Cloud, Converged Infrastructure, Big Data, Security, and IT in 2020.
This report on Open Source Software (OSS) and Collaboration Technology Infrastructure is based on the survey of about 100 participants during the 2ndCollaboration Retreat 2011 for select CXOs and Delegates organized by Mithi in September 2011.
This report captures the opinions of IT decision makers in organizations across industries regarding the feasibility and future of OSS and Collaboration IT Infrastructure.
Software IT outsourcing is actual understand to stay, especially with the aware of new innovation and the deep expertise level. NEX providing top quality software outsourcing services by mastering latest processes and new technologies such as IoT, agile, Big Data, machine learning and many more.
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Defined by Cisco as “the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life,” IoT often represents the quickest path to IoE value for private and public sector organizations.
This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
These slides - based on the webinar featuring Julie Craig, research director at leading IT analyst firm Enterprise Management Associates (EMA) and Sven Hammar, CEO at Apica - cover how a leading-edge, unified monitoring and testing solution can enable companies of every size to fulfill the promise of a high-quality digital experience.
These research slides—based on the webinar from leading IT research firm Enterprise Management Associates—highlight the essential findings of EM’s research on application delivery infrastructure. The insights provided are based on a survey of 253 subject matter experts from enterprises and cloud providers.
This presentation is about the survey conducted by TechTarget,For the IT leaders and investors.This trend has seen the emergence a new IT departments, that are able to re-allocate their IT budgets in an agile way to take advantage of emerging technologies.
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight
For midmarket and small business, IT is a complex world. How are others in your space managing IT today, while taking steps to prepare for tomorrow's needs? We interviewed 408 IT pros to find out. View the SlideShare to see key statistics from our Insight 2020 Technology Report: IT Trends for Midmarket and Small Business. Find out how other companies in this space are managing IT and procurement, equipping their workforce with the right tech, handling cloud migration and where they are in their digital transformation journey.
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds
In this webinar, our presenter Vice President of Monalytic Scott Pross discussed how to implement features of the Orion Platform that can save you time and money and improve your understanding of when or where a problem occurs in your environment.
During this webinar, our presenter addressed the following questions:
What are the hidden features?
How do I add them to my monitoring environment (including best practices)?
In what scenarios should these features be implemented?
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds
Gaps are the number one reason critical issues are missed, and network outages occur. Find out how to quickly identify and remove these gaps in your infrastructure monitoring and streamline mitigation.
Government Webinar: Alerting and Reporting in the Age of ObservabilitySolarWinds
Let your IT team take the Orion® Alerting Engine to the next level while providing in-depth business reports to management. Learn how to harness the metric ton of data from your SolarWinds database to power your IT and executive teams in the observability era.
Government and Education Webinar: Full Stack ObservabilitySolarWinds
A significant number of application performance issues can be traced back to the database tier. Learn how Server & Application Monitor plus SolarWinds database portfolio can provide the necessary observability to troubleshoot performance problems.
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
Join SolarWinds® CISO, Tim Brown, and Group Vice President, Brandon Shopp for a webinar to review and discuss our most recent Public Sector Cybersecurity Survey results, including significant differences across public sector market segments and how confident the respondents were in their teams’ ability to keep up with evolving threats.
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
The next cyberattack is always around the corner, but you can use every minor incident to help you prepare for major ones. Designing your environment with security in mind at every step will help you better prepare, and you must make sure all those who contribute to your environment are equally secure, including your software partners.
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsSolarWinds
Learn how to empower your leadership by connecting the dots for them between IT challenges and how they affect your mission and agency services, while providing the granular IT data engineers need to resolve issues.
Government and Education Webinar: Simplify Your Database Performance Manageme...SolarWinds
As a data professional, you need tools to help you detect and diagnose performance issues and errors quickly. Learn how our portfolio of database tools can improve and amplify your ability to keep your databases in top condition.
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
During this interactive webinar, our presenter discussed how to leverage major Orion® Platform alert features and use lessons learned and best practices to provide actionable information for events around your organization.
Attendees learned about:
Using enhanced node status and dependencies
Defining thresholds or baselines
Categorizing and filtering with custom properties and groups
Leveraging advanced alerting features to improve alert detail and reduce noise
Ensuring persistent issues generate or escalate alerts and alarms
Integrating with chat, ticketing, APIs, and/or SMS and providing detailed poll data
Alert actions for network devices, servers, or services on failure
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
During this interactive webinar, our presenter discussed how automation can improve support levels and maximize your resources. He also reviewed how SolarWinds® IT operations management (ITOM) solutions can help with alerts, configuration management, capacity planning, and cyberthreat response and prevention.
Attendees learned about:
Alerts—leverage intelligent alerting to notify the appropriate staff members and use thresholds to trigger alerts
Configuration management—for networks, back up and standardize configs and automate repetitive tasks during upgrades; for systems, establish baselines and get notified of changes
Capacity planning—monitor system capacity and get notified when trends indicate shortages will occur; get virtualization recommendations based on data from your environment
Threat response—establish conditions for active responses to automatically make changes to deter active cyberthreats
Government and Education Webinar: Improving Application PerformanceSolarWinds
Learn about SolarWinds® systems management tools to monitor infrastructure and help improve application performance for your organization. SolarWinds systems management tools support on-premises, cloud-based, and hybrid applications.
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
During this interactive webinar, our presenter discussed how to leverage IT tools to improve operations management and support for on-site and remote workers.
Attendees learned about:
• Improving network monitoring with ipMonitor® and configuration management with Kiwi CatTools®
• Centralizing and simplifying log message management across network devices and servers
• Monitoring logs with Kiwi Syslog® Server
• Utilizing IT service management tools like SolarWinds Web Help Desk® or SolarWinds Service Desk to improve resolution rates and provide self-service
• Leveraging Dameware® tools to support users and manage systems remotely
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
This webinar reviews the basics of database monitoring using SQL Server features, like extended events and agent monitoring to show you how to extend and amplify your database performance monitoring effectiveness with SolarWinds products.
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
Attendees spent the day with SolarWinds learning how to get the most out of our network, systems, database, compliance and security products, and IT support tools. We discussed how we responded to the recent security incident, and how we’re moving forward with our Secure by Design approach. Our system engineers dove into the technical details, reviewed new products and features, and demonstrated configuration and integration points.
Presentation topics included technical updates on the following:
- Network management products and scaling the Orion® Platform
- Systems and database monitoring products
- Security and compliance products
- SolarWinds ITSM and support tools
Government and Education Webinar: Zero-Trust Panel Discussion SolarWinds
Join us for a panel discussion featuring SolarWinds® Vice President, Security and CISO Tim Brown and Vice President of Product Strategy Brandon Shopp, who discuss best practices for zero-trust security and laying the foundation for success.
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
View this webinar to learn about the SolarWinds® Orion® Assistance Program (OAP) and how to take advantage of the program. OAP provides upgrade and hotfix assistance to SolarWinds customers under active maintenance who were/are running one of the Orion Platform versions affected by SUNBURST or SUPERNOVA. Learn more details about the program, best practices and advice on lessons learned from Monalytic’s experience supporting over 100 government customers with this program, and how to get support through the program.
Government and Education Webinar: SQL Server—Advanced Performance Tuning SolarWinds
During this interactive webinar, attendees learned about:
Architecture and implementation of SolarWinds® Database Performance Analyzer (DPA) on-premises and in the cloud
What matters most when looking for SQL Server performance issue
Wait times
Blocking and deadlocking
VM metrics
Host resources
What you should be looking at if you’re running Azure SQL Database
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
In this webinar, we discussed how to recover IP addresses on your network, whether abandoned, static, or reserved.
During this interactive webinar, attendees learned about:
Gain a more complete view of your network and find abandoned IP addresses
Obtain accurate, current information about the IP addresses in use on your network
Easily change the address status from “Used” to “Available”
Receive alerts when DHCP address pools exceed utilization thresholds
Government and Education Webinar: Optimize Performance With Advanced Host Mon...SolarWinds
In this webinar, we discussed optimized monitoring with an enterprise-grade host monitor. We also reviewed how to use monitor performance on hybrid systems, optimize host resource usage, leverage templates, and understand the relationships.
During this interactive webinar, attendees learned about:
Leveraging details about application health to achieve visibility into key performance metrics
Using analytics dashboard to compare different types of data side-by-side
Monitoring VMs running on a host and make sure resources are allocated properly
Leveraging capacity forecast charts and metrics to identify when server resources will reach warning and critical thresholds
Using application monitor templates to speed up troubleshooting and focus on what to fix
Getting visibility across your systems environment, from applications to servers, virtualized infrastructure, databases, and storage system
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
In this webinar, we discussed how SolarWinds® solutions can help you overcome remote work IT challenges.
During this interactive webinar, attendees learned about:
Improve network monitoring, configuration, and VPN management with SolarWinds Network Performance Monitor (NPM) and SolarWinds Network Configuration Manager (NCM)
Monitor the server and application performance of your collaboration systems with SolarWinds Server & Application Monitor (SAM)
Utilize configuration management to efficiently deploy upgrades and improve compliance with NCM
Support users and systems remotely with tools such as SolarWinds Dameware® Remote Support (DRS) and SolarWinds Dameware Remote Everywhere (DRE)
Improve IT request management, ticket tracking, and asset management with tools like SolarWinds Web Help Desk® and SolarWinds Service Desk
Automate provisioning and permissions management with SolarWinds Access Rights Manager™ (ARM)
Locate users and devices on your network with SolarWinds User Device Tracker (UDT)
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
New IT Survey: UK
1. IT Pros Survey: UK
A look at the evolving role of IT, its drivers, needed skillsets,
and how IT pros view their roles within this “new IT” environment
Conducted by C White Consulting
November 2013
1
2. Study Overview: areas of discussion
» What are the top emerging technologies impacting/evolving
the role of IT?
» How much has increased infrastructure complexity changed
an IT pro’s roles/responsibilities within the past 3-5 years,
and how will it change the role into the next 3-5 years?
» Are IT pros both prepared and empowered to provide a
higher level of business value given these identified
emerging technologies and their definition of the “new IT”?
For the purposes of this study, “infrastructure complexity” is defined as the continuously growing,
increasingly complicated nature of the infrastructure due to new technologies (such as SDN,
virtualisation, etc.) as well as the ever-increasing responsibilities placed on IT professionals
from an IT operations perspective (by supporting new service offerings such as cloud,
mobility, etc.) and business operations perspective (such as compliance)
2
3. Demographics: breakdown of survey respondents
Company Size
(number of employees)
5%
35%
7%
14%
13%
15%
25-49 FTEs
50-99 FTEs
100-249 FTEs
250-499 FTEs
500-999 FTEs
1000-1499 FTEs
1500-4999 FTEs
5000+ FTEs
IT Pro’s Role
11%
37%
14%
3% 8%
Practitioner
Manager
Director
9%
IT Consultant
30%
Other IT-related
214 IT practitioners, managers and directors in the United Kingdom from small, mid-size and enterprise
companies participated in a November 2013 online survey
3
5. Top Emerging Technologies Evolving the Role of IT
Technology Advancement with Most Significant Business Impact in Last 3-5 Years
0%
10%
20%
30%
40%
30%
31%
34%
27%
Compute virtualisation (server or desktop)
15%
Mobility
20%
30%
18%
Cloud computing
11%
Compliance
18%
17%
21%
50%
#1
#2
60%
70%
80%
90%
100%
Overall
Small Bus
Mid-Size Bus
9%
9%
6%
10%
Data analytics
8%
11%
6%
8%
Bring Your Own ___ (BYOx) (ie BYOD, BYOA, BYOT)
Enterprise
7%
11%
4%
7%
Other
Self-service automation
SDN/virtual networks
4%
4%
2%
4%
2%
0%
2%
3%
2%
2%
4%
2%
Nearly one-third of all IT pros surveyed indicate that compute virtualisation (server or desktop) is the
technology advancement that had the most significant impact on their business within the last 3-5
years, followed closely by mobility. By business size, small business IT pros and enterprise IT pros indicate
that cloud computing (rather than mobility) follows compute virtualisation.
Which technological advancement had the most significant impact on your
company within the last 3-5 years? [choose only one, provided “other” fill in
blank option as well]
5
6. Top Emerging Technologies Evolving the Role of IT
Emerging Technology That Is Most Disruptive to Business
0%
10%
20%
30%
27%
26%
Bring Your Own ___ (BYOx) (ie BYOD, BYOA, BYOT)
22%
22%
26%
24%
20%
Mobility
13%
11%
11%
15%
Cloud computing
Data analytics
10%
7%
8%
39%
50%
#1
#2
60%
70%
80%
90%
100%
Overall
Small Bus
Mid-Size Bus
Enterprise
10%
9%
9%
10%
Compliance
40%
Compute virtualisation (server or desktop)
Self-service automation
Other
SDN/virtual networks
2%
9%
7%
17%
13%
6%
4%
4%
9%
2%
4%
0%
2%
1%
2%
0%
2%
One-fourth of all IT pros surveyed indicate that Bring Your Own ___ (BYOx) – such as device (BYOD) or
application (BYOA) – is the emerging technology that is most disruptive to business (in terms of having the
most significant impact on business operations as well as IT time/energy spent). Mobility, cloud
computing, data analytics, and compliance round out the top 5 overall. By business size, BYOx and mobility tie
for the most disruptive emerging technology of small business IT pros, and compliance jumps to #3 on
that same small business list.
Which of the following emerging technologies is the most disruptive to your
business (in terms of having the most significant impact on business operations
as well as IT time/energy spent)? [choose only one, provided “other” fill in
6
blank option as well]
7. Top Emerging Technologies Evolving the Role of IT
Technology Investment Needed Today to Remain Competitive in Next 3-5 Years
0%
10%
20%
30%
26%
25%
25%
Cloud computing
24%
21%
23%
Mobility
11%
Compute virtualisation (server or desktop)
7%
9%
8%
7%
7%
Bring Your Own ___ (BYOx) (ie BYOD, BYOA, BYOT)
Other
SDN/virtual networks
32%
#1
#2
60%
70%
80%
90%
100%
Overall
Small Bus
Enterprise
19%
13%
7%
8%
5%
8%
Self-service automation
Compliance
32%
50%
Mid-Size Bus
14%
16%
17%
8%
Data analytics
40%
4%
0%
2%
6%
4%
0%
8%
3%
1%
0%
0%
3%
Just over one-fourth of all IT pros surveyed indicate that cloud computing is the most important technology for
their business to invest in today in order to remain competitive for the next 3-5 years. Just under one-fourth of
all IT pros surveyed indicate mobility is that technology. By business size, mid-size business IT pros feel even
stronger about both technologies, with 32% of mid-size IT pros selecting cloud computing and another 32%
selecting mobility as the most important technology for their business to invest in today to remain competitive.
In order to remain competitive for the NEXT 3-5 years, what is the most
important technology, IT service, or business operation for your company to
invest in today? [choose only one, provided “other” fill in blank option as well]
7
9. Infrastructure Complexity & Its Impact on IT Pros
Impact of Infrastructure Complexity on IT Role
in Last 3-5 Years (Overall)
0%
17%
0%
39%
44%
It has greatly affected my
role/responsibilities
10%
40%
It has somewhat affected
my role/responsibilities
It has not affected my
role/responsibilities
49%
Small Business IT Pros
Do not know
Mid-Size Business IT Pros
9% 0%
38%
53%
Enterprise IT Pros
8% 1%
42%
50%
Nearly 90% of IT professionals said infrastructure complexity has either somewhat affected or greatly affected
their role/responsibilities within the last 3-5 years. By business size, only 83% of small business IT pros feel
affected, much less than their mid-size and enterprise IT pro constituents. And slightly more mid-size IT pros
feel that infrastructure complexity has “greatly affected” their role/responsibilities compared with their small
business and enterprise IT pro counterparts.
Based on the definition of “infrastructure complexity” above, how much has
increased infrastructure complexity changed your IT role/responsibilities within
the last 3-5 years? [choose only one]
9
10. Infrastructure Complexity & Its Impact on IT Pros
Length of Time Technologies Have Been Managed by IT
0%
Compute virtualisation (server or desktop)
Mobility
Compliance
10%
6%
2%
4%
1%
20%
30%
SDN/virtual networks
Bring Your Own ___ (BYOx) (ie BYOD, BYOA, BYOT)
3%
3%
2%
2%
1%
90%
100%
50%
32%
33%
18%
16%
IT has managed 1-3yrs
23%
14%
12%
13%
IT has managed <1yr
27%
Managed in dept other than IT
23%
20%
18%
18%
Managed by MSP
Do not use
28%
17%
14%
22%
42%
14%
16%
36%
30%
14%
Self-service automation
80%
IT has managed >3yrs
8%
2%
70%
53%
4%
4%
4%
60%
9%
21%
Data analytics
50%
27%
8%
3%
Cloud computing
40%
22%
20%
4%
38%
Over half (53%) of all IT departments surveyed are currently managing ALL listed technologies. Compute
virtualisation, mobility and compliance have been managed by IT the longest, with at least one-third of IT
departments having managed each technology for over 3 years. One-fifth or less of IT departments have
managed self-service automation, Bring Your Own ___ (BYOx) and data analytics for less than one year.
Compliance and data analytics are each managed by an internal department other than IT
within slightly over 10% of all companies surveyed.
IT professionals are increasingly asked to take on additional responsibilities as
new technologies, IT service offerings, and business operations requirements
emerge. As a result of this increased infrastructure complexity, which
statement below best applies to each of the following technologies? [choose
10
one response per row, provided “other” fill in the blank option as well]
11. Infrastructure Complexity & Its Impact on IT Pros
IT Skills Becoming Automated within Next 3-5 Years
0%
10%
20%
30%
40%
45%48%
45% 50%
48%
43%
Virtualisation
26%
Server management
Cloud or SaaS
34%
Data center
18%
Mobile apps/device management
18%
Database administration
Information security
Business analytics
9%
Network engineering
Project management
Programming/Development
43%
49%
44%
33%
25%
60%
70%
80%
90%
100%
#1
59%
#2
Overall
Small Bus
Mid-Size Bus
43%
29% 34%
30%
Enterprise
25%
23%
20%
28%
23%
17%
23%
25%
17%
23%
11% 17%
17% 21%
23%
13%
Technical support
Other
50%
14%
14%
16%
4%
6%
2%4%
3%
4%
2%
3%
1%
2%
2%
1%
Nearly half of all IT pros surveyed indicate that both virtualisation and server management are the top IT
skillsets that will become automated within the next 3-5 years, followed by cloud/SaaS. Over 96% of IT pros
agree that neither programming/dev nor project management will become automated within that same time
period. By business size, only small business IT pros deviate from the overall top 3 (though the order of the top
3 varies for enterprise) as cloud/SaaS moves ahead of virtualisation, and mobile apps/device management
replaces server management as more likely to become automated within the next 3-5 years.
Which IT skills will become automated within the next 3-5 years? [choose all
that apply, provided “other” fill in blank option as well]
11
12. Infrastructure Complexity & Its Impact on IT Pros
IT Skills in Higher Demand within Next 3-5 Years
0%
10%
20%
30%
40%
Cloud or SaaS
45%
60%
53%
51%
52%
54%
43%
Information security
34%
Mobile apps/device management
Virtualisation
Business analytics
23%
28%
Project management
Programming/Development
14%
46%
50%52%
44% 49%
48%
41%
38%
40%
43%
35%
45%
35%
70%
80%
90%
100%
#1
57%
59%
#2
Overall
Small Bus
Mid-Size Bus
Enterprise
25%
30%
26%
21%
26%
20%
18%
17%
25%
14%
15%
16%
8%
17%20%
14% 19%
20%
10%
11%
9% 11%
12%
Network engineering
Technical support
Data center
Database administration
Server management
Other
50%
2%4%
5%
4%
Slightly over 50% of all IT pros surveyed indicate that cloud/SaaS and information security are the top IT
skillsets that will be in higher demand within the next 3-5 years, followed by mobile apps/device management.
Over 86% of IT pros agree that data center, database administration, and server management will not be in
any higher demand over the next 3-5 years. By business size, both small business and mid-size IT pros also
include virtualisation within the top IT skills that will be in higher demand within the next 3-5 years.
Which IT skills will be in higher demand within the next 3-5 years? [choose all
that apply, provided “other” fill in blank option as well]
12
13. Infrastructure Complexity & Its Impact on IT Pros
IT Role Needing to Adapt The Most within Next 3-5 Years
0%
10%
20%
30%
36%
Information security
30%
11%
11%
Applications
Network
10%
9%
6%
Privacy
Data center
Systems
Server
Database administration
Firewall
Repair
Other
40%
4%
5%
8%
8%
40%
38%
#2
17%
21%
50%
60%
70%
80%
90%
100%
#1
Overall
Small Bus
23%
Mid-Size Bus
10%
13%
14%
Enterprise
11%
6%
8%
9%
4%
5%
6%
2%
6%
3%
4%
0%
4%
1%
2%
2%
1%
1%
0%
2%
2%
1%
4%
2%
0%
Nearly 40% of all IT pros surveyed indicate that information security is the IT role that will need to adapt the
most to evolving technology within the next 3-5 years. By business size, at or near 40% of small business and
enterprise IT pros agree, while just under one-third of mid-size IT pros feel the same. A distant second overall
is the applications role, where 17% of all IT pros feel this role will need to adapt the most to evolving
technology. By business size, small business IT pros indicate the role of privacy as second behind information
security, while mid-size IT pros choose the network role for the second spot.
Which IT role will need to adapt the most to evolving technology within the next
3-5 years? [choose only one, provided “other” fill in blank option as well]
13
15. IT Pro Preparation & Empowerment for the “New IT”
IT Pro Confidence in Providing Guidance for
Strategic Business Decisions (Overall)
4% 0%
Small Business IT Pros
2% 0%
28%
70%
I am completely confident
Mid-Size Business IT Pros
0%
0%
29%
I am somewhat confident
32%
I am not confident at all
68%
Do not know
68%
Enterprise IT Pros
5%
1%
28%
66%
While 97% of all IT pros are some degree of confident that they could provide the guidance and expertise
necessary to help their company make informed, strategic business decisions with regard to emerging
technologies, less than one-third are completely confident in that same endeavor (regardless of business size).
With emerging technologies creating greater infrastructure complexity, the role
of the IT professional has become even more sophisticated. How confident are
you that you could provide the guidance and expertise necessary to help your
company make informed, strategic business decisions with regard to emerging
technologies? (for example, provide a business case (business value/impact)
15
for a new IT idea/project within your area of responsibility)? [choose only one]
16. IT Pro Preparation & Empowerment for the “New IT”
Opportunity for IT Pro to Provide Guidance
for Strategic Business Decisions (Overall)
Small Business IT Pros
13% 2%
44%
3%
41%
All the Time
17%
38%
Mid-Size Business IT Pros
13%
Occassionally
4%
39%
43%
Rarely
42%
Never
Enterprise IT Pros
20%
3%
35%
43%
Almost every IT pro (97%) is given the opportunity to provide the guidance and expertise necessary to help
their company make informed, strategic business decisions with regard to emerging technologies; however, the
majority (59%) only have the opportunity to do so “occasionally” or “rarely”. By business size, as company size
increases, the opportunity to provide guidance “all the time” decreases slightly.
How often are you given the opportunity to provide the guidance and expertise
necessary to help your company make informed, strategic business decisions
with regard to emerging technologies? (for example, provide a business case
(business value/impact) for a new IT idea/project within your area of
responsibility)? [choose only one]
16
17. IT Pro Preparation & Empowerment for the “New IT”
Additional Skills Needed by IT Pros in order to Feel More Empowered
0%
10%
20%
30%
40%
50%
60%
49%
57%
I would need more training in my area(s) of responsibility
70%
#1
35%
50%
37%
I would need a better understanding of the business
90%
100%
Overall
Small Bus
Mid-Size Bus
#2
31%
33%
80%
Enterprise
41%
27%
28%
I do not need anything else - I am confident I could do so today
33%
24%
9%
I would need something else
4%
11%
10%
Sampling of Noteworthy Open-Ended Responses for “Need
Something Else”
Earlier Engagement in Business Planning Process: “better contacts
across the breadth of the business”, “I would need to understand the thinking
behind the business plan”, “long term strategic direction”, “clear, strategic
business objectives”, “better awareness of developments in areas outside
immediate area of responsibility”
Greater Management Support: “senior management confidence”, “bosses
that would trust our judgment rather than spend money on input”
Just under half of all IT pros surveyed indicate that they would need more training in their area(s) of
responsibility in order to feel more empowered to provide the guidance and expertise necessary to help their
business make informed, strategic decisions regarding emerging technologies. Almost 40% would need a better
understanding of the business, while 27% feel they need nothing else. As business size increases, so does the
percentage of IT pros needing a better understanding of the business. And for every small business IT pro that
needs a better understanding of the business, nearly two small business IT pros need more training.
What else would you need to feel empowered within your organization to
provide the guidance and expertise necessary to help your business make
informed, strategic decisions regarding emerging technologies? [choose all
17
that apply, provided “other” fill in blank option as well]
18. IT Pro Preparation & Empowerment for the “New IT”
How IT Pros Define the “New IT” Environment
0%
10%
17%
Adopting cloud/SaaS + virtual networks/SDN
7%
Broader partnership/better relationship with business
End user-driven, self-service automation
Never heard of term
Accessing info from any device, anywhere, anytime
Adopting cloud/SaaS + mobility
Increased agility/adaptability to innovation
Term means nothing/buzzword
20%
4%
30%
23%
#1
18%
#2
12%
11%
9%
14%
10%
10%
9%
5%
18%
17%
8%
9%
6%
7%
11%
8%
4%
5%
11%
8%
6%
16%
5%
6%
8%
5%
5%
Nearly one-fifth of all IT pros define the “New IT”
environment as adopting cloud/SaaS AND virtual
networks/SDN, while another 12% consider “New IT”
a broader partnership/better relationship
with business.
The “New IT” is a concept that is increasingly being discussed within the IT
industry, yet no standardized definition exists today. How would you
18
define the “new IT”? [fill in blank]
40%
50%
60%
70%
80%
90%
100%
Overall
Small Bus
Mid-Size Bus
Enterprise
Sampling of Noteworthy Open-Ended Responses for Top 3
Adopting cloud/SaaS + virtual networks/SDN: “being a strategic department
that can deliver and broker services. Using private and public cloud systems, and
virtualisation alongside traditional infrastructure”, “transition to IT as a
service”, “software as a service, infrastructure on demand”, “all infrastructure and
services will become cloud-based”, “increasingly cloud-based computing”, “… softwaredefined everything”, “cloud and virtualisation on a huge scale”, “virtualisation and
delivering services from the cloud”
Broader partnership/better relationship with business: “business-enabler
focused on delivering and reducing business capabilities in an agile manner that is
matched to the changing environment of the business”, “… understand business needs
and customer requirements … put simply, that is to use technical knowledge to advise
the business how to maintain competitive advantage through technology”, “will entail a
lot more high-level planning rather than getting involved in the fundamentals
anymore”, “greater intermesh of IT as a business enabler fully imbedded and informed
… to achieve the main business objectives of the enterprise”, “value-led”, “providing
the capabilities the organisation most needs in line with its most essential ways of
creating value”, “the skill to recognise that decisions should be business-driven, not
technology-driven … offer[ing] true added value”, “much, much more integrated into
the business”, “the ability to serve the business and be seen as a business
partner”, “more integral part of the business …”, “business-enabled IT”, “IT aligned to
the business”, “greater integration with business needs”
End user-driver, self-service automation: “invisible IT to the end-user –
intuitive, simple, affordable, and accessible”, “empowering users to self-manage and
the infrastructure to support this”, “users taking self-service ownership of data …”, “the
transition to self-service IT (ie IT delivery automation”, “user-specific IT – IT a la
carte”, “user-driven, demand-focused IT”, “consumerisation”, “… IT as a
utility”, “heterogeneous, mobile, self-administered, elastic”
Editor's Notes
BY BUSINESS SIZE:Small Business (50-249 FTEs): Just over half do not use SDN/virtual networks (51%) or self-service automation (55%). Same 3 (in differing order – mobility, compute virtualisation, compliance (and cloud computing)) as “overall results” have been managed by IT the longest. Same 2 (at much higher percentages – 26% compliance, 19% data analytics) as “overall” results managed by internal department other than IT.Mid-size Business (250-999 FTEs): Half or more do not use self-service automation (52%) or SDN/virtual networks (50%). Same 3 (in same order) as “overall results” have been managed by IT the longest. Same 2 (at similar percentages) as “overall” results managed by internal department other than IT.Enterprise (1K+ FTEs): Same 3 (in same order) as “overall results” have been managed by IT the longest. Same 2 (at similar percentages) as “overall” results managed by internal department other than IT. 13% use a managed service provider (MSP) for cloud computing.
Note: While cloud/SaaSand virtualisation both sit within the overall top 3-5 of both “skills that will become automated in next 3-5 years” and “skills that will be in higher demand within next 3-5 years”, this is not necessarily contradictory results. Less than half of respondents indicated that virtualization and cloud/SaaS (respectively) will become automated, while about the same number (for virtualisation) and slightly more than half for cloud/SaaS indicate the skill will be in higher demand. Ultimately, it seems to show that IT pros are split almost 50/50 as to what skillsets will be needed moving forward. In addition, by business size, more enterprise than mid-size than small business IT pros feel that virtualization will become automated while the reverse is true for virtualization being in higher demand (more small business than mid-size than enterprise IT pros believe this will be true).
Additional Open-Ended Responses (categorized – OVERALL, SB, MB, E):Bring Your Own ___ (BYOx) 1%, 0%, 5%, 1%Other (not categorized elsewhere) 12%, 13%, 18%, 9%Cannot yet define the term/do not yet know 4%, 4%, 7%, 4%Gibberish response 3%, 6%, 0%, 4%Additional Noteworthy Open-Ended Responses (OVERALL):Adopting cloud/SaaS + mobility: “more reliance on cloud services and expectation of mobility”, , “mobile technologies and the movement towards cloud computing and storage”, “the old IT plus cloud computing and mobile services”, “increasing use of mobile devices and cloud computing”, “mobile devices, the cloud and opportunities for data collection, combination and analysis”, “enabling the organisation to mobilise with minimal constraints whilst maintaining data integrity and security – anywhere”, “mobile application development and cloud computing”Accessing info from any device, anywhere, anytime: “any time any place anywhere with security and integrity”, “secure access to applications, data, systems anywhere”, “providing information to users when they want it, how they want it, where they want it regardless of technology”, “access 24/7”, “fast, secure, energy efficient, and available on-demand, any time, anywhere”, “a model where location and device is depreciated but it is all about apps accessible from anywhere”, “seamless integration enabling business functions to perform their operations irrespective of location and device without worrying about system security, privacy and capability”, “where everyone everywhere can access everything from anywhere and the roles of IT departments are to manage this access and secure this access and offer this access”, “giving users access to exactly the right information at exactly the right time exactly where they are”Increased agility/adaptability to innovation: “smaller, lighter and more agile”, “adapting to the changing environment”, “constantly evolving infrastructure … got to keep up”, “agile IT …”, “moving goalposts and ever-changing”, “flexible and agile, proactive rather than reactive”, “agile systems that are always available”, “ability to adapt changing infrastructure technologies and restrictions of budget and timescale for implementation”, “flexible, mobile, on-demand”, “making it EASIER”“Other” (not categorized elsewhere):“empowering IT”, “IT becomes a utility consumed by intelligent people with skills in other disciplines and distributed by a select few distribution companies”, “very fragmented world”, “Chief Juggler!”