Wednesday, January 31, 2018

Word of the Day: hands-off infrastructure management

Word of the Day WhatIs.com
Daily updates on the latest technology terms |January 31, 2018
hands-off infrastructure management

Hands-off infrastructure management is the remote, automated administration of server, storage and network resources. When products are marketed with the label "hands-off," it means they have been designed and configured to run with minimal human assistance.

 

Cloud providers use the term "hands-off" to emphasize the fact that they handle the physical elements of infrastructure management for clients. The term is often used by vendors to imply that a given system can, for the most part, run by itself. For example, it may have artificial intelligence (AI) capabilities built in and use machine learning algorithms to correlate events in the IT infrastructure with problems in application and business environments.


Data center administrators can use hands-off management software tools to manage diverse infrastructure from a tablet or smartphone. The executive dashboards that allow admins to collect relevant data and receive alerts also allow them to respond to events without having to physically touch infrastructure components. Operations that can be performed remotely include rebooting, shutdown, troubleshooting, patching, fan-speed control and operating system reinstallation.

 

Some automated infrastructure management tools can even monitor and manage passive physical infrastructure, such as cabling, within an enterprise data center. The software provides administrators with visualizations for physical rack space availability, available patch panel ports and switch ports, as well as other elements that are useful for equipment deployment and moves.

Quote of the Day

"Automated infrastructure management took a step forward with the emergence of AIOps monitoring tools that use machine learning to proactively identify infrastructure problems." -- Beth Pariseau

 

Trending Terms

infrastructure management

IT automation

robotic process automation

lights-out management

software robot

machine learning

remote hands

 

 
Learning Center

AIOps tools portend automated infrastructure management
Automated infrastructure management will soon become reality in DevOps shops as IT monitoring tools lay groundwork with new AIOps features.

Evaluate DCIM software and its impact on the data center
Discover the capabilities that an effective DCIM software system can bring to the data center and how buyers can evaluate these features.

When to consider converged infrastructure technologies
Converged infrastructure technologies can simplify a data center, but make sure you ask the right questions before deciding they are a proper fit.

Change management automation alters the face of network configuration
Manually configuring and managing network changes is a chore of the past, thanks to products that automate these tasks.

Brush up your cloud automation and orchestration skills
Cloud automation and orchestration are critical technologies that save IT shops time and money. Use these five tips to implement them correctly.

Writing for Business

The promise of automation is that people will need to work _____ hours.
a. fewer
b. less
Answer


 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

On-premise vs. SaaS-based infrastructure monitoring

 
On-premise vs. SaaS-based infrastructure monitoring
Sponsored by: LogicMonitor
IT infrastructure is evolving and scaling at an exponential rate – and your organization needs a flexible monitoring tool if you hope to keep up with the breakneck pace of change. Is SaaS-based monitoring the right move for your business?

Today’s featured resource counts down 8 reasons to consider SaaS-based infrastructure monitoring over on-premise monitoring tools. Here are 3 now:
  • It deploys quickly
  • It makes costs more predictable
  • It delivers high availability
Learn more about these points, and uncover the rest, by reading on.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Storage Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

5 principles of monitoring excellence

5 principles of monitoring excellence
Sponsored by: LogicMonitor
Comprehensive monitoring of your entire IT environment is a must if you’re to survive in today’s high-risk business world – but doing monitoring wrong can result in high costs, increased downtime, and a loss of employee and consumer confidence.

Today’s featured guide counts down five tips for ongoing monitoring of your complete IT environment. Here are some now:
  • Correlate events and performance changes
  • Increase predictability using historical data to forecast the future
  • And 3 more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Networking Media Group.

Copyright 2015 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Networking Media Group,
Go to unsubscribe.

TechTarget Networking Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

SAP vs. Google vs. IBM and more: Digital transformation vendors shortlist

 
SAP vs. Google vs. IBM and more: Digital transformation vendors shortlist
Informed by client inquiries, customer references, vendor selection projects, and internal research, Constellation Research set out to investigate the top “digital transformation” target platforms, which in scale and functionality must be able to evolve and support any enterprise’s new digital initiatives. Here are the results.

Download this resource to see the ShortList of 8 distinguished cloud vendors which provide digital business reference models/blueprints, low code support, design thinking, and migration tools/services for a top-to-bottom infrastructure stack— all to assist you in delivering new, strategic digital products and services.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Data Center and Virtualization Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

PaaS vs. on-prem development for web, mobile, and IoT apps

 
PaaS vs. on-prem development for web, mobile, and IoT apps
Cloud is widely accepted as one of the key drivers of digital transformation, and under that influence, PaaS tools are turning more and more heads when it comes to changing the way apps are built and customized.

This Gartner resource examines how PaaS vendors are innovating and changing their platforms to further improve how they impact development projects. Learn about the SAP Cloud platform, and explore topics like:
  • PaaS-based mobile app development and integration
  • Multi-cloud development strategies
  • Self-managed, private PaaS vs. just Agile and DevOps on-premise
  • The split market segments for PaaS, IaaS, and SaaS
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Business Applications and Architecture Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Business Applications and Architecture Media Group.
Go to unsubscribe.

TechTarget Business Applications and Architecture Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Applying AI to ITSM; scouring social data to improve public health

IT Strategy Digest
Content from TechTarget's global network for CIOs and IT Leaders |Jan. 31, 2018
TechTarget
TIP
Prepare now for an AI-assisted ITSM strategy
Jennifer Wels, Contributor
What does it mean to have an AI-assisted ITSM strategy? Pink Elephant's Jennifer Wels outlines seven areas where AI can be applied to ITSM. (SearchCIO.com)
Advertisement
NEWS
 
In 2018, legal tech trends attest to power of data
Data becomes paramount, worldwide laws may call for contractual changes and the demand for digital services is prompting a litigation shift, according to law firm Mayer Brown. (SearchCIO.com)
 
IT areas of focus in 2018 include outcome-based security services, data lakes
Rahul Singh, managing director at IT outsourcing advisory Pace Harmon, dissects the 2018 trends in three important IT areas for CIOs. (SearchCIO.com)
 
Mining the digital phenotype has big data written all over it
John Brownstein of Boston Children's Hospital explains how his team is "putting the public back in public health" by mining troves of nonclinical data culled from social media. (SearchCIO.com)
 
Analyst: CIOs set the stage for an AI initiative, but they don't own it
In this video, analyst Zeus Kerravala explains the CIO's role in an AI initiative and offers advice about how to secure AI funding. (SearchCIO.com)
EXPERT ADVICE
 
Digital epidemiology takes on flu with help from you
The chief innovation officer at Boston Children's Hospital is building digital epidemiology tools that engage consumers and better understand their behavior. (SearchCIO.com)
 
Definition: Change management
This definition explains the meaning of change management and describes the various models businesses use to carry out a change. (SearchCIO.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from IT Strategy Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget CIO and IT Management Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

Incident response: 6 phases of an effective plan

 
Incident response: 6 phases of an effective plan
68% of respondents to a recent SAN survey cited a skills shortage as being an impediment to effective incident response.

This 48-page e-book provides insight into effective incident response strategies, why they are necessary, and step-by-step improvements you can take to advance your posture.

Uncover:
  • 6 phases of an incident response plan
  • Processes and procedures of incident response
  • Types of security incidents
  • Incident response tools
  • Incident response training vs. security awareness training
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

9 steps to becoming GDPR compliant

 
9 steps to becoming GDPR compliant
The GDPR has the potential to significantly alter the way businesses handle and store data as it consolidates and replaces many local data protection laws.

This guide offers a 9-step GDPR checklist to ensure your organization is prepared for the May 2018 regulation.

Uncover the 9 steps, focusing on:
  • SIEM
  • Vulnerability management
  • Breach detection
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

CA Veracode Virtual Summit - Coming Soon!

Winter 2018 Virtual Summit: Assembling the Pieces of the DevSecOps Puzzle  

Virtual Summit Email.png

Reserve Your Seat Today!

February 28th, 2018

11am - 6pm EST

REGISTER TODAY
 
 

By popular demand, CA Veracode is bringing back another Virtual Summit featuring a marquee lineup of speakers. This year, we are going beyond theory and principle and diving into practical discussions on integrating security into your development pipeline. Our panel of experts will lead discussions on piecing together the puzzle of a cohesive application security program in a DevOps world.
Here are the topics we will be discussing at this year's summit:


• Keynote: DevSecOps Beyond the Myths: Cutting Through the Hype and Doubt to Get Results
Sam King, SVP and General Manager, CA Veracode

• Creating Security Champions
Sonali Shah, VP of Product Strategy, CA Veracode

• The Importance of Developer Training
Maria Loughlin, SVP of Engineering, CA Veracode

• Integrating AppSec into Developer Tools and Processes
Tim Jarrett, Senior Director, Enterprise Security Strategy, CA Veracode

• AppSec Policies in a DevOps World
Pej Pourmousa, VP of Program Management, CA Veracode

• If Developers Own Security Testing in DevOps – What is Security's Role?
Chris Wysopal, Co-Founder and CTO, CA Veracode

• Panel Discussion: How Your Company Can Move From Understanding DevSecOps to Implementing It

 
Find Out More About How to Solve the DevSecOps Puzzle →
 

Speakers

SamK.png

Sam King

SVP and General Manager

CA Veracode

Sonali.png

Sonali Shah

VP of Product Strategy

CA Veracode

Maria

Maria Loughlin

SVP of Engineering

CA Veracode

 
Tim J

Tim Jarrett

Senior Director, Enterprise Security Strategy

CA Veracode

Pejman

Pejman Pourmousa

VP of Program Management

CA Veracode

 
 
Chris W

Chris Wysopal

Co-Founder and CTO

CA Veracode

 
 

Contact Us

Sales: 888-937-0329

Support: 877-837-2203

EMEA: +44 (0)203 761 5501

Visit the new Community!

65 Network Drive

Burlington, MA 01803

36 Queen Street

London, EC4R 1BN

United Kingdom

 
 
Twitter
Facebook
LinkedIn
 
                                                           

This email was sent to dasmith1973.blog@blogger.com. If you no longer wish to receive these emails you may unsubscribe at any time.