As Ferris Bueller once said, "Life moves pretty fast." It is especially true for those of us working in IT.
Microsoft releases two major Windows 10 updates per year, and in addition 12 monthly updates for their operating system. Change is unrelenting and so are the potential dangers that accompany it.
Despite Microsoft being one of the largest, most trusted software vendors in the world, I could very likely find news articles pointing out failures with each new release over the last few years. These bugs can mean the applications you need to do your job don't function properly, or worst, don't work at all.
Of course, Microsoft is only one small part of the overall stack of your hardware and software and each element can require frequent changes that can impact you as an end-user. The fact is changes happen all the time in the overall VDI stack.
What Does Change Mean?
When you consider that the average end-user interacts with at least 8 applications, then think about how important those applications are in the overall success of the business and how often the interface between the application and the hardware needs to be updated, it's a potential minefield for business operations. Any single update could explode in your face at any time.
Given the ever-accelerating pace of IT change, how can businesses cope?
Safe Not Sorry
As lockdown restrictions ease, I'll be off on some campervan adventures around Scotland. I want to be able to cook safely and have off-grid heating (it is Scotland after all), which means using gas. Now, as you'll know, installing gas heating in a small confined space comes with the risk of Carbon Monoxide poisoning, and to be honest, my cooking often comes with the risk of fire! So, as I'm aware of the danger, I'm putting in smoke and CO detectors, plus installing a fire blanket and a fire extinguisher. I value my van and, more importantly, my life.
Likewise, any company managing an ever-changing software stack needs to consider the risks associated with putting blind trust into the hands of software vendors like Microsoft. My advice would be to de-risk frequent IT changes with a robust application testing strategy.
Start with automating the process of testing your applications and see if there are any problems with them after making updates to the hardware and software platforms they reside on. Preferably use a testing solution where synthetic users test all the typical activities that real users need to perform in your application. You then should be able to answer the following questions after each change to your environment:
■ Does the software work?
■ How long does it take to do each business-critical task?
■ Is the application response time within an acceptable range?
But what if you have fancy and custom-built applications? Look for a solution that can help you design custom scripts to test your custom applications.
The Latest
If there's one thing we should tame in today's data-driven marketing landscape, this would be data debt, a silent menace threatening to undermine all the trust you've put in the data-driven decisions that guide your strategies. This blog aims to explore the true costs of data debt in marketing operations, offering four actionable strategies to mitigate them through enhanced marketing observability ...
Gartner has highlighted the top trends that will impact technology providers in 2024: Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider ...
In MEAN TIME TO INSIGHT Episode 4 - Part 1, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and network management ...
The integration and maintenance of AI-enabled Software as a Service (SaaS) applications have emerged as pivotal points in enterprise AI implementation strategies, offering both significant challenges and promising benefits. Despite the enthusiasm surrounding AI's potential impact, the reality of its implementation presents hurdles. Currently, over 90% of enterprises are grappling with limitations in integrating AI into their tech stack ...
In the intricate landscape of IT infrastructure, one critical component often relegated to the back burner is Active Directory (AD) forest recovery — an oversight with costly consequences ...
eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster(link is external) and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...
Data mesh, an increasingly important decentralized approach to data architecture and organizational design, focuses on treating data as a product, emphasizing domain-oriented data ownership, self-service tools and federated governance. The 2024 State of the Data Lakehouse report from Dremio presents evidence of the growing adoption of data mesh architectures in enterprises ... The report highlights that the drive towards data mesh is increasingly becoming a business strategy to enhance agility and speed in problem-solving and innovation ...
Too much traffic can crash a website ... That stampede of traffic is even more horrifying when it's part of a malicious denial of service attack ... These attacks are becoming more common, more sophisticated and increasingly tied to ransomware-style demands. So it's no wonder that the threat of DDoS remains one of the many things that keep IT and marketing leaders up at night ...
Today, applications serve as the backbone of businesses, and therefore, ensuring optimal performance has never been more critical. This is where application performance monitoring (APM) emerges as an indispensable tool, empowering organizations to safeguard their applications proactively, match user expectations, and drive growth. But APM is not without its challenges. Choosing to implement APM is a path that's not easily realized, even if it offers great benefits. This blog deals with the potential hurdles that may manifest when you actualize your APM strategy in your IT application environment ...