Part Two: AiThority Interview Series with Edmond Baydian, Chief Strategy Officer at Optanix
August 2019 — It’s become evident to us that increased automation is critical. Many of our customers are telling us they have a lot of information about their operating environments, but they have less time to interpret the data itself. They want their monitoring and management solutions to drive more insights and they want to automate more functions. Learn morePart One: AiThority Interview Series with Edmond Baydian, Chief Strategy Officer at Optanix
April 2019 — There have been great strides in the performance world. There are many algorithmic approaches that the performance management vendors have brought to market over the last couple of years. When we think about AIOps and machine learning, we see it adding multiple layers of value. Advanced automation, for example, can provide incredible value to an […] Learn morePodcast: Optanix discovering problems before they occur, creating new MSP opportunities
March 2019 — Optanix is a long time MSP specializing in real-time communications use cases (such as UC, Contact Center and collaboration). The company has taken its own service assurance platform and released its first stand-alone software product to partners and customers. Optanix Service Assurance platform features machine learning and advanced analytics capabilities, making it the first AIOps […] Learn moreDelivering “5 Nines Availability” to Improve Business Outcomes
March 2019 — The classic definition of “5 nines” refers to an uptime of greater than 99.999%, or just over five minutes of downtime per year. By contrast, an uptime of 99.9%, or “3 nines” is about 8.7 hours of downtime per year – more than a full business day. Downtime like that can do some real financial […] Learn moreWhen business services fail due to IT cyberattacks & how to protect your organization
February 2019 — When we think about cybersecurity, we most often think about compromised PII — Personally Identifiable Information. PII includes the social security numbers, account numbers, addresses and so on that allow bad actors to open unauthorized accounts in people’s names, to drain existing accounts, and to generally create adverse and hard-to-reverse impacts on the victims. Learn moreNo upcoming events right now. Please check back here later.