Topic

risk management

Collection size
232 articles
Page 12 of 12
Efficient Ops
Efficient Ops
Nov 17, 2019 · Operations

Mastering Shell Script Best Practices for Reliable Automation

This article outlines how to transform manual and scripted operations into automated and intelligent processes by applying comprehensive shell scripting standards, avoiding common pitfalls, and implementing risk‑mitigation techniques such as proper headers, quoting, logging, concurrency locks, and safe file handling.

Linuxautomationbest-practices
0 likes · 9 min read
Mastering Shell Script Best Practices for Reliable Automation
Efficient Ops
Efficient Ops
Dec 12, 2018 · Operations

Essential Project Management Practices Every Manager Should Master

This article shares practical insights on project management, covering how to understand project goals, assess resources, communicate with stakeholders, handle risks and changes, create effective plans, and ensure successful delivery through disciplined documentation and verification.

change controlcommunicationplanning
0 likes · 23 min read
Essential Project Management Practices Every Manager Should Master
Efficient Ops
Efficient Ops
Oct 16, 2018 · Fundamentals

Navigating Open Source Licenses: Common Pitfalls and How to Avoid Them

This article explains the rapid rise of open‑source technologies, outlines common questions and risks associated with open‑source license usage, summarizes a guide covering eleven major licenses, and announces the OSCAR Open Source Pioneer Day where experts will discuss compliance and best practices.

Open Sourcecloud computinglicense compliance
0 likes · 7 min read
Navigating Open Source Licenses: Common Pitfalls and How to Avoid Them
Efficient Ops
Efficient Ops
Apr 19, 2017 · Information Security

From Zero to Secure: How Zhaogang Built Its Information Security Operations

This article details Zhaogang's journey from a chaotic startup environment to a mature, multi‑stage security operation, covering its background, the four‑phase security framework, traditional security domains, and practical strategies for driving security initiatives across the organization.

B2BInfrastructureinformation security
0 likes · 17 min read
From Zero to Secure: How Zhaogang Built Its Information Security Operations
Efficient Ops
Efficient Ops
Mar 30, 2017 · Operations

Why Ops Engineers Are Always the Scapegoat—and How to Turn That Into Value

The article reflects on the challenges faced by operations engineers in small companies, illustrating why they often become scapegoats, and offers practical advice on learning, risk control, communication, and disaster‑recovery drills to increase their value and effectiveness.

devopslearningoperations
0 likes · 18 min read
Why Ops Engineers Are Always the Scapegoat—and How to Turn That Into Value
Efficient Ops
Efficient Ops
Dec 13, 2016 · Operations

Why Embracing Risk Is Essential for Effective IT Operations

The article explains how acknowledging and managing inevitable risks, avoiding the illusion of zero‑risk contracts, and preparing realistic compromise strategies are crucial for reliable IT operations and incident response.

CompromiseIT OperationsVendor Risk
0 likes · 8 min read
Why Embracing Risk Is Essential for Effective IT Operations
Efficient Ops
Efficient Ops
Nov 14, 2016 · Operations

What Ancient Medicine Teaches About Modern IT Risk Management

Using the classic tale of Bian Que, this article explains how proactive, mid‑stage, and reactive risk controls in IT operations prevent small issues from becoming catastrophic failures, illustrated with real‑world storage, cloud, and equipment‑selection case studies.

IT infrastructurecase studyoperations
0 likes · 7 min read
What Ancient Medicine Teaches About Modern IT Risk Management
Efficient Ops
Efficient Ops
Oct 16, 2016 · Operations

Balancing Reliability and Innovation: Google’s SRE Risk Management Explained

This article explores how Google Site Reliability Engineers manage service reliability by balancing risk, cost, and business goals, using metrics like unplanned downtime, availability formulas, and risk tolerance to set realistic SLOs for both consumer and infrastructure services.

GoogleSREavailability
0 likes · 21 min read
Balancing Reliability and Innovation: Google’s SRE Risk Management Explained
Efficient Ops
Efficient Ops
Sep 28, 2016 · Operations

Can Precise Operations Transform IT Service Delivery? A Deep Dive

This article explains the concept of precise operations, detailing how integrating business demand as a variable can make IT maintenance more proactive, value‑driven, and synchronized with business needs, and outlines a step‑by‑step framework with real‑world examples.

IT-servicebusiness alignmentdevops
0 likes · 14 min read
Can Precise Operations Transform IT Service Delivery? A Deep Dive
Efficient Ops
Efficient Ops
Sep 13, 2016 · Operations

How Google SRE Principles Compare Across Industries

This article, excerpted from the upcoming Chinese edition of “SRE: Google Site Reliability Engineering”, examines how Google’s SRE guiding philosophies—disaster planning, post‑mortem culture, automation, and data‑driven decision‑making—are adopted, adapted, or contrasted in sectors such as manufacturing, aerospace, nuclear, telecommunications, healthcare, and finance, highlighting key similarities, differences, and lessons for Google and the broader tech industry.

ReliabilitySREautomation
0 likes · 21 min read
How Google SRE Principles Compare Across Industries
Efficient Ops
Efficient Ops
Mar 8, 2016 · Information Security

How to Build an Effective Information Security Response Plan Before a Breach

This article outlines why proactive information‑security preparedness, cross‑department response teams, and clear incident‑response checklists are essential for minimizing damage and maintaining trust when a data breach occurs.

data breachincident responseinformation security
0 likes · 14 min read
How to Build an Effective Information Security Response Plan Before a Breach
Efficient Ops
Efficient Ops
Oct 7, 2015 · Information Security

Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained

The article explores the essence of information security by comparing it to safeguarding personal money, detailing the four fundamental attributes—confidentiality, integrity, availability, and controllability—and illustrating how different conditions shape security needs, from personal to enterprise contexts.

availabilityconfidentialitydata protection
0 likes · 13 min read
Why Information Security Mirrors Protecting Your Money: 4 Core Principles Explained