Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Safety first: the best backup applications

Surely you know what a backup is, right? It is what we could also call a “safety copy“. Free backups are precisely that, softwares through which you can create backup copies of your data, to save them on drives such as external hard drives, flash drives, network devices and others. What are they for? Simply put, to restore the original information that you had, of course, after having lost it by accident in some misfortune or careless incident.

Congratulations Pandora FMS, you're already a teenager!

14 years old, our beloved monitoring software is already 14 years old! Pandora FMS enters adolescence and does it with more friends than acne, with more achievements than voice changes and with more future ideas than problems at school. 14 years which are celebrated quickly with a cake and which fade, even faster, in the wake of congratulations on the day of its birthday. However, those years, so easy to count, carry weight and are remembered, with love and consequence.

Network baseline: new technologies, new challenges

The issue of network baseline arose quite some time ago. Everything started from the understanding that networks are not static entities, but are a set of elements that change over time. It was also understood that networks are not only made up of physical and tangible elements, such as a router or a switch, but we must also have more abstract elements, such as the traffic pattern over a WAN link, for example.

What is a post mortem incident? How can we monitor this?

In particular, I liked very much the article that our colleague Sara Martin wrote in Pandora FMS blog about crisis management in information technology, these are the steps: Legend: “Jack’s Lantern (https://commons.wikimedia.org/wiki/File:Jack-o-lantern.svg) This article starts from point number five: when after a certain time of recovery the crisis has been solved and becomes a post mortem incident. This word comes from the Latin language and it means “after death”.

Hybrid Cloud Monitoring: Defining a Strategy

When we are faced with the challenge of hybrid cloud monitoring, the golden dream of a single monitoring platform is reawakened in us. It would be ideal to have a tool that would allow us to see in a single screenshot what is happening throughout our platform, including those resources that we have decided to establish in the cloud, in other words, it should not discriminate between private and public networks.

Web browser security. Is it really safe?

If there is still a reason why you have a post-it covering the webcam of your laptop, if you have not yet had the audacity to delve into the deep web despite all the mysteries they say it contains, if you only enter the Internet in incognito mode, sitting in your armchair with a blindfold: then you’re worried about one thing: safety. Today, in our blog, we will discuss Web browser security. Which are the safest? Is there life beyond Google Chrome?

CentOS 8: a clone that reinvents itself

It has taken much longer than usual for the CentOS team to provide us with a new version of their operating system; however, the wait is over. The new CentOS 8 is here. CentOS, or Community ENTerprise Operating System, is a binary-level clone of the RHEL (Red Hat Enterprise Linux) distribution that can be accessed for free. For those unfamiliar with Red Hat, Red Hat offers open source, enterprise-oriented software solutions with enterprise-level support.

What is File Transfer Protocol (FTP)?

Our day to day is a constant investigation. When you were little, very small, you discovered the different names of the colors or the taste of the fruits; then, the pain of acne and your favorite rock bands; and later on, I don’t know, more complex things like the Inland Revenue and the File Transfer Protocol.