Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise, as it’s at the core of any organization’s security — it handles authentication and authorization for all users in an organization.

Introducing the New ServiceNow Plugin for Grafana

Greetings! This is Christine and Eldin reporting from Solutions Engineering, a team at Grafana Labs dedicated to helping users maximize what our Enterprise and Cloud products can do for your orgs. In a previous life, Eldin managed the customer experience department for several different companies and still remembers the pain of running daily reports so his team could have visibility into their ticket queues.

How to Identify Poor Drive Mapping to GPOs is Root Cause of Slow Logons

End users are complaining of slow logons and IT cannot quickly identify root cause. When trying to identify the root cause of a Citrix end-user experience issue, the main display to view all of the Citrix user sessions is the Goliath’s Citrix Virtual Apps & Desktops session display.

What Vending-Machines Have to Do With Your Microservices Architecture

Orchestrating and composing multiple services in a distributed architecture is not easy. Before we move along with the great solution offered by vending-machines to our distributed architectures, we need to understand what solutions and values we’re looking for. In a serverless environment, there are at least three desired properties of any distributed services implementation.

Data analytics with Jaeger aka traces tell us more!

I will get straight to the point, Jaeger at the moment only visualizes collected data from instrumented applications. It does not perform any post-processing (except service dependency diagram) or any calculations to derive other interesting metrics or features from traces it collects. This is a pity because traces contain the richest information from all telemetry signals combined!

9 Powerful Quotes That Perfectly Capture The Future of Digital Work

It’s impossible to know exactly what lies ahead in the future of digital work but there are a few technology leaders and analysts out there that always seem to stay ahead of the game. These people can often articulate complex changes in enterprise technology and digital work with simple, sharp language. Luckily, we’ve compiled some of the most telling quotes from top digital workplace experts to help companies and leaders better understand what matters most in the future of work.

Top 6 Website Builders for Beginners

In 2020, a website is essential for just about everyone. Whether you run a small business, are a blogger, a professional like a graphic designer or a freelance writer, or an entrepreneur, a website is critical for being able to do what you do. Luckily, these days it is also extremely easy to create a website. Thanks to the large number of website builders now available, you no longer need to hire a web developer, and instead can build your own website from scratch.

Automating monitoring with the Sensu Go Ansible Collection

This post by Manca Bizjak of XLAB Steampunk was originally published on the Ansible blog. In Getting Started With Ansible Content Collections, which presented the general idea behind what is becoming a new standard in the distribution of Ansible content, we learned about the what, the why and the how of Ansible Collections (and hopefully it got you excited about Ansible Collections!).

Preparing for the Unexpected: How to Monitor Logs for Anomalies

Hidden among your normal, everyday logs are any number of unexpected events and anomalies. These events can provide key insights when troubleshooting problems, tracing transactions, or monitoring performance and behavior. However, finding them can be challenging, especially if you’re unsure of what, or how, to look for them. Searching for unexpected events involves more than just searching for keywords like “error” or “critical”.

Investment Bank picks NiCE Office 365 Management Pack

NiCE IT Management Solutions is proud to serve global key-players in advanced Microsoft Office 365 performance and health monitoring. Read the latest customer reference on how the NiCE Active 365 Management Pack is enabling an Investment Bank to stay on top of Microsoft Office 365 monitoring operations.