Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Meet the Fastest Forwarder on the Net

I have recently been heads-down working on a large Splunk Cloud PoV (20+ TB / day), and the customer asked if Splunk supported their forwarding technology called Vector. I had never heard of Vector, so I took a note to do further research. I couldn’t find anyone else at Splunk who had seen this technology before, so I embarked on a little research project. What I discovered surprised me—Vector is actually fairly powerful, and cool!

What is a Network Operations Center (NOC)?

A network operations center (“NOC”) provides a central location for enterprise IT. Here, NOC team members supervise, monitor, and maintain an enterprise’s services, databases, external services, firewalls, and networks. With a full understanding of how a NOC works, your enterprise is well-equipped to maximize its performance.

Moogsoft Joins Inc. Magazine's List of America's Fastest-Growing Private Companies

Inc. Magazine has named Moogsoft to its annual Inc. 5000 list — an exclusive ranking of the nation’s fastest-growing private companies across all industries. The pioneer and leading provider of AIOps solutions made its debut on the prestigious list — ranked at # 884 — based on its 528 percent revenue growth over the past three years.

Cloud Costs: Money Saver or Money Pit?

This is the second in my series on the cloud. I started writing about cloud visibility and in this article, we take a look at cloud costs. If we look at the evolution of computing over the past 30 or so years, it has always been about monumental shifts in technology, which drive further and further innovation, efficiencies and – seemingly – cost reduction.

What is GitLab CI/CD

GitLab CI/CD is a tool that is built into GitLab. It allows you to create automated tasks that you can use to form a Continuous Integration and Continuous Delivery / Deployment process. You configure GitLab CI/CD by adding a yaml file (called `.gitlab-ci.yml`) to your source repository. This file creates a pipeline, which will then run when a code change is pushed to the repository. Pipelines are made up of a series of stages, and each stage can each contain a number of jobs or scripts.

Tools Which can help You Manage and Market Your Website

Nowadays, having no strong internet presence means people not knowing about your brand. Fortunately, there are numerous online business tools available, which could help you set up and manage your website. From the design, website development to social media and everything in between managing your online presence is paramount. Having an internet presence means reinforcing your brand, boosting your marketing endeavor, and most of all help connect with customers.

Ransomware: 11 Steps You Should Take to Protect Against Disaster

The frequency and volume of ransomware attacks have increased dramatically in the past few years. Few people in the tech industry will forget the 2017 WannaCry attack, which infected over 200,000 computers in 150 countries worldwide and brought down part of the U.K.’s National Health Service, or the 2019 RobbinHood attack, which brought the Baltimore government to a standstill for nearly two weeks.

5 IT strategy considerations to ensure business resilience

If you’re a Marvel® Comics fan, you might have heard about the superhero named Darwin. Darwin can evolve based on need and environment. For instance, he can acquire night vision for his evening’s mission or develop gills if swimming underwater. As with Darwin, adaptation is an essential skill for many IT operations superheroes out there as well, tough times or not.

South Africa's GDPR: The POPI Act and it's impact on Desktop Central users

The Protection of Personal Information (POPI) Act puts South Africa’s data regulation standards on par with existing data protection laws around the world. It aims to protect personally identifiable information (PII), enforce individuals’ rights to privacy, and provide guidelines for lawfully processing sensitive information and notifying regulators and data holders in the event of a breach.