Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Checklist for publishing a guest post to Fyipe.

Here’s a quick checklist to publish articles or guest posts on Fyipe Blog. We invite anyone to publish stories to any of our publications. If you wish to contribute. Please send an email to [email protected] with your draft article. Please make sure your draft article follows guidelines in this post. Here’s what all this means for you as a writer: Educate your readers and teach them something new. Cut all the fluff. Get to the point — fast. Do not waste their time.

The value UEM delivers in digital upgradation of enterprises' IT administration

2020 has arrived. Most companies are striving to become digitally transformed, business applications are moving to the cloud, and day-to-day IT operations are becoming more mobile-oriented with executives using a diversified range of devices. Employees don’t just use company-provided desktops; they often work on the go with corporate-owned, personally enabled (COPE) laptops, mobile devices, and iPads; bring your own device (BYOD); etc.

Capture the Page Source of Website Errors

When it comes to website errors and issues, seeing is believing. Like most developers, I’ve been guilty of using the line “it works on my machine” when confronted with an annoying bug that only shows up under some obscure conditions. But just because one person doesn’t see it, doesn’t mean tens or hundreds of customers aren’t experiencing it.

A hawk-eyed inspection of your VPN connections: VPN monitoring by OpManager

With the ever-evolving business landscape, a considerable number of companies have started trying out VPNs to help their employees access sensitive data at home or while in transit. VPNs offer a plethora of functions, like serving as a covert conduit between remote users and corporate networks, shielding confidential data, and granting access to region-restricted websites.

An FBI spymaster taught me how to read my coworkers

“Wait. I don’t remember telling you the name of my hometown,” I said with an eyebrow cocked. “No, but I’m an intel analyst. So I know.” Truth be told, I was surprised the conversation hadn’t included more moments like this. I’m sitting in a tavern a few klicks down the road from the FBI’s training academy in Quantico, VA.

GitKraken v6.5: Fork & Perf Improvements

The latest updates to the GitKraken Client are so forking good, you’re sure to break into your Kraken happy dance. We know Keif did. Before we get to the meat and potatoes of what’s new with GitKraken v6.5, here’s the high-level: the GitKraken Git GUI is now 10% faster; with 20% reduced memory consumption; taking up 30% less disk space. How knife is that?!

Azure Functions Live - January 2020

It is really exciting to see the Azure Functions team back again to the monthly live webcast after quite a long time. Here is a bit of introduction about this webcast who is new to the community, the Azure Functions team at Microsoft has been conducting a webcast every month to let the community stay up-to-date on the latest developments. This is a nice way for them to reach out and engage with the community to gain feedback on the features.

A Day in the Life of IT is Anything but Ordinary: Industry Predictions for 2020 and Beyond

Did you happen to catch the important news unveiled in Ivanti’s January 7 press release? Ivanti enters the next decade with an augmented leadership team. Jim Schaper, Ivanti’s current Chairman of the Board, has been appointed Chief Executive Officer, and the company’s longtime CEO Steve Daly has retired but will continue to serve as a Board Member. You can learn more about the new Ivanti leadership team in one of our recent blog posts.

World Economic Forum In Davos - Growth in Global Technology Risk

Hey there, While the World Economic Forum (WEF) in Davos always dominates the news agenda across a variety of topics I wondered what discussions around technology occurred this year, particularly from a cybersecurity perspective. During my reading, I came across the global risks report 2020 published by WEF and thought sharing some of the key points would help you in case you have to argue about the importance of cybersecurity.