Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The relationship between steganography and cyberattacks

There’s no denying the importance of communication. Businesses cannot function without the proper means of communication, such as phone calls, faxes, emails, text messages, and more. However, not all forms of communication are secure, meaning the information transferred by them doesn’t always stay confidential. This is where steganography comes into play.

IT in 2018: A ManageEngine retrospective

2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the processor bugs Meltdown and Spectre. From there, the year was filled with data breaches and ransomware. But things weren’t all bad this year; the GDPR went into effect, which is a huge step forward in data privacy, and plenty of new technologies were released.

eG Enterprise APM Wins 'Great User Experience Award' on an Independent Review Platform for B2B Solutions

FinancesOnline, an independent B2B solutions review platform, recently conducted an independent assessment of eG Enterprise APM and published their review. This review provides an overview of the features, benefits, and problems solved by eG Enterprise APM. Also, the review analyzes eG Enterprise APM in relation to other APM solutions in the market.

Why will the IoT change the world?

You may have heard on many occasions that this technology will change the world forever. And if you’re old enough, you’ll have seen that on some occasions, indeed, it has been like that, but on others, things have gone on as usual and that technology that was going to wipe everything out has ended up in the drawer of forgetfulness.

5 Tips to Avoid Deadlocks in Amazon RDS Part 2

If you missed the first 2 tips, go back and read 5 Tips to Avoid Deadlocks in Amazon RDS (Part 1), and then come back for the last 3 tips on deadlock avoidance. Once again, I want to re-emphasize that RDS is not actually capable of creating deadlocks — it merely reports them from the underlying database engine.

2018: The Year Bee-hind Us

In just a few days, we’ll all be embarking on the new year–kicking its tires and planning our conquests for the months to come. This holiday in-between week, while the days are just barely beginning to get a little longer, seems like a good time to look back on the events of the past year and remember some of the good times we’ve shared–so join me for a little retrospective fun.

Cyber Security in the Movies - Is It Realistic?

Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security system.

Upgrading to Sensu Go: takeaways (and solutions) from Sensu Summit

Now that Sensu Go is out, I thought this would be a great time to circle back and follow up on the Sensu Summit 2018 breakout session concerning Sensu 1.x to Sensu Go workload migration challenges. That session had some great feedback from Sensu users; we’ve been heads down over the past few months putting the pieces together to make it easier to move your existing workloads when you upgrade to Sensu Go and keep your existing Sensu Plugins working while you transition.