Operations | Monitoring | ITSM | DevOps | Cloud

Blog

VLAN, WLAN, LAN... and other types of networks you should know

If you thought the fishmonger’s hair net was the only kind of net you’re wrong. From Pandora FMS we will show you some more, so that you do not get lost without them. The term “network” is used in computing to name a set of computers connected to each other in such a way that they can share resources, services, and information. There are several ways to classify these networks, based on their scope, relationship, or connection method.

Elastic App Search: A free product for building great search experiences

Wherever people encounter a search bar — whether on Google, phone apps, or while shopping online — they're conditioned to expect search experiences that deliver fast and relevant results. With this ever-evolving expectation in mind, millions of developers and organizations have chosen Elasticsearch for building powerful content discovery experiences over the years, to the great delight of their audience and user base.

Modernizing and Consolidating Your Monitoring Without Losing It...

The current days of remote work and “IT Ops from home” may or may not be here to stay, but they definitely reinforce the need for consolidating and modernizing our monitoring. The challenges which multiple siloed tools create for understanding the big picture are only exacerbated by having just one screen to look at when monitoring our IT from our kitchen table.

Coronavirus: From the Office to Working From Home

Coronavirus (COVID-19) is greatly impacting the lives of organizations, employees and stakeholders. With the outbreak’s rising impact, more employees are migrating to remote, work-from-home practices as means of achieving “social distancing.” However, inevitable challenges are emerging with remote workdays. Obstacles include, but aren’t limited to, employee isolation, diminished productivity and poor team communication or collaboration.

Sumo Logic Announces Continuous Intelligence for Atlassian Tools

In today’s digital economy, the pressure to develop and release new software has become paramount to deliver great customer experiences and create a competitive advantage. Unfortunately, the process by which to deliver this software is increasingly complex and highly fragmented across various tools and teams. While this complexity increases, there is also no easy way to centrally measure, monitor and secure the overall performance of the software delivery pipeline in real-time.

SOLID Design Principles Explained: The Single Responsibility Principle

SOLID is one of the most popular sets of design principles in object-oriented software development. All of them are broadly used and worth knowing. But in this first post of my series about the SOLID principles, I will focus on the first one: the Single Responsibility Principle.

OpenStack distributions: How to choose the right one?

Choosing the right OpenStack distribution is essential to the success of an OpenStack project at every organisation. When selecting one, organisations should always follow certain criteria. Is it possible to operate the considered OpenStack distributions economically? How easy is it to deploy them? Can the organisation upgrade its production OpenStack cloud without affecting the workloads? Everyone planning to deploy OpenStack should ask themselves these questions.

FIPS 140-2: Stay compliant and secure with Canonical

FIPS 140-2 is a set of publicly announced cryptographic standards developed by the National Institute of Standards and Technology. It is an essential part of FEDRamp requirements for many governmental agencies in the US and Canada, as well as their business partners from all around the world. Furthermore, as a well established and verified security standard, an increasing number of large companies and financial institutions are asking for FIPS compliance.

Steps to maximise robotics security with Ubuntu

The Robot Operating System (ROS) is a popular open-source platform for advanced robotics. Its flexibility and ease-of-use make it well-suited to a wide array of robotics applications – however, these robots are not always sufficiently protected against security threats. Opportunistic attacks are by far the most prevalent, and robots with inadequate ROS security make tempting targets for bad actors.

How to Integrate Microsoft Teams with Office 365 Monitoring

For those of us already using Microsoft Teams, the benefits couldn’t be clearer: Microsoft Teams provides everyone with one place to chat, meet, call, and collaborate, no matter where you are. IT professionals who support modern workplace tools like Office 365, and remote meeting platforms like Zoom and WebEx, can greatly benefit from connecting critical applications like Exoprise, directly into the Teams Channels they are already using.