Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Can we talk about SCOM Overrides?

If you’ve ever had a well-planned Operations Manager tuning session end in frustration, you are not alone. With everyone in IT seemingly always short on time, scheduling a meeting with multiple teams can kick-off things with some tension, and the process of walking through overrides hasn’t even started. There are useful resources available, depending on what pack your installing and tuning.

Top 5 Open-Source HIDS Systems

The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot.

Cachebuster - A Pro Tip for Bypassing Cache

Caching is a great way to improve website performance and minimize the load. An ideal cache displays the cached version until the content changes and flushes the cache when there is a change. Yet, there may be cases where the cached version is not the most up-to-date one (if there is a DB error on the site or the caching is only time-based..).

Making Your Life Easier with Citrix Receiver Version Usage Reporting

Citrix Receiver (now renamed as Citrix Workspace app) is client software that is bundled with Citrix Virtual Apps and Desktops and allows client devices to connect to various virtualization services offered by Citrix. Citrix Receiver is supported on various client platforms and form factors, including Windows, Windows Mobile, macOS, iPad, iPhone, Android, BlackBerry, HTML5, Linux, Google Chromebook, thin clients, zero clients, Raspberry Pi and embedded operating systems.