Operations | Monitoring | ITSM | DevOps | Cloud

Blog

How to counteract 3 types of bias and run inclusive meetings

Think back to your last team meeting. Did you get in everything you wanted to say? Did that one rambunctious teammate jump in before you could finish your killer point? We’ve all been there. It feels like crap, right? Yet, the truth is that how it makes us feel is only part of the story. There’s also the not-so-trivial matter of how being ignored or talked over in meetings limits the entire group’s performance.

2018 - Year in review! On a path to continued innovation

It was indeed an eventful year for us. With launching a slew of new capabilities, attending more than 23 global events, and conducting 12 seminars in multiple cities, the year 2018 was a blast. This year has also made us one of the firsts in the monitoring industry to introduce AI-driven Azure monitoring, along with many other significant enhancements.

Using AWS or Azure? Why You Need a Website Monitoring Service

Already have a monitoring service with your current host? Does your plan include Amazon CloudWatch, Azure Monitor or another proprietary monitoring tool? You might want to check the fine print. These services often provide internal web monitoring only. While they may check HTTP availability from locations outside their network, HTTP checks alone are not sufficient.

Why will the IoT change the world?

You may have heard on many occasions that this technology will change the world forever. And if you’re old enough, you’ll have seen that on some occasions, indeed, it has been like that, but on others, things have gone on as usual and that technology that was going to wipe everything out has ended up in the drawer of forgetfulness.

eG Enterprise APM Wins 'Great User Experience Award' on an Independent Review Platform for B2B Solutions

FinancesOnline, an independent B2B solutions review platform, recently conducted an independent assessment of eG Enterprise APM and published their review. This review provides an overview of the features, benefits, and problems solved by eG Enterprise APM. Also, the review analyzes eG Enterprise APM in relation to other APM solutions in the market.

The relationship between steganography and cyberattacks

There’s no denying the importance of communication. Businesses cannot function without the proper means of communication, such as phone calls, faxes, emails, text messages, and more. However, not all forms of communication are secure, meaning the information transferred by them doesn’t always stay confidential. This is where steganography comes into play.

IT in 2018: A ManageEngine retrospective

2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the processor bugs Meltdown and Spectre. From there, the year was filled with data breaches and ransomware. But things weren’t all bad this year; the GDPR went into effect, which is a huge step forward in data privacy, and plenty of new technologies were released.

5 Tips to Avoid Deadlocks in Amazon RDS Part 2

If you missed the first 2 tips, go back and read 5 Tips to Avoid Deadlocks in Amazon RDS (Part 1), and then come back for the last 3 tips on deadlock avoidance. Once again, I want to re-emphasize that RDS is not actually capable of creating deadlocks — it merely reports them from the underlying database engine.