Operations | Monitoring | ITSM | DevOps | Cloud

%term

Auvik Use Case #4: Support All the Network Equipment Your Clients Have

It would be ideal if every network device you managed across all your client sites was from the same manufacturer, but for most MSPs that’s not the case—over 75% of MSPs manage four or more network vendors for their clients, and some manage upwards of 20. Even though taking care of diverse networks is standard procedure for most service providers, managing gear from multiple vendors is still, well, complex. It means handling different operating systems, different languages, and more.

New Horizons for Mobile Edge Computing (MEC) and IoT

As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture—such as edge computing—to relieve their security and device management burdens. Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we’ll be looking at some of the issues and available options.

Filters: valves for the Sensu monitoring event pipeline

Filters, the mechanism for allowing and denying events to be handled, have been given a refresh in Sensu Go. These new and improved JavaScript filters give you a way to express business logic through filtering, giving you more awareness of your environment, reducing alert fatigue, and improving performance. In this post, I’ll share what’s new with filters, using examples in Sensu Go. (If you haven’t already, you can download it here.)

Browser market share 2018: Safari on the rise

Our Real User Monitoring (RUM) product gathers performance data from actual user experiences from all around the globe for enabled pages. For 2018 that meant we collected data from thousands of worldwide users. In this blog, we take a look at the users’ browser choices, the page performance as experienced by the users, and their choices in device types.

Top 5 Open-Source HIDS Systems

The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot.

Cachebuster - A Pro Tip for Bypassing Cache

Caching is a great way to improve website performance and minimize the load. An ideal cache displays the cached version until the content changes and flushes the cache when there is a change. Yet, there may be cases where the cached version is not the most up-to-date one (if there is a DB error on the site or the caching is only time-based..).

Rethink Analytics: Don't be fooled by cloud washing

The choices facing today's enterprise executives are far more complex than whether to adopt cloud or not - that is mostly decided. The question is how to do it well. In particular, are the tools they are using to monitor performance and security truly built to run and scale in their cloud environment. Many vendors are "cloud washing" customers by simply adding the word "cloud" to their service offerings without truly being able to deliver on their promises.