Operations | Monitoring | ITSM | DevOps | Cloud

Distributed Systems and the 21st century

At the end of the last century I had the opportunity to help in a very ambitious computer project: the search for radio messages emitted by extraterrestrial civilizations… And what the hell does it have to do with Distributed Systems? Recently my colleagues wrote an interesting article on distributed network visibility, which I really liked and I came up with the idea of taking it to the next level.

Passing Grade: Top 3 Recommendations for School Network Administrators

Digital demands from students and staff to keep pace with modern education methods has put a lot of pressure on IT operations. Consistently delivering quality service for all is a tall order. Technology advancements, IoT proliferation, device demand, lower cost, and ease of wireless access means supporting all the things is the job facing education network administrators.

Asset Inventory Management Tips & Best Practices

There are many aspects to keeping your IT house in order. And IT asset inventory management is just one of the many heads of this ever-shifting hydra. It’s also one of those practices that managers may sometimes gloss over in their effort to go after “the big issues.” In this guide, we’ll clue you into some best practices that you absolutely have to take into account to run things smoothly.

Running Tracealyzer 4 on Linux hosts

To run Tracealyzer 4 on Linux, the first thing you will need to install is Mono. For most distributions there’s a package called “mono-complete”, though some distributions and package systems may instead use simply “mono”. There may be additional requirements, in particular for Debian/Ubuntu and Fedora based systems. See below for distribution specific instructions. Mono version 5.14 (or newer) is required for Tracealyzer.

Financial Services Network Challenges: Compliance, Security and Availability Top Concerns

Financial services firms face three key network issues: maintaining compliance with an array of regulations, keeping a growing horde of financial data hungry hackers at bay, and earning the trust of users with an always-on responsive network. Financial data is so valuable, cybercriminals make getting it a top priority. And financial services networks are so interconnected and complex, there are all sorts of ways hackers can try to break in. The security threat to finance is more than bad.

The Big Problem With Big Data

The 2022 Australian Open men’s singles final between Rafael Nadal and Daniil Medvedev was epic! I watched it in Australia, which meant I was up until 2 a.m. on a Sunday night. Monday morning’s dog walk was sub-joyful. Medvedev seemed unplayable, taking the first two sets comfortably. But Nadal is a legend for a reason. Point by point, he overran his rival to make history.

The Importance of Log Management and Cybersecurity

Struggling with the evolving cybersecurity threat landscape often means feeling one step behind cybercriminals. Interconnected cloud ecosystems expand your digital footprint, increasing the attack surface. More users, data, and devices connected to your networks mean more monitoring for cyber attacks. Detecting suspicious activity before or during the forensic investigation is how centralized log management supports cybersecurity.

How to Optimize Cloud Monitoring Costs Using Flow Logs in Progress Flowmon

This blog post discusses some of the best practices for balancing the costs of cloud traffic monitoring while maintaining a reasonable level of visibility. Progress Flowmon 12 has introduced the processing of native flow logs from Google Cloud and Microsoft Azure, plus it has enhanced support for Amazon Web Services (AWS) flow logs.

A guide to Microsoft Azure Regions

The global footprint of Microsoft Azure is made up of physical infrastructure of over 200 data centres and connective network components, arranged into regions, and linked by a large interconnected network. Each of the Azure data centres provides high availability, low latency, scalable cloud services close to users to improve reliability and speed. In this blog, we look at the Azure Regions, and explain the benefits of using a direct connection to access Azure infrastructure.