Operations | Monitoring | ITSM | DevOps | Cloud

Python MQTT Tutorial: Store IoT Metrics with InfluxDB

MQTT is a standard messaging protocol used for the Internet of Things (IoT) because it requires minimal resources and can be executed by small microcontrollers found in connected devices. IoT devices have a real need for this type of lightweight protocol because it guarantees fast and reliable communication with minimal hardware requirements, keeping power consumption and manufacturing costs low.

The Online Travel Landscape

The travel industry was hit harder than any other industry throughout the pandemic. Frequent changing of rules and restrictions resulted in multiple setbacks. Travel companies had significant difficulties navigating the field and it wasn’t without devastating losses. The Office for National Statistics (ONS) data shows that turnover in travel and tourism businesses declined to 26.0% of February levels, compared with 73.6% in all other industries.

How to Make Data Center Asset Audits Faster and More Accurate

Many organizations perform periodic data center asset audits to report accurate asset information by cabinet and U position. This information is needed to remotely plan moves, adds, and changes and to facilitate corporate reporting. Data center asset management is often a struggle due to the complex, distributed, and constantly changing environments of modern data centers. They are manual, time-consuming, and human error can result in inaccurate data.

Flowmon and WhatsUp Gold: Automatic Threat Detection Through Single Pane of Glass

Network Detection & Response (NDR) is a key element that provides an additional level of security across the company wide network through detection of threats that bypass traditional security measures and materialize in the company’s digital environment. Progress Flowmon ADS (Anomaly Detection System) is a typical representative of an NDR system that combines various detection techniques to ensure that malicious activity is recognized and flagged as a security incident.

Strengthen Your Developer Experience and Deployment Velocity with OKE and Shipa Cloud

For an application developer, there is certainly a long road between an idea/feature and getting deployed into production with Kubernetes. From a development perspective, having a low barrier of entry and the ability to iterate is key. From a platform engineering/DevOps perspective, creating gains in engineering efficiency all while creating and enforcing policies that do not stifle innovation is key.

Prometheus 2.35 - What's new?

Prometheus 2.35 was released last month, focusing on a better integration with cloud providers. It also improved the service discovery, performance, and resources usage. One key change was the migration to Go v1.18. It has brought some changes in the support for TLS 1.0, 1.1, and certificates signed with the SHA1 hash function. Welcome to this first edition of What’s new in Prometheus. We love Prometheus, the de-facto open source standard monitoring tool!

How to Effectively Optimize Your Website For Voice Search

Talking to a device, a watch, or a virtual assistant is becoming an everyday activity as chatting on the phone. While many of us are used to taking part in a live webchat with a real person, speaking to a computer rather than typing on a screen has been an adjustment. But it's not nearly as unfamiliar an experience as it once was, and it has many advantages. Voice search is a convenient, hands-free way to access information, news, entertainment, and of course, websites.

7 Important Things to Include in Your Company Security Policy

We live in risky times. Security incidents and data breaches are more common than ever and digital-minded companies usually bear the brunt of it. Organizations are constantly at risk and can be compromised in no time by ransomware, cyberattacks, social engineering, and corporate espionage. But, in truth, the most common way companies are undermined and infiltrated is through the actions of individual members inside of the organization itself.