Operations | Monitoring | ITSM | DevOps | Cloud

What Are The Different Types of Authentication?

The goal of authentication is to confirm that the person attempting to access a resource is actually who they say they are. As you can imagine, there are many different ways to handle authentication, and some of the most popular methods include multi-factor authentication (MFA) and Single Sign On (SSO). However, these methods just skim the surface of the underlying technical complications. In order to implement an authentication method, a business must first establish an authentication protocol.

Using Synthetic Endpoints to Quality Check your Platform

Quality control and observability of your platform are critical for any customer-facing application. Businesses need to understand their user’s experience in every step of the app or webpage. User engagement can often depend on how well your platform functions, and responding quickly to problems can make a big difference in your application’s success. AWS Canaries can help companies simulate and understand the user experience.

Continuous Availability vs. Continuous Change

All companies are going through some form of cloud adoption - whether cloud migration for the first time, hybrid cloud adoption, or extending cloud-native with newer microservice architecture. But, according to a recent survey by Aptum*, only 39% of companies are completely satisfied with their current rate of digital transformation. Cloud adoption projects create a continuous state of change for engineering teams juggling to keep things up and running while limiting the impact on customers.

Introducing OID Monitor History

Despite everyone’s best efforts, network failures happen. And when downtime means lost productivity, fast troubleshooting becomes an integral part of IT operations. So with the addition of OID (object identifier) monitoring history, Auvik providing users an archive for troubleshooting, analysis, and planning. When it comes to managing network issues, diagnosing the root cause is the first step. And often, there’s a gap between when an incident occurs, and when it’s reported.

How to choose the best-fit ITSM software for your fast-growing Tech start-up?

Choosing the right IT service management (ITSM) software for your company is crucial since it directly impacts your end-to-end IT service delivery. And, if you’re a start-up, you need to be especially cautious about the software you use. If you choose the wrong IT helpdesk software that doesn’t match your organization’s requirements, you might waste time, money, and resources.

Events in MS Windows and Pandora FMS, does anyone give more?

If the spreadsheet was the essential application for accounting and massification of personal computers, MS Windows® operating system was the graphical interface that turned work into something more pleasant and paved the way for web browsers for the Internet as we know it today. Today, in Pandora FMS blog, we discuss.

ASP.NET Core 7 has built-in dark mode for error pages

You may remember Dark Screen of Death, the Chrome extension to bring dark mode to ASP.NET Core exception pages that we launched back in February. I probably should have followed the commits on the aspnetcore repository more closely, since it turns out that ASP.NET Core 7 comes with its own dark mode version of error pages. In this post, I'll share how to enable it and look at the differences between the built-in version and the Chrome extension.

NiCE Active 365 Management Pack 4.0 released

Microsoft 365 services help companies worldwide improve business and revenue by providing best in class digital workspace experience. The NiCE Active 365 Management Pack complements this by advanced M365 monitoring such as full Teams Call analysis integrated into Microsoft SCOM. Advanced monitoring and analytics help you reveal unwanted micro-events influencing the health and performance of the system and its users.