Operations | Monitoring | ITSM | DevOps | Cloud

The Dual Approach in Scaling: Chaos Engineering and Performance Engineering

For any enterprise, they're more than likely all too familiar with the struggles and complexities of scaling their environments and applications. Whether these applications live on premise, in a cloud environment, or somewhere between in a hybrid state, an age-old question engineering ponders on is, “Can my application and environment scale?

Distributed Systems and the 21st century

At the end of the last century I had the opportunity to help in a very ambitious computer project: the search for radio messages emitted by extraterrestrial civilizations… And what the hell does it have to do with Distributed Systems? Recently my colleagues wrote an interesting article on distributed network visibility, which I really liked and I came up with the idea of taking it to the next level.

Passing Grade: Top 3 Recommendations for School Network Administrators

Digital demands from students and staff to keep pace with modern education methods has put a lot of pressure on IT operations. Consistently delivering quality service for all is a tall order. Technology advancements, IoT proliferation, device demand, lower cost, and ease of wireless access means supporting all the things is the job facing education network administrators.

Asset Inventory Management Tips & Best Practices

There are many aspects to keeping your IT house in order. And IT asset inventory management is just one of the many heads of this ever-shifting hydra. It’s also one of those practices that managers may sometimes gloss over in their effort to go after “the big issues.” In this guide, we’ll clue you into some best practices that you absolutely have to take into account to run things smoothly.

Hybrid Infrastructure Monitoring and Alert Management on a Single Platform Made the Difference for Liquid IT

Liquid IT is a New Zealand IT services company that delivers cybersecurity, network connectivity and integrated workspace services to government and corporate clients in New Zealand. The firm manages a hybrid IT environment for its customers that includes Microsoft Azure cloud services, Cisco Meraki cloud network services, plus on-premises compute, storage and networking from the likes of VMware, Dell EMC, Nutanix, AeroHive and Palo Alto Networks.

Running Tracealyzer 4 on Linux hosts

To run Tracealyzer 4 on Linux, the first thing you will need to install is Mono. For most distributions there’s a package called “mono-complete”, though some distributions and package systems may instead use simply “mono”. There may be additional requirements, in particular for Debian/Ubuntu and Fedora based systems. See below for distribution specific instructions. Mono version 5.14 (or newer) is required for Tracealyzer.

Financial Services Network Challenges: Compliance, Security and Availability Top Concerns

Financial services firms face three key network issues: maintaining compliance with an array of regulations, keeping a growing horde of financial data hungry hackers at bay, and earning the trust of users with an always-on responsive network. Financial data is so valuable, cybercriminals make getting it a top priority. And financial services networks are so interconnected and complex, there are all sorts of ways hackers can try to break in. The security threat to finance is more than bad.

The Big Problem With Big Data

The 2022 Australian Open men’s singles final between Rafael Nadal and Daniil Medvedev was epic! I watched it in Australia, which meant I was up until 2 a.m. on a Sunday night. Monday morning’s dog walk was sub-joyful. Medvedev seemed unplayable, taking the first two sets comfortably. But Nadal is a legend for a reason. Point by point, he overran his rival to make history.

The Importance of Log Management and Cybersecurity

Struggling with the evolving cybersecurity threat landscape often means feeling one step behind cybercriminals. Interconnected cloud ecosystems expand your digital footprint, increasing the attack surface. More users, data, and devices connected to your networks mean more monitoring for cyber attacks. Detecting suspicious activity before or during the forensic investigation is how centralized log management supports cybersecurity.