Operations | Monitoring | ITSM | DevOps | Cloud

Investigating Network Anomalies - A sample workflow

Network anomalies vary in nature. While some of them are easy to understand at first sight, there are anomalies that require investigation before a resolution can be made. The MITRE ATT&CK framework introduced in Kemp Flowmon ADS 11.3 streamlines the analysis process and gives security analyst additional insight by leveraging knowledge of adversaries' techniques explaining network anomalies via the ATT&CK framework point of view.

HTC Automates Network Operations, Fueling Data-Driven Decision-Making During Emergencies

Severe weather in South Carolina comes with the territory, and for a local communications service provider like HTC, that translates to service outages for the internet, streaming video, phone, and wireless networks it provides to predominantly rural communities. When these events strike, the Emergency Operations Center (EOC) at HTC faces enormous pressure not only to maintain services, but to prioritize customer support efforts and restore services as quickly as possible.

How to build a team that demands metrics

When we talk about metrics in software delivery, a lot of developers think of execution metrics — things like throughput, delivery and number of deploys. But in reality, those metrics don’t motivate anyone — at least not without connecting them to a bigger picture. I’ve worked in software for 23 years. I’m a three-time founder and four-time CTO, responsible for leading a 200+ member distributed engineering organization.

Mattermost plugins: The server side

In the first article in this series, we explained how to set up your developer environment to begin creating Mattermost plugins. In the second, we examined the structure of server-side and web app plugins and how to deploy them. Now, it’s time to dive deeper into the server side of the application, which is written in Golang.

How to Troubleshoot Network Issues-Guide and Recommended Tools

You’re going to run into network issues during normal operations—in part because so many kinds of errors can cause noticeable problems in your network. Identifying the root cause of each issue is critical and to do so successfully, you want to make sure you have the right network troubleshooting solutions in your arsenal before wading in. This helps ensure you have a clear understanding of the scope of the problem before you attempt any network troubleshooting steps.

Do You Need an Alert for Your Alerts? Building Smarter Monitoring Systems

Traditional systems monitoring solutions poll various counters (typically simple network management protocol [SNMP]), pull in data and react to it. If an issue requiring attention is found, an event is triggered—perhaps an email to an administrator or the firing of an alert. The admin subsequently responds as needed. This centralized pull approach is resource-intensive. Due to the pull nature of the requests, it results in data gaps and data that may not be granular enough.

No pants, no problem: Employees Report More Work Yet More Satisfaction in the Everywhere Workplace

“We want to work remotely.” That’s the major takeaway from Ivanti’s just-released survey on the Everywhere Workplace. Nearly 2,000 consumers across the U.S. and U.K. responded. While most of them were abruptly shifted into remote work due to circumstances outside their control – and those circumstances were scary and confusing – there has been a silver lining. They’re happier at home.

That One Time Using APM Bit Us

At Catchpoint, our mission is to provide customers with actionable data that will help them reduce MTTR and maintain a positive digital experience. We measure "from where the users are" to ensure the data reflects real end-user experience. As someone that's part of the Catchpoint on-call chain, this is extremely important to me. I do not want to be woken up at 2 AM because a server is misbehaving, only to find out that the application failed over gracefully and no users were impacted.