Operations | Monitoring | ITSM | DevOps | Cloud

How to Measure Network Performance: 5 Network Metrics

As more companies continue to rely on SaaS and cloud applications to run their businesses, it becomes important for them to ensure their network infrastructures can withstand the demand, and that they’re able to offer their services quickly and reliably. Continuous network monitoring can help you ensure that your network is always performing at its highest level. So, we’re running you through exactly how to measure network performance, and what network metrics you should be looking at.

Error logging, tracing, and improving developer workflow with Jeffrey T. Fritz

Today Nico joined Jeffrey T. Fritz on the Fritz and Friends live coding stream and we talked about how Rollbar can be added to your applications to provide better logging, error tracking, and reporting. We walked through the story of Rollbar and added the logging solution to the KlipTok service that manages interactions with internet bots for the various social networks and search engines. See why 100,000+ developers trust Rollbar to analyze, diagnose & fix errors in record time.

Forrester Research: The Future of Technology Operations

Recently, we had the opportunity to hear from Charlie Betz of Forrester Research about the future of technology operations. He covered the shift from project-based work to product team orientation, the integration between DevOps and IT services and the ways in which the entire enterprise is getting value from investments in artificial intelligence. Check out some of the interesting questions and answers from the discussion and be sure to catch the full conversation in the video below.

ITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 2 of 2

As mentioned in Part 1 of this blog series, IT Service Management (ITSM) and IT Asset Management (ITAM) make a great combo to support IT’s overall plan to maximize operational efficiencies and improve service delivery experiences, while also optimizing compliance and cost. This post discusses the remaining three use-case examples: 3) Tackle Problem Assets with Proactive Management; 4) Effective Change Management; and 5) Complete Lifecycle Visibility.

Azure Monitor for Windows Virtual Desktop (WVD)

At the end of March 2021, Microsoft released Azure Monitor for Windows Virtual Desktop (WVD) for General Availability. Built upon Azure Monitor Workbooks to give insights into the Windows Virtual Desktop environment, including: Connection Diagnostics, Connection Performance, Host Diagnostics, Host Performance, Utilizations, Users, Clients and Alerts.

Good Catch: Partner Monitoring

Operating in today’s digital economy often involves dealing with an extensive network of third-party providers and partners. Common types of partner networks include affiliates, vendors, suppliers, marketing platforms, and payment gateway providers. Partner networks involve tracking and analyzing data from multiple providers, each of which creates thousands of metrics and billions of events each day.

Application Monitor: Checking Everything that Matters

Application monitor solutions are not novel but rather an evolutionary technology. These types of solutions answer the problems that most developers and DevOps teams encounter when building an application. Application monitor solutions help determine potential defects so developers can take corrective actions quickly. Hence, building an application is no longer complete without application performance monitoring (APM) solutions.

Resolve network security issues efficiently with the Firewall Analyzer-ServiceDesk Plus integration

ManageEngine Firewall Analyzer reviews firewall logs to capture network security threats. It generates alerts upon detecting security threats and attacks, and notifies you, the security administrator, in real time. You can configure alerts to be sent via email, SMS, and more. With these real-time notifications, you can troubleshoot to take instant remedial action. You can also make changes to your firewall policies and configurations to prevent recurring security incidents.