Operations | Monitoring | ITSM | DevOps | Cloud

What Your Mobile Devices and Favorite Jeans Might Have in Common

We can all agree that we need our mobile devices to be as secure as possible. No one wants to be hacked. No one wants to deal with the fallout of a breach. If you’re a small business owner, you could be out of business in six months because of how hard it is to recover from a single cybersecurity incident. If you’re in charge of a larger business, you might have to clean up the damage caused from leaked data for years.

Announcing HAProxy ALOHA 17.0

HAProxy ALOHA 17.0 is now available, delivering powerful new features that improve UDP load balancing, simplify network management, and enhance performance. With this release, we’re introducing the new UDP Module and extending network management to the Data Plane API, a new API-based approach to network configuration. The Network Management CLI is enhanced with exit status codes and contextual help.

DSC and STP Update

For over 15 years, Ribbon Communications and Cellusys have worked together to drive innovation in signaling solutions. Today, we’re excited to announce the next phase of our collaboration: Cellusys and Ribbon will be combining the strength of the Cellusys Signaling Firewall and Roaming platforms with the Ribbon DSC and STP though the purchase by Cellusys of a license of the source code to the Ribbon STP and DSC products.

Common database performance monitoring pitfalls and how to avoid them

Databases are fundamental to almost all applications, facilitating everything from financial dealings to social media engagements. Nonetheless, efficient database performance monitoring frequently resembles maneuvering through a labyrinth, with concealed traps that may result in diminished performance or expensive downtime. In this article, we will examine frequent mistakes in database monitoring and offer helpful advice to avoid them.

Comparing Major SD-WAN Vendors

In the face of increasingly complex, far-reaching network architectures, organizations continue to adopt Software-Defined Wide Area Network (SD-WAN) solutions to enhance network performance, security, and agility. Megaport Virtual Edge (MVE) offers a versatile platform that integrates with leading SD-WAN vendors, enabling businesses to deploy their virtual network functions seamlessly.

Conan Launches C/C++ Audit Functionality

Conan is a leading software package manager for C/C++ development environments. As an open source multi-platform package manager, it is used to create, manage and share native binaries and their dependencies based on C/C++ code. C/C++ is often the preferred language for developing embedded systems, mobile platforms, and real-time applications due to its low-level control, high performance, and direct memory management capabilities.

Looking for a PRTG Alternative? Here's Why You Should Consider Icinga

If you’re reading this, chances are high you’re looking for a PRTG alternative and considering switching from Paessler PRTG to Icinga. Maybe it’s the rising costs of PRTG, or maybe you want a monitoring solution that gives you more flexibility and control. Whatever your reason, I want to give you an honest, technical perspective on what that switch entails. I’m not here to tell you PRTG is bad – far from it.

Datadog vs Zabbix - Which Monitoring Tool is Right for You?

When it comes to infrastructure and application monitoring, Datadog and Zabbix are two widely recognized tools, each catering to different needs. While Datadog is a cloud-based observability platform offering end-to-end monitoring, Zabbix is an open-source monitoring solution known for its flexibility in tracking network devices and server performance. But which one should you choose?

What happens when networks aren't monitored? Key risks and consequences

In today's hyper-disruptive risk climate, most businesses are under-prepared. With cyberattacks threatening organizations every day, even the most experienced risk professionals are under growing uncertainty. In this climate, can you really afford not to monitor your networks? Failing to monitor your network isn't just a technical oversight; it's a strategic vulnerability.