Operations | Monitoring | ITSM | DevOps | Cloud

%term

The Benefits of a Single Incident Management System

How many monitoring tools do you have? Chances are at least 2-3. One tool usually does not cover all cases, and it’s usually a combination of self-managed and managed tools. Self-managed gives you more control over custom configurations and cost. Managed ones take away the headache of running it yourself. Prometheus is the de-facto standard for monitoring these days if you have a modern application stack and you want to manage your own monitoring.

Edge Data Centre - What is Edge and Why Use It?

What is an Edge Computing Platform and Why Your Business Needs It Edge computing is a vital part of today's business function. With more people choosing to work remotely and office spaces dispersed across the nation, having edge network compatibility is an essential component of any digital infrastructure. Edge allows users in remote locations to access and manage data from the network's Edge, ensuring security and integrity for your data no matter where people choose to use it.

6 Common Spanning Tree Mistakes and How to Avoid Them

Let me start by saying that spanning tree is a Good Thing. It saves you from loops, which will completely shut down a network. But it has to be configured properly to work properly. I can’t count the number of times I’ve had a client call me, desperate with a terribly broken network, and I’ve responded, “Sounds like a spanning tree problem.” There are many ways things can go wrong with spanning tree. In this article, I’ve collected six of the recurring themes.

Best practices for scheduling security patching automations

In this webinar, you’ll learn about Canonical's release schedule for Ubuntu and its security updates, and how you can use this information to set optimal manual and automated security patching maintenance intervals. There are a variety of tools, such as Livepatch, Landscape, Snaps, and command line utilities like unattended-upgrades that provide security patching automation capabilities. We’ll cover how each one works, and how you can combine them for maximum benefit. We’ll also cover the nuances between reboot recommended and reboot required.

Ubuntu Core 24 | Run Your Devices on Ubuntu

Secure and reliable open source IoT - everywhere. Introducing Ubuntu Core 24, the operating system optimised for IoT and Edge, allowing you to run your devices on Ubuntu. Ubuntu Core delivers high performance, ultra-low latency and workload predictability for time-sensitive industrial, telco, healthcare, and robotics use cases.

How to Skynet your Kubernetes Clusters with LocalAI with Engin Diri

Join Engin Diri from Pulumi at Civo Navigate NA 24 as he explores "How to Skynet Your Kubernetes Clusters with Local AI." In this session, you'll discover the rapid advancements in AI, the truth behind common myths, and practical applications using LocalAI. Learn about the benefits and challenges of open-source large language models and see a live demonstration of embedding domain-specific knowledge using Pinecone.

Lead Gen or Operational Efficiency-What's more important for sustainable MSP growth?

This month, I want to address a question I was sent from one of our MSP partners. As a smaller MSP looking to grow, they were wondering what they should focus on first: Marketing and lead gen to fill their sales pipeline? Or strategies to improve their organizational and operational efficiencies? They recognized that both areas are currently a source of weakness for their business.

Network Basics: Spanning Tree Protocol

For new networkers, Spanning Tree Protocol (STP) can be an intimidating topic. Many old-timers speak of spanning-tree in ominous tones, recounting the time when a “spanning-tree loop” brought down the network. Some managers strictly forbid anyone from changing anything related to the spanning tree, fearing a resulting service interruption. Some of the fear surrounding spanning trees is likely based on bad experiences, but some are based on ignorance—at least partly.

How to Adjust TCP Window Size to Improve Network Performance

The TCP/IP protocol sometimes shows its age. It was invented in an era when networks were very slow and packet loss was high. So one of the main considerations in early protocol design was reliability. The Transmission Control Protocol (TCP) has built-in mechanisms for reliability that include validating a checksum on every packet, as well as detection and retransmission of dropped or out-of-order packets.