Operations | Monitoring | ITSM | DevOps | Cloud

%term

Visualize relationships across your on-premises network with the Device Topology Map

Network engineers need clear visibility into the relationships and dependencies of their network devices so they can quickly troubleshoot when issues arise. But when dealing with the potentially thousands of devices that comprise a modern enterprise network, engineers often need to navigate a complex web of interconnected signals in order to trace the sources and consequences of poor network performance.

The Complete Guide to FIPS Compliance for Your Organization

Federal Information Processing Standards (FIPS) compliance plays a critical role in setting the standards for encryption and security that safeguard sensitive information. As your organization increasingly relies on digital infrastructure, it’s important to understand and implement FIPS compliance requirements to maintain the security and integrity of your data. This commitment helps ensure your operational practices not only meet but exceed the necessary safeguards.

What Is DNS? Definition & How It Works

The Domain Name System, commonly known as DNS, is a fundamental component of the internet, yet it remains a mystery to many users. Without DNS, browsing the web would be a cumbersome process, requiring us to remember complicated numerical addresses for every website we want to visit. In this article, we will demystify DNS, explaining its importance, how it works, and its critical role in our everyday online activities.

Welcome to the Data (R)evolution: Shaping Tomorrow's Technology

Data is the fuel that sparks innovation and transforms our world. It's powerful, undeniable, and the driving force of our future. Data (R)evolution, our new podcast series, delves into how data, innovation, and economics intersect within the dynamic realm of cloud technology. Hosts Janki Patel Westenberg and Francesco Tisiot navigate the currents of the data, platforms and AI revolution in thought-provoking conversations with experts at the forefront of change.

How to create synthetic monitors in OneUptime?

In this video, we will guide you through the step-by-step process of creating synthetic monitors using OneUptime. Synthetic monitoring is a method to monitor your applications by simulating user behavior. It’s an essential tool for ensuring optimal performance and high availability of your web applications.

UniSuper Google Cloud Outage Reveals Need for Keen Backup and DR Planning

Earlier this month, Google Cloud disclosed that it accidentally deleted the account of its customer UniSuper, a $125 billion Australian pension fund. According to a joint statement from Google Cloud and UniSuper, the deletion occurred due to an “inadvertent misconfiguration.” As a result, more than 600,000 pension fund users were unable to access their accounts for over a week. UniSuper had geographical redundancy built into its Google Cloud environment, according to the statement.

Modern Egress Gateway: Assign stable IPs to traffic leaving Kubernetes clusters

Whether an enterprise is migrating its legacy application to a cloud-native architecture or deploying a new cloud-native application, it will face the challenge of integrating with security tools such as firewalls that rely on a stable network identity for security configuration. This is due to the fact that cloud-native workloads aren’t guaranteed to have a fixed network identity.

How to Monitor Steel Alloys with Grafana | 2024 Golden Grot Award Winner: Dr. Christopher Field

Meet Dr. Christopher Field, our 2024 Golden Grot award winner in the professional category. Dr. Field is the Co-founder and President of Theia Scientific, whose software helps researchers stream images from room-sized electron microscopes to a time series database and machine learning models that are used to instantly identify defects in alloy.