Operations | Monitoring | ITSM | DevOps | Cloud

Pandora FMS

What are logs and why monitor them?

What are logs? In computing, when generally speaking of “log”, we refer to information belonging to a more or less low level reported by the operating system or a specific application that helps identify what is being done, including errors, problems or minor warnings, and when that happens, it indicates the date and time. In some cases, the source, the user, the IP address and other interesting fields from the point of view of what has happened can be identified.

What is bandwidth and how does it affect your connections?

What is bandwidth? Over the last few years, and at the dawn of the very celebrated arrival of the Internet into our homes and our beloved cell phones, concepts such as bandwidth, previously restricted to more technical contexts, have come into our lives hand in hand with waves of experts who recommend this or that connection based on criteria that usually fits your brother-in-law’s wisdom.

What is VPN? The acronyms that could save your life

What is VPN? You know that in IT we absolutely love acronyms, right? Specifying and summing things up is our thing. Digital Video Disc? DVD. Central Processing Unit? CPU. Asymmetric Digital Subscriber Line? Yes, you guessed it right: ADSL. In fact, tell me a word, no matter how long… What the heck! let’s take one of the longest words, with no more and no less than 23 characters: electroencephalographer. Well, how would we find this word in a hypothetical technoglossary?

Common and Disastrous Network Monitoring Mistakes and How to Avoid Them

If you run a sizable enterprise, your network is probably sprawling. You also probably have a network management or IT security team on the payroll to handle monitoring. Their job is to check the network for potential security intrusions, make sure resources aren’t overloaded in one area, and otherwise ensure that things run smoothly.

Managing Network Configuration Changes Five Best Practices

Do you know what the most common cause of network outages and performance problems is? Misconfiguration. For as much time and energy as people spend talking about issues such as infrastructure and cybercrime, the truth is that basic low-level configuration challenges are still the biggest “threat” to properly-functioning networks.

Remote working monitoring: A breach of privacy or a gateway to a work-from-home culture?

One benefit of the lockdown triggered by the coronavirus epidemic has been a renewed enthusiasm for working at home. Forced to let millions of employees work from home to avoid contagion, companies that had been hesitant about taking this step have concluded they can benefit from moving to a remote workforce.

GNU Linux commands to inventory computer hardware

In the beginning we, as Humanity, created computers. We said “let it be electricity” and it was the light on our ballistic trajectory calculations. We saw the numbers matched and they were good. And we called the set of calculation instructions as “programs”, which were loaded straight into computer memories. And so was the first computing decade. GNU Linux commands didn’t exist yet, because there were no operating systems either.