Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How to Analyze Website Speed Test Results

The SolarWinds® Pingdom® Website Speed Test is one of our most popular tools. It helps countless users understand how their websites are performing and what they can do to improve their site speed. The Website Speed Test can test websites from locations around the globe, and it produces many key results to give you in-depth insight into how quickly your webpages are loading.

Benefits of Cloud-Based Log Monitoring

Most of the IT industry is floating on the cloud these days. From hosting websites to storing data, organizations have started to use the cloud for various purposes, so why not for log monitoring? In this blog, I’ll explain how cloud-based log monitoring is beneficial for you and how you can use SolarWinds® Papertrail™ for it.

4 Reasons Why IT Risk Detection is Critical in the Service Desk

In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in the service desk can act as a safeguard to avoid this. It can help notify service technicians of “prohibited” or questionable items that could cause problems. Here are four reasons why IT risk detection should be incorporated and is critical for successful use of the service desk.

SolarWinds Updates APM Suite Designed to Simplify Application and Infrastructure Management

Introduces new service map and web transaction recorder, enhanced custom parsing rules, and search user experience to further reduce application performance management complexity and speed up troubleshooting.

Four Strategies for Securing the Tactical Edge

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information into soldiers’ hands more quickly, allowing them to make decisions in near-real time. But these benefits come with significant challenges, particularly regarding security. The more endpoints, the larger the potential attack surface and the greater the risk.

5 Best Tools to Tail Logs in 2020

Modern businesses rely on a complex ecosystem of digital networks, databases, applications, user devices, and more. The tools and platforms supporting this ecosystem undergo constant refinement and upgrades. However, the basic methods for monitoring infrastructure and application performance have remained unchanged, and logging is one such methods. Every computer, server, networking device, and application produces logs, a timestamped record of events within a system.

5 Best Tools to Tail Logs

Modern businesses rely on a complex ecosystem of digital networks, databases, applications, user devices, and more. The tools and platforms supporting this ecosystem undergo constant refinement and upgrades. However, the basic methods for monitoring infrastructure and application performance have remained unchanged, and logging is one such methods. Every computer, server, networking device, and application produces logs, a timestamped record of events within a system.

Ideas for Combatting DoD Mobile Security Threats

In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they open doors for hackers. According to research by Wandera, in 2018 there were 455,121 mobile phishing attacks, 1.9 million Wi-Fi incidents, and 32,846 malware attacks.

3 IoT Protocols to Watch in 2020

As we roll into the next decade and IoT becomes commonplace in most organizations, requirements for connectivity will change. Over the last decade of Wi-Fi, we’ve seen a push for faster speeds (high throughput and very high throughput) and recently the ability for greater capacity (high efficiency). Wireless IoT protocols have a different focus. Those requirements are long distance, low power, and flexible architecture. As we consider the next generation, which capabilities rise to the top?