Operations | Monitoring | ITSM | DevOps | Cloud

Core Web Vitals: Google's Upcoming Ranking Changes

From 1st May 2021, Google will start judging your website based on a new set of performance metrics called Core Web Vitals. This initiative is focused around user experience and will become part of Google’s ranking algorithm. Failing them is bad, getting them right is a huge opportunity. Only 23% of businesses currently pass these tests consistently, so organic SEO will be negatively impacted for the large majority of companies.

10 Best Tools for Monitoring Wireless Access Points

Monitoring wireless access points is business-critical, allowing teams to facilitate day-to-day workflows. These wireless access points (APs or WAPs) provide strong Wi-Fi signals and transmission ranges for sending and receiving valued information. But wireless access points are susceptible to cyberattacks that jeopardize your revenue and reputation.

How to Monitor Network Traffic: Best Tips for IT Pros

What if I told you that monitoring network traffic is a lot less daunting than it actually seems? I think I have your attention. As a network has various moving parts, understanding it all can be a serious challenge. If something breaks or a component stops working correctly, implementing a quick troubleshooting process is essential. If you can't fix the issue right away, this could be detrimental for your end users, leading to more severe complications.

Cisco Network Monitoring: 6 Best Practices

It's often said that your network is the "backbone" of your IT infrastructure, underlying every other part of your enterprise IT. If your Cisco network infrastructure goes down or is experiencing performance issues, it's crucial that you have a real-time solution to identify and resolve the problem as soon as possible. But what does such a solution look like when it comes to Cisco networks?

AWS S3 security with CloudTrail and Falco

One of the major concerns when moving to the cloud is how to approach AWS S3 security. Companies may have moved their workflows to Amazon, but are still cautious about moving their data warehouse. And that is totally understandable. We have all heard about data breaches in companies like Facebook, GoDaddy, and Pocket. It’s important that access to information is done properly, in a limited and controlled fashion, to avoid such breaches.

How I fell in love with logs thanks to Grafana Loki

As part of my job as a Senior Solutions Engineer here at Grafana Labs, I tend to pretty easily find ways out of technical troubles. However, I was recently having some Wi-Fi issues at home and needed to do some troubleshooting. My experience changed my whole opinion on logs, and I wanted to share my story in hopes that I could open up some other people’s eyes as well. (I originally posted a version of this story on my personal blog in January.) First, some background info.

High throughput VM logging and metrics agent now in Preview

Running and troubleshooting production services requires deep visibility into your applications and infrastructure. Virtual machines running on Google Compute Engine (GCE) provide some system logs and metrics without any configuration required, but capturing application and advanced system data has required the installation of both a metrics agent and a logging agent.

Ask these 8 questions when choosing your IT project management software

IT teams across the digital world are currently facing their biggest test yet. Ensuring that things are running smoothly when employees are working from home. And they’re doing a very good job at it. But, there’s always room for improvement right? If you’ve ever been a part of an IT team, you know the pain of jumping between multiple software tools, the effects of a broken down collaboration system and the struggle for visibility amongst team members.

Enterprise IT Cost Containment-A Series

H.L. Mencken once famously wrote, “…there is always a well-known solution to every human problem—neat, plausible, and wrong.” More than just a pithy way to frame the entire concept of “cost containment” (whether network-specific cost, the broader category of IT, or the cost of anything else, to be quite honest), it’s an integral aspect of what I’ll be proposing in this and subsequent articles in this series.