Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

A little bit about the vision of the WebGazer

To start with, idea of WebGazer came into existence from self-need. Maintaining multiple websites on different servers and not knowing the state of every one were problematic, especially when one of the websites somehow goes down and you learn it from the customer you maintain the website for or the user who shouldn't even notice the glitch in the first place.

Free Operations Manager Performance Monitoring Management Pack

Prior to upcoming upgrades or a new installation of System Center Operations Manager (SCOM), it’s important to keep statistics on how the performance of your environment is impacted over time. It can also be the case that you want to make changes to the infrastructure and you’d want to understand if you get a positive or negative impact.

Mattermost 4.7: Enhanced image preview and thumbnails, faster load times, upgraded desktop app

We’ve just released our February 2018 update and there’s a lot of exciting news to share! Mattermost 4.7 includes enhanced image previews and thumbnails that make it easier to see what’s in the images your colleagues share. We’ve also added several performance improvements. You’ll notice pages and images are loading even faster thanks to image proxy support. It’s also easier to find channels due to optimized autocomplete queries.

Five worthy reads: Machine learning, the next phase of cybersecurity

With the number of cyberattacks growing with each passing day, the need for increasingly sophisticated security systems has never been higher. Just when these ceaseless attacks had you at your wit’s end, machine learning may just restore some sanity to the cybersecurity scene.

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.