Operations | Monitoring | ITSM | DevOps | Cloud

Ivanti Helps Companies Manage, Secure and Deliver IT for a Remote Workforce

We're here to support you and your organization during these uncertain times. Check out our helpful resources regarding how to navigate the IT environment with all the changes COVID-19 brings. Our lives and businesses are changing daily in response to the current health climate. It is an uncertain and unprecedented time for everyone, and our concern is always first and foremost the health and safety of our employees, partners, and customers.

Heat monitoring system: Heat maps with Pandora FMS

One of the great pleasures of life, next to sunbathing parallel to a swimming pool, walking along the beach at sunset or eating chocolate in all its aspects, is the fact that we can relate, in this blog, elements of science fiction with elements that we can count on today in real life and that no one seems to have noticed. That’s why today, in “Pandora FMS News“, we’ll talk about temperature monitoring, something that’s already available to everyone.

Generating Jaeger gRPC services and using Jaeger in JUnit with Testcontainers

In this article you will learn how to generate Jaeger model classes and gRPC services from protobuf definitions. The generated code can be used to write integrations or it can be used in tests to query tracing data from Jaeger-query service. This is the use case we are going to look at in more detail.

What Is SDLC? Understand the Software Development Life Cycle

The Software Development Life Cycle (SDLC) refers to a methodology with clearly defined processes for creating high-quality software. in detail, the SDLC methodology focuses on the following phases of software development: This article will explain how SDLC works, dive deeper in each of the phases, and provide you with examples to get a better understanding of each phase.

Simplify NFV adoption - Charmed OSM and Managed Apps

Charmed OSM and Managed Apps let telecom operators accelerate adoption of NFV. This is needed because the way we consume data has changed. We want data at a cheaper price with faster speeds and in larger quantities. To meet the challenge, telecom operators are changing the underlying network infrastructure that delivers data. Software-defined networking (SDN) and network function virtualisation (NFV) are enabling this by lowering costs and improving infrastructure flexibility.

The Anatomy of a Secure Serverless Platform, Pt. 2 -- Development

Stackery’s secure serverless platform for AWS offers teams a key resource to help realize the promise of serverless – by automating otherwise complex infrastructure processes, we enable you to leverage the massive suite of AWS tools and services with minimal management overhead. It’s crucial for teams to do this while enforcing security and ensuring adherence to compliance guidelines.

Splunk Rapid Adoption Packages - Part 2

In part 1 of the RAP blog we focused on an overview of Rapid Adoption Packages, Part 2 will now focus on the use case package specifics and how these can help with customer goals. With Rapid Adoption Packages Customers have the option to select a number of use cases which are specifically designed exactly to do this, there are currently 9 available use case packages and they include...

Monitoring Family Pickle Consumption with Splunk!

Recently, about a month after our public health crisis started in the US, I opened my mailbox. Inside was a printed public service announcement sent from the mayor of my little community northwest of Denver. It had cute graphics of cartoonish townsfolk wearing facemasks, and the content conveyed reasonable, folksy messaging about social distancing and sheltering in place.

Fraud Detection: WFH Leading to Increased BEC and Phishing Threats - What To Look For

A lot has changed in the past few weeks. And the percentage of us working from home (WFH) has increased tremendously. With increased WFH, we rely more on email communication, and this increases the opportunities for abuse by others. One thing that has stayed constant: bad people want to do bad things. As we have seen in the past, when one avenue of attack is restricted, the fraudsters redouble their efforts in other areas, and online fraud attempts are already increasing during our new normal.