Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Revisiting 2020, the year of the new normal

Compared to other years, 2020 has been a lot different in every single aspect; from how we all interacted to how we operated, everything changed. It was the year where the adjective "unprecedented" was overused. As the world embraced remote work policies, the only thing that remained unchanged was the fact that we operated uninterrupted and our customer support kept churning out replies to customers’ questions. It was business as usual for us.

VoIP during remote work, and meeting its QoS challenges

Though remote work has been in practice for a decent number of years, the pandemic has made businesses take up the challenge of shifting to a completely remote workforce. All this wouldn't have been possible without high-speed internet access for all employees. Another tool that has made the transition smooth and ensured uninterrupted communication is Voice over Internet Protocol (VoIP).

Back to work: IT monitoring best practices

Work remains work, regardless of the location. Working remotely has become the new normal, but some organizations have started to return to their office workspaces, albeit with a minimal workforce. Though going back to work may not be as difficult as adapting to remote work instantly, certain operational challenges are unavoidable; for example, monitoring workspace infrastructure is nothing new, but managing different locations simultaneously has yet to become customary.

10 filter patterns that are helpful for managing your logs

Log files, which are the records of everything that has happened in your server, application, or framework, are generally unfiltered and huge. Going on for pages, these plain text files are packed with tons of information and are the initial go-to place for any troubleshooting. However, the challenge lies in reading, understanding, and interpreting log files, and ultimately pulling out the right piece of information required for analysis.

Site24x7 Server Monitoring: Your pit stop for capturing the disk monitoring flag

All storage devices, whether on-premises or in the cloud, are used to store or maintain data in a server. To organize files based on usage and perform read/write operations, the disk is divided into separate portions called partitions. A partition can contain the entire disk space or some of it. Disk usage gives the amount of space used by the storage device to read/write an operation.

Why HTTPS is important for your website security

HTTP, which stands for Hypertext Transfer Protocol, is a communication protocol used by your browser to connect to the web server of the site you're looking for. When HTTP data transfer between the browser and the web server is shared via unencrypted hypertext, anybody connected to your network can intercept the data you're transferring. To combat this, it's best to switch to HTTPS, the more secure extension of HTTP. You can't verify data integrity with HTTP

A developer's guide to optimizing PHP performance

With its open-source nature, PHP has evolved into one of the most popular languages among web developers. According to w3techs, 78 percent of websites across the globe use PHP as their server-side language. Even amongst the top 1,000 ranked sites, PHP is dominant, being used by more than 50 percent of them.

How Nutanix has changed the approach to virtual infrastructure monitoring

Reinventing any technology is an interminable process. When it comes to legacy infrastructure and virtualization, Nutanix took the giant leap to hyper-converged infrastructure (HCI). Dating back to 2009, Nutanix brought in HCI with the vision to invent a better way to build and manage data centers.

Serverless computing: The what, why, and why not

Applications have traditionally been run on servers, which have to be closely monitored to ensure there are no hindrances in production. In the case of serverless computing, you no longer have to manage servers, as the onus falls on cloud service providers. Read along to discover more about serverless computing, including some of its advantages and disadvantages. So what actually is serverless computing?