Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Four Strategies for Securing the Tactical Edge

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information into soldiers’ hands more quickly, allowing them to make decisions in near-real time. But these benefits come with significant challenges, particularly regarding security. The more endpoints, the larger the potential attack surface and the greater the risk.

5 Best Tools to Tail Logs in 2020

Modern businesses rely on a complex ecosystem of digital networks, databases, applications, user devices, and more. The tools and platforms supporting this ecosystem undergo constant refinement and upgrades. However, the basic methods for monitoring infrastructure and application performance have remained unchanged, and logging is one such methods. Every computer, server, networking device, and application produces logs, a timestamped record of events within a system.

5 Best Tools to Tail Logs

Modern businesses rely on a complex ecosystem of digital networks, databases, applications, user devices, and more. The tools and platforms supporting this ecosystem undergo constant refinement and upgrades. However, the basic methods for monitoring infrastructure and application performance have remained unchanged, and logging is one such methods. Every computer, server, networking device, and application produces logs, a timestamped record of events within a system.

Ideas for Combatting DoD Mobile Security Threats

In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they open doors for hackers. According to research by Wandera, in 2018 there were 455,121 mobile phishing attacks, 1.9 million Wi-Fi incidents, and 32,846 malware attacks.

3 IoT Protocols to Watch in 2020

As we roll into the next decade and IoT becomes commonplace in most organizations, requirements for connectivity will change. Over the last decade of Wi-Fi, we’ve seen a push for faster speeds (high throughput and very high throughput) and recently the ability for greater capacity (high efficiency). Wireless IoT protocols have a different focus. Those requirements are long distance, low power, and flexible architecture. As we consider the next generation, which capabilities rise to the top?

Best Practices for Effective Website Transaction Alerting

Having their websites constantly perform at their optimal capacity should be the aim of all businesses and website owners. When websites go down, load slowly, or underperform, the user experience suffers. This can result in low sales and conversions. So what can you do to ensure your website remains fully functional? In this article, we’ll look at the importance of monitoring your website with a powerful monitoring tool like Pingdom®.

5 Best Heroku Add-Ons in 2020

The cloud provides a standardized approach to embracing disruptive technologies with higher agility and ease of operations. This is why most organizations have embraced cloud-based infrastructure and services for application development and delivery. However, the processes, tools, and platforms used in the application development life cycle are always evolving, allowing businesses to make the most of their cloud investments.

IoT Architecture: 3 Things Every IT Professional Should Know

OK, folks. Let’s be real for a moment and acknowledge that everybody, every professional, and definitely every vendor out there is tossing out the phrase “IoT” like flyers on the Las Vegas strip. As an industry, we tend to use IoT to describe a breadth of networked devices, most often headless—those without a user attached—such as cameras, door entry systems, and HVAC controls.

IT Risk Assessment vs. IT Risk Management: The Difference and What They Mean to the Service Desk

In life, risks can be perceived both negatively and positively. Taking a risk can sometimes yield great results, but other times, a risk is a yellow light of caution. For businesses in particular, if not managed properly, IT risks like malware malfunctions and employee errors can range in size and occur in several areas. The result is disruption and valuable time being used to resolve the issue. But even with risk present, there are measures IT can put in place to ward them off.