Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Best Practices for Database Performance Monitoring

Like application monitoring, database performance monitoring is a critical discipline. If there isn’t a code issue, there’s a good chance you have a database issue. Key metrics such as CPU and memory usage can give you important insights into your database’s performance. In addition, by monitoring slow queries, and inordinate number of database requests, you can combine this knowledge to optimize both.

CMDB: Your Family Tree of Dependencies

Configuration items (CIs) in the configuration management database (CMDB) stores information regarding the relationships among its assets. IT configuration management is becoming increasingly critical in order to maintain service levels and keep all hardware and software performing at peak levels. In order to maintain those levels, there are a few things to understand about the CMDB, how those CIs are connected, and how their relationships can be used to improve technology services.

Data Security and Privacy Techniques for Everyone

Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to protect their data. If you’re online in any capacity, there are some basic techniques you should use. I’m not talking about things like encryption and data masking; if I tried to tell my mother about those, she would stare blankly at me.

Monitoring Hybrid IT Environments With AppOptics

Over the past decade, organizations have been moving to a hybrid cloud model. A hybrid cloud is a form of cloud computing where applications are deployed on a combination of public clouds and private infrastructure. With a hybrid cloud, organizations can choose the most optimal deployment strategy for their applications while maintaining control over certain aspects, such as running user-facing services from a public cloud while storing sensitive data on-premise.

How to Analyze Website Speed Test Results

The SolarWinds® Pingdom® Website Speed Test is one of our most popular tools. It helps countless users understand how their websites are performing and what they can do to improve their site speed. The Website Speed Test can test websites from locations around the globe, and it produces many key results to give you in-depth insight into how quickly your webpages are loading.

Benefits of Cloud-Based Log Monitoring

Most of the IT industry is floating on the cloud these days. From hosting websites to storing data, organizations have started to use the cloud for various purposes, so why not for log monitoring? In this blog, I’ll explain how cloud-based log monitoring is beneficial for you and how you can use SolarWinds® Papertrail™ for it.

4 Reasons Why IT Risk Detection is Critical in the Service Desk

In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in the service desk can act as a safeguard to avoid this. It can help notify service technicians of “prohibited” or questionable items that could cause problems. Here are four reasons why IT risk detection should be incorporated and is critical for successful use of the service desk.

SolarWinds Updates APM Suite Designed to Simplify Application and Infrastructure Management

Introduces new service map and web transaction recorder, enhanced custom parsing rules, and search user experience to further reduce application performance management complexity and speed up troubleshooting.

Four Strategies for Securing the Tactical Edge

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information into soldiers’ hands more quickly, allowing them to make decisions in near-real time. But these benefits come with significant challenges, particularly regarding security. The more endpoints, the larger the potential attack surface and the greater the risk.

5 Best Tools to Tail Logs in 2020

Modern businesses rely on a complex ecosystem of digital networks, databases, applications, user devices, and more. The tools and platforms supporting this ecosystem undergo constant refinement and upgrades. However, the basic methods for monitoring infrastructure and application performance have remained unchanged, and logging is one such methods. Every computer, server, networking device, and application produces logs, a timestamped record of events within a system.