Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Synthetic Monitoring vs Real User Monitoring: What's The Difference?

It’s important for both technical and business teams to understand the different web performance monitoring options that are available as well as their various use cases and the benefits of each. In this article, we’ll compare synthetic monitoring and real user monitoring (RUM).

Synthetic Monitoring Tools: 5 Must-Have Features

There are many different classes of web performance tools, from synthetic monitoring to application performance monitoring (APM), to real user monitoring (RUM), and more. These different classes exist because each has its own strengths and weaknesses. When evaluating open-source or enterprise-grade synthetic monitoring tools, you want to look for capabilities that maximize its strengths.

Telegraf Best Practices: SNMP Plugin

Telegraf has now reached 300+ plugins and is deployed in a wide variety of use cases. In January we released a blog post covering the golden rules for creating configs and optimizing your Telegraf agent. It’s now about time we got our hands dirty covering some of the plugins the community uses the most. In this post, we are going to cover the SNMP Input Plugin.

Identify Vulnerable Devices From Vendor Recalls and Security Notices

When network hardware vendors issue device recalls, field notices, or security alerts, the implication can be massive for MSPs. Take the 2017 clock signal issue, for example. That huge recall of Intel microchips was a large-scale vulnerability for tons of devices—and left MSPs scrambling to figure out which devices were affected on which client sites.

Civo Update - June 2022

In May, we hosted our first in-person community meetup speaking about all things Kubernetes. Community members came and engaged in cloud-native discussions with talks from Saiyam Pathak, Kunal Kushwaha, Josh Van Leeuwen, and Walid Shaari. We also featured in ZDNet’s article on the four-day work week which includes an interview with Mark Boost, CEO at Civo. This outlined how employees have attained a better work-life balance with the change as well as why the decision was made.

Tips for Optimizing React Native Application Performance: Part 1

React Native is an amazing framework for building cross-platform mobile applications. It helps you provide a high-quality, native-looking application that runs on multiple platforms, using a single codebase. The current React Native architecture uses the UI (or main) thread and the JavaScript thread. The JavaScript thread is used to run business logic, make API calls, process touch events, etc. The UI thread is where animations and transitions are done.

Ad Fraud: What Is It and How to Protect Your Firm From It?

Ad fraud is a type of online advertising scam that involves the creation of fake ads or click-throughs in order to generate revenue for the fraudster. Ad fraud can be perpetrated by anyone with access to an advertiser's account, such as a publisher, ad network, or even a malicious insider. Ad fraud can be difficult to detect and even more difficult to prevent. However, here are a few tips to help protect your firm from ad fraud.

Top 7 ITSM tools to help deliver a delightful support experience

If your company has more than a few employees, and if even one of you is the designated “IT guy,” you’re already applying ITSM in a small way. But as your company expands, you need to bring in more mature processes to derive the most benefits from your ITSM investment. Therefore, effective IT sinervice management has become vital to guarantee long-term success.