Operations | Monitoring | ITSM | DevOps | Cloud

Guide To AWS Load Balancers

The AWS Elastic Load Balancing (ELB) automatically distributes your incoming application traffic across multiple targets, such as EC2 instances, containers, and IP addresses, in one or more Availability Zones, ultimately increasing the availability and fault tolerance of your applications. In other words, ELB, as its name implies, is responsible for distributing frontend traffic to backend servers in a balanced manner.

Speak French well with La langue française, a Rails application deployed on Vultr with Cloud 66

This case study showcases La langue française, an online learning platform and publication that teaches people how to speak French. La langue française hosts their Ruby on Rails application on Vultr with the help of Cloud 66.

Five steps to better customer communication

When you’re deep into an incident and there’s alerts firing, decisions to be made, and people to escalate to, it’s easy for outward communication with your customers to fall off the priority list. In many regards this makes sense; it seems natural to put all of your focus and energy into minimising the impact and getting things back on track as soon as possible.

Network AF, Episode 4: Untangling business in the ISP industry with Elliot Noss

Today on the episode 4 of the Network AF podcast, host Avi Freedman welcomes his longtime friend Elliot Noss. For 25 years, Elliot has been the CEO of Tucows, the internet services company with the second-largest domain registrar in the world. Elliot is considered an outlier in the ISP industry, largely due to his transparency and for the stellar customer experiences he encourages through Tucows.

How to Manage an ETL Data Migration Into the Cloud

As organizations move their workloads into the public cloud, their environments gradually evolve. Initially, an organization tends to aim for a 1:1 migration of resources, typically in the form of virtual machines (VMs). Although this approach allows for an easier data migration path, it’s more costly and offers less flexibility than taking advantage of some of the serverless and Platform-as-a-Service (PaaS) offerings in the public cloud.

DevOps: A Philosophy? A Job? An Entire Industry?

When I came to SolarWinds in 2020, I was quickly immersed in the world of developers, application engineers, and IT operations. As I started talking to more customers about their roles, I came to understand each of the job functions uniquely—each with distinct responsibilities completely independent of one another. But as I was researching the age-old conflict between developers and IT ops professionals, I was introduced to a word that has now oversaturated work life: DevOps.

CVE-2021-37136 & CVE-2021-37137 - Denial of Service (DoS) in Netty's Decompressors

The JFrog Security research team has recently disclosed two denial of service issues (CVE-2021-37136, CVE-2021-37137) in Netty, a popular client/server framework which enables quick and easy development of network applications such as protocol servers and clients. In this post we will elaborate on one of the issues – CVE-2021-37136.

Align ITSM and PPM to Accelerate Digital Transformation

ITSM’s fundamental processes around request management, incident management, change management, and maintaining a CMDB all provide essential support services to enterprise business processes and employees. These are some of IT’s “run the business” functions that can consume 57% of IT’s resources by one benchmark and be a lot higher for organizations that aren’t investing heavily in digital transformation.

The Key Benefits of Modernizing Your VPN and Bridging to a Zero Trust Model - Let Ivanti Show You

I am excited to announce the launch of our latest network security offering known as Ivanti Neurons for Secure Access (nSA). This new cloud-based management solution will allow our existing L3 VPN customers using Connect Secure to take the next step in their journey toward a zero trust architecture. And this all can happen while still utilize existing Connect Secure VPNs that are already setup and configured.

Identity Director 2021.2 Has Arrived! Why Your Business Will Benefit From Adopting Identity Management

Identity and Access Management involves a series of complex and organisational challenges. This brings together people from the whole organisation to engage in workflow management and decision making. Where the tools at hand lack the capacity to integrate key stakeholders into the communication and the decision-making process, the organization suffers.