Operations | Monitoring | ITSM | DevOps | Cloud

$25 Million Lost: Tech Issues Hit Businesses Where It Hurts

The phrase just a few months ago has never seemed to cover more ground than it does today. Well, just a few months ago, Nexthink commissioned a study with Vanson Bourne to find out the real state of the Digital Employee Experience. Vanson Bourne reached out to 3,000 IT leaders and employees across major markets in the USA, United Kingdom, Germany and France.

2004 to 20.04 LTS: Ubuntu in popular culture

When we launched Ubuntu back in 2004, our mission to make well-supported, free open source software available to everyone, everywhere was a bold one – but today, Ubuntu is one of the world’s most popular operating systems. One consequence of that popularity is that Ubuntu has very much entered the public consciousness, and its influence can be seen across all kinds of popular culture.

WSLConf: Sessions Part 1 - C++ cross-platform development and more

Earlier this year, Canonical had the pleasure of hosting WSLConf, a virtual conference dedicated to the Windows Subsystem for Linux (WSL). We demonstrated what teamwork and community can achieve when we flipped the in-person conference to a virtual experience in less than a week. WSLConf united developers, security professionals, team leaders from Microsoft, and a passionate community from all around the world.

A Checklist for Your Website Launch

Launching your business website is a big step, but, if you don’t know how to launch a website the right way, you’re just wasting time. There are many considerations, including design, functionality, SEO, testing, marketing, analytics, and security. Assuming you’ve designed and built a site that’s ready to go, your website launch checklist should include the following.

Log Management Solutions: A Look at 11 That You Need

The days of logging as a mere troubleshooting mechanism are past gone. Nowadays, log management is a must. In today’s post, we’ll present you with a list of 11 log management solutions worth checking out. Let’s dig in. The first tool in our list is Splunk, which is a comprehensive utility very well-known by sysadmins. It’s available as a downloadable tool for Linux, Windows, and macOS X. A cloud version also exists, as well as a free version with limited capabilities.

Between Two Alerts: Phishing Emails - Don't Get Reeled In!

Potential attackers are really good at what they do. Security analysts see this firsthand with the amount of phishing emails their organizations see daily. A newly released State of the Phish report reveals that nearly 90% of organizations dealt with business email compromise (BEC) attacks in 2019. End users reported 9.2 million suspicious phishing emails globally for the year.

Encrypt Azure Service Bus Data at REST using User Keys

Azure Service Bus messages may contain sensitive business information. This sensitive information should be accessible only to the intended receivers of the message. This information must be protected from the attackers when the messages are in transit and at rest. This blog will brief you how Azure handles the default encryption of data at rest and how we can use our own keys to encrypt the Service Bus data at transit.

Mastering website monitoring with Applications Manager

In the digital era, most enterprises use a web platform to reach potential customers and showcase the products or solutions they offer. Websites have become extremely popular as a medium of establishing a brand image, and they contribute in making a major share of revenue. Well-planned websites can capture the attention of the target audience, increasing the probability of them turning into valuable, paying customers.

How ML6 used Grafana to deliver a 200% ROI for Accolade Wines

Did you know that Grafana pairs well with a fine wine? That’s what machine learning company ML6 discovered when they worked with their client Accolade Wines, an award-winning Australian vintner whose goal was to decrease the waste produced in its global operations. “Accolade Wines is really focused on being as efficient as possible,” says Rebecca Brooke, ML6’s team leader in the U.K. “They’re always looking at minimizing their environmental impact.”

Is the role of ITSM only limited to IT? Understanding Enterprise Service Management

Enterprises are facing new challenges not just in terms of staying relevant in the market and customers but also in controlling internal organizational chaos. Over the years, there have been a number of frameworks and models that were consistently being rolled out to assist enterprises to declutter operational and organizational challenges, streamline enterprise services and service delivery, and identify loopholes and fix them.