Operations | Monitoring | ITSM | DevOps | Cloud

Understanding Log4Shell: An Ultimate Guide to Protecting your System

Coding is a big part of building an application. But, most of the time, you don’t write the entire code. Yes, you don't! Some people, usually big companies, provide pre-written codes for certain standard functions - like loggers, APIs, etc. This is because these functions work the same way in most applications; they require only simple fine-tuning to be adapted for your program as well. In such a case, writing it all from scratch would be a waste. And that is why developers use libraries.

SolarWinds Day Recap: What You May Have Missed

Our second SolarWinds Day was another success! For our second SolarWinds Day, we focused on our customers. We shared exciting new product updates, new tool releases, and some helpful tips for navigating 2023. Let’s dive into our recap, and make sure to check out the end of the post for a quick FAQ of questions asked by those in attendance. First of all, if you missed the event or want to revisit any sections, you can watch the full event on-demand here.

RDCMan: How to Manage Multiple Remote Connections in Microsoft

Having to switch between multiple desktop client windows to access them remotely is highly time-consuming and leads to a cluttered desktop. But you can simply ditch the frustration by using RDCMan for your RDP connections. In this article, we'll explore what it is, how you can use it, and the differences between mRemoteNG and RDCMan. We'll also discuss alternatives to this tool. So, let's dive in and learn how to use Microsoft's RDCMan to manage your remote connections like a pro!

Linux security: your questions, answered

At Canonical, we often get questions about open-source security and of course, Linux security is a common topic. Based on a recent webinar hosted by our security team and an accompanying blog post, we put together the most common questions we receive. This is by no means an exhaustive list, but it should give you a general idea about Ubuntu’s approach to security vulnerability management, livepatch, IoT, and its compliance and hardening tools.

Monitor User Behavior to Detect Insider Threats

The risk from insider threats has grown massively, with perpetrators frequently getting around organizations' increasingly complex perimeter protections. It is one of the most common ways customer data or industrial and trade secrets leak. This very complex topic includes many types of threats and techniques. Let's discuss how you could detect insider threat activity at a network level.

How to Create and Manage Secrets in Kubernetes

Kubernetes Secrets are a built-in resource type that's used to store sensitive data. This blog teaches you how to work with Secrets in Kubernetes. Kubernetes can do many things, but we usually refer to it as a “container orchestrator.” Orchestrating containers means starting and restarting them when needed, ensuring their configuration matches the declared state, and autoscaling them. But Kubernetes can do much more than that.

5 Common Collaboration Tool Myths Busted by Collaboration Experience

As part of Nexthink’s launch of the new Nexthink Infinity Platform we also launched Collaboration Experience – adding detailed Microsoft Teams and Zoom call telemetry and insights to the comprehensive “See, Diagnose & Fix” capabilities of the platform. After 4 months, we are ingesting telemetry from almost 2 million employee calls and sessions a day – great testimony to the power and scalability of the Nexthink Infinity platform.

Big Productivity with Small Wearables

“If that doesn’t work, try a bigger hammer.” It’s an old saying we can all appreciate, but it isn’t always the best solution. Regarding the mobile workforce, smaller is sometimes better. As consumers, we’ve watched cell phone handset sizes change: first from large 1980’s car phones to pocketable “brick” phones. Then, smaller “flip” phones were replaced by our larger smart phones, which vary on screen size but remain pocketable.