Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Interacting With Log Data in Security Event Manager

SolarWinds Security Event Manager is designed to give users a centralized view of logs and events occurring across their network, and quickly and easily recall specific logs and identify suspicious patterns and behaviors in that data. This video gives a quick overview of the features in SEM, making it easy for users to view and interact with their log data.

DevOps Patterns and Antipatterns for Continuous Software Updates at Velocity Berlin 2019

So, you want to update the software for your user, be it the nodes in your K8s cluster, a browser on user’s desktop, an app in user’s smartphone or even a user’s car. What can possibly go wrong? In this talk, we’ll analyze real-world software update fails and how multiple DevOps patterns, that fit a variety of scenarios, could have saved the developers. Manually making sure that everything works before sending an update and expecting the user to do acceptance tests before they update is most definitely not on the list of such patterns.

Motadata's Network Configuration Management Software

Motadata's Network Configuration Management helps users deploy policy compliant configurations, alerts them on out of process changes, monitors devices for configuration changes, backup and restore device configurations, manage configuration changes. It works in a multi-vendor environment and it can work with almost all the devices on your network.