Operations | Monitoring | ITSM | DevOps | Cloud

%term

What is the curl command?

curl is one of those programs that feels like its always been there for you in a pinch, like when you're trying to debug what your API is doing, and yet we never take the time to actually learn how to use it (I only ever used it via "copy as curl" from my browser's devtools). It's insanely powerful too, run curl --help all to see what I mean. In this article, we're going to take the time to learn what we can do with a tiny subset of curl's options, so we don't have to look them up every time.

Best Monitoring Solutions for Nonprofits in 2025

In 2025, nonprofits will rely heavily on technology to achieve their missions. They need reliable infrastructure to manage databases, run online campaigns, deliver critical services, and more. Limited resources make it difficult to maintain their systems efficiently. Monitoring solutions provide visibility into system uptime, performance, security, etc. With monitoring, nonprofits can focus on their missions without worrying about infrastructure failures or other errors.

NinjaOne01 Monitoring Active Directory User Changes

In the world of technology, there are a near infinite number of moving parts, network configurations, Active Directory, users getting added to and removed from groups, data, security and so much more. Trying to keep an eye on all of this can be a genuine headache, so let’s take a look at some ways we can log Active Directory changes with NinjaOne to give you a little bit more breathing room!

Monitoring in the Age of the Internet: DEM, IPM, and APM-What You Need to Know

Gartner recently published the first ever Magic Quadrant for Digital Experience Monitoring (DEM). This landmark report raises important questions about what DEM is and why we need a new category now. It also prompts discussions about how DEM, Internet Performance Monitoring (IPM), and Application Performance Monitoring (APM) relate to each other and what roles they play in modern monitoring strategies.

LogicMonitor is recognized as a 2024 Customers' Choice for Observability Platforms on Gartner Peer Insights

LogicMonitor is pleased to have been recognized as a Customers’ Choice vendor for 2024 in the Observability Platforms category on Gartner Peer Insights. This distinction is based on feedback and ratings as of December 30, 2024. LogicMonitor reviewers gave us a 4.7 (out of 5) overall rating in the report, with 94% saying they would recommend the LogicMonitor platform and 83% coming from companies with over $50 million in revenue based on 49 reviews submitted as of October 2024.

Using SolarWinds Loggly to Get the Most Out of MongoDB Structured Logging

Logs are essential for understanding and optimizing performance, and MongoDB structured logging makes them more powerful. By organizing logs into a consistent format, we can query and analyze them more efficiently. However, dealing with logs locally has its limits. That’s where a centralized log management tool like SolarWinds Loggly comes in. Shipping MongoDB logs to SolarWinds Loggly gives you a unified view of your data, advanced analytics, and proactive monitoring.

How to Fix Poor AWS Latency

Find out how to reduce your latency and get better network performance from the leading cloud service provider. In the modern business world, AWS is everywhere. According to HG Insights, the leading hyperscaler has over 50% market share, with 2.38 million businesses worldwide using AWS cloud services in 2024. One of the top questions we hear AWS users ask is how they can make their AWS connection faster.

NIST 800-53: Understanding the Rosetta Stone of security frameworks

Across various industries including the Department of Defense (DoD), federal service agencies, financial institutions, healthcare and other highly regulated organizations, the National Institute of Standards and Technologies (NIST) 800 53 security framework, is used to describe the security compliance. It is a standard catalog of security controls for protecting organizations’ operations, assets, and users from cyber threats. To be sure that is a broad definition that requires more nuance.