Operations | Monitoring | ITSM | DevOps | Cloud

Resilience with Zero Data Loss in High-Volume Telemetry Pipelines with OpenTelemetry and Bindplane

This was the problem one Bindplane customer had with processing enormous S3-stored log files. Our engineering team tackled the problem head-on, enhancing the S3 event receiver with offset tracking and chaos testing methodologies.

Goodput vs Throughput: The Differences and How They Affect Your Network

Two key metrics that often come up in discussions about network performance are throughput and goodput. While these terms may seem similar, they highlight different aspects of your network’s efficiency and misunderstanding them can lead to poor decision-making that can impact the way you manage your network and your business’ resources.

PostgreSQL Performance: Faster Queries and Better Throughput

A PostgreSQL setup that performed well with 10,000 users starts to show strain at 100,000. Queries that once returned in under 50ms now take over 2 seconds. The connection pool regularly hits its limit during peak usage, leading to timeouts and degraded performance. This blog focuses on practical ways to reduce query latency by 50–80% and increase throughput for high-concurrency environments.

IT Horror Stories: ITOops Ep12 S1

In the spine-tingling finale of IT Horror Stories, host Jonathan Crowe is joined by a fearless lineup of IT veterans who have stared into the digital void and lived to tell the tale. Guests Kallum Kyle, Senior Sysadmin at Storable; Josh Adcock, Director of Client Services at The Tech Doctor; and Adam Walter, Founder of Humanize IT, recount their most harrowing experiences from the trenches of tech. They relive moments when end users were their only hope, when vulnerable software lurked like ghosts on forgotten networks, and when automation backfired so badly it cost them their jobs.

Mobile Security Isn't a Nice-to-Have - It's an Absolute Must

Mobile Security Isn’t a Nice-to-Have — It’s an Absolute Must According to the Verizon’s 2024 Verizon Mobile Security Index Report, nearly 90% of organizations recognize the urgent need to take mobile security seriously. Are you one of them? From mobile phishing to smishing, vishing, quishing and zero-day threats, the mobile attack surface is bigger and more dangerous than ever. Cybercriminals are relentlessly targeting mobile devices as a gateway to your organization, making mobile security especially critical.

Microsoft Office 365 Update and Linux Security Enhancements

Microsoft extends rollback support for Office 365 updates to two months and discloses a vulnerability without zero-day exploits. SQL updates now require specific version and driver fixes. Ivanti releases three security updates addressing 11 CVEs, while a partnership with Tuck Care improves Linux patching. Misconceptions about Linux security are addressed, emphasizing the need for regular updates to mitigate risks from notable CVEs across distributions.

Leaning into AI, ML, and observability to manage your ever-growing infrastructure

The complexity and scale of modern infrastructure requires an equally intelligent set of observability tools to effectively monitor it. Remember when scaling meant ordering new servers and racking them in a data center? Remember when cloud providers first offered access to seemingly infinite virtual machines at the click of a button? Remember when Kubernetes made it trivial for infrastructure to automatically scale itself based on demand?

Console Connect Ecosystem Update August 2025

In this ecosystem update, we share details of 11 new data centre locations now available on the Console Connect platform, along with new global on-ramps across the ''big three'' cloud providers. Across the U.S., we’ve expanded our footprint in New Jersey, Florida, Utah, and Ohio, giving you access to more local data centres with ultra low-latency connectivity.

New Feature - Vulnerable System Drivers Monitoring

Vulnerable system drivers continue to be a vector exploited by attackers to compromise systems. In eG Enterprise version 7.5 we added a number of periodic security checks to assist administrators proactively identify weaknesses, including vulnerable system drivers monitoring.This new capability is supported for a Windows OS, when using a VM agent for inside view monitoring and / or when monitoring an Azure Virtual Desktop session host.