Operations | Monitoring | ITSM | DevOps | Cloud

Ten Minute Troubleshooting: Meet (and Monitor) Users Where They Are

What do you do if your monitoring, APM, and synthetic tools tell you an application is up, but the users say it’s not? A good first question is to ask where your monitoring tools are located relative to both the users and the application itself. In this episode Mursi helps Leon identify his “red-light, green light” issue and adjust his monitoring to do a better job showing the REAL user’s experience.

Secure by Design: IT Modernization for Government

As government agencies modernize IT infrastructure, many are shifting to hybrid and multicloud environments. But this evolution brings heightened exposure to cyber threats. For the public sector, where data protection is tied to national security and public trust, compliance is more than a box to check—it’s the front line of defense. FedRAMP (Federal Risk and Authorization Management Program) provides a standardized framework for securing cloud services used by U.S. agencies.

Resilience with Zero Data Loss in High-Volume Telemetry Pipelines with OpenTelemetry and Bindplane

This was the problem one Bindplane customer had with processing enormous S3-stored log files. Our engineering team tackled the problem head-on, enhancing the S3 event receiver with offset tracking and chaos testing methodologies.

Goodput vs Throughput: The Differences and How They Affect Your Network

Two key metrics that often come up in discussions about network performance are throughput and goodput. While these terms may seem similar, they highlight different aspects of your network’s efficiency and misunderstanding them can lead to poor decision-making that can impact the way you manage your network and your business’ resources.

PostgreSQL Performance: Faster Queries and Better Throughput

A PostgreSQL setup that performed well with 10,000 users starts to show strain at 100,000. Queries that once returned in under 50ms now take over 2 seconds. The connection pool regularly hits its limit during peak usage, leading to timeouts and degraded performance. This blog focuses on practical ways to reduce query latency by 50–80% and increase throughput for high-concurrency environments.

IT Horror Stories: ITOops Ep12 S1

In the spine-tingling finale of IT Horror Stories, host Jonathan Crowe is joined by a fearless lineup of IT veterans who have stared into the digital void and lived to tell the tale. Guests Kallum Kyle, Senior Sysadmin at Storable; Josh Adcock, Director of Client Services at The Tech Doctor; and Adam Walter, Founder of Humanize IT, recount their most harrowing experiences from the trenches of tech. They relive moments when end users were their only hope, when vulnerable software lurked like ghosts on forgotten networks, and when automation backfired so badly it cost them their jobs.

Mobile Security Isn't a Nice-to-Have - It's an Absolute Must

Mobile Security Isn’t a Nice-to-Have — It’s an Absolute Must According to the Verizon’s 2024 Verizon Mobile Security Index Report, nearly 90% of organizations recognize the urgent need to take mobile security seriously. Are you one of them? From mobile phishing to smishing, vishing, quishing and zero-day threats, the mobile attack surface is bigger and more dangerous than ever. Cybercriminals are relentlessly targeting mobile devices as a gateway to your organization, making mobile security especially critical.

Microsoft Office 365 Update and Linux Security Enhancements

Microsoft extends rollback support for Office 365 updates to two months and discloses a vulnerability without zero-day exploits. SQL updates now require specific version and driver fixes. Ivanti releases three security updates addressing 11 CVEs, while a partnership with Tuck Care improves Linux patching. Misconceptions about Linux security are addressed, emphasizing the need for regular updates to mitigate risks from notable CVEs across distributions.