Security Takes Center Stage in New EMA Report on Network Performance Management (NPM)

Security Takes Center Stage in New EMA Report on Network Performance Management (NPM)

Despite being an essential piece of the Sysadmin toolbox, Network performance management (NPM) can be a bit of a mystery for many IT professionals. Part of the issue is that the NPM toolset is vast, and can be vague—device monitoring, packet and flow analysis, and log analysis are all part of the equation. Another, is […]

Monitoring Your Azure Resource Usage with WhatsUp Gold

Monitoring Your Azure Resource Usage with WhatsUp Gold

In 2019, cloud computing hasn’t just hit the mainstream, it is the mainstream. In fact, some experts are predicting that upwards of 80% of enterprise workloads will live in the cloud by 2020. By-and-large, this rise in cloud adoption has been driven by Amazon Web Services or AWS, as it’s commonly called. And while Amazon […]

The Importance of Continuous Delivery in DevOps

The Importance of Continuous Delivery in DevOps

DevOps as a practice and philosophy includes the communication and teamwork between developers and IT operations. Traditionally, developers and operations are two very different teams who would point fingers when issues would arise with software. DevOps is an attempt to abolish this and has both teams work together. The business result of this is a […]

Raspberry Pi Used to Steal 500MB of Data From NASA

Raspberry Pi Used to Steal 500MB of Data From NASA

Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for […]

How to Easily Search Windows Event Logs Across Hundreds of Servers with PowerShell

How to Easily Search Windows Event Logs Across Hundreds of Servers with PowerShell

When troubleshooting problems or investigating potential security breaches, the Windows event log is a great place to start. Windows provides an extensive list of various event logs grouped by a provider with a sometimes staggering number of events recorded within. With all of these events being recorded, it’s hard to figure out what’s going on. […]

3 Network Monitoring Functionalities That DevOps Teams Need

3 Network Monitoring Functionalities That DevOps Teams Need

Working in a DevOps environment, agility is everything. That next release needs to get into production quickly, so even a minor network issue can hamper speed and efficiency. Consider the different roles within a DevOps environment. You have your developers and testers deeply embedded in their dev and test environments, rushing to get the next […]

Monitoring AWS Resource Usage: Are You Just Taking Amazon’s Word For It?

Monitoring AWS Resource Usage: Are You Just Taking Amazon’s Word For It?

Amazon Web Services (AWS) have simply become a fact of life for most IT organizations. The benefits of outsourcing networking to Amazon’s cloud are simply too obvious to ignore or to not take advantage of. You get to stop worrying about infrastructure, heating, cooling, capacity, storage space, etc. and in return, Amazon sends you a […]