Here's how a classic IT mistake caused some embarrassing downtime for Microsoft this morning, and how you can avoid the same fate!
In this article, you’ll learn how to retrieve the Office 365 service health status using the Office 365 Service Communications API and PowerShell.
Windows has several methods in place for finding restart information, but most of these solutions are difficult to use when querying multiple computers and don’t provide historical information. In this article, we’ll review the options available and then look at how to get the information you need via PowerShell.
If you’re looking for a cloud database service in Amazon Web Services (AWS), which service do you choose? Amazon Redshift or Amazon Relational Database Service (RDS)? The answer may surprise you.
Networks have become vital strategic assets for every modern enterprise. And, as we usher in the new year, networks will only continue to grow in terms of value, significance, and complexity. It's our job as IT pros to figure out how things will change and prepare for all contingencies.
There is no straightforward way to rename an already existing Azure VM. Learn how to rename an Azure VM using PowerShell as a workaround in this step by step guide.
Providing fast access to applications and data while protecting digital assets are the two biggest challenges faced by network administrators. Performance and security represent the two-pronged mission that administrators find themselves facing every day.
Your IT infrastructure is ready to make the big move—from on-premises to the public cloud. Or perhaps you’re already in the cloud, but it’s time for a change to a new platform provider.
Many organizations that rely on Amazon Web Services (AWS) aren't doing the best job tracking their AWS resource usage and spending– they just pay the monthly bill from Amazon. Unless that bill significantly increases, they have no incentive to determine if they’re really using all those resources or if they’re being accurately billed. But they should be— many companies pay an average of 36% more for cloud services than they need to, according to one report.
As IT pros already know, when we speak of ports, we mean the 16-bit virtual ports used when interconnecting systems i.e. during communication over protocols such as TCP or UDP and not physical connections on the system such as USB, HDMI etc. See the OSI model and list of port numbers and their assigned function if not an IT pro. Port 80 is commonly used for HTTP activity, for example, and many applications communicate using assigned default ports.
Last month, we released WhatsUp Gold 2019.1, and with it, the addition of a powerful REST API that lets you easily integrate other systems or your own scripts with WUG.With the new REST API, you can now use an extensive range of REST API calls to get data from WhatsUp Gold from other systems, or input data to WhatsUp Gold or have other systems make changes. The result is a huge range of automation use cases that will help IT teams be faster and more efficient. Example use cases include the ability to automatically put devices in maintenance mode before making changes, the ability to add or remove devices and monitors automatically, and more.
Wouldn't it be great if you could get an automatic alert every time something in your house or car broke, like when a spark plug or fuse failed, or when a light bulb went out? That way you could fix those problems before they caused you any trouble... If only. For most of us, the prospect of such a smart home is still a distant glimmer in the future, but for IT teams (and others) working in a modern enterprise, you can get automatic notifications when parts of your infrastructure fail, and you can fix those failures before they cause problems. How? With the IT swiss army knife/ticketing system known as ServiceNow.
In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That's why multiple data backups are necessary.
Scanning ports is very popular among cybercriminals. It’s often their first step of reconnaissance to discover services they can exploit and systems they can break into as they try to steal or destroy sensitive data. Two recent examples of major breaches illustrate just how handy port scanning is to threat actors:
Disclaimer: Azure Monitor’s official documentation is more than 2700 pages of fascinating material. Azure Application Insights is a small part of it. Given the variety of nodes, features, apps and development methods in an Azure infrastructure, app and performance monitoring objectives can be achieved in many ways. This article focuses on Application Insights only.
Get our latest blog posts delivered in a weekly email.