Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Top 3 Reporting Software of 2019

Reporting software is a part of a Business Intelligence or BI suite and is used for analysis in early data processing. The purpose of self-service reporting software is to help deliver interactive information that can be put into action. Self-service reporting software allows the user to connect data sources, extract data and present it in various formats of visualization, including charts, tables, and spreadsheets.

When Should You Host Applications Onsite?

When it comes to hosting applications, business and IT administrators often need to make tough decisions as to whether cloud hosting or retention of the software at their own data center is the preferred option. Public cloud hosting may have the edge in terms of scale and distribution, but there are certain instances where an onsite approach to application hosting is a better idea.

Toughening Security for Linux Servers

As with any other operating system, security is a prime concern with Linux network hardware. In this article, we’ll be giving some recommendations on how to toughen the security posture of your Linux servers. Screenshots and example syntax relate to systems running Kali Linux, CentOS, RHEL, Ubuntu, and Debian-based Linux distributions.

New Horizons for Mobile Edge Computing (MEC) and IoT

As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture—such as edge computing—to relieve their security and device management burdens. Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we’ll be looking at some of the issues and available options.

How to Strengthen Security on Windows 10 Networks

The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It’s debatable exactly how bad the OS actually is or isn’t in this regard. In this article, we’ll be exploring some methodologies and best practices for hardening the security status of your Windows 10 workstations and network configuration.

Best Practices for Configuring Linux Containers

Within a Linux network or development system, launching a limited set of applications or services (often known as microservices) in a self-sustaining container or sandboxed environment is sometimes necessary. A container enables administrators to decouple a specific set of software applications from the operating system and have them run within a clean, minimal, and isolated Linux environment of their own.

How to Configure Windows Network Printers and Email in Office 365

Enterprise users of Office 365 often need to configure a multi-function printer to use the platform’s SMTP email capabilities on their network. There are several ways of doing this, each with their own benefits and disadvantages. In this guide we’ll be looking at the steps required in setting up Office 365 network printing and email under various conditions.

How to Configure a Multicast Linux Network

In a world where consumer-level computing technology has been largely dominated by Windows, many users remain unaware of the need for administrators to configure and maintain network hardware and environments based on the Linux operating system. But Linux in its various distributions and the Unix operating system from which they derive have for decades provided the backbone for the core systems that make consumer-level computing and indeed many aspects of daily life possible.