Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Fast and furious: The importance of performance in the digital age

As someone who's been in the tech space for years, I've seen the evolution of user expectations and the way businesses have adapted to the digital world. What strikes me most today is how fast things have to move. I remember a time when uptime alone was the key to a successful service. Today, it’s no longer enough for a service to just be “up”—it needs to be fast, seamless, and reliable at all times.

Mastercard's DNS Misconfiguration: Lessons Learned and How DNS Spy Can Help

In January 2025, security researchers uncovered a critical DNS misconfiguration involving Mastercard. For nearly five years, one of Mastercard’s DNS records pointed to the incorrect domain "akam.ne" instead of the intended "akam.net." This error, caused by a simple typographical mistake, created a vulnerability that could have allowed malicious actors to intercept or redirect traffic.

The Future and The Floor: Framing Investments for Growth

There are a limited number of investments that a team can make in any given year and it can be daunting to choose the “right” ones. In R&D, there is always more to do. There is always more to research, design, build, fix, maintain, and improve. Spread across multiple domains, the possibilities multiply: we’re spoiled for choice—and, while inspiring, the breadth of possible investment areas can be overwhelming.

Threat Detection and Response: How Flowmon Detected an Attack in Real Time

According to a study by IBM, organizations, on average, take more than 190 days to identify a data breach and an additional 60 or more days to remediate the issue. The financial implications of such an event, including mitigation and remediation, run into millions and can pose a serious risk to business continuity. However, organizations can effectively handle these scenarios with the help of robust security solutions and well-defined processes.

Announcing InfluxDB 3 Enterprise free for at-home use and an update on InfluxDB 3 Core's 72-hour limitation

Two weeks into the alpha release of InfluxDB 3 Core (our new open source offering) and InfluxDB 3 Enterprise (our newest commercial offering), we’ve received a good amount of feedback that the 72 hour limitation in Core is too limiting. This fell into three categories: For the users in category 1, we’re announcing a free tier of InfluxDB 3 Enterprise for at-home, non-commercial use.

5 Most Common MPLS Issues & How to Fix Them

From 2010 to 2017, MPLS (Multiprotocol Label Switching) was the go-to solution for enterprise networks. It offered reliability, security, and performance that businesses relied on for their critical operations. Since then, many organizations have moved to SD-WAN, attracted by its flexibility and cost-effectiveness. However, MPLS is far from obsolete.

GLPI: IT service management and its integration with Pandora FMS

GLPI is a free IT Service Management (ITSM) solution that allows you to manage assets, incidents and requests within an organization. It works as an incident tracking and service desk system, optimizing technical support and technological resources. It also includes hardware and software inventory, contracts and licenses, offering a centralized view of the whole infrastructure. Its intuitive web interface and customization options ensure flexibility and scalability for businesses of any size.