Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Are You Ready to (Executive) Order?

We’ve all been there. That harrowing moment at the restaurant when the waiter comes to the table and asks that fateful question: “Are you ready to order?” I don’t know about you, but I am almost never ready. Do I want chicken or steak? I’ve eaten a lot of meat this week… Should I opt for fish or a vegetarian option instead? Oh, God. I forgot to check the reviews online. What do other people like the best? Cue heart palpitations.

Why automation is the incident response 'easy button' MSPs & IR firms have been waiting for

The managed security services market is booming. Coming in at $22.8 billion in 2021, it is projected to nearly double in just five years and grow to $43.7 billion by 2026. Moreover, cloud-based managed security services are poised to be the major growth driver for the broader MSP market, coming in at $219.59 billion in 2021, and expected to reach $557.10 billion by 2028. As we can see, providing robust security services is a key competitive differentiator for the lucrative MSP market.

Broadcom Software Announces Intent to Acquire AppNeta

As consumers, we are all intimately aware of our individual dependence on the internet. Now consider that dependency and apply it to the business-critical services that your company uses daily. Nearly overnight, companies are at the mercy of the internet, a network of public networks as nearly all employees work remotely and apps that were once hosted internally move to external SaaS providers.

What Is Credential Stuffing and How Do You Prevent It?

In their effort to protect their customers from a range of modern threats, managed services providers (MSPs) may encounter a strategy known as credential stuffing. This hacking technique involves rapidly inserting large numbers of usernames and passwords—often collected from corporate data breaches—into the login fields of other sites and digital services.

PTC Kepware and InfluxDB: Collecting and Storing Your Automation Data

If you have worked in the automation sector for some time, it is likely you have come across or at least heard of PTC Kepware. They provide one of the largest connectivity suites for automation devices such as PLC’s easing the bridge between the OT (Operation Technology) and IT (Information Technology) world. The best part? You can store, transform and visualize this data using InfluxDB. This blog post will take you through the different ways of connecting your Kepware instance to InfluxDB.

AppNeta Brings Borderless Monitoring to Broadcom's NetOps Solution

It was at the turn of the millennium. I was one of the first engineers entrusted with the job of installing Network Computers, the thin client that Oracle had just introduced as an alternative to personal computers. During the process, as I described the benefits of network computing and three-tier architecture to customers, there was a palpable skepticism all around. Twenty years have passed since. Client-server gave way to three-tier architecture, and with the internet came cloud computing.

Website and Performance Monitoring for Edge Cases

Specific needs are compelling but also hard to plan for. Your use case may be the reason you are searching for a monitoring provider, but the ability of your provider to adapt to your edge cases will be the reason you stay. The challenge is in discerning if a provider will be able to rise to meet your needs in unknown circumstances. In monitoring, there are some uniform needs. Everyone wants to know if their site is UP so HTTP(S) checks meet use cases universally.

How to Use AWS Lambda Serverless Functions with InfluxDB

For time series workloads the ability of serverless functions to scale up and down is a major advantage, especially for something like IoT devices that may have intermittent connectivity and might suddenly send data in bursts. In this type of situation, it doesn’t make sense to be paying for a server to be running 24/7 when you can use a serverless function and only pay for the compute you use.