Operations | Monitoring | ITSM | DevOps | Cloud

Total Economic Impact study finds LogicMonitor Edwin AI delivered a 313% ROI and payback in 6 months or less

Forrester Consulting’s Total Economic Impact study found that a composite organization based on interviewed customers achieved 313% ROI and payback in less than 6 months with LogicMonitor Edwin AI. AI for IT operations has a credibility problem. The market is crowded with claims about speed, automation, and intelligence, while buyers are left doing the harder work of separating measurable impact from vendor language.

True Visibility: How Liang Chen is Rethinking Network Monitoring

What happens when deep networking expertise meets low-level programming and a passion for invention? In this episode of Next-Gen Network Heroes, host Bob Slevin sits down with Liang Chen, Senior Network Architect at Texas Children's Hospital and a true innovator in network performance and visibility. With more than 25 years of experience in networking, plus advanced expertise in programming languages like C and Assembly, Liang has built his own next-generation traffic analysis platform from the ground up—designed to provide real-time, packet-level visibility at massive scale.

Enhancing Your Search Skills with Liang Chen

What does it take to reinvent network visibility from the ground up? In this episode of Next-Gen Network Heroes, Bob sits down with Liang Chen, Senior Network Architect at Texas Children’s Hospital and creator of a next-generation network traffic analyzer built for real-time, packet-level visibility. Liang shares how he built a platform capable of analyzing traffic at up to 200Gbps with zero packet loss—unlocking deeper network forensics and faster troubleshooting in mission-critical environments.

How HAProxy built its modern application delivery architecture

Let’s be real: building reliable tech products is hard. Modernizing that same tech without compromising the user experience is even harder. The "rip and replace" approach to modernization can severely disrupt your customers’ integration efforts and workflows. When it doesn’t work, reversing course might be the least-worst option. By contrast, the evolution of the HAProxy One application delivery platform architecture at HAProxy Technologies over 25 years has been gradual and consistent.

From Copy Fail to Dirty Frag: Why Speed-to-Exploit Is Forcing a New Approach to Linux Security

In early 2026, two back-to-back Linux kernel exploits, Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284 & CVE-2026-43500), shattered assumptions about how quickly attackers can weaponize disclosed CVEs. Dirty Frag, a zero-day Linux vulnerability that affected most major distributions, had PoC exploits published within hours of its disclosure. It’s a stark reminder: the timeline between vulnerability disclosure and active exploitation has shrunk from weeks to hours.