The Next Norm: Prepare to Work-from-Anywhere (Part 1)
With the onset of the recent pandemic, countries across the globe reacted in unprecedented fashion to ‘flatten the curve’ by implementing shelter-in-place guidelines. Businesses re…
With the onset of the recent pandemic, countries across the globe reacted in unprecedented fashion to ‘flatten the curve’ by implementing shelter-in-place guidelines. Businesses re…
06/18/20 Configuration items (CIs) in the configuration management database (CMDB) stores information regarding the relationships among its assets. IT configuration management is b…
Please provide me with the article "Monitoring Kafka with Datadog"! I need the text of the article to be able to summarize it for you. Just paste the content here, and I'll give …
06/17/20 This year, SentryOne Plan Explorer is 10 years old. Recently, I reminisced with Greg Gonzalez (b|t) and Aaron Bertrand (b|t) about the decade-long journey of our favorite …
06/17/20 Reports are among one of the most powerful and ubiquitous aspects of the Orion Platform. Despite being right at people’s fingertips, they’re often overlooked or under-appr…
06/17/20 Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to prote…
This Datadog article highlights how Synthetic Monitoring proactively identifies issues *before* users do by simulating user behavior across the entire application journey – from we…
06/16/20 Esports is soaring in popularity in K–12 schools and in higher education as student gamers find a competitive and team-based outlet for their video gaming habits—playing n…
With the security concerns we face these days it’s ever so important for organizations to use encryption to secure their data in transit. And since the HTTP protocol is so widely u…
06/11/20 In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in…
Enterprises are leveraging both Intranet and Internet to bring remote offices, mobile workers, and business partners into their trusted network environments. Once an attacker gains…
06/09/20 The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on t…