How to Boost Your APM Solution With Log Management

While everyone knows application monitoring is an essential part of running awesome software services, understanding whether you need application performance management (APM) or log management isn’t so straightforward. Both techniques involve collecting data that describe your application’s behavior, and both help you analyze that data. Despite the similarities between APM and log management, they serve … Read more How to Boost Your APM Solution With Log Management

Is OneDrive Secure? Microsoft OneDrive for Business Security Risks

Microsoft OneDrive for Business is a cloud-based storage platform designed to help you organize, access, edit, update, and send files across devices. In 2014, Microsoft launched OneDrive, a rebranding of its original storage platform SkyDrive, with a mission to simplify cloud storage for all. Many businesses choose OneDrive because it offers many opportunities to share … Read more Is OneDrive Secure? Microsoft OneDrive for Business Security Risks

The Ultimate Guide to Active Directory Best Practices

Security Groups, User Accounts, and Other AD Basics At many enterprises and SMBs that use Windows devices, IT teams are likely to use Active Directory (AD). Essentially, Active Directory is an integral part of the operating system’s architecture, allowing IT more control over access and security. AD is a centralized, standard system that allows system … Read more The Ultimate Guide to Active Directory Best Practices

What is SOX Compliance?

In 2002, Congress passed the Sarbanes-Oxley Act, named after its sponsors Senator Paul Sabanes (D-MD) and Representative Michael G. Oxley (R-OOH-4). Instituted “to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws,” the Sarbanes-Oxley Act (commonly referred to as SOX) established a stricter protocol for internal controls … Read more What is SOX Compliance?

Best Active Directory Management Tools

For administrators managing assets across enterprise networks, Active Directory is one of the most important tools in their toolbox. It doesn’t matter how large or small your operation is—managing assets, users, and authorizations across your network can be a headache. While Microsoft Active Directory (AD) is pretty indispensable when it comes to keeping tabs on … Read more Best Active Directory Management Tools

Cloud Monitoring Basics: Page Speed, App Performance, Log Analysis

Monitoring user-facing software has always been important, no doubt about it. But with the unrelenting migration of software to the cloud, and the adoption of microservices and serverless architectures such as Function as a Service (FaaS), monitoring is now business-critical. These new ways of building modern software involve many moving parts, and developers need to … Read more Cloud Monitoring Basics: Page Speed, App Performance, Log Analysis

Edge Computing Is Changing DNS

Edge computing is the new black, and it comes in flavors. One of these flavors is the geo-proximate model, where workloads live in regional data centers, telco COs, or even in micro-data centers at the base of cell phone towers. Geo-proximate edge computing is heavily reliant on GeoDNS and other modern DNS tools.

Read moreEdge Computing Is Changing DNS

Top 10 Log Sources You Should Monitor

There are literally hundreds of possible types of log sources around your environment and choosing which bubble to the top of your IT consciousness can be difficult. In a job where everything seems to be a top priority, understanding all the log types and sources available for selection can be daunting. In your environment, some logs may be more valuable than others, but having general guidance about logging and what types of logs may be available to monitor can help make you a better technologist.

Read moreTop 10 Log Sources You Should Monitor