Monitoring
SMART goals: What they are and how to apply them in IT projects
Content: What are SMART goals and why are they important in IT? Breakdown of SMART Goals into IT Projects Practical Examples of SMART Goals in IT Benefits of SMART Goals Disadvantages or, Rather, Considerations about SMART Goals And there are not only SMART goals...
Server down: causes and problems it can lead to
Hace apenas unas pocas décadas, casi ninguna empresa disponía de servidores. Ni siquiera utilizaban los de terceros. De hecho, en el mundo empresarial apenas se conocían las funciones de los servidores, ni se concebía qué podían aportar a un...
Global details of a project? Nothing better than a code line counter!
Code Line Counter: language statistics In this blog we have already told you about the application programmer, but... what about the code we write? Do we have any tools that shed any light on this? Well, that's what we're going to talk about...
The silicon lottery and high-end processors
What is the silicon lottery? And high-end processors? What does computer science have to do with lottery and high-end processors? Actually, not too much. But there is an important factor in the manufacturing process of the processors that has...
Citrix NetScaler monitoring using Pandora FMS
Citrix NetScaler Monitoring Integrated with Pandora FMS In this article, we offer you the possibility to make an approach to the issue of Citrix NetScaler monitoring, based on the scope of this product line and the visibility challenges...
5 applications to increase your productivity
Best productivity apps to improve your productivity Work may be the place where we are least productive, perhaps because of pressure, laziness, routine, or boredom. In fact, it is in our humble workplace where procrastination triumphs the most....
An illustrated TLS connection: learn about each step in detail
Get to know through an illustrated TLS how private data is protected The wise saying says that the rope always breaks at its weakest point. That is why today we will cover the subject of safe communications with an illustrated TLS connection. In...
Promoting customer centric culture
Customer service culture (or customer centric) is that set of practices or strategies that promote for the actions carried out by a company to be aimed at the client. That means they are carried out thinking about the customers’ point of view...
Data Lake. What are we talking about?
What is Data Lake?; Learn all about it and Big Data Data! More data! What is Data Lake? Big Data is not only a more or less fashionable marketing "word", but also contains a quite clear concept: the accumulation and processing of enormous...
Black Mirror and monitoring: the future and the most real fiction
Black Mirror and monitoring: how it is linked to fiction At this point of the series-junkie revolution of the last couple of years, who has not already seen the great ones? The Sopranos, Lost, Breaking Bad, Game of Thrones... are some of them...
6 tips on how to improve Internet speed in 2023
Once upon a time, we practiced all the yoga poses with the radio and TV antenna in order to leave the snow behind and get a good signal. We've also seen partners shouldering their partners with their arm in the air, trying to get a little more...
The use and importance of Maps in Monitoring
Mapping and Monitoring: Always together until the end of time Maps have been related to the management and monitoring activities of IT platforms for a long time. Years ago, when there were no tools available to generate the graphical vision we...
What is smart home?, some examples and a little monitoring
Surely you have heard the term "smart home" some time, and you may have wondered "what is smart home?" but you're not sure what it is about. Or you may already know perfectly what smart home is, but you want to increase your knowledge. You have...
Computer heat and its monitoring
Computer Heat; Read some Important Facts here! Everything has to work at the right temperature. Everything! Or would you be able to work at 70ºC? Our computers too. Although they are capable of withstanding higher temperatures than us - humans -...
How to monitor WAN load balancers
Introduction to WAN Load Balancers Monitoring Since load balancers are active devices that can be included in the design of a WAN, the question arises: Should we adapt our monitoring scheme to include something that could be called Load Balancer...
The 7 best rated cloud apps for your company
Cloud applications; the best ones to make things easy for a company Previously, on our own "How to know everything about the technology that surrounds us", we have already talked about what cloud computing is: that option given by the Internet...
Datadog Alternative: An interesting comparison with Pandora FMS!
Alternativa a Datadog: historia, comparativa y casos de uso ¿Conocéis el software Datadog? Datadog es también el nombre de la empresa que lo produce, y aquí lo traemos en una comparativa con Pandora FMS. De entrada os decimos que Datadog en...
Monitoring of bike sharing services
Bike sharing services and their monitoring We can see them on the streets of many cities. They are an ecological and healthy alternative to other means of transport and are becoming more and more fashionable. Haven't you tried them yet? Bike...
Who is Linus Torvalds?
Who is exactly Linus Torvalds? Get to know the man behind the "x" Few human beings enjoy the privilege of having given their name to an operating system (at least one that is known beyond the room of its creator). What about meeting one of them?...
Internet Backup: Cloud Backup Cost
Cloud Backup Cost: Things to Keep in Mind Before You Buy A backup is a set of files that are mirrors or exact images of their originals at any given time. They are generally compressed to save space both in storage and transport. They should not...
Discover what cache memory is
What is cache memory? A simple description What is cache memory? You've probably heard of it on more than one occasion, usually abbreviated as "cache". You may even have heard about whether or not to delete it periodically. In this article we...