Surely every administrator has heard of shadow IT, and probably many of you admins live in (peaceful) coexistence with these parallel, partly unknown IT infrastructures.
As we have already described in previous articles, the topic of IoT security is something that is explosive. Of course, if we live in a functional smart home at some point, we would like the devices that know everything about us not to fall into the hands of the bad guys. With the new EU-funded innovation project "Protecting Digital Industries" on security for the Internet of Things, the government wants to make the digital world safer. The project runs until December 2020 and is funded by the EU's Horizon 2020 research and innovation program. Fujitsu is in charge of the project.
Summer is here again, and in addition to lots of sunshine, happy people and a holiday feeling, it also brings hot temperatures. As nice as a heat wave may be (if you lie at the pool with a cocktail), intrusive temperature values in living rooms or bedrooms are unpleasant.
If you've been following our previous Maker Monday projects, you will know that we just finished putting together a wake up light. For our newest Maker Monday project, we decided to make a temperature logger (which will also measure humidity and air pressure). Part 1 (of 2) has just gone live on our Paessler YouTube channel! Here's what we did.
We recently showed in a blog article that the topic of security should enjoy a high status in the context of IoT, but that this is often not (yet) the case. IoT devices are frequently largely without any protection. Even if they are quite uninteresting for attack scenarios such as ransomware, the security issues in connection with smart devices remain an explosive topic. The devices are relatively easy to manipulate so that users can be spied on or information stolen.
In recent years, medical healthcare infrastructure has gone through digitization, just as many other industries have. The IoT has brought an array of new connected medical devices that are revolutionizing the medical field. This digitization has led to medical devices and the traditional IT infrastructure becoming more and more intertwined. This subsequently means that medical IT has more points of failure than ever before.
Managing large-scale and multifaceted PRTG installations with tens of thousands of sensors in many locations across the globe requires administrators with deep knowledge and experience. Especially in such complex environments, a simple management of large systems is the holy grail for admins. Today we want to look at Savision's solution, which eases the management of very complex system environments - PLUS, register for our Savision Webinar on July 12th.
In any job, good communication skills can help you be even better at what you do. Because — unless you're working as a game ranger in the middle of the Okavanga Delta — you need to interact with other humans. And the better you do that, the more you can achieve. The same applies for system administration. Here at Paessler, we're all about helping system administrators, and so I decided to put together some communication tips to help get you through the day. Plus: Email templates!
Augmented reality, artificial intelligence, and... classical studies? They don’t appear to go together. And it’s not just because these disciplines are eras apart; it has much more to do with public perception. An archaeologist continues to fit the role of either the lovable, eccentric bookworm or the Indiana Jones type, with a Fedora and whip, but definitely not that of a programmer with a laptop and smartphone. Because my second academic degree is in the Humanities, and more specifically in the area of Egyptology as well as of the philology and archeology of ancient Greece and Rome, I follow the issues of Virtual Heritage and the Digital Humanities with great interest. Furthermore, I’m quite sure that augmented reality and AI in archeology and the research of ancient languages will make new findings possible in the near future — or at least make sure that a much broader audience can get involved with these disciplines.
Surely you are familiar with the sentence: "People are often said to be the weakest link in the chain of IT Security". As old-fashioned as this sentence may sound, it still applies in 2018! IT admins are faced with the human factor every day over and over again. Today we want to look in detail when employees in the company represent an IT security risk and, as a result of the risks, show you 13 efficient ways to boost the IT security understanding of your colleagues and employees!
The digitalization is progressing and with it the Internet of Things (IoT). Smart devices communicate with each other and network even the most sensitive areas to make life easier for users. We have recently written about LPWA and will continue to publish a lot about Smart Home and IoT on our blog. But let's talk today about something that is often forgotten. IoT also has a downside, as numerous cyber-attacks in recent months have shown the danger that can emanate from all-encompassing networking. But how easy is it really to hack an IoT device?
Like any software, even if you use PRTG every day, I can almost guarantee that you don't know about all the features that can make a difference to your user experience. With this in mind, here are five ideas and tips for how to do little things that might make your daily experience with PRTG even more fun.
Have you all recovered from our release of last month? In May we introduced the PRTG version 18.2.40, presenting our new Fujitsu sensor. This new SNMP Fujitsu System Health BETA sensor monitors the status of Fujitsu PRIMERGY servers via the iRMC (Integrated Remote Management Controller). With this new sensor type you have an overview of the iRMC status, CPU status, available memory, status of power supplies, the current temperature, the temperature status, and more.
It is time again to talk about the most prominent security vulnerabilities of 2018, whose horror at the beginning of the year haunted the Internet, only to turn out to not be so horrible afterwards. In the end it's something that can be reported on, but which will not lead to the end of the world. Here are some facts about Spectre & Meltdown, covering everything that has been going on since our last article. But first, a brief etymological digression.
The basis of any network monitoring solution is alert notifications. You need them to know when there's a problem with your infrastructure. And, when setting up your monitoring solution, there is a fundamental problem that you will have to consider when it comes to notifications: if your infrastructure crashes and no longer accesses a connection to the Internet, how will you be notified? Because traditionally, your monitoring software is onsite. And onsite is down, with no means to communicate with the outside world. Oops. This leads us to the age-old philosophical question: Like a tree falling in the forest, if your network fails and you don't get the notifications, did it really fail?