ITC Network Monitor
In ?1984? Orwell described a total surveillance, mainly with the help of "two-way telescreens", from which nobody can escape. The telescreen is both transmitter and receiver, which monitors the citizens of Oceania, particularly the Outer Party members, in every house, in public places, and at work. The smallest sign of rebellion, even a facial expression, can result in immediate arrest and imprisonment. Nobody knows whether they are being watched or not, and one can only speculate about how often the Thought Police intervenes in the private sphere. Sounds pretty creepy, right?
It's time for a new Maker Monday project! This time we (and by that, I mean, "I") try to come to terms with how to pronounce "TR?DFRI". In case you don't know, TR?DFRI is IKEA's line of smart lights, and in this episode we set one up and hook it up to our Home Assistant.
If you are an MSP (Managed Service Provider) providing IT services for customers, then a part of that service is undoubtedly network monitoring. In fact, you probably have service level agreements attached to metrics like uptime, network speeds, and so on. So you need a capable network monitoring tool to take care of this requirement.
I'm sure most of you are already using our PRTG release 18.2.41. Have you tried the donuts? ?? Since the last PRTG release this graph object is available in the maps. If you really don't know this yet, take a look at the last release blog article: Mmm?Donuts! PRTG Release 18.2.41 Comes with a New Map Chart Object
AI will become "ASI" within the next 50 years, which is the last invention mankind has to make... Whaaaat?.... While researching AI, I?ve found some fascinating tendencies like this and other observations on AI that I would like to share. There's a lot of stuff in here that's really mind-blowing.
Today is Sysadmin Appreciation Day, so we thought we'd give our own sysadmins a day off. Because as much as we appreciate their work, we believed we could manage at least one full day without them. At least that's what we thought.
RIS, LIMS, HIS, PACS...the technology of modern healthcare has its own language, and along with it, its own IT requirements. If you've been following our recent healthcare posts, you'll know that we've already discussed the digitalization of healthcare IT, and how healthcare IT can be monitored.
You are probably familiar with Palo Alto Networks based in Santa Clara, California, who provide their 45,000+ customers in over 150 countries a "Next-Generation Security Platform" through their firewalls and security management tools. But did you know that PRTG can monitor the critical aspects of a Palo Alto device quickly and easily?
IoT is an important topic in our blog because, well, it's just a damn important emerging field. And the most interesting thing about IoT is that it has so many forms, so many possibilities to realize a digitization of work, private life, or industry. Here are 3 cool realizations of companies, who either think big in their vision or are very individual.
We're always fascinated by how PRTG is used out there in the wild. With over 200,000 PRTG users worldwide, you can imagine that there are some pretty cool use cases. Some we don't even know about. For the ones we do know about, we like to write them down and tell their stories. As an example: just recently, we featured a sensor contest, and what we got back was nothing short of amazing to us. The winner was a smart mailbox (seriously, you need to check it out), but some of the other sensor stories were also eye-openers for us.
Surely every administrator has heard of shadow IT, and probably many of you admins live in (peaceful) coexistence with these parallel, partly unknown IT infrastructures.
As we have already described in previous articles, the topic of IoT security is something that is explosive. Of course, if we live in a functional smart home at some point, we would like the devices that know everything about us not to fall into the hands of the bad guys. With the new EU-funded innovation project "Protecting Digital Industries" on security for the Internet of Things, the government wants to make the digital world safer. The project runs until December 2020 and is funded by the EU's Horizon 2020 research and innovation program. Fujitsu is in charge of the project.
Summer is here again, and in addition to lots of sunshine, happy people and a holiday feeling, it also brings hot temperatures. As nice as a heat wave may be (if you lie at the pool with a cocktail), intrusive temperature values in living rooms or bedrooms are unpleasant.
If you've been following our previous Maker Monday projects, you will know that we just finished putting together a wake up light. For our newest Maker Monday project, we decided to make a temperature logger (which will also measure humidity and air pressure). Part 1 (of 2) has just gone live on our Paessler YouTube channel! Here's what we did.
We recently showed in a blog article that the topic of security should enjoy a high status in the context of IoT, but that this is often not (yet) the case. IoT devices are frequently largely without any protection. Even if they are quite uninteresting for attack scenarios such as ransomware, the security issues in connection with smart devices remain an explosive topic. The devices are relatively easy to manipulate so that users can be spied on or information stolen.