PRTG - SMARTCONNECT
Today is Sysadmin Appreciation Day, so we thought we'd give our own sysadmins a day off. Because as much as we appreciate their work, we believed we could manage at least one full day without them. At least that's what we thought.
RIS, LIMS, HIS, PACS...the technology of modern healthcare has its own language, and along with it, its own IT requirements. If you've been following our recent healthcare posts, you'll know that we've already discussed the digitalization of healthcare IT, and how healthcare IT can be monitored.
You are probably familiar with Palo Alto Networks based in Santa Clara, California, who provide their 45,000+ customers in over 150 countries a "Next-Generation Security Platform" through their firewalls and security management tools. But did you know that PRTG can monitor the critical aspects of a Palo Alto device quickly and easily?
IoT is an important topic in our blog because, well, it's just a damn important emerging field. And the most interesting thing about IoT is that it has so many forms, so many possibilities to realize a digitization of work, private life, or industry. Here are 3 cool realizations of companies, who either think big in their vision or are very individual.
We're always fascinated by how PRTG is used out there in the wild. With over 200,000 PRTG users worldwide, you can imagine that there are some pretty cool use cases. Some we don't even know about. For the ones we do know about, we like to write them down and tell their stories. As an example: just recently, we featured a sensor contest, and what we got back was nothing short of amazing to us. The winner was a smart mailbox (seriously, you need to check it out), but some of the other sensor stories were also eye-openers for us.
Surely every administrator has heard of shadow IT, and probably many of you admins live in (peaceful) coexistence with these parallel, partly unknown IT infrastructures.
As we have already described in previous articles, the topic of IoT security is something that is explosive. Of course, if we live in a functional smart home at some point, we would like the devices that know everything about us not to fall into the hands of the bad guys. With the new EU-funded innovation project "Protecting Digital Industries" on security for the Internet of Things, the government wants to make the digital world safer. The project runs until December 2020 and is funded by the EU's Horizon 2020 research and innovation program. Fujitsu is in charge of the project.
Summer is here again, and in addition to lots of sunshine, happy people and a holiday feeling, it also brings hot temperatures. As nice as a heat wave may be (if you lie at the pool with a cocktail), intrusive temperature values in living rooms or bedrooms are unpleasant.
If you've been following our previous Maker Monday projects, you will know that we just finished putting together a wake up light. For our newest Maker Monday project, we decided to make a temperature logger (which will also measure humidity and air pressure). Part 1 (of 2) has just gone live on our Paessler YouTube channel! Here's what we did.
We recently showed in a blog article that the topic of security should enjoy a high status in the context of IoT, but that this is often not (yet) the case. IoT devices are frequently largely without any protection. Even if they are quite uninteresting for attack scenarios such as ransomware, the security issues in connection with smart devices remain an explosive topic. The devices are relatively easy to manipulate so that users can be spied on or information stolen.
In recent years, medical healthcare infrastructure has gone through digitization, just as many other industries have. The IoT has brought an array of new connected medical devices that are revolutionizing the medical field. This digitization has led to medical devices and the traditional IT infrastructure becoming more and more intertwined. This subsequently means that medical IT has more points of failure than ever before.
Managing large-scale and multifaceted PRTG installations with tens of thousands of sensors in many locations across the globe requires administrators with deep knowledge and experience. Especially in such complex environments, a simple management of large systems is the holy grail for admins. Today we want to look at Savision's solution, which eases the management of very complex system environments - PLUS, register for our Savision Webinar on July 12th.
In any job, good communication skills can help you be even better at what you do. Because — unless you're working as a game ranger in the middle of the Okavanga Delta — you need to interact with other humans. And the better you do that, the more you can achieve. The same applies for system administration. Here at Paessler, we're all about helping system administrators, and so I decided to put together some communication tips to help get you through the day. Plus: Email templates!
Augmented reality, artificial intelligence, and... classical studies? They don’t appear to go together. And it’s not just because these disciplines are eras apart; it has much more to do with public perception. An archaeologist continues to fit the role of either the lovable, eccentric bookworm or the Indiana Jones type, with a Fedora and whip, but definitely not that of a programmer with a laptop and smartphone. Because my second academic degree is in the Humanities, and more specifically in the area of Egyptology as well as of the philology and archeology of ancient Greece and Rome, I follow the issues of Virtual Heritage and the Digital Humanities with great interest. Furthermore, I’m quite sure that augmented reality and AI in archeology and the research of ancient languages will make new findings possible in the near future — or at least make sure that a much broader audience can get involved with these disciplines.
Surely you are familiar with the sentence: "People are often said to be the weakest link in the chain of IT Security". As old-fashioned as this sentence may sound, it still applies in 2018! IT admins are faced with the human factor every day over and over again. Today we want to look in detail when employees in the company represent an IT security risk and, as a result of the risks, show you 13 efficient ways to boost the IT security understanding of your colleagues and employees!