Wow, 2018 was a amazing year for Paessler and PRTG. There were so many great updates focused on the best possible user experience and specific wishes of our customers.
Hardly any company can do without comprehensive IT monitoring. But when choosing the right solution, the question often arises whether an IT administrator should work with freeware or an open source option, or whether a commercial solution should be bought. Just to be clear: No IT company and almost no IT product can do completely without open source. We use it constantly and therefore we are not questioning the value of open source. But does monitoring with an open source solution make sense, is it as cost-effective as alleged, and as individually configurable as sometimes claimed? We get to the bottom of it.
The closer we get to the end of the year, the faster time seems to fly. It feels like just the other day we were stumbling over pumpkins and being scared by our next-door children with "trick or treat", and now it's not even a month until Christmas!
In a recent post we discussed how to monitor healthcare IT using the DICOM and HL7 sensors in PRTG Network Monitor. We then covered how to monitor entire healthcare workflows. Now, in this post, we share some tutorial videos that show you exactly how to set these healthcare IT sensors up in PRTG, and the information that they deliver to you.
We recently gave an outlook on the impact Artificial Intelligence can have on our future. In addition, there are of course specific effects for each individual profession. And if you define illegal hacking as a profession, then there too. Because just like righteous programmers, hackers usually leave their very own mark in the programs and code they write. And surprise: AI can easily find clues that expose a hacker faster than they would like.
From November 4th to 7th, five Paesslerists got their minds off daily business and attended the Web Summit in Lisbon. We came back inspired by the ideas presented there, and felt some of these thoughts would be just as exciting for our readers! So, here are the standout sessions we attended, which continue to make us think long after we returned to our desks.
Following the evolution in Software Development, one has the feeling that the times of the typical sysadmin are over. I still remember the years when the daily routine of a sysadmin consisted of keeping a handful of servers running, checking the firmware status of switches regularly, and rolling out latest updates from time to time.
According to a recent study, most large and small companies will opt for an IIoT platform in the next 5 years. This puts pressure on suppliers from the IT sector and heavyweights in industry to position themselves with a suitable solution. It is already feared that the topic of security might once again be forgotten in the IIoT context.
Here at Paessler, we have an age-old tradition on Friday afternoons of having a few beers together with our colleagues. And every now and then we end up playing a game of "Would Your Rather?"
Hey, we have some merchandise to give away!
We are used to devices communicating with each other. Digital devices and assistants turn on the radio on command, we turn on our lights with our smartphone, and the printer orders new toner on its own. All this makes security solutions for data traffic in IoT all the more important.
A keynote highlight of this year's Sigfox Connect was the presentation of the work of the Sigfox Foundation and its rhino tracking system. Free-living rhinos in Africa have been equipped with GPS trackers and Sigfox's low-power sensors for over a year now. The project's findings should help to better protect these endangered animal species in the future.
We love it when our users compile information that might be of use to other PRTG users, or even just IT Administrators in general. And in today's post, we highlight a how-to guide written by a PRTG user. Florian Thiele is an IT Security Architect. He has worked with FortiGate firewalls and PRTG Network Monitor for 10 years. He's written for us before (check out Using a Fortinet FortiGate as Reverse Proxy for PRTG). Now he has put together a document about how to monitor FortiGate firewalls with PRTG (download below). In it, he not only provides some information specifically related to PRTG, but also provides some general information about FortiGate firewalls that might also be useful on its own.
Nowadays there are countless providers who offer you either a lot or manageable storage space for more or less money respectively. Where lower costs tempt regarding higher storage capacity, however, the data protection is often questionable. In recent years, the big names have been successful with their offers. No matter whether Google, Microsoft, Amazon or Dropbox, all providers attract with free storage space, which can be extended by the booking of a paid option almost to an unlimited extent.
On the 24th and 25th of October, Sigfox Connect opened its doors at the Arena Berlin in Berlin Alt-Treptow - and of course Paessler AG was also there. 150 exhibitors and a full day lecture program with numerous keynotes of leading industrial enterprises were offered.