Monitoring is a key component in a modern IT infrastructure. The term monitoring is no longer foreign to any system administrator. Unfortunately, in practice it is often different: sometimes even critical systems are not monitored sufficiently or not at all. This is because there is often simply not enough time […]
Monthly Archives: February 2025
6 things that can The big problem here is the IT infrastructure of companies. This has usually grown organically over a long period of time and has recently often been supplement by the cloud. The result is complex, confusing environments. This situation is increasingly limiting companies’ ability to operate. A […]
Domain Name System The survey “DNS and the Edge: A Roadmap for CSPs Moving Into the Distributed Future” conducted by market researchers at Heavy Readinglooks at the relationship between DNS and NGN technologies. According to the results, adapting DNS to the new standards is crucial for the introduction of modern […]
5 Must-Haves for However, individual offices will be a rarity in the working world of tomorrow. Instead, there will be large share offices with desk sharing for daily work. At the same time, rooms will be create that enable creative collaboration, but also retreats for concentrate work and undisturb meetings. […]
The Active Directory Security Halftime Reportby Semperis looks at attacks and vulnerabilities in hybrid identity systems such as Active Directory and Azure Active Directory. From the Colonial Pipeline attack to the Windows Print Spooler leak. Expert recommendations are intend to consolidate the identity security strategy that has been weaken over […]
Three-dimensional encounters The design of new 3D spaces for teleconferencing and collaboration brings together several technical developments: AR/VR glasses, AI, various devices for teleconferencing and, finally, holography. The leading players determine the direction of the platforms, including Microsoft, Cisco, Google and Intel. Startups and specialists can develop their apps for […]
A quick look at the status quo before Corona: IT helpdesks, field staff and other support teams communicated via traditional channels such as telephone, email or – it may be hard to believe – fax. However, many customers have long complained that problems are not resolved via these channels quickly […]
Many, if not most, companies feel safe when a good backup strategy has been created that is tailored to their individual requirements and the corresponding backup solutions are reliably in operation. In addition to the classic protection of data in the event of system failures or even disasters, IT managers […]
Risks of the Workplace First of all, it should be noted that both employees and employers should exercise caution when using such tools. Currently, AI-generated texts often contain inaccurate or completely incorrect information. It is therefore strongly recommended that the content created be checked thoroughly for errors and revised if […]
5 Reasons Why No One Enterprises are increasingly turning to SD-WANs to reduce costs, improve user experience, and strengthen connectivity to and from the cloud. IDC notedthat SD- WAN continues to be one of the most successful segments of the enterprise networking market. With annual revenue growth of 30.8 percent, […]