High-tech

High-tech
Light

Friday, September 26, 2014

7 killer open source monitoring tools

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Sep 23, 2014 1:00 PM
Subject: 7 killer open source monitoring tools
To: <aquarianm@gmail.com>
Cc:

App Store figures from Apple suggest iOS 8 adoption rate of 46%

Google withdraws from conservative lobbyist service ALEC, citing climate change

Network World Daily News PM
September 23, 2014

7 killer open source monitoring tools

7 killer open source monitoring tools Network and system monitoring is a broad category. There are solutions that monitor for the proper operation of servers, network gear, and applications, and there are solutions that track the performance of those systems and devices, providing trending and analysis. Some tools will sound alarms and notifications when problems are detected, while others will even trigger actions to run when alarms sound. Here is a collection of open source solutions that aim to provide some or all of these capabilities.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. App Store figures from Apple suggest iOS 8 adoption rate of 46%

2. Google withdraws from conservative lobbyist service ALEC, citing climate change

3. Microsoft rolls out free Office 365 for Students self-service but hits activation snag

4. End of an era: Microsoft shuts down research lab, TwC

5. With iPhone 6 VoLTE, Apple leads by following Android once again

6. Why Cisco lost two key officials in data center, cloud

7. Hear an iPhone scream when dropped

8. Ray Ozzie's Talko app stores calls in cloud, lets you search them

9. Apple iOS 8 fixes outlined in report

10. Stanford Promises Not to Use Google Money for Privacy Research

11. DDoS attackers turn fire on ISPs and gaming servers

WHITE PAPER: Samsung

Scaling the Mobile Enterprise

Not all employers are ready to jump into the mobility space. There is a lot more to consider than just productivity, revenue growth, and operational efficiency – they have to consider security, device fragmentation, application and content complexity as well as cost to implement enterprise mobility. Learn More

App Store figures from Apple suggest iOS 8 adoption rate of 46%

Not even a week old, iOS 8 adoption is nearing 50% READ MORE

Google withdraws from conservative lobbyist service ALEC, citing climate change

Google's Eric Schmidt has denounced the controversial group for its stance on renewable energy. READ MORE

Microsoft rolls out free Office 365 for Students self-service but hits activation snag

Microsoft offered a self-service model for students to get Office 365 for free, but many students hit a snag as the activation process failed. READ MORE

WHITE PAPER: Guidance Software

Incident Response: Six Steps for Managing Cyber Breaches

Now that security breaches are practically unavoidable, organizations must adopt new postures to be prepared for and successfully respond to incidents right at the first sign of intrusion. In this paper, we outline the six essential steps to effective incident response in order to greatly increase your success in managing cyber breaches. View now

End of an era: Microsoft shuts down research lab, TwC

Satya Nadella continues to shake things up and surprise at the same time. READ MORE

With iPhone 6 VoLTE, Apple leads by following Android once again

Call quality took a dive when consumers shifted from land lines to mobile. Android has had VoLTE HD quality calling for a couple of years. READ MORE

Why Cisco lost two key officials in data center, cloud

The departures of two key players in data center and OpenStack indicate that Cisco's conflicted interests may be driving away top talent in important markets. Cisco's propensity to protect its installed base through proprietary technology while at the same time tactically embracing standards translates into slow, plodding advances on trends like software-defined networking, open source and OpenStack, sources say.To read this article in full or to leave a comment, please click here READ MORE

RESOURCE COMPLIMENTS OF: PC Connection

Need to justify a storage refresh? Get SMART, get started.

Storage modernization unlocks the full potential of your data center. It increases storage capacity, boosts performance, and reduces costs per gigabyte. Click to continue

Hear an iPhone scream when dropped

Now if you drop your iPhone you will not be the only one screaming; your phone will, too, provided its jailbroken and carries this funny tweak being touted on Reddit. A variety of different screams are now available.To read this article in full or to leave a comment, please click here READ MORE

Ray Ozzie's Talko app stores calls in cloud, lets you search them

So far it's just for iPhone, but the goal is support for corporate work groups. READ MORE

Apple iOS 8 fixes outlined in report

With iOS 8 crashes and complaints aplenty, you can expect Apple to issue am 8.0.1 patch for the new iPhone and iPad software before long. READ MORE

Stanford Promises Not to Use Google Money for Privacy Research

This story was co-published by ProPublica and Mashable, and is republished here under the Creative Commons license.Stanford University recently declared that it will not use money from Google to fund privacy research at its Center for Internet and Society, according to a legal filing made by the school. "Since 2013, Google funding is specifically designated not [to] be used for CIS's privacy work," the university said in the court filing, found by ProPublica in documents filed in an unrelated lawsuit.To read this article in full or to leave a comment, please click here READ MORE

DDoS attackers turn fire on ISPs and gaming servers

DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises, half-year figures from Chinese mitigation vendor NSFOCUS have confirmed.The firm's recent statistics show that the peak for DDoS attacks on banks happened in the first half of 2013 when they accounted for an extraordinary 45 percent of all attacks, with enterprises second in the target list at around 25 percent.By the second half of last year, this had started to change with bank attacks slipping under 10 percent - this has since dropped to fractions of a percent. If banks are now off the menu, online gaming and ISPs are suddenly popular, rising in the first half of 2014 to 10 percent and nearly 15 percent of attacks respectively.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Instart Logic

A New, Better Approach for Web Experiences across Devices

For media and entertainment companies intent on delivering high definition web experiences across all devices, web performance can make or break their engagement levels. Learn more>>

SLIDESHOWS

The wild world of workplace wearables

Here are some examples of wearables coming to a variety of vertical industries.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. No, Apple's iPhone 6 Plus isn't too big

2. Ex-Cisco employee pleads guilty to second-degree murder in 'Google Maps case'

3. Oracle to release a PaaS

4. 7 killer open source monitoring tools

5. Key Cisco defections in data center, OpenStack

6. FTC shuts down $11M online diploma mill

7. Crashing Apple's iOS 8 party

8. Internet of Overwhelming Things

9. Take a spin in the world's first 3D –printed electric car

10. EMC reportedly held merger talks with Hewlett-Packard

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment