Welcome!

Monitoring in the Cloud

Hovhannes Avoyan

Subscribe to Hovhannes Avoyan: eMailAlertsEmail Alerts
Get Hovhannes Avoyan via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Hovhannes Avoyan

No doubt you’ve seen the stats and heard about the rapid advance of Big Data, how data doubles every two years, and the ginormous amounts of data that will be tracked as more and more physical objects get connected to the Internet. We all get that Big Data is huge and that it’s a key market differentiator today.                                       But what does all this mean on the ground, in the day to day activities of the small business trying to survive? How effective is your Big Data strategy? Your initial response may be that your data is not that “Big.” Okay, that’s well and good, but how effectively are you leveraging the information you DO have? Are you capturing 360 degree customer insights and what people are saying about your products, brands, and services? Do you even have a strategy in place to begin with?   If any of the answers... (more)

The Week in Website Performance News

This Week in Website Performance is a weekly feature of the Monitis.com blog. It summarizes recent articles about website performance. How to make your web site better, how to improve your users experience when they come to your website and how to optimize the overall experience. Why? Because your friends at Monitis.com care.   Mobile Web Stress: Understanding the Neurological Impact of Poor Performance [SLIDES] Author: Tammy Everts While it’s clear that slow mobile web pages affect metrics, what really goes on in the heads of mobile users who are experiencing poor performance?... (more)

Who Should Have Access to Your IT Monitoring Tools

Assigning access to IT monitoring tools isn’t an exact science. Data should be available to those who use it effectively to make decisions. But who are those people – and where in your organization will you find them?   Generally speaking, those with access to IT monitoring data should know how to identify and prioritize network performance and security problems. Most importantly, they should be capable of taking action when those problems affect critical business processes. With those factors in mind, let’s explore the advantages of providing IT monitoring access to various area... (more)

How to Help Your Coworkers Transfer Email Data During a Server Switch

It’s hard to ensure there’s no downtime during an email server switch when your coworkers keep asking you if their archived emails, contacts, and calendar events will be transferred.   There’s no need to stress. Fend off your worried coworkers with some easy how-to guides so they get their archived emails and you get to get some work done.   Outlook to Gmail. So your company wanted more email storage (off our server, you shouted!) and the ability to access everything from any device. Congrats! You’ve switched to Gmail. Now your coworkers are freaking out about switching over ... (more)

Twenty-Five Linux Server Hardening Tips

When it comes to having a Linux server hosted in a data center or it is not behind any kind of Firewall or NAT device there are a number of security requirements that need to be addressed. Linux servers generally come with no protection configured by default and depending on the hosting company or distro can come preconfigured with many services installed that are not required, including Web Servers, FTP Servers, Mail Servers and SSH Remote Access. The following is a compilation of various settings and techniques you can employ to harden the security of your vulnerable Linux sys... (more)