Category: Tech



unicast flooding traffic

Community Network Tech

Monitoring Unicast Flooding Traffic


Unicast Flooding Traffic: root cause and monitoring Unicast Flooding Traffic is associated with the learning process of network switches. In fact, with this method, switches identify the MAC addresses of the devices that are accessible by each of their ports, thus constructing a table …





the best mouses of 2018

Community Tech

The best mouses of 2018: our best ergonomic friends


The best mouses of 2018: let’s search and offer an opinion As we have already wisely mentioned a few times before, in this world, for better or for worse, everything is rankable and, of course, susceptible to one of those articles on “The best…”. …


Network blind spots featured

Network Tech

Network Blind Spots: Total Visibility or Not


Network blind spots: visibility, monitoring and security issues Network blind spots study is framed within a field controlled by three well interconnected elements: monitoring, security and visibility. Here are the two main principles that rule over this universe and are relevant to the topic …


Best desktop computers of 2018 featured

Geek culture Tech Tecnología

The best desktop computers of 2018


Best desktop computers of 2018. Learn all about it Desktop computers are quite common. Although now, with smartphones, tablets, smartwatch, laptops and other mobile devices, we have forgotten a little about desktop computers, they are still very much present in the evolving world of …




emotional robots

Community Comunidad Geek culture Tech Tecnología

Monitoring feelings


Emotional robots and other examples to monitor our feelings We have always tried to know – with greater or lesser success – the feelings of others. From the quaternary man who, inside his cave, looked into his partner’s eyes trying to discern her, to …



Anomaly detection in monitoring

Community Tech

Part I: Anomaly Detection in monitoring: what can we really do?


Anomaly Detection in monitoring: problems we can resolve with it In recent years we have frequently found the term anomaly detection in monitoring. In fact, some monitoring tools have introduced in their features the customized application of anomaly detection algorithms and some companies offer …



wireless monitoring

Community Network Redes

About wireless monitoring


Wireless Monitoring: Relevance and Tools The concept “Wireless Monitoring” is quite broad. In fact, it covers all wirelessly instrumented communications platforms and the monitoring we can do on them. We are talking about everything from the short-range signal of a Bluetooth device to sensors …




importance of backup data

Community Network Tech

The importance of Data Backup in Pandora FMS


Importance of Data Backup: Learn how to be protected If you value stability and anticipation, if you love being on the safe side, you should know the importance of Data Backup. Performing a backup of the system is essential in order to maintain the …



Raspberry kiosk mode

Community Howto Servers

Discover how to set up a Raspberry kiosk mode


Raspberry kiosk mode configuration on Pandora FMS About the Raspberry kiosk mode If you’ve been shopping recently, you may or may not have seen stores and shops with screens, promotional videos, product images, statistics, etc. Normally, for this purpose the computers are hidden. These …


Community Howto Tech Tecnología

Every programmer deserves a Vagrant File


Vagrant File: Working with virtual IDE’s An Integrated Development Environment is like the personal office of every software programmer, because we have all the components in order to focus on the task. Today everything is oriented towards web applications and in a previous article …







Data Center monitoring

Community Features Tech

Let’s talk about Data Center Monitoring


Data Center Monitoring: The basis for defining a service The term Data Center Monitoring is used in the communications plan of some companies as if it were a product specially designed for this area. However, when it comes to these ideas we believe that …




cover network TAP

Network Tech

Network Traffic Capture with Network TAPs


Network TAP: three situations in which they are necessary Network TAP (Terminal Access Point or Test Access Point) is the most common hardware device used for network traffic capture purpose. A Network TAP is basically a hardware designed to access the traffic between two …




Community Network Tech Tecnología

DNS Monitoring: A Necessary Task.


DNS Monitoring: Reasons and elements to be included When we think of DNS (Domain Name System), there are two thoughts that we all assume to be true and that become natural justifications for the development of a DNS Monitoring scheme: If the DNS system …


ansible community

Community Tech Tecnología

Ansible Community: open source ACS tool without agents


Ansible Community: architecture, considerations and installation We’ve mentioned this before: “Simplicity is the ultimate sophistication” (Leonardo da Vinci) The Ansible Collective encompasses the handling of the ACS in a practical way! For some people when they hear the word Ansible, it may remind them …


Mainframe Monitoring

Community Howto Tech Tecnología

Mainframe Monitoring: Beyond the Black Box


Mainframe Monitoring: Introduction, Challenges and Tools Either because we are implementing an integral monitoring platform, because we want to monitor a data centre or because we need to monitor an application, sooner or later we will have to face the issue of Mainframe Monitoring. …