PRTG Network Monitor (12SRVPRTG02)

Neues Kennwort anfordern

Bitte geben Sie Ihren Benutzernamen ein.

Wir senden Ihnen ein neues Kennwort per E-Mail.

Paessler Blog

4 Facts about Memes You (Probably) Didn't Know

Memes are everywhere. They flood the Internet and correspond to every world-historical event, such as the new Stranger Things season. Here are some facts about memes you (probably) didn't know. 🎁 Plus, we've been working on our own Paessler Sysadmin Meme Page. Today is also the 20th annual System Administrator Appreciation Day, so we thought about declaring this our official gift. Cause we love you and stuff. ❤️

4 Metrics for Measuring Your Service Level Agreements

One of the buzzwords we constantly come across when answering PRTG requests is “SLA Reporting”. To keep up with demand, one of our partners created a PRTG plugin for SLA monitoring and back in March of this year, my colleague Sascha wrote a blog post on it. But what exactly is an SLA, when is it required and what does it have to do with monitoring?

Healthcare IT: 4 Ways to Monitor a PACS

In our previous discussions about healthcare IT on this blog, we've covered an overview of typical architecture that is found hospitals or clinics, and how to monitor it. More recently, we started looking at individual components (like the Integration Engine). Now, in this article, we take a look at another vital element: the Picture Archive and Communication System, or PACS.

How to Become Anonymous on the Internet - Part 2/2

Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say. (Edward Snowden) Our ideas of privacy and freedom have changed with the Internet. In earlier times, thoughts of freedom were enshrined in constitutions to protect us against tyrants and menaces. In our digital lives, there are complex threats and the laws that have been written to protect us belong to times no longer linked to our realities. The protection of your digital rights is an individual, personal undertaking. This is part 2/2. Find part 1 here, which covers achieving 30% and 60% anonymity.

You Experienced IT in the 90s If You Know These Relics

In the year I was born, the IBM 5150 PC was the benchmark in computing. The basic unit (16 kilobytes of RAM and no data storage) was sold for about $1,565, while the full version cost about $3,000. 16 years later, in the middle of the 1990s, I decided to move into the IT business.So today I want to take you on a trip down memory lane, to the golden computer age of the 90s. Let's wallow together in nostalgia and remember the times when there was hardly any IT monitoring, an internet connection was still established manually, and the mp3 file revolutionized the music business. Let's go! 😊

5 Ideas to Expand Your ETL Process Monitoring

Just about every kind of company or organization has a reliance on data for daily operations. Because of this, databases and data warehouses are central to many environments. And most data architectures look very similar: there is a number of data sources, such as external systems or apps, which deliver data into the central system. This incoming data is in different formats and structures, and so it needs to be consolidated and loaded into the database in a way that matches how the data is stored there. This is where Extract, Transform, and Load (referred to as “ETL”) processes come into play.

How to Become Anonymous on the Internet - Part 1/2

I think it only makes sense to seek out and identify structures of authority, hierarchy, and domination in every aspect of life - and to challenge them; unless a justification for them can be given, they are illegitimate and should be dismantled, to increase the scope of human freedom. (Noam Chomsky) Our ideas of privacy and freedom have changed with the Internet. In earlier times, thoughts of freedom were enshrined in constitutions to protect us against tyrants and menaces. In our digital lives, there are complex threats and the laws written to protect us belong to times no longer linked to our realities. The protection of your digital rights is an individual, personal undertaking.

Where Are We Going? Check Our PRTG Roadmap!

We are often asked if and when we want to integrate this or that feature into PRTG Network Monitor, or in which direction PRTG will develop further. From now on we will make this information available online in our PRTG Roadmap.

Why OPC UA Will Revolutionize Industrial Automation in the Coming Years

When we encounter the phrase "Smart Factory" nowadays, we inevitably also encounter the phrase "Machine-to-Machine (M2M) communication". The goal of communication between manufacturing machines is to collect data for further processing and evaluation.

Sugar-Coated: How Carambar & Co. Digitally Transformed Itself (and How PRTG Helped)

In a previous article I discussed digital transformation in a broad sense of the term. But what does it actually look like for companies? There are many great examples, but there's one in particular that we have come across in recent times (because they're one of our customers). Maybe you have heard of Carambar? They're a French candy and confectionery company, and in 2017 they were acquired by Eurazeo and became part of the newly-formed CPK Group. Carambar & Co. was the wholly-owned operating subsidiary of this group. At this point, they had around 1 000 employees, and to manage an operation of this size, a new IT strategy was required. Carambar started putting together plans for digital transformation, and set in motion a project that would end up with them winning awards! Here's what they did, and how PRTG Network Monitor was an important supporting mechanism in their success. 

The Unbearable Lightness of Bitcoin

2019, seriously, what is wrong with you? Apple introduces a cheese grater and wants to sell a display stand for $999, Elon Musk announces that he has deleted Twitter, on Twitter, and proclaims "Occupy Mars" showing a picture of the moon*, and Facebook wants to launch its own "cryptocurrency".

Buzzword Bingo: What the Heck Is Distributed Ledger Technology?

It's the year of our Lord two thousand and nineteen, and no technology trend with its subcategories is as flooded with buzzwords as the Internet of Things*. Buzzwords are awesome and not so awesome at the same time. You can really annoy people with them, but you need to understand them first. Here I take a quick look at one of them: Distributed Ledger Technology.

Monitor Your ERP Environment with PRTG

An integral part of every business is business processes that run as smoothly as possible – and one application that promises to automate and facilitate these processes is Enterprise Resource Planning, or ERP for short. But, what happens when these applications themselves are not properly working or, worst of all, shut down?

Digital Transformation Still Has a Long Way To Go

While digital transformation might seem like a decade-old buzzword, it actually is changing the world in the present day. And as more processes and solutions become digitized, the complexity of aspects to monitor increases. But what exactly is digital transformation?

Tracking Containers with Sigfox

IBM and IoT service provider Sigfox have jointly implemented a solution for digitizing container tracking in logistics. The project was implemented as part of Groupe PSA. Now the tracking system is to be offered to other manufacturers too.