The closer we get to the end of the year, the faster time seems to fly. It feels like just the other day we were stumbling over pumpkins and being scared by our next-door children with "trick or treat", and now it's not even a month until Christmas!
In a recent post we discussed how to monitor healthcare IT using the DICOM and HL7 sensors in PRTG Network Monitor. We then covered how to monitor entire healthcare workflows. Now, in this post, we share some tutorial videos that show you exactly how to set these healthcare IT sensors up in PRTG, and the information that they deliver to you.
We recently gave an outlook on the impact Artificial Intelligence can have on our future. In addition, there are of course specific effects for each individual profession. And if you define illegal hacking as a profession, then there too. Because just like righteous programmers, hackers usually leave their very own mark in the programs and code they write. And surprise: AI can easily find clues that expose a hacker faster than they would like.
From November 4th to 7th, five Paesslerists got their minds off daily business and attended the Web Summit in Lisbon. We came back inspired by the ideas presented there, and felt some of these thoughts would be just as exciting for our readers! So, here are the standout sessions we attended, which continue to make us think long after we returned to our desks.
Following the evolution in Software Development, one has the feeling that the times of the typical sysadmin are over. I still remember the years when the daily routine of a sysadmin consisted of keeping a handful of servers running, checking the firmware status of switches regularly, and rolling out latest updates from time to time.
According to a recent study, most large and small companies will opt for an IIoT platform in the next 5 years. This puts pressure on suppliers from the IT sector and heavyweights in industry to position themselves with a suitable solution. It is already feared that the topic of security might once again be forgotten in the IIoT context.
Here at Paessler, we have an age-old tradition on Friday afternoons of having a few beers together with our colleagues. And every now and then we end up playing a game of "Would Your Rather?"
Hey, we have some merchandise to give away!
We are used to devices communicating with each other. Digital devices and assistants turn on the radio on command, we turn on our lights with our smartphone, and the printer orders new toner on its own. All this makes security solutions for data traffic in IoT all the more important.
A keynote highlight of this year's Sigfox Connect was the presentation of the work of the Sigfox Foundation and its rhino tracking system. Free-living rhinos in Africa have been equipped with GPS trackers and Sigfox's low-power sensors for over a year now. The project's findings should help to better protect these endangered animal species in the future.
We love it when our users compile information that might be of use to other PRTG users, or even just IT Administrators in general. And in today's post, we highlight a how-to guide written by a PRTG user. Florian Thiele is an IT Security Architect. He has worked with FortiGate firewalls and PRTG Network Monitor for 10 years. He's written for us before (check out Using a Fortinet FortiGate as Reverse Proxy for PRTG). Now he has put together a document about how to monitor FortiGate firewalls with PRTG (download below). In it, he not only provides some information specifically related to PRTG, but also provides some general information about FortiGate firewalls that might also be useful on its own.
Nowadays there are countless providers who offer you either a lot or manageable storage space for more or less money respectively. Where lower costs tempt regarding higher storage capacity, however, the data protection is often questionable. In recent years, the big names have been successful with their offers. No matter whether Google, Microsoft, Amazon or Dropbox, all providers attract with free storage space, which can be extended by the booking of a paid option almost to an unlimited extent.
On the 24th and 25th of October, Sigfox Connect opened its doors at the Arena Berlin in Berlin Alt-Treptow - and of course Paessler AG was also there. 150 exhibitors and a full day lecture program with numerous keynotes of leading industrial enterprises were offered.
We are posting this on the 31st of October, so one could generously call the PRTG release 18.4.45 a Halloween special. Of course, that's not quite right, because when we do a blog about a stable release, it's already been available for download for a few days. Only when we see that there are no more complications out there, do we tell you more about the release on our blog.
In a previous post, we took a look at the DICOM and HL7 sensors you get out-of-the-box with PRTG. These sensors can be used to monitor various aspects of a typical hospital's infrastructure, such as the Picture Archiving and Communication System (PACS) or the interfaces for transferring patient details between departments. But interfaces and systems don't run in isolation. What you really want is the big picture: what is the status of entire workflows? PRTG Network Monitor provides a Business Process Sensor to help with this, but how exactly does it work?