Fast Networks Monitoring Station

Password Recovery

Please enter your user name.

A new password will be sent to you via email.

Paessler Blog

5 Things I Learned While Interning as a Sysadmin

Paessler is very open-minded when it comes to ideas that help “broaden your horizon”. One of the great opportunities we have here is to do internships in other departments to learn new skills, understand pain points and grow together as a company. Since I’m fresh out of university and felt that I lagged behind on the more practical side of anything related to IT, I got to live as a Sysadmin for two whole months.

How Technology Will Change Our Lives in the Next 5 Years

As an innovation manager, I am trying to keep pace with current tech trends and have come across a couple of exciting stories I want to share. After reading so many individual pieces of information, I am trying to see the bigger picture behind it all and what we’re aiming at. Some of these tech trends stand out, and I frequently see opinions that I think are misleading. Also, I think these changes are coming very slowly and will go almost unnoticed – we will understand how much they changed our lives only afterwards.

Is It Possible to Monitor OSI Model Layer 8?

You no doubt know the OSI model, and you probably work with it every day. If you're a sysadmin and don't know what I'm talking about, then... no, everyone knows what I am talking about! 😊

Why MQTT Is Everywhere, and the Security Issues It Faces

In a previous article, I detailed the history of MQTT and how it came to be one of the most commonly-used protocols when it comes to the Internet of Things. I ended that article by asking several questions: Why would someone choose MQTT over HTTP as a communication protocol? And why choose MQTT over enterprise messaging systems like AMQP? As I said then, to answer those questions, it helps to first understand how MQTT works. Then I’ll discuss some of the problems it has faced in recent times.

Chris Dancy at the Paessler HQ - Part 2/2

What the world knows about Chris Dancy: He is the most connected human on earth. What we know about him (because he visited us): He's a very stimulating, likeable guy, who knows about the power of the data we each produce every day. The days with Chris were inspiring and we created 2 videos to try encapsulate his ideas.

How to Monitor Meeting Rooms with PRTG

Did you just receive a last-minute request for a customer call and are now frantically looking for a free meeting room? Do you spontaneously need to schedule a meeting and can’t figure out were to go? Fret no longer, PRTG has got you covered!

Chris Dancy at the Paessler HQ - Part 1/2

What the world knows about Chris Dancy: He is the most connected human on earth. What we know about him (because he visited us): He's a very stimulating, likeable guy, who knows about the power of the data we all produce every day. The days with Chris were very inspiring and we created two videos to try encapsulate his ideas.

SAP Monitoring with PRTG

Many large and medium-sized companies rely on SAP as their ERP solution for business-critical areas. One reason they use SAP is for its high availability features. A system failure or a performance degradation will cause high expenditures in IT and cause work restrictions for the users and customers and using a highly available database will prevent this from happening.

Company Network + Private IoT Devices = Trouble

The days of BYOD have changed the way we deal with our workplace. We now use private devices much more naturally in the workplace, perform certain work tasks using them, and are generally much more flexible. But what are the consequences if more and more employees bring more and more IoT devices to work?

How to Set Up Reports in PRTG in 5 Easy Steps

Your PRTG is up and running. You’ve built a flawless device tree with everything perfectly organized in accordance with your network hierarchy. You’re getting email, SMS and push notifications when things are down or problematic.But now the CIO wants regular reports about the uptime and availability of a critical application or service you provide to end users. The CIO will be sharing these reports with the rest of the executive team, so you need to keep it “high level”. Where do you start?

The Silex and the Fury: New Malware Tries to Destroy IoT Devices

A new malware called Silex is targeting IoT devices. The software does not want to take the devices over, in order to use them for DDoS attacks, but rather wants them to malfunction and shut down.

8 Reasons Why Documentation Is Vital for Your IT Environment

Is IT documentation a source of joy, or a necessary evil? Experience shows that most companies only maintain IT documentation to comply with legal regulations.

From Oil Pipelines to the IoT: A Brief History of MQTT

If it feels like the Internet of Things (IoT) has kind of gone from zero to ubiquitous hype in the space of no time at all, you're not wrong: it's only been around in its current form since the late 90s. Now I know, many might argue that there was a "smart" toaster in the 70s or a monitored coffee pot in the 80s, but the IoT as we now know it only really took shape at the turn of the century. And while it showed some potential right from the early days, it needed a few developments before it could truly become useful.

One Flew over the Paessler's Nest

More and more companies are paying attention to their energy consumption, but only a few generate their own energy. We are quite happy that our roof now serves as more than just rain protection.

Were You in IT Support 20 Years Ago? Then You Surely Experienced This!

A few weeks ago I wrote about 11 IT relics from the 90s. Your feedback was overwhelming. So many of you have contributed personal stories and experiences from that time, and there are more every day! If you haven't seen the article, check it out: You Experienced IT in the 90s If You Know These Relics All your stories got me thinking about how we actually did IT support two decades ago. The time is not so long ago, but still the procedures of today are hardly comparable with the those of the past, some of which were very complex. Four quite typical scenarios from the time between 1999 and 2004 are still in my memory. How was IT support back at that time?