Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM 2012 R2 Java APM – MP Installation and Configuration (Part 3)
Finally we are going to install and configure Java APM management pack. Just for a small recap, we have a monitored Linux server and a fully functional Tomcat application server in place which is configured for deep monitoring. Cool, huh? Now we would like to get some hands on performance of one of the applications […]
itnetx – Winner of the “Microsoft Partner of the Year Award 2013”
Yes it is unbelievable but we did it again. Yesterday itnetx received from Microsoft Switzerland the “Partner of the Year 2013 –Datacenter” award – the third time in a row :). This award shows also the passion and dedication of itnetx for delivering the best possible solution for its customers. And now let’s get ready […]