Augmented Reality (AR)

Augmented Reality (AR)

I’m sure you might have played “pokemon-go” game! Augmented Reality (AR) is changing the way we view the world or at least the way its users see the world. Picture yourself walking or driving down the street. With augmented-reality displays, which will eventually look much like a normal pair of glasses, informative graphics will appear …

Read More Read More

Top 5 configuration management software

Top 5 configuration management software

Why Configuration Management? DevOps and CM(Configuration Management) are different. DevOps is about collaboration between people, while CM tools are just that: tools for automating the application of configuration states. Like any other tools, they are designed to solve certain problems in certain ways.Using CM you can make changes very quickly, but needs to validate those …

Read More Read More

Ravi co-founder of IndianGNU @ 2nd Check_MK Conference in Munich, Germany

Ravi co-founder of IndianGNU @ 2nd Check_MK Conference in Munich, Germany

Introduction- Ravi Bhure co-founder of IndianGNU attended  2nd Check_MK Conference in Munich, Germany last October,2015 as delegate. Ravi talked about “Migration from Solarwinds to Check_MK” in Check_MK Munich Conference. For more information on presentation please visit https://www.linkedin.com/pulse/open-source-monitering-deadly-combo-migration-from-checkmk-burkule   Thank you, Arun    

Website Functional testing using Browser automation

Website Functional testing using Browser automation

Introduction- Website Functional testing using Browser automation is very important and better than just monitoring url with 200 OK! Your Application or Website URL may be working fine but this doesn’t mean that all components are working fine. So testing your Web Application functionalities with screenshot is important in cloud based product and Uptime Reporting …

Read More Read More

Configuration management database (CMDB)

Configuration management database (CMDB)

CMDB- Configuration management database (CMDB) is a repository that acts as a data warehouse for information technology (IT) organizations. Its contents are intended to hold a collection of IT assets that are commonly referred to as configuration items (CI), as well as descriptive relationships between such assets. A Configuration item type (or CI Type) is …

Read More Read More

Cloud: Monitoring as a Service (MaaS)

Cloud: Monitoring as a Service (MaaS)

Introduction- Cloud computing has been evolving into different technology areas such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). These technology areas are finding increasing adoption in the marketplace. A recent report published by International Data Corporation (IDC) has indicated that the Cloud Computing market is …

Read More Read More

A. P. J. Abdul Kalam – Great Son of India

A. P. J. Abdul Kalam – Great Son of India

Introduction– A. P. J. Abdul Kalam (Avul Pakir Jainulabdeen Abdul Kalam) was the 11th President of India from 2002 to 2007. He was great engineer,scienctist and Leader. I pay tribute to him and May his soul rest in peace.             ॐ असतो मा सद्गमय । तमसो मा ज्योतिर्गमय । मृत्योर्मा …

Read More Read More

CloudStack: An Overview of the Open Source IaaS Platform.

CloudStack: An Overview of the Open Source IaaS Platform.

    Here’s an open source IaaS platform to set up an on-demand, elastic cloud computing service. It enables utility computing services by allowing cloud service providers to offer self-service compute instances, storage volumes and networking configurations, and to set up a private cloud for internal use. Apache CloudStack is an open source, multi-tenanted cloud …

Read More Read More

Shellshock ‘Deadly serious’ new tech bug found!

Shellshock ‘Deadly serious’ new tech bug found!

This issue affects all products which use the Bash shell and parse values of environment variables. This issue is especially dangerous as there are many possible ways Bash can be called by an application. Quite often if an application executes another binary, Bash is invoked to accomplish this. Because of the pervasive use of the …

Read More Read More