<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 12 Apr 2026 18:07:39 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Benchmarks”</title>
    <link>https://techsnap.systems/tags/benchmarks</link>
    <pubDate>Fri, 21 Feb 2020 18:00:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>423: Hopeful for HAMR</title>
  <link>https://techsnap.systems/423</link>
  <guid isPermaLink="false">579b3028-f4b8-408a-ad04-ee0f8d017f78</guid>
  <pubDate>Fri, 21 Feb 2020 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/579b3028-f4b8-408a-ad04-ee0f8d017f78.mp3" length="21313956" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.</itunes:subtitle>
  <itunes:duration>29:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. 
Plus Jim's journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about. 
</description>
  <itunes:keywords>Ubuntu, 18.04.4, 18.04, LTS, Linux, WiFi, hardware enablement, maintenance release, Clear Linux OS, Linux desktop, Intel, Clear Linux, benchmarks, performance, swupd, ZFS, ZFS on Linux, ZoL, MobaXterm,  LRU, WSL, Windows, Microsoft, L2ARC, ARC, filesystems, cache, caching, HDD, storage, hard drives, HAMR, SMR, MAMR, Seagate, Western Digital, latency, throughput, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. </p>

<p>Plus Jim&#39;s journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.</p><p>Links:</p><ul><li><a title="Ubuntu 18.04.4 LTS: here&#39;s what&#39;s new" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/ubuntu-18-04-4-lts-released-wednesday-heres-whats-new/">Ubuntu 18.04.4 LTS: here's what's new</a> &mdash; It's not as shiny and exciting as entirely new versions, of course, but it does pack in some worthwhile security and bugfix upgrades, as well as support for more and newer hardware.</li><li><a title="18.04.4 - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes/ChangeSummary/18.04.4">18.04.4 - Ubuntu Wiki</a></li><li><a title="MobaXterm" rel="nofollow" href="https://mobaxterm.mobatek.net/">MobaXterm</a> &mdash; Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more.</li><li><a title="Linux distro review: Intel’s own Clear Linux OS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/linux-distro-review-intels-own-clear-linux-os/?comments=1">Linux distro review: Intel’s own Clear Linux OS</a> &mdash; There's not much question that Clear Linux is your best bet if you want to turn in the best possible benchmark numbers. The question not addressed here is, what's it like to run Clear Linux as a daily driver? We were curious, so we took it for a spin.</li><li><a title="Clear Linux* Project" rel="nofollow" href="https://clearlinux.org/">Clear Linux* Project</a> &mdash; Clear Linux OS is an open source, rolling release Linux distribution optimized for performance and security, from the Cloud to the Edge, designed for customization, and manageability.</li><li><a title="swupd — Documentation for Clear Linux* project" rel="nofollow" href="https://docs.01.org/clearlinux/latest/guides/clear/swupd.html">swupd — Documentation for Clear Linux* project</a></li><li><a title="clr-boot-manager: Kernel &amp; Boot Loader Management" rel="nofollow" href="https://github.com/clearlinux/clr-boot-manager">clr-boot-manager: Kernel &amp; Boot Loader Management</a></li><li><a title="Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/9745">Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs</a></li><li><a title="Persistent L2ARC might be coming to ZFS on Linux" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/zfs-on-linux-should-get-a-persistent-ssd-read-cache-feature-soon/">Persistent L2ARC might be coming to ZFS on Linux</a> &mdash; The primary ARC is kept in system RAM, but an L2ARC device can be created from one or more fast disks. In a ZFS pool with one or more L2ARC devices, when blocks are evicted from the primary ARC in RAM, they are moved down to L2ARC rather than being thrown away entirely. In the past, this feature has been of limited value, both because indexing a large L2ARC occupies system RAM which could have been better used for primary ARC and because L2ARC was not persistent across reboots.</li><li><a title="Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/pull/9582">Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs</a> &mdash; This feature implements a light-weight persistent L2ARC metadata structure that allows L2ARC contents to be recovered after a reboot. This significantly eases the impact a reboot has on read performance on systems with large caches.</li><li><a title="LINUX Unplugged 303: Stateless and Dateless" rel="nofollow" href="https://linuxunplugged.com/303">LINUX Unplugged 303: Stateless and Dateless</a> &mdash; We visit Intel to figure out what Clear Linux is all about and explain a few tricks that make it unique.</li><li><a title="LINUX Unplugged Blog: Clear Linux OS 2019" rel="nofollow" href="https://linuxunplugged.com/articles/clear-linux-os-2019">LINUX Unplugged Blog: Clear Linux OS 2019</a></li><li><a title="HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/">HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020</a> &mdash; Although the 2012 "just around the corner" HAMR drives seem to have been mostly vapor, the technology is a reality now. Seagate has been trialing 16TB HAMR drives with select customers for more than a year and claims that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.</li><li><a title="HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units" rel="nofollow" href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/">HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units</a></li><li><a title="Western Digital debuts 18TB and 20TB near-MAMR disk drives" rel="nofollow" href="https://blocksandfiles.com/2019/09/03/western-digital-18tb-and-20tb-mamr-disk-drives/">Western Digital debuts 18TB and 20TB near-MAMR disk drives</a></li><li><a title="Previously on TechSNAP 341: HAMR Time" rel="nofollow" href="https://techsnap.systems/341">Previously on TechSNAP 341: HAMR Time</a> &mdash; We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details &amp; some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology &amp; take a mini deep dive into the world of elliptic curve cryptography.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. </p>

<p>Plus Jim&#39;s journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.</p><p>Links:</p><ul><li><a title="Ubuntu 18.04.4 LTS: here&#39;s what&#39;s new" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/ubuntu-18-04-4-lts-released-wednesday-heres-whats-new/">Ubuntu 18.04.4 LTS: here's what's new</a> &mdash; It's not as shiny and exciting as entirely new versions, of course, but it does pack in some worthwhile security and bugfix upgrades, as well as support for more and newer hardware.</li><li><a title="18.04.4 - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes/ChangeSummary/18.04.4">18.04.4 - Ubuntu Wiki</a></li><li><a title="MobaXterm" rel="nofollow" href="https://mobaxterm.mobatek.net/">MobaXterm</a> &mdash; Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more.</li><li><a title="Linux distro review: Intel’s own Clear Linux OS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/linux-distro-review-intels-own-clear-linux-os/?comments=1">Linux distro review: Intel’s own Clear Linux OS</a> &mdash; There's not much question that Clear Linux is your best bet if you want to turn in the best possible benchmark numbers. The question not addressed here is, what's it like to run Clear Linux as a daily driver? We were curious, so we took it for a spin.</li><li><a title="Clear Linux* Project" rel="nofollow" href="https://clearlinux.org/">Clear Linux* Project</a> &mdash; Clear Linux OS is an open source, rolling release Linux distribution optimized for performance and security, from the Cloud to the Edge, designed for customization, and manageability.</li><li><a title="swupd — Documentation for Clear Linux* project" rel="nofollow" href="https://docs.01.org/clearlinux/latest/guides/clear/swupd.html">swupd — Documentation for Clear Linux* project</a></li><li><a title="clr-boot-manager: Kernel &amp; Boot Loader Management" rel="nofollow" href="https://github.com/clearlinux/clr-boot-manager">clr-boot-manager: Kernel &amp; Boot Loader Management</a></li><li><a title="Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/9745">Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs</a></li><li><a title="Persistent L2ARC might be coming to ZFS on Linux" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/zfs-on-linux-should-get-a-persistent-ssd-read-cache-feature-soon/">Persistent L2ARC might be coming to ZFS on Linux</a> &mdash; The primary ARC is kept in system RAM, but an L2ARC device can be created from one or more fast disks. In a ZFS pool with one or more L2ARC devices, when blocks are evicted from the primary ARC in RAM, they are moved down to L2ARC rather than being thrown away entirely. In the past, this feature has been of limited value, both because indexing a large L2ARC occupies system RAM which could have been better used for primary ARC and because L2ARC was not persistent across reboots.</li><li><a title="Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/pull/9582">Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs</a> &mdash; This feature implements a light-weight persistent L2ARC metadata structure that allows L2ARC contents to be recovered after a reboot. This significantly eases the impact a reboot has on read performance on systems with large caches.</li><li><a title="LINUX Unplugged 303: Stateless and Dateless" rel="nofollow" href="https://linuxunplugged.com/303">LINUX Unplugged 303: Stateless and Dateless</a> &mdash; We visit Intel to figure out what Clear Linux is all about and explain a few tricks that make it unique.</li><li><a title="LINUX Unplugged Blog: Clear Linux OS 2019" rel="nofollow" href="https://linuxunplugged.com/articles/clear-linux-os-2019">LINUX Unplugged Blog: Clear Linux OS 2019</a></li><li><a title="HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/">HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020</a> &mdash; Although the 2012 "just around the corner" HAMR drives seem to have been mostly vapor, the technology is a reality now. Seagate has been trialing 16TB HAMR drives with select customers for more than a year and claims that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.</li><li><a title="HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units" rel="nofollow" href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/">HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units</a></li><li><a title="Western Digital debuts 18TB and 20TB near-MAMR disk drives" rel="nofollow" href="https://blocksandfiles.com/2019/09/03/western-digital-18tb-and-20tb-mamr-disk-drives/">Western Digital debuts 18TB and 20TB near-MAMR disk drives</a></li><li><a title="Previously on TechSNAP 341: HAMR Time" rel="nofollow" href="https://techsnap.systems/341">Previously on TechSNAP 341: HAMR Time</a> &mdash; We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details &amp; some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology &amp; take a mini deep dive into the world of elliptic curve cryptography.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>415: It's All About IOPS</title>
  <link>https://techsnap.systems/415</link>
  <guid isPermaLink="false">876a69f9-340a-4bc9-bfaa-be87b35ac4c9</guid>
  <pubDate>Fri, 01 Nov 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/876a69f9-340a-4bc9-bfaa-be87b35ac4c9.mp3" length="24837038" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We share our simple approach to disk benchmarking and explain why you should always test your pain points.</itunes:subtitle>
  <itunes:duration>34:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We share our simple approach to disk benchmarking and explain why you should always test your pain points.
Plus the basics of solid state disks and how to evaluate which model is right for you. 
</description>
  <itunes:keywords> Samsung evo, samsung pro, ssd, ssds, solid state disks, 4k random writes, disk benchmarking, benchmarks, phoronix test suite, spinning rust, hard disk drive, hard disk, Crucial, Sandisk, SSD Controller, queue depth, fio, IOPS, throughput, flash storage, NVMe, disk performance, dd, fsync, flexible IO tester, disk cache, ssd cache, test your pain points, rsyslogd, syslog, RAID, TLC, MLC, SLC, write endurance, TRIM,  DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We share our simple approach to disk benchmarking and explain why you should always test your pain points.</p>

<p>Plus the basics of solid state disks and how to evaluate which model is right for you.</p><p>Links:</p><ul><li><a title="History of hard disk drives" rel="nofollow" href="https://en.wikipedia.org/wiki/History_of_hard_disk_drives">History of hard disk drives</a> &mdash; Wikipedia</li><li><a title="How to Buy the Right SSD: A Guide for 2019 " rel="nofollow" href="https://www.tomshardware.com/reviews/ssd-buying-guide,5602.html">How to Buy the Right SSD: A Guide for 2019 </a> &mdash; Tom's Hardware</li><li><a title="The Development and History of Solid State Drives (SSDs)" rel="nofollow" href="https://www.semiconductorstore.com/blog/2014/The-Development-and-History-of-Solid-State-Drives-SSDs/854/">The Development and History of Solid State Drives (SSDs)</a></li><li><a title="Understanding IOPS, latency and storage performance" rel="nofollow" href="https://louwrentius.com/understanding-iops-latency-and-storage-performance.html">Understanding IOPS, latency and storage performance</a></li><li><a title="FIO cheat sheet" rel="nofollow" href="https://jrs-s.net/2015/11/23/fio-cheat-sheet/">FIO cheat sheet</a> &mdash; Jim's Blog</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We share our simple approach to disk benchmarking and explain why you should always test your pain points.</p>

<p>Plus the basics of solid state disks and how to evaluate which model is right for you.</p><p>Links:</p><ul><li><a title="History of hard disk drives" rel="nofollow" href="https://en.wikipedia.org/wiki/History_of_hard_disk_drives">History of hard disk drives</a> &mdash; Wikipedia</li><li><a title="How to Buy the Right SSD: A Guide for 2019 " rel="nofollow" href="https://www.tomshardware.com/reviews/ssd-buying-guide,5602.html">How to Buy the Right SSD: A Guide for 2019 </a> &mdash; Tom's Hardware</li><li><a title="The Development and History of Solid State Drives (SSDs)" rel="nofollow" href="https://www.semiconductorstore.com/blog/2014/The-Development-and-History-of-Solid-State-Drives-SSDs/854/">The Development and History of Solid State Drives (SSDs)</a></li><li><a title="Understanding IOPS, latency and storage performance" rel="nofollow" href="https://louwrentius.com/understanding-iops-latency-and-storage-performance.html">Understanding IOPS, latency and storage performance</a></li><li><a title="FIO cheat sheet" rel="nofollow" href="https://jrs-s.net/2015/11/23/fio-cheat-sheet/">FIO cheat sheet</a> &mdash; Jim's Blog</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>411: Mobile Security Mistakes</title>
  <link>https://techsnap.systems/411</link>
  <guid isPermaLink="false">b9fd8f0e-82a3-44bb-b373-eea0ac62412d</guid>
  <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/b9fd8f0e-82a3-44bb-b373-eea0ac62412d.mp3" length="21338406" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:subtitle>
  <itunes:duration>29:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs. 
</description>
  <itunes:keywords>iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>407: Old School Outages</title>
  <link>https://techsnap.systems/407</link>
  <guid isPermaLink="false">a442674d-ddd6-471a-ac89-448f1d9a3284</guid>
  <pubDate>Wed, 10 Jul 2019 22:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a442674d-ddd6-471a-ac89-448f1d9a3284.mp3" length="30618354" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim shares his Nagios tips and Wes chimes in with some modern monitoring tools as we chat monitoring in the wake of some high-profile outages.</itunes:subtitle>
  <itunes:duration>42:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD. 
</description>
  <itunes:keywords>Ryzen, AMD, Epyc, Intel, CPU, server, server builds, performance, benchmarks, internet, xeon, ecc, outages, google, cloudflare, facebook, microsoft, BGP, regex, deployment, verizon, RKPI, bgp leak, internet infrastructure, monitoring, openNMS, libreNMS, nagios, zabbix, prometheus, riemann, time series, metrics, logs, logging, observability, grafana, netdata, NRPE, old school, sysadmin, infosec, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
