February 2021


How to Monitor API Usage and Performance with the Moesif Plugin for AWS API Gateway

API gateways provide a central point to govern and control access to your APIs, enabling customers and partners to quickly create new experiences. Amazon API Gateway has native support for a variety of compute resources like AWS Lambda or Amazon Elastic Compute Cloud (Amazon EC2).


5 Keys to Simple Project Management

Project Managers are presented with some challenging tasks which can hinder the success of the project. Some of the most prevalent challenges that keep project managers on the ball involve making sure the project is on track, within the assigned budget, keeping up with the project's pace, and managing resources.


Avoiding the Most Common Business Mistakes When Scaling Your Small Business

Scaling and generating more revenue without necessarily increasing costs is a good sign for your small business. But with the potential to scale by increasing sales volume comes the challenge of keeping the company’s operations and profitability stable. This is why companies emphasize the importance of operational efficiency.


6 Tech Tools to Streamline Your Remote Workflow

‍ Thrust into the unfamiliarity of remote work, a huge number of industries around the globe have had to adapt to life away from the office. COVID-19 has prompted a surge in remote work like we have never seen before, with much of the American workforce being left with no choice but to work from home. In fact, the pandemic has ensured that tech priorities shifted for 95% of companies.


Getting started with Raygun Crash Reporting using Raygun4Android

Building native mobile apps can be a daunting challenge. Even if you ignore the choice of building separate iOS/Android apps or using cross-platform technology, writing native apps is hard. The development process of native apps involves a lot of testing and debugging. While the app is still under initial development this usually happens on test devices of the developers or dedicated testers. When problems arise or the app crashes, these incidents are often observable and can be debugged.


Security operations center, Part 2: Life of a SOC analyst

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry out every day to protect their organization from constantly evolving cyber threats and the skill sets that come in handy in effectively carrying out their duties.


12 Best Docker Container Monitoring Tools

Monitoring systems help DevOps teams detect and solve performance issues faster. With Docker and Kubernetes steadily on the rise, it’s important to get container monitoring and log management right from the start. This is no easy feat. Monitoring Docker containers is very complex. Developing a strategy and building an appropriate monitoring system is not simple at all.


Preparing to Fail Fast so You can Recover Faster

The principle of fail fast is either the best thing since the transistor or nothing but hot air. It depends on the size of your organization and the cohesiveness of your teams. If your team members have a strong working relationship, and dev is well integrated with everyday work company-wide, you already have a good foundation for this particular agile thinking. Most companies that have grown beyond startup-size, and even some startups, may find this idea a bit jarring.


Increasing limits for three key Cloud Monitoring features

Cloud Monitoring is one of the easiest ways you can gain visibility into the performance, availability, and health of your applications and infrastructure. Today, we’re excited to announce the lifting of three limits within Cloud Monitoring. First, the maximum number of projects that you can view together is now 375 (up from 100). Customers with 375 or fewer projects can view all their metrics at once, by putting all their projects within a single workspace.


Integration with 3rd Party Systems

Integrations of third-party systems with Enterprise Alert, what is possible? In my work with new and existing customers, I keep coming across the assumption that Enterprise Alert is not able to be integrated with certain third-party systems in order to receive and process events and fault messages from this system. Basically, first of all, we have to say: We can integrate everything that communicates digitally in any way.


Webinar Wrap-up: Urban Company's Journey of Scaling Growth by Leveraging AI

If you run an online business, it is vital to ensure that your platform is in top shape and accessible to customers 24/7. Better user experience is the key to earning customer loyalty and driving growth. A customer-focused approach is one of the key factors behind the success of India’s largest home services company – Urban Company.


Getting Started with Change Tracking

Changes are both inevitable and necessary when you are running a business. As customer expectation and the market landscape keeps changing, you will have to take up the necessary measures to implement corresponding digital solutions and technology changes. But managing changes can be a tricky process. Some changes can be as simple as changing the folder organization in your data. But if you have not tracked it properly, you will soon run into confusing folder hierarchies and problems in data sharing.


What is virtualisation? The basics

Virtualisation plays a huge role in almost all of today’s fastest-growing software-based industries. It is the foundation for most cloud computing, the go-to methodology for cross-platform development, and has made its way all the way to ‘the edge’; the eponymous IoT. This article is the first in a series where we explain what virtualisation is and how it works. Here, we start with the broad strokes.


Announcing Updated Analytics Filters to Dive Even Deeper into your Historic Incident Data

After successfully implementing a conditional evaluation engine into Runbooks, we started looking at other places in FireHydrant that would be improved with this engine. After hearing a lot of feedback from you, we’ve implemented conditions into our Analytics page. Let’s dive in and see what new things are possible with this new filtering.


Build Trust with a Custom Domain

Security in software is now everyone’s problem. We can no longer simply rely on InfoSec teams or your equivalent Gary “he-likes-security” to handle security-related processes and issues. All software, tools, infrastructure, and services need to be trusted. It is important to us at Cloudsmith to provide you with the ability to build that trust within your teams or with your customers. Cloudsmith allows you to use your own domain name for your repositories.


How to create a good test plan

Software testing is the process of evaluating and verifying a software program or application —with the intent of preventing software defects, reducing development costs, improving performance, and delivering a superior product. To ensure adequate product coverage and keep testing in line with project objectives, it’s imperative to have a sound test plan.


How To - Monitor Your Email Service with Catchpoint

Today, we’re going to continue diving into Catchpoint’s wealth of synthetic tests with a brief overview of network protocols and a look at some helpful use cases specifically around monitoring your email service. I’ll be sharing a hands-on demo, illustrating how this data shows up in Catchpoint – focusing on a pair of protocol tests we’ll be running against our email service.


What the Months Ahead Look Like for Insurance

Insurers, reinsurers and intermediaries are under pressure to adapt to new customer expectations. Insurtechs have made omnichannel digital experiences the norm. And COVID-19 has forced the issue further, on top of necessary operational and claims process changes. Digital transformation is no longer a buzzword or something that can fix just one area of an insurance organization.


AI Expert Joanna Bryson Dishes on Due Diligence and Rooting Out AI Bias, Part 2

How was that credit application declined? Why was that person denied parole? How were disability benefits cut for those constituents? And why do computers learning from humans automatically see certain occupational words as masculine and others as feminine? It’s hard to explain how the most advanced algorithms make decisions. But as predictive systems proliferate, there are signs we’ve become more wary of their use in making critical decisions.


Microsoft Skype End User Experience

When Skype was first released in 2003, it quickly became one of the world’s most well-known Voice over Internet Protocol (VoIP) and video chat tools. The original free program is still available today and is designed for individual use and small teams of less than 20 employees. When Microsoft purchased Skype in 2012, it aimed to transform the offering into a complete business communications platform.


Finance: Why Getting Answers From Engineering About Your AWS Bill Is So Difficult

It’s no secret that AWS bills are confusing. But it’s particularly difficult for the team who actually writes the check to Amazon for hundreds of thousands or millions of dollars — yet has never personally seen what the inside of the AWS portal looks like (and probably never will).


2021 Secure Consumer Cyber Report: Protecting the Everywhere Workplace

The 2021 Secure Consumer Cyber Report provides one of the industry’s most comprehensive studies about the shift in consumer behavior as a result of increased work-from-home initiatives. With the influx of unsecured personal devices and high-risk employee behavior, what does the threat landscape look like today? The newly released report found that, with the dramatic increase in remote work due to the pandemic, the threat to enterprise data is higher than ever.


How to Monitor Network and Zoom Performance & Fix "Your Internet Connection is Unstable" on Zoom

Laggy video, packet loss, and jitter make it difficult to have a clear and coherent conversion over Zoom - which is why it’s important to identify these issues before your next call. In this article, we’re teaching you how to monitor network performance and Zoom performance to help you have the clearest Zoom experience, and avoid the “Your Internet Connection is Unstable” message of doom.


How to Identify the Zoom Data Center Location on AWS Infrastructure

Zoom leverage AWS’s global infrastructure, storage, content distribution, and security to deliver its service and store information securely in AWS data centers around the world. This means that when you’re looking to monitor your Zoom performance, it’s important to know how to identify which AWS data center location your Zoom application is using. Keep reading to find out how.


Why you should use Central Error Logging Services

Logs are vital for every application that runs in a server environment. Logs provide essential information which points to whether the current system is operating properly. Looking through logs, you will gather data on system issues, errors, and trends. However, it is not feasible to manually look up errors on various servers across thousands of log files. The solution? Central errors logging services.


5 Principles of Enterprise Low-Code Application Development

In 2020, low-code application development went mainstream. Organizations everywhere prioritized the ability to rapidly adapt, making the Low-Code Application Platform (LCAP) an essential part of the enterprise technology stack. Low-code may be everywhere—but many IT and development teams are failing to reach its full potential. Ironically, they’re running low-code projects with traditional, high-code development practices.


The Future of InfluxDB OSS: More Open, Permissive with Complementary Closed Source

I was recently on the Changelog Podcast talking about Elastic’s recent change away from open source licensing. I’m at 1:02:45 to 1:24:03, but the whole thing is pretty interesting if you have time to listen. This is where #InfluxDB is headed. No more open core, we're going to a combination of cloud offering, or if on-premise, a complementary offering to the open source. It'll take us time to get there, but that's the vision. Commercial complements the open source rather than replace.


Cloud Data Retention & Analysis: Unlocking the Power of Your Data

Enterprise data growth is accelerating rapidly in 2021, challenging organizations to adopt cloud data retention strategies that maximize the value of data and fulfill compliance needs while minimizing costs. To meet this challenge, organizations are adopting or refining their cloud data retention strategies. In this blog post, we’ll take a closer look at the state of data retention and analytics in the cloud.


Sample applications for Cloudera Operational Database

Cloudera Operational Database is an operational database-as-a-service that brings ease of use and flexibility to Apache HBase. Cloudera Operational Database enables developers to quickly build future-proof applications that are architected to handle data evolution. In the previous blog posts, we looked at application development concepts and how Cloudera Operational Database (COD) interacts with other CDP services.

What Functional Tests Overlook, See It with Visual Testing

Organizations strive to deliver the best possible digital experience to their customers. One way to ensure this is by testing their applications, and many organizations perform functional testing to verify that the application behavior is working correctly. However, there are areas that functional testing cannot cover. This is where visual testing comes in.

Troubleshooting services on Google Kubernetes Engine by example

Applications fail. Containers crash. It’s a fact of life that SRE and DevOps teams know all too well. To help navigate life’s hiccups, we’ve previously shared how to debug applications running on Google Kubernetes Engine (GKE). We’ve also updated the GKE dashboard with new easier-to-use troubleshooting flows. Today, we go one step further and show you how you can use these flows to quickly find and resolve issues in your applications and infrastructure.


With SRE, failing to plan is planning to fail

People sometimes think that implementing Site Reliability Engineering (or DevOps for that matter) will magically make everything better. Just sprinkle a little bit of SRE fairy dust on your organization and your services will be more reliable, more profitable, and your IT, product and engineering teams will be happy. It’s easy to see why people think this way. Some of the world’s most reliable and scalable services run with the help of an SRE team, Google being the prime example.


Monitoring Node.js Application With AppOptics on DigitalOcean - Better Together

Many teams take advantage of the convenience of deploying their apps to the platform as a service (PaaS) providers such as DigitalOcean. Cloud solutions like this are an easy way for teams to deploy and scale their applications without worrying about the details. However, even in these managed environments, poorly written apps can cause issues. If your pages load too slowly, users will likely leave your site and look for another.


Will Azure Blob Storage Rule the Unstructured Data Storage Space?

2020 was indeed challenging for Kovai.co still had great learning! One of them is what I am sharing with the community through this blog. For enterprises like us, worldwide work from anywhere became the new reality. We had to move towards a cloud-native world where secure data storage and effective remote management of IT infrastructure were of supreme importance.


Product Updates: Creating a New Runbook Just Got Easier with Templates

Starting out with runbooks can be daunting, we've built a way to implement our best practices into a runbook that can be implemented in a single click. On top of this, there's now even more ways to attach runbooks to your incidents and a much easier way to test out the runbook that you're currently working on.


The Key Metrics That Fintech Product Managers Can't Live Without

If each product is a world in its own, each industry in which that product -or service, for that matter- is deployed, is a universe. A seemingly chaotic universe full of data coming from every direction and angle that you, the product manager, need to catch, analyze, and funnel into your every day. If this does not sound easy, it is because it is not!


The Best Software Deployment Tools For 2021

Software deployment tools allow developers to ensure that software is properly installed with it’s required packages and implementation steps conducted in the correct order. Using these tools is a vital requirement for any business that creates its own software in-house. There is a variety of software that can assist developers in launching their latest code with new ones (such as GitHub Actions) arriving to the forefront of many growing consideration lists.


10 Ways to Protect Your Mission-Critical Database

As Werner Vogels says: “Everything fails all the time.” Data is the new oil. We rely on it not only to make decisions but to operate as a business in general. Data loss can lead to significant financial consequences and damaged reputation. In this article, you can find ten actionable methods to protect your most valuable resources.


Picking up the pieces of your monolith breakdown

A decade ago, all developers could talk about was breaking down the monolith and event-driven architectures. Especially in the financial services industry, to become more nimble and accelerate their application delivery. They leveraged messaging systems to decouple the application, and specifically Apache Kafka has transitioned from being a data integration technology to the leading messaging system for microservices.

[Webinar] How QA Orchestration Improves Your Mobile Testing Productivity

“Test Orchestration” is the key strategy of companies in today’s competitive marketplace. However, it may become a time-consuming and effort-intensive process if not done right. Hence, there’s a need for better strategies.  Watch the recording of this Katalon x Kobiton webinar and explore how to boost up your team productivity with the industrial experts! In this webinar, our experts will walk you through:

C++ Microservices in Docker

Microservices have become a popular way to architect applications, particularly those that compose functionality from a variety of loosely coupled systems and services. While there are a variety of frameworks and tools for implementing a microservice architecture, it isn’t always clear how to expose native code like C or C++ code within a wider microservice system. That’s where HydraExpress comes in.


How Mixed Reality Transform Retail Store Experience?

Digital transformation is driving industries to evolve to new dimensions. Mixed reality is one of the key components in the digital reality trends that business sectors a rapidly capitalizing into. It is reshaping almost every conventional way that retailers do business. Many industrial trajectories are responding immediately to give more experiential customer experience with reality technologies such as Augmented Reality, Virtual Reality and Mixed Reality.


How DevOps Practices Strengthen Security & Compliance?

Companies worldwide these days make use of DevOps with a view to attain better profit and progress. Despite its increased use, DevOps can lead to higher risks if not properly handled. There should be an integration of security and development process form the beginning in order to have a risk-free progress. The entire organization will be at risk if proper security check is not practiced in each stage, as cyberattacks are increasing each day.


Guidelines to help you avoid losing your domain

Imagine you're sitting in your office, and you start noticing emails coming in asking if you'd like to buy your domain. "Huh, that's weird, I already own that domain" you think to yourself. A few more emails come in, and they're getting past the spam filter, so you decide to double check your domain manager. Doubt starts creeping into your mind, you start panicking, and you frantically scroll down to where the domain should be, and... It's gone.


Migrating between WordPress hosts without downtime

Sometimes you'll want to migrate WordPress hosts - maybe it's time for renewal, and you found a better deal elsewhere, or your hosting provider isn't as reliable as they promised. Which is great for you, but your site's readers don't care that it's a better deal - they just want to see your content. So minimising downtime when transferring hosts is a pretty big deal. Let's learn how to avoid downtime.


OpenTelemetry automatic instrumentation: a deep dive

OpenTelemetry can be an overwhelming project to take in - understanding the interactions between the API, SDK, and various tools and protocols is a lot. One particularly interesting and important part of the project, though, is the "automatic instrumentation" components. What is automatic instrumentation, and why is it important to OpenTelemetry? How can you use it? How does it help? We’ll answer these questions, and more, so read on!


What's new? Winter Release 2021

Winter is clearly over here, the sun is shining, which means it is time to sum up everything that is new in the Tideways Winter 2021 release. Aside from this blog post explaining the new features in detail and the documentation, we also invite you to our 30 minute webinar "New Features and Improvements launched in Winter 2021" scheduled for 4th March 2021, 15:00 Europe/Berlin. The webinar will also include an exclusive intro to two brand new features that are launching into Beta next week.

little warden

Improved Content Monitoring!

Two new features in TWO DAYS.. what is this new year NEW ME? When we launched custom content extraction in 2017, I was always a bit annoyed by the ‘pain in the arse’ it was to use, sure it was an excellent feature but we made the user load up a tab and copy the xPath manually. Since that launch we’ve had ‘make content extraction less shi of a pain to do’ but as things tend to do, other features and improvements got in the way. BUT NOT TODAY… BOOM!


Why Your Local Workstation Can't Mimic the Cloud

If there is one thing developers love, it’s control. This makes sense—if you build something as complex as a software system, you need to understand what’s happening at every level. But absolute control can be a liability when it becomes the main goal of the development process. Many developers go to great lengths to get the same system replicated locally that they run on a remote server with the hope of catching every error before it’s deployed. This is a pipedream.


5 key features of any modern embedded analytics platform

Start-ups founded on analytics have been shaking up every industry. Finance has been disrupted by Monzo's data focus, Netflix’s analytics has upended film entertainment, and Swyfft has used data to change the game for US home insurance. Today's users have come to expect analytics in their applications.


DataOps and automation at the heart of the banking revolution

According to the European Banking Authority report on Advanced Analytics and Big Data in banking, the implementation of data technologies, infrastructure, and practices is still at “an early stage”. The game is on for early contenders in this winner-takes-most market. Banks that move quickly are likely to get ahead of the curve, grabbing more of the market pie before others rise to the challenge.


What is MEC ? The telco edge.

MEC, as ETSI defines it, stands for Multi-access Edge Computing and is sometimes referred to as Mobile edge computing. MEC is a solution that gives content providers and software developers cloud-computing capabilities which are close to the end users. This micro cloud deployed in the edge of mobile operators’ networks has ultra low latency and high bandwidth which enables new types of applications and business use cases.


DFI and Canonical offer risk-free system updates and reduced software lead times for the IoT ecosystem

Feb. 25, 2021 – DFI and Canonical signed the Ubuntu IoT Hardware Certification Partner Program. DFI is the world’s first industrial computer manufacturer to join the program aimed at offering Ubuntu-certified IoT hardware ready for the over-the-air software update. The online update mechanism of and the authorized DFI online application store combines with DFI’s products’ application flexibility, to reduce software and hardware development time to deploy new services.


Auditing your network, without credentials.

Now that I have your attention, how can we possibly audit a network and find all the juicy details about the devices upon it, without having high level credentials to talk to those devices? Well, it’s a bit of a mistruth. Or a caveat. Or whatever you want to call it. We definitely can do this, but for devices such as routers, printers and switches you will need a minimal set (read only, minimum access level) of SNMP credentials.


AIOps for Managed Service Providers: modernize and monetize your monitoring offering

Legacy monitoring tools weren’t built for visibility into the cloud and can obstruct your ability to compete and grow your business. Interlink Software works with MSPs to define, monetize and deliver AIOps monitoring solutions that meet the requirement for high-performing business services and hybrid cloud infrastructures that digital enterprises rely on.


Concept Drift Deep Dive: How to Build a Drift-Aware ML System

There is nothing permanent except change. In a world of turbulent, unpredictable change, we humans are always learning to cope with the unexpected. Hopefully, your machine learning business applications do this every moment, by adapting to fresh data. In a previous post, we discussed the impact of COVID-19 on the data science industry.

How to monitor your API in just 2 simple steps?

In this video, you’re going to learn exactly how to monitor your API in just 2 simple steps! To be clear: Monitoring an API is a lot of hassle. But with this video tutorial, you’ll know how you can monitor your API in just 2 simple steps while saving a lot of time. Think of Components like folders that contain other Fyipe resources and one of the resources it has is called "Monitors". An API monitor will basically test your API to gain visibility into performance, availability, and functional correctness.

Guest Blog: Airbrake & LogicMonitor = Awesome News

“On Tuesday, we announced some big news: LogicMonitor has acquired Airbrake — a developer-centric application error and performance monitoring platform. This acquisition represents the latest step in our company’s journey towards becoming an end-to-end infrastructure monitoring and observability platform. As part of the acquisition, I am thrilled to welcome the Airbrake team into the fold!


Ruby and Python clients for Elastic Enterprise Search now generally available

Back in our 7.10 release of the Elastic Stack, we announced the beta of our Ruby and Python clients for Elastic Enterprise Search. Now, with 7.11, both the Ruby and Python clients are generally available. We’ve also begun work on a PHP client. All client source code for both enterprise-search-ruby and enterprise-search-python is available on GitHub. Documentation on how to get started with each client is available on elastic.co.


Troubleshoot problems using GitLab activity data with the new plugin for Grafana

GitLab is one of the most popular web-based DevOps life-cycle tools in the world, used by millions as a Git-repository manager and for issue tracking, continuous integration, and deployment purposes. Today, we’re pleased to announce the first beta release of the GitLab data source plugin, which is intended to help users find interesting insights from their GitLab activity data.


What Tools Does a DevOps Engineer Actually Use?

“DevOps” is a recently coined term that combines the realm of “development” with that of “operations.” So in theory, a DevOps engineer is someone who is proficient in both of these areas and understands how they interact with each other. In reality, however, most DevOps engineers work on the “operations” side of things on a day-to-day basis.


Getting Started With Kong's OpenID Connect Plugin

The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is not trustworthy until you establish otherwise. Within Kong Konnect, one mechanism to apply zero-trust is the OpenID Connect API gateway plugin. In this post and the below recording from our recent Destination: Zero-Trust virtual event, I’ll cover OpenID at a high level and some of its applications and use cases.


3 Ways IT Can Unblock Mergers & Acquisitions Problems in the Pandemic Era

Even when businesses are functioning as usual, mergers and acquisitions are intense and demanding transitions for companies to pull off. From the constant communication required in the preparation phase, to the technical demands of integrating two teams, a merger or acquisition forces companies to exhaust resources in order to make the transition a smooth success. Then the pandemic hit.


Want to be an Effective IT Leader? You Need to Care About Experience Management

What is more important – time saved or time well spent? How you think about this problem and how you’d go about measuring it is an important consideration for managers who aspire to be leaders in today’s digital workplace. In IT and beyond, focusing on experience over service is the difference between managing the status quo and leading a change that pushes an organization forward.


Change The Way You Do ML With Applied ML Prototypes

Today’s enterprise data science teams have one of the most challenging, yet most important roles to play in your business’s ML strategy. In our current landscape, businesses that have adopted a successful ML strategy are outperforming their competitors by over 9%. The implications of ML on the future of business are clear. However, only 4% of enterprise executives today report seeing success from their ML investment.


Only Autonomous Anomaly Detection Scales

Say you’re looking for a smart product to detect anomalies in your organization’s IT environment. A sales rep drops by and shows you all kinds of great artificial intelligence (AI) features with fancy-sounding algorithms. It sounds very impressive and seems like there is a lot of very valuable AI in the product. But, in fact, the opposite is true. This is a manual AI product wrapped in a deceiving jacket. Let me tell you more.

power admin

The Top 5 Benefits of Temperature Server Monitoring Solutions

Your servers generate heat—this is a fact common with any type of electronic device. The amount of heat they generate will vary, depending on where they are located and the number of servers in use. For example, a small business may have only one or two servers that are stored in a small server room. On the other hand, a large corporation could have hundreds of servers in a massive data center.


How to make remote meetings work during lockdown

Many people think because we’re an online business, with technology at the heart of everything we do, we’d be better placed than many to make the transition from in-person meetings to virtual meetings during the pandemic. Whilst we have made that leap and made it work well, it’s not because we’re au fait with tech and the latest tools, it’s quite the opposite.

Coralogix - On-Demand Webinar: Drive DevOps with Machine Learning

DevOps has become the de facto method of developing and maintaining software, but it comes with its own challenges. Keeping track of change in a complex, fluid environment is a serious hurdle to overcome. In this webinar, we explained how machine learning can be employed within a DevOps team to improve operational performance, optimize mean time to recovery and create a better service for your customers.

Accelerate your Looker dashboards with BigQuery BI Engine

At Looker we’re constantly working to help you leverage the power of your database for greater performance, efficiency, and functionality. That’s why we’re so excited to have worked with the BigQuery team on the launch of Google’s new preview of BigQuery BI Engine — an in-memory analysis service that makes Looker running on BigQuery faster than ever.


Microservices Asynchronous Communication and Messaging | JFrog Xray

Microservices have changed the way we build applications. Software design has moved from large monolithic applications (which are not really adaptable to changes and improvements) to a collection of small, independent processes infrastructure which is far more suited to adapt to changes in today’s agile world.


Manual Monitors: Everything you need to know

In this post, I will explain what are manual monitors? Manual monitors are monitors that do not actively monitor any resources. You can use them if you are using an external monitoring tool and can ping Fyipe API to create incidents. They can also be helpful to create manual incidents for your customers and show them on status page. Manual monitors can be created in just 2 simple steps.


Frequently Asked Questions | Vol 2

In an industry where technological evolution is commonplace, it’s easy to get lost in a sea of terminology and acronyms. It’s important to establish a solid foundation of understanding. In the second installment of our ‘Frequently Asked Questions’ series, we tackle issues related to effective monitoring, speed, and performance related to Microsoft 365 services.


Is Your Cloud Cost Report Missing Critical Information?

Worldwide end-user spending on public cloud services is forecast to grow 18.4% in 2021, with the cloud projected to make up 14.2% of the total global enterprise IT spending market in 2024, up from 9.1% in 2020, according to Gartner. Enterprises are, therefore, rightly concerned about controlling their public cloud costs—to ensure they’re getting all the value they’re paying for.


6 Ways Retailers Can Maximise Value With Creative Engineers

“Engineering” and “creativity” aren’t often considered synonymous. However, in today’s world, where the online experience is at the forefront of virtually all business transactions and experiences, the creative engineer is finally getting the recognition they deserve. These individuals are quite literally building the virtual world we live in.


Key benefits of advanced HTML5 that accelerate performance and simplify secure remote desktop access

What does it mean to securely access remote desktops from any device and from anywhere? 2020 was a game changer for the future of business operations and how, when and where people work. To enable secure remote access across an enterprise means making the Everywhere Workplace possible. Here’s how.

What are Manual Monitors?

In this video, I'll explain what are Manual Monitors? You’re also going to learn exactly how to create a Manual Monitor in just 2 simple steps while saving a lot of time. Think of Components like folders that contain other Fyipe resources and one of the resources it has is called "Monitors". Manual Monitors are monitors that do not actively monitor any resources. You can use them if you are using an external monitoring tool and can ping Fyipe API to create incidents.

Introduction to the ImGui C++ Library with Conan

The Conan team provides an introduction and demonstration for the open-source C++ graphics library known as ImGui. To show the basics of ImGui, we will create a simple application with some controls like buttons, scrollbars, color editors, and more. We will show how easily and quickly you can create a graphical user interface using this library. Finally, we will show how to a simple way to build ImGui using packages with Conan, the package manager for C and C++.

Be Proactive! Never be Surprised by End User Issues on Citrix or VMware Horizon

Learn how with Goliath you can automatically test availability from multiple locations, monitor logon performance and failures with a centralized dashboard, and quickly troubleshoot, resolve, and document initial stages of the logon process.

Sweetening Your Honey

Are you looking for a better way to troubleshoot, debug, and really see and understand what weird behavior is happening in production? Service-level objectives (SLOs) and observability can help you do all that—but they require collecting and storing the right data. If we’re naive with our telemetry strategy, we spend a lot of money on storing data without seeing adequate return on investment in the form of insights.


What Is Metasploit?

In this quick guide for cybersecurity professionals, we’ve invited some of our favourite security experts who have previously worked with Metasploit to explain why this tool is so valuable for conducting effective penetration tests and network reconnaissance tasks. Our first expert Michael Roninson, Security Expert at Cerber Tech gives a brief overview of this tool and how to use it in his response below;


Build a Solid Foundation for the Cloud's Shifting Sands

Becoming cloud-native promises speed, flexibility, better products, and lower costs. But here’s the rub: for many companies, the reality isn’t nearly so rosy. Most digital transformation projects aimed at making companies more cloud-native actually drive up costs. Why? Well, there are many reasons; if you’re interested in root-cause analysis, Cloud FinOps by J. R. Storment is an excellent read.

squared up

How to embed Grafana visualization in SquaredUp

In our previous post on Grafana and SquaredUp, we compared the two tools across various benchmarks like ease of deployment, time to value, dashboard creation, dashboard sharing, and more. Both tools have their specific advantages over the other, but since the ultimate goal is to give you a single place to look – why not leverage Grafana for the visualizations and data sources it offers, but give them meaning by embedding them in SquaredUp?


What Is a Data Stack?

These days, there are two kinds of businesses: data-driven organizations; and companies that are about to go bust. And often, the only difference is the data stack. Data quality is an existential issue—to survive, you need a fast, reliable flow of information. The data stack is the entire collection of technologies that make this possible. Let's take a look at how any company can assemble a data stack that's ready for the future.


New in BigQuery BI Engine: faster insights across popular BI tools

Business analysts working with larger and larger data sets are finding traditional BI methods can't keep up with their need for speed. BigQuery BI Engine is designed to meet this need by accelerating the most popular dashboards and reports that connect to BigQuery. With the freshest data available, your analysts can identify trends faster, reduce risk, match the pace of customer demand, even improve operational efficiency in an ever-changing business climate.


Introducing, Dashbird's serverless Well-Architected Insights

Dashbird now scans your serverless infrastructure for industry best practices. It’s the antidote for chaos. We’re excited to introduce the Dashbird Well-Architected Insights – a continuous insights scanner combined with Well-Architected reports. The new feature provides serverless developers with insights and recommendations to continually improve their applications and keep them secure, compliant, optimized, and efficient.


Why Gartner says augmented analytics is the new BI battleground

Another year, another Gartner Magic Quadrant for Analytics and BI tools. The leaders quadrant is again dominated by a few legacy platforms, focused as always on “nifty visualizations” and clean dashboards. But this year, the scoring took a novel turn. That’s the takeaway by Alex Woodie, Managing Editor at Datanami.


The Complete Guide to Java String Replace

One of the most commonly used functionalities for String objects in Java is String replace. With replace(), you can replace an occurrence of a Character or String literal with another Character or String literal. You might use the String.replace() method in situations like: In Java, keep in mind that String objects are immutable, which means the object cannot be changed once it’s created.


Streamline project management with advanced analytics for Jira Software

Managing projects isn’t an easy task, particularly if you’re managing parallel projects with inter-team dependencies. Lack of visibility coupled with difficulty in obtaining the right metrics on time can make it nearly impossible for project teams to track issues, action items, and risks, often resulting in projects running behind schedule, overshooting budgets, or worse, getting stalled due to unforeseen problems.


Announcing Support for GKE Autopilot

Google Kubernetes Engine (GKE) is the preferred way to run Kubernetes on Google Cloud as it removes the operational overhead of managing the control plane. Earlier today, Google Cloud announced the general availability of GKE Autopilot, which manages your cluster’s entire infrastructure—both the control plane and worker nodes—so that you can spend more time building your applications.


Observability is transforming ITOM landscape as next generation monitoring

First things first. Observability is inherent as a principle to a system and not something that is instilled. Here, we are addressing observability as an open source based solution in the context of insightful monitoring within the ITOM landscape. ITOM is now in the middle of addressing the needs of the expanding and dynamic nature of IT infrastructure as a function. It is no longer about being a monolithic computing stack. It is now beyond monitoring discrete infrastructure elements.


What is Application Performance Monitoring (APM)?

Application performance monitoring (APM) solutions can help your business enhance its IT and grow its operations. To understand why, let’s answer some of the key questions surrounding APM. APM involves the use of technologies and tools to maintain consistent application availability, performance, and response times. So, your business can use APM solutions to monitor apps across its operations.


A Playbook to Properly Implement Pay As You Go Pricing

Usage-based pricing, consumption-based pricing, and PAYG (Pay As You Go) are relatively new SaaS pricing models that enable you to drive both top of line growth while also increasing net revenue retention over more traditional subscription pricing models such as license or seat-based pricing. With Pay As You Go, a customer only needs to pay for what they consume such as hours of a VM or number of messages sent.


Sysdig contributes Falco's kernel module, eBPF probe, and libraries to the CNCF

Today, I’m excited to announce the contribution of the sysdig kernel module, eBPF probe, and libraries to the Cloud Native Computing Foundation. The source code of these components will move into the Falco organization and be hosted in the falcosecurity github repository. These components are at the base of Falco, the CNCF tool for runtime security and de facto standard for threat detection in the cloud.


5 ways the best mobile teams use release trains for increased speed and efficiency

Releasing with speed and confidence is every mobile team’s dream. To help you on that journey, mobile release trains can introduce a quicker release model and faster mobile cycles — making distributed development teams, that work on different parts of an application, become more aligned — regardless of their size.


Kubernetes Cluster Automated Upgrade in Jelastic PaaS

Flexibility, accelerated development and delivery, improved scalability and high availability are the main reasons companies are adopting Kubernetes (K8s) technology. But managing and keeping the system up to date can be so complex for organizations that they need to hire a separate department just to handle everything properly. With Jelastic’s Kubernetes automation you can improve DevOps productivity and focus on your business aims rather than fighting infrastructure complexity.


Monitoring DigitalOcean Billing with InfluxDB

I’ve always had a good experience using DigitalOcean, a cloud infrastructure provider which offers developers cloud services that help deploy and scale applications that run simultaneously on multiple computers. I’ve used DigitalOcean a lot for my personal projects — for example, to host my personal blog, its stats, and a NextCloud instance, all running in Kubernetes.


Why Monitoring Should be a Part of Your DevOps Strategy

DevOps came about as a result of ever-growing lags between development and operation. It’s a framework that deals with communication bottlenecks, allowing for smooth change management. DevOps monitoring is a crucial element and a necessity for this framework to succeed. Monitoring plays a vital role in realizing the underlying goals of DevOps. DevOps is all about eliminating technical inefficiencies and improving the speed of the whole cycle from development to deployment.


Becoming the Most Loved Baby Products Brand Globally With Qlik

I’ve been a Business Intelligence (BI) analyst and evangelist for over two decades now. As you can imagine I’ve worked with many different BI platforms throughout my career, especially during my time as a BI Consultant. In this role, I was product agnostic, so from Power BI to Tableau, you name it, I used it! However, Qlik Sense quickly stood out to me as the most powerful and intuitive platform on the market.


You're Not the Only One With Data Problems

I’ve met with lots of customers and prospects throughout my career. And, I’ve noticed that, when I’ve asked them to describe their current software situation, many would say the same things. “We should have updated this a long time ago.” “It’s embarrassing how long it takes to do a simple task.” “I bet other companies stopped doing things like this years ago.”


Enhance your secrets management strategy with Puppet + HashiCorp Vault

Security is paramount in today's digital world. Bad actors can use sensitive data to wreak havoc across thousands of machines in minutes if organizations do not have a solid cybersecurity strategy. Compliance requirements and regulations are increasingly calling for key management and strong encryption as part of a business's cybersecurity strategy. These are no longer optional but mandatory security requirements as DevOps also gains in popularity for agile development and application deployment.

Tanzu Tuesdays - Modern Application Configuration in Tanzu with Craig Walls

Historically, application configuration has been managed internal to an application deployment, in environment variables, or in files placed in the filesystem of the running application. As applications evolved into microservices, however, that approach become inadequate. Centralized configuration, including application-specific and shared configuration, versioning and rollback capabilities, and auditing became necessary. As more applications and microservices are becoming containerized and deployed in Kubernetes, configuration continues to be challenging. While Kubernetes offers configuration via ConfigMaps and Secrets, there’s no clear way to manage the properties going into those resources. In this Tanzu Tuesday session, we’ll explore the Tanzu Configuration Service, a means of managing configuration in a Kubernetes-native way using ConfigMaps, but that also offers the benefits afforded in a centralized configuration option.

Jaeger Persistent Storage With Elasticsearch, Cassandra & Kafka

Running systems in production involves requirements for high availability, resilience and recovery from failure. When running cloud native applications this becomes even more critical, as the base assumption in such environments is that compute nodes will suffer outages, Kubernetes nodes will go down and microservices instances are likely to fail, yet the service is expected to remain up and running.


Kaptain Is Aboard: v. 1.0 Is GA!

AI and Machine Learning (ML) are key priorities for enterprises, with a recent survey showing that 72% of CIOs expect to be heavy or moderate users of the technology. Unfortunately, other research has found that the vast majority—87%—of AI projects never make it into production. And even those that do often take 90 days or more to get there. Why this disconnect between intent and outcome? What are the roadblocks to enterprise ML? And what can be done about them?


APM Integrated Experience

We’ve been listening to our customers. Whether you’re a SolarWinds® Loggly®, SolarWinds AppOptics™, or SolarWinds Pingdom® user, we’ve been working hard to make your life easier. We’re happy to announce a brand-new experience designed to bring together real user monitoring, synthetic transactions, metrics, traces, and logs in a single platform, making it faster and easier to identify, triage, and troubleshoot application issues.


Can enterprises move fast without breaking IT?

In one of our recent webinars we discussed a challenge in digital transformation that is top of mind for many IT Ops leaders: how to actually transform with the least amount of pain… No matter how tired people are of the term “digital transformation”, it still represents an imperative strategy for enterprises wishing to survive in today’s dynamic business environment, let alone see growth and increased market value.


You should know about... transformations in Grafana

Transformations were introduced in Grafana v7.0, and I’d like to remind you that you can use them to do some really nifty things with your data. All performed right in the browser! Transformations process the result set of a query before it’s passed on for visualization. They allow you to join separate time series together, do maths across queries, and more. My number one use case is usually doing maths across multiple data sources.


Five Trends for the Financial Services Industry to Track in 2021

With a new year ahead, it’s time for financial services to pause, take stock of the “new normal,” and plan a path forward. COVID-19 forced nearly every industry to adapt to a new reality, and the financial services industry was no exception. Consumer habits shifted drastically. Suddenly, many people started working from home. Employee and customer needs changed. Adaptability was a necessity.


Defense Department Cybersecurity: All Ahead on Zero Trust

With the Defense Department’s quick and successful pivot to a remote workforce last Spring via its Commercial Virtual Remote (CVR) environment, it proved that the future to fully operate from anywhere in the world is now. Gone are the days of thousands of civilian employees heading into the Pentagon or other installations everyday. However, with this new disparate workforce comes increased risks for network security. As my colleague Bill Wright expertly noted last Summer.


Get more insights into your organization's mobile device posture information by using the Cortex XSOAR Pack for MobileIron (acquired by Ivanti) Core and Cloud

More than 52% of organizations now offer their employees, contractors and frontline workers the ability to work securely from any endpoint of their choice. This modern workplace includes diverse endpoints such as iOS, macOS, Android, Windows 10 devices, as well as other immersive and rugged devices such as HoloLens, Oculus, Zebra and more - and IT teams need a scalable solution to secure and manage them.


Human in the Loop (HITL) and the Move to AIOps

Implementing DevOps practices for application development has generated an incredible acceleration in code velocity and reliability, and that is just on the Dev side. As the infrastructure that runs applications is increasingly treated as code, similar benefits are being seen in the operations (Ops) side that deploy and run those applications.

SolarWinds Web Performance Monitor - Product Walk-Through

Web application availability is crucial for your organization. Whether your applications are accessed inside or outside the firewall, your business depends on them being up, available, and performing optimally. Watch this short video and learn how WPM allows you to constantly monitor availability and response time from one location or locations around the globe. Find problems before your users do. WPM is the easiest to use, most affordable application in this space.

APIOps: End-to-End Automation Throughout the API Lifecycle

It is a truth universally acknowledged that the culture change side of any technology transformation program is the hardest and slowest part to get right. If you cannot efficiently operationalize a technology investment, that investment is wasted. This is no different in the world of APIs and microservices, where every service is designed to support a change to a digital-first culture. APIOps makes this change possible.


Out of the box GRC Processes - How two companies prospered

At first glance, AltaGas Ltd. and Align Technology don’t have much in common. AltaGas Ltd. is a North American energy infrastructure business with a focus on owning and operating assets to provide clean and affordable energy to its customers. Align Technology is a leading manufacturer of 3D digital scanners and clear aligners used in orthodontics. However, the two companies share similar stories when it comes to the technology they use to manage governance, risk, and compliance (GRC) issues.


How to use a machine learning model from a Google Sheet using BigQuery ML

Spreadsheets are everywhere! They are one of the most useful productivity tools available. They make organizing, calculating, and presenting data a breeze. Google Sheets is the spreadsheet application included in Google Workspace, which has over 2 billion users. Machine learning, or ML for short, has also become an essential business tool. Making predictions with data at low cost and high accuracy has transformed industries.


What Is Ticketing Software?

When something goes wrong with a user’s device, who do they turn to for help? Maybe an employee walks up to their favorite IT team member’s desk or sends them a Slack message. They may even try to find a DIY solution by browsing the web. Though these methods may ultimately give the user the result they’re looking for, they aren’t necessarily the most effective way to handle technology issues.


Product Update: Netreo On-prem Version 12.2.26 and Netreo SaaS Upgrade

With the recent release of Netreo On-prem v12.2.26, your premiere solution for full-stack IT management and AIOps is even better! Your latest release includes powerful new features and enhancements that simplify IT management with a single source of truth about the status of your entire infrastructure.


Introducing Component Previewer

The component previewer is a feature that allows you to preview your data at each component step without having to validate packages and run full-scale production jobs. It gives you the ability to extract, transform and preview your data on any transformation component, allowing you to debug your pipeline and/or to confirm and validate your data flow logic. Component previews are similar to the data previews available on source components, which you might already be familiar with.


The OpsRamp Monitor: February

Don’t stop thinking about tomorrow: For enterprise IT leaders everywhere, it’s no longer enough to lead well today and have teeth in the business. You must now be prepared for all manner and scope of uncertainty and change, and according to Accenture, very few organizations are there yet. In a recent report, the consultancy reports that only 7% of organizations are “future-ready”.

How to get your first green build on CircleCI

In this video we'll help you set up your first CircleCI build, run your first CircleCI build, break that build, use workflows to build our configuration file, and then advance workflows by fanning in and fanning out. We’ll then be adding some changes to use workspaces. And finally, we will conclude this learning activity by SSH’ing into your build.

Is my CI pipeline vulnerable?

Your continuous integration (CI) pipelines are at the core of the change management process for your applications. When set up correctly, the CI pipeline can automate many manual tasks to ensure that your application and the environments it runs in are consistent and repeatable. This pipeline can be an integral part of your security strategy if you use it to scan applications, containers, and infrastructure configuration for vulnerabilities.


The path to production: how and where to segregate test environments

Bringing a new tool into an organization is no small task. Adopting a CI/CD tool, or any other tool should follow a period of research, analysis and alignment within your organization. In my last post, I explained how the precursor to any successful tool adoption is about people: alignment on purpose, getting some “before” metrics to support your assessment, and setting expectations appropriately.


Using the CircleCI API to build a deployment summary dashboard

The CircleCI API provides a gateway for developers to retrieve detailed information about their pipelines, projects, and workflows, including which users are triggering the pipelines. This gives developers great control over their CI/CD process by supplying endpoints that can be called to fetch information and trigger processes remotely from the user’s applications or automation systems.


Four ways Sisu's new experience accelerates data exploration

This week, we officially launched a new Sisu analytics experience that accelerates data exploration for analysts and product leaders alike (read the full announcement here). It’s the result of over six months of user research, prototyping, and close collaboration with our customers, we’re excited to share this new interface to data.


NiCE VMware Management Pack 5.3

Virtualization is part of many IT environments and a very effective way to reduce expenses while boosting efficiency and flexibility. The NiCE VMware Management Pack enables advanced health and performance monitoring for VMware to leverage your existing investment, reduce costs, save time, and build efficiencies that will help shape a future-proof business.


Use Datadog geomaps to visualize your app data by location

Being able to track and aggregate data by region is important when monitoring your application. It can provide visibility into where errors and latency might be occurring, where security threats might be originating, and more. Now, you can use Datadog geomaps to visualize data on a color-coded world map. This helps you understand geographic patterns at a glance, including where users are experiencing outages, app revenue by country, or if a surge in requests is coming from one particular location.


Four ways to send SCOM alerts to ServiceNow

If you work with Microsoft System Center Operations Manager (SCOM) and ServiceNow then you will be familiar with the fear of missing a critical infrastructure alert! But fear no more, we have just the ticket! Imagine if you could get these two tools working together, to fully synchronize your alerts and incidents for the lifetime of an issue – you’d be living the ITSM dream, right! So, here are our top four methods for making this dream a reality.


Low-code in the Insurance Industry: Facing the Challenge of Digital Transformation

The insurance industry is among those most impacted by the COVID-19 pandemic. Claims are likely to top €190 billion in 2021, according to reinsurer Lloyd’s of London. However, the pandemic did not fire the starting pistol in challenging insurers to transform, although it has amplified the issue. You can read more about the challenges specific to this sector in a recent interview with Gijsbert Cox, EMEA Insurance Industry Leader at Appian.


Single-Tenant Cloud vs Multi-Tenant Cloud

In this article, we shall talk about the advantages and disadvantages of single-tenant cloud and multi-tenant cloud. So let us get started! In the past decade adoption of cloud computing has been off the charts. For a long time most companies (primarily enterprises) managed their own IT infrastructure and they could reap the benefits of isolation, privacy and greater management control. This is what is known as a single tenant cloud architecture i.e.


How to Find Memory Leaks in Websites and Web Applications

Knowing how your users interact with your web application and how they experience it is crucial to provide the best possible experience. So what do you need to know? Start with metrics such as page load times, HTTP request times, and core Web Vitals – time to the first byte, first contentful paint. If you use Sematext Experience you’ll see a number of other useful metrics for your web applications and websites there. However, metrics themselves are only a part of the whole picture.


As security practitioners, we all have things we want to be able to tell our CISO’s. We need to tell them we need more money, more headcount, we need to be able to tell them their baby (security program) is ugly. Everyone wants the ear of a CISO for the dollars they control. We just want their ear to help them understand what’s really going on in the industry and in their organization.

It Came From The Clouds

Beware that which lives amongst the Clouds. Or, ya know, just attack them mercilessly. One of the best parts about having such talented security pros at Splunk, is they also make amazing products. And some are even free. Enter the Cloud Attack Range, a detection development platform written/maintained by Splunkers Jose Hernandez and Mike Haag and open-sourced to everyone. Joining us will be Co-Founder of Red Canary Keith McCammon. Red Canary integrates with Attack Cloud to help generate attack data. It’s a true community project and we’re going to chat about it.

I Wish Someone Had Squished That Phish

It’s long since been established that it’s not if a breach will occur in your enterprise, it’s when. Are you prepared for that response? As Dave Kennedy, CEO of TrustedSec once asked a Brrcon audience, “If all you had was Sysmon, could you still do a successful IR?” Best practices are only best if you actually practice them. Along with Robert Wagner, Staff Security Specialist at Splunk, we’ll talk about ways to get your teams to their fighting weight when the bad guys sneak in through the basement.

Introduction to Azure Service Bus | Serverless360

We are back with a discussion on Azure Service Bus, the most popular messaging service from Microsoft Azure. In this video, we throw light on the Queues and Topics, along with guidance on choosing the right service for your business scenario. Also, discover the significance of topic subscription rules using Serverless360.

Accelerating support to Microsoft Azure Serverless resources | Serverless360 #webinar

Discover how Serverless360 could efficiently complement the Azure portal in managing and Monitoring all your Azure resources under one roof. Also, our experts will provide solutions to mitigate the challenges in supporting your Azure applications. This video elaborates on how to achieve Proactive Monitoring, Holistic Application View & End-to-End tracking to accelerate support to Azure Serverless Services which eventually reduces the Total Cost of Ownership.

Creating a Data Strategy & Self-Service Data Platform in FinTech

In this episode of CDO Battlescars, Sandeep Uttamchandani, Unravel Data’s CDO, speaks with Keyur Desai, CDO of TD Ameritrade. They discuss battlescars in two areas: Building a Data Strategy and Pervasive Self-Service Analytics Platforms. Keyur is a data executive with over 30 years of experience managing and monetizing data and analytics.


Ebbs and Flows Of DevOps Debugging PART 2

This piece is the second part of a two-part series on how focusing on cloud debugging practices can accelerate our DevOps intentions. In part 1, we explored how an increased move to the cloud pushed for the adoption of DevOps practices. However, throughout the past decade or so, since we have been looking at DevOps with the advent of the cloud, we have hit a glass ceiling in our DevOps practices.


Overview of Incident Lifecycle in SRE

Incidents that disrupt services are unavoidable. But every breakdown is an opportunity to learn & improve. Our latest blog is a deep dive into best practices to follow across the lifecycle of an incident, helping teams build a sustainable and reliable product - the SRE way As the saying goes, “Every problem we face is a blessing in disguise”.


Tutorial: Using Kong Kubernetes Ingress Controller as an API Gateway

In this first section, I’ll provide a quick overview of the business case and the tools you can use to create a Kubernetes ingress API gateway. If you’re already familiar, you could skip ahead to the tutorial section. Digital transformation has led to a high velocity of data moving through APIs to applications and devices. Companies with legacy infrastructures are experiencing inconsistencies, failures and increased costs. And most importantly, dissatisfied customers.


SaaS vs Hosted Solutions: Which Should You Choose and Why?

A key decision that must be made in a product’s lifecycle is SaaS vs Hosted. Should we be only employing the use of hosted solutions, or are we going to utilize SaaS offerings? Hosted solutions are services from providers like AWS and Azure, that take away the operational burden from some well-known pieces of tech, like Kafka or Grafana. SaaS solutions on the other hand are platforms like Coralogix, that offer proprietary value. They each offer benefits and drawbacks. Let’s get into it.


Key Differences Between Observability and Monitoring - And Why You Need Both

Observability and Monitoring are viewed by many as interchangeable terms. This is not the case. While they are interlinked, they are not interchangeable. There are actually very clear and defined differences between them. Monitoring is asking your system questions about its current state. Usually these are performance related, and there are many open source monitoring tools available. Many of those available are also specialized.


InfluxDB C Client Library for Capturing Statistics

Currently, there is no official InfluxDB C language client library. Fortunately, I wanted to do exactly that for capturing Operating System performance statistics for AIX and Linux. This data capturing tool is called “njmon” and is open source on Sourceforge. So having worked out how and developing a small library of 12 functions for my use to make saving data simple, I thought I would share it. I hope it will prove useful for others.


11 Network Traffic Terms to Know

Every industry loves its terms and jargon. Stop me if you’ve heard this one before: “I’ve always said that one of my core competencies is getting the most bang for my buck out of the sweat equity I put in during my 9-to-5.” Sure, the sentence doesn’t really make any sense, but it sounds good enough when you say it. And that’s just the point jargon tends to make. The IT industry is no different.


What's new in Sysdig - February 2021

Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new features to all of our customers, automatically and for free! We hope you all managed to make it through January, and happy Lunar New Year! February welcomes the launch of our always-popular fourth annual Sysdig Container Security and Usage report, which looks at how global Sysdig customers of all sizes and industries are using and securing container environments.

vmware tanzu

VMware Spring Cloud Gateway for Kubernetes, the Distributed API Gateway Developers Love, Is Now GA

For all the talk of digital transformation, there’s one workflow that tends to hinder release velocity: changes to API routing rules. But while—much to the consternation of enterprise developers everywhere—this process has historically remained stubbornly ticket-based, Spring Cloud Gateway removes this bottleneck. The open source project provides a developer-friendly way to route, secure, and monitor API requests.


Applying the Roles and Profiles Method to Compliance Code

Most of you are familiar with the roles and profiles method of writing and classifying Puppet code. However, the roles and profiles method doesn’t have to exist only in your control repository. In fact, as I’ve been developing Puppet code centered around compliance, I’ve found that adapting the roles and profiles method into a design pattern to Puppet modules makes the code more auditable, reusable, and maintainable!

DataOps for Industrial IoT

The growth in IoT data collection and processing underscores the need for comprehensive data management strategies. The average enterprise today has deployed – and collects data from – nearly 4,000 IoT endpoints. And these organizations expect a 65% increase in the number of connected IoT endpoints over the next two years. Hear from 451 Research (part of S&P Global Market Intelligence) and Hitachi Vantara to assess the business impact of edge computing and IIoT on data management.

The State of EdTech 2021: Education Software Usage Analyzed

Today we will share our list of the most popular software tools used by education institutions. Why is this important? If you are managing technology in education you need to make the best choice from among many available tools. Discovering the most popular tools used by other education professionals can help you make an informed choice. After reading the report you’ll know which tools are relied upon by primary and secondary schools, colleges, and universities in the United States.


LogicMonitor Welcomes Airbrake

“Today’s an exciting day for LogicMonitor. But before I share our news, I want to sincerely thank our customers for your business. The Covid-19 pandemic has been a terrible experience for the world, and yet we @ LogicMonitor are fortunate and thankful to be counted on every day by thousands of organizations. I — and our team of over 650 employees worldwide — are grateful for the chance to serve your organizations during these turbulent times”


4 Reasons Why Organizations are Ditching the Microsoft 365 SLA for an XLA

Written by Nick Cavalancia, Microsoft Cloud & Datacenter MVP The increase in reliance upon Office 365 as an organization’s digital workspace has led many organizations to measure Office 365 against how well users interact with it rather than if it’s running.


Container Monitoring: Essential Tools + Best Practices

In the Modern era of application development, businesses move towards building highly available, fault-tolerant, zero downtime applications to make the user experience and performance smoother and better. One of the essential steps in that process is containerization and orchestration of an application. A Container Monitoring process is as vital as containerizing your application.


G2 Recognizes Testlio as High Performer

Third Consecutive Quarter as Leader in Two Categories February 23, 2021. Austin, TX and Tallinn, Estonia. Testlio, the originator of networked testing, today announced that it has been twice recognized as a High Performer within the Winter 2021 G2 Grid ®. The two categories are the best Crowdsourced Testing Software and the best Software Testing Tools.


Composable Enterprise: The New Business Architecture

With all the emphasis on the ‘why’ of digital transformation, there’s little clarity of what the end result should look like. And that’s on purpose, because transformation goals are different for each organization and a cookie-cutter model of successful businesses would only stifle innovation. But if there’s one term to describe the end-state of a digitally transformed business, it would be ‘composable enterprise’.


Microsoft Azure API Management vs. 3scale: Find the Right API Solution for You

Today’s businesses often rely on hundreds of digital assets, including legacy systems and new applications that streamline their processes. However, you can’t rely on your SaaS apps, microservices, and systems to integrate themselves. Instead, you need an API solution built for full lifecycle API management. Microsoft Azure API Management and 3scale get a lot of positive reviews from users.


Successful API Product Management in Large Enterprises

Joining us is Claire Barrett, Director at APIsFirst and a seasoned consultant in strategy and technology change. In our podcast she identifies the key issues to ensure digital transformation success in larger, more mature organizations, and examines why digital savviness is key, how you should always aim for shared business goals, and why balanced teams are preferable. Larry Ebringer, Moesif’s CMO, is your host today.


Scheduling With Cron Expressions in Xplenty

One of the most requested features in a data integration tool is greater flexibility around the scheduling of packages and workflows. With Xplenty, this can be achieved through the use of our Cron Expression scheduling feature. Cron is a software utility that enables Unix-based operation systems, such as Linux, to use a job scheduler. You can create cron jobs, which execute a script or command at a time of your choosing. Cron has broad applications for tasks that need time-based automation.


How to Check CloudFront Logs for Big Data Collection

AWS provides many solutions for managing business data. There’s Amazon Relational Database, or Amazon RDS, which is ideal for scaling your databases on the cloud. There’s Amazon Redshift for warehousing your data. For collecting big data, we’ve looked at a number of modern data integration platforms, but Amazon CloudFront is more of a content delivery platform. So, why are we talking about CloudFront in terms of big data right now?


Stitch vs. Dell Boomi vs. Xplenty: Battle of 3 ETL Platforms

Five differences between Stitch vs. Dell Boomi vs. Xplenty: Real-time data provides a competitive advantage, so every business requires an analytics strategy. But many organizations struggle to integrate data because they store information in lots of locations, including apps, SaaS, and legacy systems. Extract, Transform, and Load (ELT) makes it easier for companies like yours to access data in disparate locations and move it to one centralized system.


How to monitor NVIDIA GPU metrics with Elastic Observability

Graphical processing units, or GPUs, aren’t just for PC gaming. Today, GPUs are used to train neural networks, simulate computational fluid dynamics, mine Bitcoin, and process workloads in data centers. And they are at the heart of most high-performance computing systems, making the monitoring of GPU performance in today's data centers just as important as monitoring CPU performance.


7 Reasons Engineering and DevOps Teams Love CloudZero

CloudZero is a cloud cost intelligence solution that puts engineering in control of cloud cost. We set out to disrupt the cost management and optimization space by building a solution that was designed around the way engineers work — so cost becomes a tradeoff during the software development process, rather than a massive disruption. We often get asked what actually makes us such an engineering-friendly solution? Well, here are seven reasons why engineering and DevOps teams love CloudZero.


How to monitor Nginx

How to monitor Nginx? Let us first read what Nginx monitoring is all about and how it can together work with MetricFire’s Hosted Prometheus. Nginx, pronounced like “engine-ex”, is an open-source web server that, since its initial success as a web server, is now also used as a reverse proxy, HTTP cache, and load balancer. In the case of web applications, it is not prudent to just run a single web server for your application.


Creating a Data Strategy & Self-Service Data Platform in FinTech

In this episode of CDO Battlescars, Sandeep Uttamchandani, Unravel Data’s CDO, speaks with Keyur Desai, CDO of TD Ameritrade. They discuss battlescars in two areas: Building a Data Strategy and Pervasive Self-Service Analytics Platforms. Keyur is a data executive with over 30 years of experience managing and monetizing data and analytics.


3 Ways to Improve JavaScript Applications

In January we brought Release Health to JavaScript. This month we’ve been thinking about the overall experience for JavaScript developers, some could call it JavaScript Jebruary. Think back to your last frustrating experience. It was probably caused by slow page loads or getting dizzy from staring at the ever-ending spinner. One survey showed that the average desktop load time on a webpage was 10.3 seconds and on mobile, it was 27.3 seconds.


Run private cloud and on-premises jobs with CircleCI runner

CircleCI has released a new feature called CircleCI runner. The runner feature augments and extends the CircleCI platform capabilities and enables developers to diversify their build/workload environments. Diversifying build environments satisfies some of the specific edge cases mentioned in our CircleCI runner announcement.


Guide to Pub/Sub in Golang

If you’ve ever used Go before, the concepts of Publish/Subscribe should be fairly familiar to you. It is much like how goroutines communicate over channels between each other, the idea boils down to allowing for such a channel to have multiple ‘subscribers’ receive messages sent on the channel. This paradigm can be powerful when used right, allowing for a cut down of complexity from both the publisher and subscriber side, as well as fast asynchronous communication.


A new take on cloud data exploration: Fast, iterative, and complete

We started Sisu to help companies bridge the gap between their data and its use in everyday decision-making. Over the past year, we’ve seen data teams at companies like Samsung, Gusto, and Mejuri use Sisu to transform the way they connect their data to the decision-making process. They’re using Sisu for rapid data exploration, diagnosing every trend, dimension, and change in their data to efficiently identify what’s actually impacting business performance.


10 Reasons Why We Love Firecracker MicroVMs

As we discussed in Firecracker MicroVMs: Lightweight Virtualization for Containers and Serverless Workloads, Firecracker is a lightweight virtual machine monitor (VMM) that uses Linux kernel-based virtual machines (KVM) to provision and manage lightweight virtual machines (VMs), also known as microVMs. Without further ado, here is a list of the top ten reasons why we love Firecracker.


Mattermost and moderation: Managing access for a more welcome experience

One of the greatest values Mattermost provides to users is the ability to create a space for discussion, issue tracking, and succinct communication, which is made possible by administrators managing access. Our goal is to create a safe and secure communication platform for all of our users. This often comes with the need for tools to help ensure users are communicating in line with the culture of the organization or community to ensure a welcoming and inclusive experience for all.


Windows network monitoring made easy with OpManager

Network administrators are responsible for the day-to-day operation of computer networks at organizations of any size and scale. Their primary duty is to manage, monitor, and keep a close watch on the network infrastructure to prevent and minimize downtime. Managing a network includes monitoring all the network components, including Windows devices. In any Windows network, the desktops, servers, virtual servers, and virtual machines (VMs), like Hyper-V, run on the Windows operating system.


A Quick Guide to Log Shipping To Logz.io: Collectors, Code, and Clouds

One of the great things about Logz.io Log Management is that it’s based on the most popular open source logging technology out there: the ELK Stack (click here to view our thoughts and plans on the recent Elastic license). This means Logz.io users get to leverage log shipping and collector options within the rich ELK ecosystem. So how do you know which log shipping technology to use?


What does the future hold for supply chain processes?

Global supply chains have been under immense pressure over the past year, fighting to keep up with unprecedented demand for online goods and critical healthcare supplies while battling stock shortages around the world. However, businesses on the whole came out swinging, managing to scale quickly and competently adapt to the restrictive working procedures necessary to fulfil orders and keep customers happy.

Webinar - Step Up Your DevOps Game with 4 Key Integrations for Jira & Bitbucket

Atlassian’s Ian Buchanan discusses how to integrate third-party DevOps tools with Atlassian’s robust DevOps ecosystem. You’ll learn about the benefits of an integrated tool stack, an introductions to 4 key DevOps practices, and examples of how those practices can integrate with Jira and/or Bitbucket.

Top Benefits of Cloud-Based Log Management

In the ultracompetitive times in which we live, organizations must leverage every asset at their disposal if they’re to survive and thrive. Log data is undoubtedly valuable, so having a proper log management strategy in place is vital for any tech team . Unfortunately, implementing a great log management strategy isn’t as easy as it sounds. It involves many factors, including the selection of an adequate tool.


Monitoring Microservices-based Environments Using Epsagon

Microservices are great to run in cloud-native environments and provide the flexibility to adapt to businesses’ ever-changing needs. Organizations have the opportunity to gain competitive advantages using these microservices-based environments. The environments, such as various cloud providers (AWS) and Kubernetes, used to run or orchestrate the microservices have thus become a critical part of an organization’s architecture.


QA Engineers, This is How SRE will Transform your Role

When implementing SRE, almost every role within your IT organization will change. One of the biggest transformations will be in your Quality Assurance teams. A common misconception is that SRE “replaces” QA. People believe SLOs and other SRE best practices render the traditional role of QA engineering obsolete, as testing and quality shift left in the SDLC. This leads to QA teams resisting SRE adoption.


Customizing Containers during App Modernization using CloudHedge

CloudHedge Transform provides the user with the option of modifying the data that goes into the container. It uses the data gathered from the X-Ray, a part of the CloudHedge Discover module that has been performed on the process. Using the Transform Platform, the user can currently: The Edit Dockerfile feature can be used to: And the File Selection feature can be used to.


A Partnership Between InfluxData and Ockam Brings Trust to Time Series Data

This article is a re-post of the article written by Matthew Gregory and published on the Ockam blog. Let’s investigate how to build applications with trusted time series data in a zero trust environment! To trust an application we need to trust the data that feeds into it. Increasingly, applications rely on time series data from outside the datacenter, at the edge, or in IoT. This means we need to think of trust and data in new ways.


Troubleshooting Large Queues in RabbitMQ

If you’re a RabbitMQ user, chances are that you’ve seen queues growing beyond their normal size. This causes messages to get consumed long after they have been published. If you’re familiar with Kafka monitoring, you’ll call it consumer lag, but in RabbitMQ-land it’s often called queue length or queue depth.


Top 5 New Relic Competitors and Alternatives to Try

New Relic is one popular for SaaS-based Application Performance Management capable of providing you with a flexible and dynamic approach to monitoring. It is considered to be effective but some may feel it is not cost-effective for small-meidum-size businesses and comes with a very high learning curve. If you want an APM that you can get started quickly, requiring minimal training or experience, New Relic may not be for you.


Writing your scripts in Java and Kotlin with Bitrise

If you are familiar with Bitrise you probably already used the Script Step to do something in your CI workflow. There are multiple options for the language of your script, by default it is a bash script, but the description of the step also mentions Go, Ruby or Python. Although it does not mention Java or Kotlin, I will show you in the next few minutes how to do it!


Testing the new Elasticsearch cold tier of searchable snapshots at scale

The cold tier of searchable snapshots, previously beta in Elasticsearch 7.10, is now generally available in Elasticsearch 7.11. This new data tier reduces your cluster storage by up to 50% over the warm tier while maintaining the same level of reliability and redundancy as your hot and warm tiers.


The new Splunk Infrastructure Monitoring plugin brings the SaaS formerly known as SignalFx to your Grafana dashboards

Greetings! This is Mike reporting from the Solutions Engineering team at Grafana Labs. In previous posts, you might have read our beginner’s guide to distributed tracing and how it can help to increase your application’s performance. In this post, we are back to talk about metrics and showcase another one of our newest favorite Enterprise plugins: Splunk Infrastructure Monitoring (formerly known as SignalFx)!


AI Chihuahua! Part II

With build-or-buy decisions, it often comes down to an all-in-one platform or a mixture of best-of-breed technologies. With open-source technology companies can actually get the best of everything. So, why not roll your own platform based on top-notch technologies? The real question is whether enterprises can afford to. Open-source software is free to use, but teams have to invest quite a bit in selecting, introducing, using, and maintaining these technologies.


Building loyalty with data and analytics

In 1969, my aunt graduated from university and joined IBM, the dominant player in the nascent tech industry at the time. She remained at “Big Blue” where she met and married my uncle, and rose up through the management ranks, until their joint semi-retirement exactly 30 years later. She recently told me, “the only way you could get fired in those days was to murder someone, embezzle or steal”.


The Multifaceted Value Proposition of the Cloudera Data Platform

The Cloudera Data Platform (CDP) represents a paradigm shift in modern data architecture by addressing all existing and future analytical needs. It builds on a foundation of technologies from CDH (Cloudera Data Hub) and HDP (Hortonworks Data Platform) technologies and delivers a holistic, integrated data platform from Edge to AI helping clients to accelerate complex data pipelines and democratize data assets.

Bringing value to our members through automation using Ocean by Spot

Moving to Kubernetes gives applications the ability to scale, but it also introduces challenges to managing and operating cloud infrastructure. When giffgaff, a virtual mobile network, migrated to EKS, they needed to figure out how they would automatically scale their EC2 instances and how they would do so cost-efficiently. In this session, you’ll hear how giffgaff worked with Spot by NetApp to implement container-driven autoscaling for provisioning compute capacity and leverage spot instances to save big on their cloud bill.

Comprehensive Observability via Distributed Tracing on Node js | Node Congress

The benefits of Node.js to develop real-time applications at scale are very well known. As Node.js architectures get more and more complex, visualization of your microservice-based architecture is crucial. However, the visualization of microservices is incredibly complex given the scale and the transactions across them. You not only need to visualize your Node.js applications but also analyze the health, flow, and performance of applications to have a complete observability solution. In this talk, we'll go over the challenges of scaling your Node.js applications and tools (such as distributed tracing) available to you to scale with confidence.

Forging a truly data-driven organization

In a 2020 study performed by Nature Research, 70 different teams of neuroimaging experts were asked to test nine hypotheses by looking at the same MRI data set. You may not be surprised to learn that these teams reached a wide range of different conclusions, in part because no two teams chose identical workflows to analyze the data. With seventy teams, there were 70 different workflows.


The 50 Best DevOps Tools

DevOps has gained a lot of traction among the software development community for its ability to improve cycle times and application performance. DevOps methods are still being tested and perfected by development teams throughout the world, and there are many DevOps tools at their disposal to help them streamline processes, improve application performance, and address common issues faced in development and operations.


Splunking AWS ECS Part 2: Sending ECS Logs To Splunk

Welcome to part 2 of our blog series, where we go through how to forward container logs from Amazon ECS and Fargate to Splunk. In part 1, "Splunking AWS ECS Part 1: Setting Up AWS And Splunk," we focused on understanding what ECS and Fargate are, along with how to get AWS and Splunk ready for log routing to Splunk’s Data-to-Everything platform.


Show Your Query You Love It By Naming It

Honeycomb is all about collaboration: We believe that observability is a team sport, and we want to give you as many tools to help your team get the ball down the field (i.e., untangle knotty problems) as we can. We want you to be able to share the current state of your work so that others can follow and figure out what’s up, and we want you to leave breadcrumbs so the next time you’re stuck here, you can find your way back.

Maximize your Google Cloud Investment with LogicMonitor

LogicMonitor’s agentless architecture is designed for organizations adopting hybrid and multi-cloud environments to scale with ease. With an end-to-end view across important GCP services, IT Operations teams are equipped with real-time visibility into the health and performance of their entire distributed environments, maximizing value for GCP investments whether fully deployed or just getting started with cloud migration.

Building and running FIPS containers on Ubuntu Pro FIPS

Canonical provides customers Ubuntu Pro images AWS Marketplace. Ubuntu Pro for AWS is a premium AMI designed by Canonical to provide additional coverage for production environments running in the cloud. It includes security and compliance services, enabled by default, in a form suitable for small to large-scale Linux enterprise operations — with no contract needed.


Monitoring Node.js Health and CPU Usage

What’s the most wanted feature for a Node.js application? Well, high performance with no downtime is one of the top answers for this question. But how do you accomplish this? Monitoring is key to gain a better understanding of the health of your application. For example, by implementing monitoring, you can detect problems, such as a memory leak or long-running processes that block the Node.js event loop.


The True Cost of IT Failures (and What to Do Instead)

In this age of digital transformation, any issues with your IT infrastructure can cause major disruptions to your business. On top of this, IT environments that support critical business applications continue to get more complex and dynamic. As failures, outages, and incidents increase in volume and cost, the risk of an outage within your company becomes a very expensive one.


Tyk or Akana: Which Has the Right API Management Tools to Match Your Needs?

Whether you work for a startup or a giant corporation, your organization likely needs a reliable API management solution that helps all of your SaaS apps communicate with each other. The following article compares Tyk and Akana to help you decide whether one of them could meet your needs.


Community and Evangelism in Digital Transformation

Inertia, cynicism, and doubt can make it difficult for organizations to commit to digital transformation. Employees, executives, and stakeholders might resist digital transformation initiatives even after you explain its benefits. It often takes more than explaining benefits. You get the best results when you can build a community of digital transformation evangelical’s who gets others excited about adopting new technologies.


How predictive analytics is transforming logistics and supply chain

Supply chain 4.0 is reshaping the global value chains. Advanced technologies like the Internet of Things (IoT), big data analytics, and autonomous robotics are transforming the model of supply chain management. Data is being produced, collected, analyzed, and productized at speeds and scales which were unimaginable a decade ago. The race to capitalize on the value of supply chain 4.0 is on.


How Do Data Pipelines Fit Into Your Data Stack?

The amount of big data generated around the world by the time you finish this page is limitless. Think about it for a second. Companies everywhere will create an innumerable amount of data right now — customer records, sales orders, chain reports, emails, you name it. Companies need all this data for data analytics — the science of modeling raw data to uncover precious real-time insights about their business. It's like opening a treasure trove.