February 2021

nifty

Best ways to manage your content marketing calendar

Content marketing does plenty for your organization. It pushes your site higher in the search engine ranks, pulls in traffic, educates and builds trust with your readers, and hopefully leads to them buying from you (and staying loyal into the future). But there are plenty of moving parts involved with producing just one perfect piece of content — let alone several in a week. This is where a content calendar comes in handy. Your content calendar can be as simple or complex as you need.

nifty

30+ Best Tools for a Hybrid Work Environment

If 2020 was the year of work-from-home, 2021 will gradually be easing into what the future of the office will look like: a hybridized home-and-office paradigm. The reason this term casts such a wide net is because everyone’s situation will be notably different. Some businesses will return in full force (once they’re able to) and will resume the office life that they formerly lived, while other organizations may never have a formal office again.

freshworks

How to Improve Customer Service: Top 10 Practical Tips

Like most business leaders, you want your company to provide a great customer service experience. You hope to respond quickly, have positive interactions with your customers, and give them the solutions they need. However, with customers being higher expectations than ever, and customer support teams being understaffed, this is easier said than done. If you’re wondering how to improve customer service in this salutation, then look no further.

nightfall

What is Social Engineering?

The phrase “social engineering” sounds innocuous — but, this approach to hacking threatens organizations of all sizes. Social engineering may be an unfamiliar term, but the attacks that fall under this category are well-known. For instance, phishing attacks and ransomware attacks have seen massive increases in the last year. By some estimates, ransomware is up 700% and phishing campaigns are up over 200%.

tripwire

Fixing the "Human Error" Problem

Last year, Verizon’s data breaches report showed that “human error” was the only factor with year-over-year increases in reported incidents. The average cost of data breaches from human error stands at $3.33 million, according to IBM’s Cost of a Data Breach Report 2020. Even big companies and government entities have fallen victim to data breaches caused by human error.

moesif

How to Monitor API Usage and Performance with the Moesif Plugin for AWS API Gateway

API gateways provide a central point to govern and control access to your APIs, enabling customers and partners to quickly create new experiences. Amazon API Gateway has native support for a variety of compute resources like AWS Lambda or Amazon Elastic Compute Cloud (Amazon EC2).

upguard

How to prevent supply chain attacks by securing PAM

The SolarWinds supply chain attack against the US Government was the largest and most sophisticated breach in history. A post mortem operation is still underway and with every stage of its progression, cybersecurity experts become increasingly flabbergasted at the INNOVATIVE complexity of the techniques used. But despite nation-state's efforts to conceal their tactics, they left some highly-valuable clues about their methods that could be leveraged to sharpen supply chain attack defenses.

upguard

How to prevent supply chain attacks with an Assume Breach mentality

Supply chain attacks are on the rise, yet few businesses are equipped to face this threat. This could be due to a growing despondency towards cybersecurity in light of the SolarWinds attack. If the nation-state hackers were sophisticated enough to bypass highly-secure Government agency critical infrastructures, how could any organization prevent a supply chain attack? The answer is a change of mindset - don't assume a supply chain attack might occur, assume it will occur.

startingpoint

5 Keys to Simple Project Management

Project Managers are presented with some challenging tasks which can hinder the success of the project. Some of the most prevalent challenges that keep project managers on the ball involve making sure the project is on track, within the assigned budget, keeping up with the project's pace, and managing resources.

startingpoint

Avoiding the Most Common Business Mistakes When Scaling Your Small Business

Scaling and generating more revenue without necessarily increasing costs is a good sign for your small business. But with the potential to scale by increasing sales volume comes the challenge of keeping the company’s operations and profitability stable. This is why companies emphasize the importance of operational efficiency.

startingpoint

6 Tech Tools to Streamline Your Remote Workflow

‍ Thrust into the unfamiliarity of remote work, a huge number of industries around the globe have had to adapt to life away from the office. COVID-19 has prompted a surge in remote work like we have never seen before, with much of the American workforce being left with no choice but to work from home. In fact, the pandemic has ensured that tech priorities shifted for 95% of companies.

raygun

Getting started with Raygun Crash Reporting using Raygun4Android

Building native mobile apps can be a daunting challenge. Even if you ignore the choice of building separate iOS/Android apps or using cross-platform technology, writing native apps is hard. The development process of native apps involves a lot of testing and debugging. While the app is still under initial development this usually happens on test devices of the developers or dedicated testers. When problems arise or the app crashes, these incidents are often observable and can be debugged.

manageengine

Security operations center, Part 2: Life of a SOC analyst

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry out every day to protect their organization from constantly evolving cyber threats and the skill sets that come in handy in effectively carrying out their duties.

sematext

12 Best Docker Container Monitoring Tools

Monitoring systems help DevOps teams detect and solve performance issues faster. With Docker and Kubernetes steadily on the rise, it’s important to get container monitoring and log management right from the start. This is no easy feat. Monitoring Docker containers is very complex. Developing a strategy and building an appropriate monitoring system is not simple at all.

uptime

Preparing to Fail Fast so You can Recover Faster

The principle of fail fast is either the best thing since the transistor or nothing but hot air. It depends on the size of your organization and the cohesiveness of your teams. If your team members have a strong working relationship, and dev is well integrated with everyday work company-wide, you already have a good foundation for this particular agile thinking. Most companies that have grown beyond startup-size, and even some startups, may find this idea a bit jarring.

operations

Increasing limits for three key Cloud Monitoring features

Cloud Monitoring is one of the easiest ways you can gain visibility into the performance, availability, and health of your applications and infrastructure. Today, we’re excited to announce the lifting of three limits within Cloud Monitoring. First, the maximum number of projects that you can view together is now 375 (up from 100). Customers with 375 or fewer projects can view all their metrics at once, by putting all their projects within a single workspace.

derdack

Integration with 3rd Party Systems

Integrations of third-party systems with Enterprise Alert, what is possible? In my work with new and existing customers, I keep coming across the assumption that Enterprise Alert is not able to be integrated with certain third-party systems in order to receive and process events and fault messages from this system. Basically, first of all, we have to say: We can integrate everything that communicates digitally in any way.

crunchmetrics

Webinar Wrap-up: Urban Company's Journey of Scaling Growth by Leveraging AI

If you run an online business, it is vital to ensure that your platform is in top shape and accessible to customers 24/7. Better user experience is the key to earning customer loyalty and driving growth. A customer-focused approach is one of the key factors behind the success of India’s largest home services company – Urban Company.

virtualmetric

Getting Started with Change Tracking

Changes are both inevitable and necessary when you are running a business. As customer expectation and the market landscape keeps changing, you will have to take up the necessary measures to implement corresponding digital solutions and technology changes. But managing changes can be a tricky process. Some changes can be as simple as changing the folder organization in your data. But if you have not tracked it properly, you will soon run into confusing folder hierarchies and problems in data sharing.

canonical

What is virtualisation? The basics

Virtualisation plays a huge role in almost all of today’s fastest-growing software-based industries. It is the foundation for most cloud computing, the go-to methodology for cross-platform development, and has made its way all the way to ‘the edge’; the eponymous IoT. This article is the first in a series where we explain what virtualisation is and how it works. Here, we start with the broad strokes.

firehydrant

Announcing Updated Analytics Filters to Dive Even Deeper into your Historic Incident Data

After successfully implementing a conditional evaluation engine into Runbooks, we started looking at other places in FireHydrant that would be improved with this engine. After hearing a lot of feedback from you, we’ve implemented conditions into our Analytics page. Let’s dive in and see what new things are possible with this new filtering.

cloudsmith

Build Trust with a Custom Domain

Security in software is now everyone’s problem. We can no longer simply rely on InfoSec teams or your equivalent Gary “he-likes-security” to handle security-related processes and issues. All software, tools, infrastructure, and services need to be trusted. It is important to us at Cloudsmith to provide you with the ability to build that trust within your teams or with your customers. Cloudsmith allows you to use your own domain name for your repositories.

testlio

How to create a good test plan

Software testing is the process of evaluating and verifying a software program or application —with the intent of preventing software defects, reducing development costs, improving performance, and delivering a superior product. To ensure adequate product coverage and keep testing in line with project objectives, it’s imperative to have a sound test plan.

catchpoint

How To - Monitor Your Email Service with Catchpoint

Today, we’re going to continue diving into Catchpoint’s wealth of synthetic tests with a brief overview of network protocols and a look at some helpful use cases specifically around monitoring your email service. I’ll be sharing a hands-on demo, illustrating how this data shows up in Catchpoint – focusing on a pair of protocol tests we’ll be running against our email service.

appian

What the Months Ahead Look Like for Insurance

Insurers, reinsurers and intermediaries are under pressure to adapt to new customer expectations. Insurtechs have made omnichannel digital experiences the norm. And COVID-19 has forced the issue further, on top of necessary operational and claims process changes. Digital transformation is no longer a buzzword or something that can fix just one area of an insurance organization.

appian

AI Expert Joanna Bryson Dishes on Due Diligence and Rooting Out AI Bias, Part 2

How was that credit application declined? Why was that person denied parole? How were disability benefits cut for those constituents? And why do computers learning from humans automatically see certain occupational words as masculine and others as feminine? It’s hard to explain how the most advanced algorithms make decisions. But as predictive systems proliferate, there are signs we’ve become more wary of their use in making critical decisions.

logsentinel

The SolarWinds Hack: What Went Wrong With Missing Alarms and How To Fix It

A few days ago, on February 23, the US Senate Intelligence Committee held a hearing with executives from SolarWinds, FireEye, CrowdStrike and Microsoft about the SolarWinds hack. It’s worth listening in full, but we want to focus on one particular aspect described by the participants – the malware shutting down endpoint monitoring agents.

aternity

Microsoft Skype End User Experience

When Skype was first released in 2003, it quickly became one of the world’s most well-known Voice over Internet Protocol (VoIP) and video chat tools. The original free program is still available today and is designed for individual use and small teams of less than 20 employees. When Microsoft purchased Skype in 2012, it aimed to transform the offering into a complete business communications platform.

cloudzero

Finance: Why Getting Answers From Engineering About Your AWS Bill Is So Difficult

It’s no secret that AWS bills are confusing. But it’s particularly difficult for the team who actually writes the check to Amazon for hundreds of thousands or millions of dollars — yet has never personally seen what the inside of the AWS portal looks like (and probably never will).

ivanti

2021 Secure Consumer Cyber Report: Protecting the Everywhere Workplace

The 2021 Secure Consumer Cyber Report provides one of the industry’s most comprehensive studies about the shift in consumer behavior as a result of increased work-from-home initiatives. With the influx of unsecured personal devices and high-risk employee behavior, what does the threat landscape look like today? The newly released report found that, with the dramatic increase in remote work due to the pandemic, the threat to enterprise data is higher than ever.

obkio

How to Monitor Network and Zoom Performance & Fix "Your Internet Connection is Unstable" on Zoom

Laggy video, packet loss, and jitter make it difficult to have a clear and coherent conversion over Zoom - which is why it’s important to identify these issues before your next call. In this article, we’re teaching you how to monitor network performance and Zoom performance to help you have the clearest Zoom experience, and avoid the “Your Internet Connection is Unstable” message of doom.

obkio

How to Identify the Zoom Data Center Location on AWS Infrastructure

Zoom leverage AWS’s global infrastructure, storage, content distribution, and security to deliver its service and store information securely in AWS data centers around the world. This means that when you’re looking to monitor your Zoom performance, it’s important to know how to identify which AWS data center location your Zoom application is using. Keep reading to find out how.

stackify

Why you should use Central Error Logging Services

Logs are vital for every application that runs in a server environment. Logs provide essential information which points to whether the current system is operating properly. Looking through logs, you will gather data on system issues, errors, and trends. However, it is not feasible to manually look up errors on various servers across thousands of log files. The solution? Central errors logging services.

appian

5 Principles of Enterprise Low-Code Application Development

In 2020, low-code application development went mainstream. Organizations everywhere prioritized the ability to rapidly adapt, making the Low-Code Application Platform (LCAP) an essential part of the enterprise technology stack. Low-code may be everywhere—but many IT and development teams are failing to reach its full potential. Ironically, they’re running low-code projects with traditional, high-code development practices.

influxdata

The Future of InfluxDB OSS: More Open, Permissive with Complementary Closed Source

I was recently on the Changelog Podcast talking about Elastic’s recent change away from open source licensing. I’m at 1:02:45 to 1:24:03, but the whole thing is pretty interesting if you have time to listen. This is where #InfluxDB is headed. No more open core, we're going to a combination of cloud offering, or if on-premise, a complementary offering to the open source. It'll take us time to get there, but that's the vision. Commercial complements the open source rather than replace.

chaossearch

Cloud Data Retention & Analysis: Unlocking the Power of Your Data

Enterprise data growth is accelerating rapidly in 2021, challenging organizations to adopt cloud data retention strategies that maximize the value of data and fulfill compliance needs while minimizing costs. To meet this challenge, organizations are adopting or refining their cloud data retention strategies. In this blog post, we’ll take a closer look at the state of data retention and analytics in the cloud.

cloudera

Sample applications for Cloudera Operational Database

Cloudera Operational Database is an operational database-as-a-service that brings ease of use and flexibility to Apache HBase. Cloudera Operational Database enables developers to quickly build future-proof applications that are architected to handle data evolution. In the previous blog posts, we looked at application development concepts and how Cloudera Operational Database (COD) interacts with other CDP services.

What Functional Tests Overlook, See It with Visual Testing

Organizations strive to deliver the best possible digital experience to their customers. One way to ensure this is by testing their applications, and many organizations perform functional testing to verify that the application behavior is working correctly. However, there are areas that functional testing cannot cover. This is where visual testing comes in.
operations

Troubleshooting services on Google Kubernetes Engine by example

Applications fail. Containers crash. It’s a fact of life that SRE and DevOps teams know all too well. To help navigate life’s hiccups, we’ve previously shared how to debug applications running on Google Kubernetes Engine (GKE). We’ve also updated the GKE dashboard with new easier-to-use troubleshooting flows. Today, we go one step further and show you how you can use these flows to quickly find and resolve issues in your applications and infrastructure.

operations

With SRE, failing to plan is planning to fail

People sometimes think that implementing Site Reliability Engineering (or DevOps for that matter) will magically make everything better. Just sprinkle a little bit of SRE fairy dust on your organization and your services will be more reliable, more profitable, and your IT, product and engineering teams will be happy. It’s easy to see why people think this way. Some of the world’s most reliable and scalable services run with the help of an SRE team, Google being the prime example.

solarwinds

Monitoring Node.js Application With AppOptics on DigitalOcean - Better Together

Many teams take advantage of the convenience of deploying their apps to the platform as a service (PaaS) providers such as DigitalOcean. Cloud solutions like this are an easy way for teams to deploy and scale their applications without worrying about the details. However, even in these managed environments, poorly written apps can cause issues. If your pages load too slowly, users will likely leave your site and look for another.

serverless360

Will Azure Blob Storage Rule the Unstructured Data Storage Space?

2020 was indeed challenging for Kovai.co still had great learning! One of them is what I am sharing with the community through this blog. For enterprises like us, worldwide work from anywhere became the new reality. We had to move towards a cloud-native world where secure data storage and effective remote management of IT infrastructure were of supreme importance.

M Files Admin: Creating a Document Review and Approval Workflow | Intelligent Information Management

One of the most used and needed workflows throughout all organizations is the document review and approval workflow, where documents start out in a draft state and then they go through review and then final approval. It's really easy to create this workflow in M-Files and it saves staff loads of time since they don't have to hassle with the messy process of emailing attachments back and forth and creating multiple versions of the same document
firehydrant

Product Updates: Creating a New Runbook Just Got Easier with Templates

Starting out with runbooks can be daunting, we've built a way to implement our best practices into a runbook that can be implemented in a single click. On top of this, there's now even more ways to attach runbooks to your incidents and a much easier way to test out the runbook that you're currently working on.

countly

The Key Metrics That Fintech Product Managers Can't Live Without

If each product is a world in its own, each industry in which that product -or service, for that matter- is deployed, is a universe. A seemingly chaotic universe full of data coming from every direction and angle that you, the product manager, need to catch, analyze, and funnel into your every day. If this does not sound easy, it is because it is not!

logitio

The Best Software Deployment Tools For 2021

Software deployment tools allow developers to ensure that software is properly installed with it’s required packages and implementation steps conducted in the correct order. Using these tools is a vital requirement for any business that creates its own software in-house. There is a variety of software that can assist developers in launching their latest code with new ones (such as GitHub Actions) arriving to the forefront of many growing consideration lists.

dashbird

10 Ways to Protect Your Mission-Critical Database

As Werner Vogels says: “Everything fails all the time.” Data is the new oil. We rely on it not only to make decisions but to operate as a business in general. Data loss can lead to significant financial consequences and damaged reputation. In this article, you can find ten actionable methods to protect your most valuable resources.

How Shutterstock Implemented DevSecOps from the Ground Up

Learn how Shutterstock’s Director of Product and Application Security, Christian Bobadilla, built security into the development culture of Shutterstock from the ground up. Christian will share his experience working with developers on embedding security throughout the SDLC, reducing vulnerabilities in their cloud native applications, and ultimately embracing a new security culture. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.
Snyk

Java configuration: how to prevent security misconfigurations

Java configuration is everywhere. With all the application frameworks that the Java ecosystem has, proper configuration is something that is overlooked easily. However, thinking about Java configuration can also end up in a security issue if it is done in the wrong way. We call this misconfiguration. Security misconfiguration is part of the infamous OWASP top 10 vulnerability list and has a prominent spot on place 6.

lenses

Picking up the pieces of your monolith breakdown

A decade ago, all developers could talk about was breaking down the monolith and event-driven architectures. Especially in the financial services industry, to become more nimble and accelerate their application delivery. They leveraged messaging systems to decouple the application, and specifically Apache Kafka has transitioned from being a data integration technology to the leading messaging system for microservices.

[Webinar] How QA Orchestration Improves Your Mobile Testing Productivity

“Test Orchestration” is the key strategy of companies in today’s competitive marketplace. However, it may become a time-consuming and effort-intensive process if not done right. Hence, there’s a need for better strategies.  Watch the recording of this Katalon x Kobiton webinar and explore how to boost up your team productivity with the industrial experts! In this webinar, our experts will walk you through:
perforce

C++ Microservices in Docker

Microservices have become a popular way to architect applications, particularly those that compose functionality from a variety of loosely coupled systems and services. While there are a variety of frameworks and tools for implementing a microservice architecture, it isn’t always clear how to expose native code like C or C++ code within a wider microservice system. That’s where HydraExpress comes in.

ziniosedge

How Mixed Reality Transform Retail Store Experience?

Digital transformation is driving industries to evolve to new dimensions. Mixed reality is one of the key components in the digital reality trends that business sectors a rapidly capitalizing into. It is reshaping almost every conventional way that retailers do business. Many industrial trajectories are responding immediately to give more experiential customer experience with reality technologies such as Augmented Reality, Virtual Reality and Mixed Reality.

ziniosedge

How DevOps Practices Strengthen Security & Compliance?

Companies worldwide these days make use of DevOps with a view to attain better profit and progress. Despite its increased use, DevOps can lead to higher risks if not properly handled. There should be an integration of security and development process form the beginning in order to have a risk-free progress. The entire organization will be at risk if proper security check is not practiced in each stage, as cyberattacks are increasing each day.

onlineornot

Guidelines to help you avoid losing your domain

Imagine you're sitting in your office, and you start noticing emails coming in asking if you'd like to buy your domain. "Huh, that's weird, I already own that domain" you think to yourself. A few more emails come in, and they're getting past the spam filter, so you decide to double check your domain manager. Doubt starts creeping into your mind, you start panicking, and you frantically scroll down to where the domain should be, and... It's gone.

onlineornot

Migrating between WordPress hosts without downtime

Sometimes you'll want to migrate WordPress hosts - maybe it's time for renewal, and you found a better deal elsewhere, or your hosting provider isn't as reliable as they promised. Which is great for you, but your site's readers don't care that it's a better deal - they just want to see your content. So minimising downtime when transferring hosts is a pretty big deal. Let's learn how to avoid downtime.

lightstep

OpenTelemetry automatic instrumentation: a deep dive

OpenTelemetry can be an overwhelming project to take in - understanding the interactions between the API, SDK, and various tools and protocols is a lot. One particularly interesting and important part of the project, though, is the "automatic instrumentation" components. What is automatic instrumentation, and why is it important to OpenTelemetry? How can you use it? How does it help? We’ll answer these questions, and more, so read on!

netwrix

Information Security Policy: Must-Have Elements and Tips

Organizations often create multiple IT policies for a variety of needs: disaster recovery, data classification, data privacy, risk assessment, risk management and so on. These documents are often interconnected and provide a framework for the company to set values to guide decision-making and responses. Organizations also need an information security policy. This type of policy provides controls and procedures that help ensure that employees will work with IT assets appropriately.

tideways

What's new? Winter Release 2021

Winter is clearly over here, the sun is shining, which means it is time to sum up everything that is new in the Tideways Winter 2021 release. Aside from this blog post explaining the new features in detail and the documentation, we also invite you to our 30 minute webinar "New Features and Improvements launched in Winter 2021" scheduled for 4th March 2021, 15:00 Europe/Berlin. The webinar will also include an exclusive intro to two brand new features that are launching into Beta next week.

little warden

Improved Content Monitoring!

Two new features in TWO DAYS.. what is this new year NEW ME? When we launched custom content extraction in 2017, I was always a bit annoyed by the ‘pain in the arse’ it was to use, sure it was an excellent feature but we made the user load up a tab and copy the xPath manually. Since that launch we’ve had ‘make content extraction less shi of a pain to do’ but as things tend to do, other features and improvements got in the way. BUT NOT TODAY… BOOM!

thundra

Why Your Local Workstation Can't Mimic the Cloud

If there is one thing developers love, it’s control. This makes sense—if you build something as complex as a software system, you need to understand what’s happening at every level. But absolute control can be a liability when it becomes the main goal of the development process. Many developers go to great lengths to get the same system replicated locally that they run on a remote server with the hope of catching every error before it’s deployed. This is a pipedream.

yellowfin

5 key features of any modern embedded analytics platform

Start-ups founded on analytics have been shaking up every industry. Finance has been disrupted by Monzo's data focus, Netflix’s analytics has upended film entertainment, and Swyfft has used data to change the game for US home insurance. Today's users have come to expect analytics in their applications.

keboola

DataOps and automation at the heart of the banking revolution

According to the European Banking Authority report on Advanced Analytics and Big Data in banking, the implementation of data technologies, infrastructure, and practices is still at “an early stage”. The game is on for early contenders in this winner-takes-most market. Banks that move quickly are likely to get ahead of the curve, grabbing more of the market pie before others rise to the challenge.

canonical

What is MEC ? The telco edge.

MEC, as ETSI defines it, stands for Multi-access Edge Computing and is sometimes referred to as Mobile edge computing. MEC is a solution that gives content providers and software developers cloud-computing capabilities which are close to the end users. This micro cloud deployed in the edge of mobile operators’ networks has ultra low latency and high bandwidth which enables new types of applications and business use cases.

canonical

DFI and Canonical offer risk-free system updates and reduced software lead times for the IoT ecosystem

Feb. 25, 2021 – DFI and Canonical signed the Ubuntu IoT Hardware Certification Partner Program. DFI is the world’s first industrial computer manufacturer to join the program aimed at offering Ubuntu-certified IoT hardware ready for the over-the-air software update. The online update mechanism of and the authorized DFI online application store combines with DFI’s products’ application flexibility, to reduce software and hardware development time to deploy new services.

opmantek

Auditing your network, without credentials.

Now that I have your attention, how can we possibly audit a network and find all the juicy details about the devices upon it, without having high level credentials to talk to those devices? Well, it’s a bit of a mistruth. Or a caveat. Or whatever you want to call it. We definitely can do this, but for devices such as routers, printers and switches you will need a minimal set (read only, minimum access level) of SNMP credentials.

interlink

AIOps for Managed Service Providers: modernize and monetize your monitoring offering

Legacy monitoring tools weren’t built for visibility into the cloud and can obstruct your ability to compete and grow your business. Interlink Software works with MSPs to define, monetize and deliver AIOps monitoring solutions that meet the requirement for high-performing business services and hybrid cloud infrastructures that digital enterprises rely on.

WhiteSource

Setting Up an Effective Vulnerability Management Policy

Considering the continuous increase in cybersecurity attacks targeting large organizations over the past few years and regulations like PCI DSS, HIPAA, NIST 800-731 – to name a few – it’s no surprise that enterprise investment in vulnerability management is on the rise. Detecting, prioritizing, and remediating security vulnerabilities in today’s rapidly evolving threat landscape is no small feat.

cyphere

Penetration testing methodologies, frameworks & tools

There is no doubt how regular penetration tests are an essential part of the vulnerability management process to reduce risks. It is important to ensure penetration tests are efficient and to do so, the use of correct penetration testing methodologies is an essential component. A methodology in this context defines the logic using which various test cases are carried out to assess an asset’s security. Let’s start with the basics first and then move on to the topic.

iguazio

Concept Drift Deep Dive: How to Build a Drift-Aware ML System

There is nothing permanent except change. In a world of turbulent, unpredictable change, we humans are always learning to cope with the unexpected. Hopefully, your machine learning business applications do this every moment, by adapting to fresh data. In a previous post, we discussed the impact of COVID-19 on the data science industry.

How to monitor your API in just 2 simple steps?

In this video, you’re going to learn exactly how to monitor your API in just 2 simple steps! To be clear: Monitoring an API is a lot of hassle. But with this video tutorial, you’ll know how you can monitor your API in just 2 simple steps while saving a lot of time. Think of Components like folders that contain other Fyipe resources and one of the resources it has is called "Monitors". An API monitor will basically test your API to gain visibility into performance, availability, and functional correctness.
logicmonitor

Guest Blog: Airbrake & LogicMonitor = Awesome News

“On Tuesday, we announced some big news: LogicMonitor has acquired Airbrake — a developer-centric application error and performance monitoring platform. This acquisition represents the latest step in our company’s journey towards becoming an end-to-end infrastructure monitoring and observability platform. As part of the acquisition, I am thrilled to welcome the Airbrake team into the fold!

elastic

Ruby and Python clients for Elastic Enterprise Search now generally available

Back in our 7.10 release of the Elastic Stack, we announced the beta of our Ruby and Python clients for Elastic Enterprise Search. Now, with 7.11, both the Ruby and Python clients are generally available. We’ve also begun work on a PHP client. All client source code for both enterprise-search-ruby and enterprise-search-python is available on GitHub. Documentation on how to get started with each client is available on elastic.co.

grafana

Troubleshoot problems using GitLab activity data with the new plugin for Grafana

GitLab is one of the most popular web-based DevOps life-cycle tools in the world, used by millions as a Git-repository manager and for issue tracking, continuous integration, and deployment purposes. Today, we’re pleased to announce the first beta release of the GitLab data source plugin, which is intended to help users find interesting insights from their GitLab activity data.

epsagon

What Tools Does a DevOps Engineer Actually Use?

“DevOps” is a recently coined term that combines the realm of “development” with that of “operations.” So in theory, a DevOps engineer is someone who is proficient in both of these areas and understands how they interact with each other. In reality, however, most DevOps engineers work on the “operations” side of things on a day-to-day basis.

kong

Getting Started With Kong's OpenID Connect Plugin

The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is not trustworthy until you establish otherwise. Within Kong Konnect, one mechanism to apply zero-trust is the OpenID Connect API gateway plugin. In this post and the below recording from our recent Destination: Zero-Trust virtual event, I’ll cover OpenID at a high level and some of its applications and use cases.

nexthink

3 Ways IT Can Unblock Mergers & Acquisitions Problems in the Pandemic Era

Even when businesses are functioning as usual, mergers and acquisitions are intense and demanding transitions for companies to pull off. From the constant communication required in the preparation phase, to the technical demands of integrating two teams, a merger or acquisition forces companies to exhaust resources in order to make the transition a smooth success. Then the pandemic hit.

nexthink

Want to be an Effective IT Leader? You Need to Care About Experience Management

What is more important – time saved or time well spent? How you think about this problem and how you’d go about measuring it is an important consideration for managers who aspire to be leaders in today’s digital workplace. In IT and beyond, focusing on experience over service is the difference between managing the status quo and leading a change that pushes an organization forward.

stackpulse

Playbooks-as-Code: An Overview

You’ve heard of playbooks. But what about playbooks-as-code? How can playbooks be managed as code, and what does that mean for SREs and incident response teams? The short answer is that by automating the processes that are defined in conventional playbooks, playbooks-as-code take incident response and reliability engineering to the next level. For the longer answer, keep reading. This article offers an overview of playbooks-as-code, including how they work and the benefits they offer.

cloudera

Change The Way You Do ML With Applied ML Prototypes

Today’s enterprise data science teams have one of the most challenging, yet most important roles to play in your business’s ML strategy. In our current landscape, businesses that have adopted a successful ML strategy are outperforming their competitors by over 9%. The implications of ML on the future of business are clear. However, only 4% of enterprise executives today report seeing success from their ML investment.

stackstate

Only Autonomous Anomaly Detection Scales

Say you’re looking for a smart product to detect anomalies in your organization’s IT environment. A sales rep drops by and shows you all kinds of great artificial intelligence (AI) features with fancy-sounding algorithms. It sounds very impressive and seems like there is a lot of very valuable AI in the product. But, in fact, the opposite is true. This is a manual AI product wrapped in a deceiving jacket. Let me tell you more.

power admin

The Top 5 Benefits of Temperature Server Monitoring Solutions

Your servers generate heat—this is a fact common with any type of electronic device. The amount of heat they generate will vary, depending on where they are located and the number of servers in use. For example, a small business may have only one or two servers that are stored in a small server room. On the other hand, a large corporation could have hundreds of servers in a massive data center.

teamwork

Introducing Planned vs Actual Milestones Report to Teamwork

As we continue our focus on enhancing the reporting functionality throughout Teamwork this quarter, we’re delighted to introduce the first of three Planned vs Actual Reports — the Planned vs Actual Milestones Report. The aim of this new report is to give you an understanding of the actual status of your Milestones by comparing the original due dates with your current due or completed dates. With this view, you can quickly identify how a project is performing against your plan.

teamwork

Introducing the Teamwork Success Planner: A report to help your team maximize their use of Teamwork

Whether you’re onboarding a new tool within an organization or using an existing tool, it’s critical for your team to get the maximum use out of it. However, it’s just as important to ensure your team is using it as effectively and efficiently as possible. We know that many project management tools can be limited in their functionality and others may be too feature-heavy and it can be a little unclear on where to focus within the product to gain the most value.

teamwork

Introducing Email Notifications and Activity Reminders to Teamwork CRM

We are delighted to release the final piece of our notifications solution to Teamwork CRM with Email Notifications and Reminders. Until now, notifications were available in-app via the bell icon. To date this is how users received notifications for any changes to the deals they were following. However, there was still a notification gap to be filled. Once you were out of the application, you had no means of understanding how your deals progressed.

teamwork

60 of the best project management software options for 2021

Whiteboards are out—project management software is in. There's never been a better time for project managers to fully manage their team and projects thanks to the development of extremely useful project management software available in 2021. Because of this tech, it's now easier than ever to plan projects, schedule tasks, track milestones and create progress reports.

teamwork

Quickly set Task Reminders to ensure your team gets notified

Your team now has the capability to quickly set task reminders for any task in their task list. This new feature allows you to stay up-to-date on your latest tasks from start to completion — allowing for the timely execution of your project. We know in today's remote world teams are busy. Whether it’s balancing work lives with homeschooling or work commitments with personal lives, everyone is multitasking.

teamwork

Introducing customizable project navigation tabs in Teamwork

At Teamwork we understand that not all our customers want the exact same project navigation tab. This is especially true when you take into account the hundreds of thousands of users from varying industries that are within Teamwork everyday. But it’s clear to us that the ideal project setup–not only for each customer but each unique project–could be very different.

veracode

Announcing the First-Ever Veracode Hacker Games

“Destroying things is much easier than making them.” This quote from The Hunger Games rings true in software; developers spend months perfecting their innovative applications only to see it all crumble at the nimble fingers of a speedy cyberattacker. So how do you beat them? Improve your secure coding know-how early on and keep it sharp. More than half of organizations in North America provide developers with some level of security training annually, or less often.

statuscake

How to make remote meetings work during lockdown

Many people think because we’re an online business, with technology at the heart of everything we do, we’d be better placed than many to make the transition from in-person meetings to virtual meetings during the pandemic. Whilst we have made that leap and made it work well, it’s not because we’re au fait with tech and the latest tools, it’s quite the opposite.

Coralogix - On-Demand Webinar: Drive DevOps with Machine Learning

DevOps has become the de facto method of developing and maintaining software, but it comes with its own challenges. Keeping track of change in a complex, fluid environment is a serious hurdle to overcome. In this webinar, we explained how machine learning can be employed within a DevOps team to improve operational performance, optimize mean time to recovery and create a better service for your customers.
geckoboard

How to improve customer service: 8 tips from top companies

It’s no secret that good customer service is an essential aspect of any business. More than 80% of surveyed customer service professionals view customer experience as a primary or secondary differentiating factor for their organization. Yet, for many businesses, meeting and exceeding client expectations can be a challenge. In 2020, 40% of surveyed consumers stopped doing business with one or more companies because of poor customer service.

looker

Accelerate your Looker dashboards with BigQuery BI Engine

At Looker we’re constantly working to help you leverage the power of your database for greater performance, efficiency, and functionality. That’s why we’re so excited to have worked with the BigQuery team on the launch of Google’s new preview of BigQuery BI Engine — an in-memory analysis service that makes Looker running on BigQuery faster than ever.

devo

When Your Organization Should Adopt Centralized Logging

Most security pros know the value of log data. Organizations collect metrics, logs, and events from some parts of the environment. But there is a big difference between monitoring and a true centralized log management. How can you measure the effectiveness of your current logging solution? Here are four signs that it’s time to centralize log management in your organization: This post is based on content from the new Devo eBook The Shift Is On.

styra

Using OPA with GitOps to speed cloud-native development

Devops teams are flocking to GitOps strategies to accelerate development time frames and eliminate cloud misconfigurations. They should adopt a similar ‘as-code’ approach to policy. One risk in deploying fleets of powerful and flexible clusters on constantly changing infrastructure like Kubernetes is that mistakes happen. Even minute manual errors that slip past review can have substantial impacts on the health and security of your clusters.

jfrog

Microservices Asynchronous Communication and Messaging | JFrog Xray

Microservices have changed the way we build applications. Software design has moved from large monolithic applications (which are not really adaptable to changes and improvements) to a collection of small, independent processes infrastructure which is far more suited to adapt to changes in today’s agile world.

fyipe

Manual Monitors: Everything you need to know

In this post, I will explain what are manual monitors? Manual monitors are monitors that do not actively monitor any resources. You can use them if you are using an external monitoring tool and can ping Fyipe API to create incidents. They can also be helpful to create manual incidents for your customers and show them on status page. Manual monitors can be created in just 2 simple steps.

martello

Frequently Asked Questions | Vol 2

In an industry where technological evolution is commonplace, it’s easy to get lost in a sea of terminology and acronyms. It’s important to establish a solid foundation of understanding. In the second installment of our ‘Frequently Asked Questions’ series, we tackle issues related to effective monitoring, speed, and performance related to Microsoft 365 services.

m-files

Why 'Set It and Forget It' Information Governance Matters More Than You Realize

Anyone who has ever spent an appreciable about of time working with business information knows full well that the sheer volume of content within their deployment is growing by the day. But at the same time, the variety of content is also on the rise — which can easily lead to governance issues before you know it.

virtana

Is Your Cloud Cost Report Missing Critical Information?

Worldwide end-user spending on public cloud services is forecast to grow 18.4% in 2021, with the cloud projected to make up 14.2% of the total global enterprise IT spending market in 2024, up from 9.1% in 2020, according to Gartner. Enterprises are, therefore, rightly concerned about controlling their public cloud costs—to ensure they’re getting all the value they’re paying for.

pagerduty

6 Ways Retailers Can Maximise Value With Creative Engineers

“Engineering” and “creativity” aren’t often considered synonymous. However, in today’s world, where the online experience is at the forefront of virtually all business transactions and experiences, the creative engineer is finally getting the recognition they deserve. These individuals are quite literally building the virtual world we live in.

ivanti

Key benefits of advanced HTML5 that accelerate performance and simplify secure remote desktop access

What does it mean to securely access remote desktops from any device and from anywhere? 2020 was a game changer for the future of business operations and how, when and where people work. To enable secure remote access across an enterprise means making the Everywhere Workplace possible. Here’s how.

What are Manual Monitors?

In this video, I'll explain what are Manual Monitors? You’re also going to learn exactly how to create a Manual Monitor in just 2 simple steps while saving a lot of time. Think of Components like folders that contain other Fyipe resources and one of the resources it has is called "Monitors". Manual Monitors are monitors that do not actively monitor any resources. You can use them if you are using an external monitoring tool and can ping Fyipe API to create incidents.

Introduction to the ImGui C++ Library with Conan

The Conan team provides an introduction and demonstration for the open-source C++ graphics library known as ImGui. To show the basics of ImGui, we will create a simple application with some controls like buttons, scrollbars, color editors, and more. We will show how easily and quickly you can create a graphical user interface using this library. Finally, we will show how to a simple way to build ImGui using packages with Conan, the package manager for C and C++.

Be Proactive! Never be Surprised by End User Issues on Citrix or VMware Horizon

Learn how with Goliath you can automatically test availability from multiple locations, monitor logon performance and failures with a centralized dashboard, and quickly troubleshoot, resolve, and document initial stages of the logon process.

Design Sprints with Miro: "Hacking" Templates to Achieve Your Goals

Ever feel like you're staring down the barrel at a difficult problem and just spinning? We did too. Enter design sprint methodology—and the daunting task of planning, organizing, and executing in an impactful way. A Miro template, plus a few tweaks, helped us minimize the overhead so that we could actually focus on the real problem at hand, rather than getting distracted by the process.
honeycomb

Sweetening Your Honey

Are you looking for a better way to troubleshoot, debug, and really see and understand what weird behavior is happening in production? Service-level objectives (SLOs) and observability can help you do all that—but they require collecting and storing the right data. If we’re naive with our telemetry strategy, we spend a lot of money on storing data without seeing adequate return on investment in the form of insights.

sqreen

Preventing SQL injections in PHP (and other vulnerabilities)

If you’ve been around web development for a while, you’ve almost certainly heard the term “SQL injection” and some terrifying stories about it. PHP, like many other languages, is not immune to this type of threat, which can be very dangerous indeed. But, luckily, protecting your websites from SQL injection and other similar threats is something you can take tangible steps towards.

bulletproof

What matters most: VA scans or pen tests

All sources agree that cyber crime is increasing year on year, putting businesses small and large at increasing risk. Attacks jumped by 31% during the height of the 2020 pandemic alone, and is predicted to cost the global economy over $10 trillion by 2025. In order to stay ahead of the hackers, savvy enterprises are stepping up their security scanning regimes by using vulnerability scanning and penetration tests to uncover security flaws.

tripwire

ENISA Releases Guidelines for Cloud Security for Healthcare Services

The healthcare sector is undergoing digitalization and adopts new technologies to improve patient care, offer new services for remote patients and reach operational excellence. The integration of new technologies in the complex healthcare IT infrastructure creates new challenges regarding data protection and cybersecurity.

logitio

What Is Metasploit?

In this quick guide for cybersecurity professionals, we’ve invited some of our favourite security experts who have previously worked with Metasploit to explain why this tool is so valuable for conducting effective penetration tests and network reconnaissance tasks. Our first expert Michael Roninson, Security Expert at Cerber Tech gives a brief overview of this tool and how to use it in his response below;

siemplify

Selecting the Best SOAR Solution Series: Throw the (Play)book at 'Em! (Part 4)

Welcome to Part 4 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution for your business. In Part 1, we defined what SOAR platforms set out to do at their core. In Part 2, we listed the key core competencies that you can expect to find in a SOAR solution. In Part 3, we dove into one of those core competencies: case management. Part 4 will focus on the bread and butter of the SOAR category: playbooks.

netskope

How to Securely Manage Your Shift to the Cloud

All organizations want to take advantage of the cost savings, operational efficiency, and improved capabilities that a shift to the cloud provides. But having the right protections in place is key to make sure not only your users are protected, but that your sensitive data is also protected. Especially as workforces become increasingly remote, improved functionality and cloud security are both must-haves for any organization.

opsani

Build a Solid Foundation for the Cloud's Shifting Sands

Becoming cloud-native promises speed, flexibility, better products, and lower costs. But here’s the rub: for many companies, the reality isn’t nearly so rosy. Most digital transformation projects aimed at making companies more cloud-native actually drive up costs. Why? Well, there are many reasons; if you’re interested in root-cause analysis, Cloud FinOps by J. R. Storment is an excellent read.

squared up

How to embed Grafana visualization in SquaredUp

In our previous post on Grafana and SquaredUp, we compared the two tools across various benchmarks like ease of deployment, time to value, dashboard creation, dashboard sharing, and more. Both tools have their specific advantages over the other, but since the ultimate goal is to give you a single place to look – why not leverage Grafana for the visualizations and data sources it offers, but give them meaning by embedding them in SquaredUp?

xplenty

What Is a Data Stack?

These days, there are two kinds of businesses: data-driven organizations; and companies that are about to go bust. And often, the only difference is the data stack. Data quality is an existential issue—to survive, you need a fast, reliable flow of information. The data stack is the entire collection of technologies that make this possible. Let's take a look at how any company can assemble a data stack that's ready for the future.

bigquery

New in BigQuery BI Engine: faster insights across popular BI tools

Business analysts working with larger and larger data sets are finding traditional BI methods can't keep up with their need for speed. BigQuery BI Engine is designed to meet this need by accelerating the most popular dashboards and reports that connect to BigQuery. With the freshest data available, your analysts can identify trends faster, reduce risk, match the pace of customer demand, even improve operational efficiency in an ever-changing business climate.

dashbird

Introducing, Dashbird's serverless Well-Architected Insights

Dashbird now scans your serverless infrastructure for industry best practices. It’s the antidote for chaos. We’re excited to introduce the Dashbird Well-Architected Insights – a continuous insights scanner combined with Well-Architected reports. The new feature provides serverless developers with insights and recommendations to continually improve their applications and keep them secure, compliant, optimized, and efficient.

SIEM for SMEs: Five Myths Debunked

Many people, when reviewing their security strategy, ask the question "is SIEM suitable for my organization?" And for a long time, the answer was "no unless you are a large multinational". The price, the complexity and the hard-to-get value made SIEM a category suitable only for the big corporations with large security teams and budgets. While these used to be correct, that's no longer the case. And the problems that SIEM solves, related to reducing cyber risk, preventing insider threats, covering compliance requirements- are all problems that SME/mid-market organizations have as well.
raygun

Build successful React Native apps with Raygun

React Native has come a long way since an internal prototype at Facebook to where it is now. The cross-platform framework is now a go-to tool for businesses to develop natively rendered mobile apps for iOS and Android. Thanks to its reduced development time with hot reloading to its focus on runtime performance with natively rendered views, React Native has gained traction with large-scale companies like Shopify and Tesla.

manageengine

Streamline project management with advanced analytics for Jira Software

Managing projects isn’t an easy task, particularly if you’re managing parallel projects with inter-team dependencies. Lack of visibility coupled with difficulty in obtaining the right metrics on time can make it nearly impossible for project teams to track issues, action items, and risks, often resulting in projects running behind schedule, overshooting budgets, or worse, getting stalled due to unforeseen problems.

datadog

Announcing Support for GKE Autopilot

Google Kubernetes Engine (GKE) is the preferred way to run Kubernetes on Google Cloud as it removes the operational overhead of managing the control plane. Earlier today, Google Cloud announced the general availability of GKE Autopilot, which manages your cluster’s entire infrastructure—both the control plane and worker nodes—so that you can spend more time building your applications.

geckoboard

The hidden intricacies of CSAT

Customer Satisfaction Score (CSAT) is the oldest and most widely used customer satisfaction KPIs. It’s also one of the most popular north-star metrics amongst support teams. As with all metrics, it’s not without its complications. One is how to put the score into perspective. Is a CSAT of 80% good or bad? Zendesk and ACSI have great benchmarking reports that can help with this. But, there’s a complication that’s often overlooked.

cloudfabrix

Observability is transforming ITOM landscape as next generation monitoring

First things first. Observability is inherent as a principle to a system and not something that is instilled. Here, we are addressing observability as an open source based solution in the context of insightful monitoring within the ITOM landscape. ITOM is now in the middle of addressing the needs of the expanding and dynamic nature of IT infrastructure as a function. It is no longer about being a monolithic computing stack. It is now beyond monitoring discrete infrastructure elements.

alienvault

Quantifying CyberRisk- Solving the riddle

In the late 1990’s and early 2000’s there was a concept that was bandied about that was coined “Return on Security Investment” or ROSI. Borrowing from the common business term Return on Investment (ROI) where a return on a particular investment (capital investment, personnel, training etc.) could be quantified, the cybersecurity industry attempted to quantify a return on security investment.

alertops

What is Application Performance Monitoring (APM)?

Application performance monitoring (APM) solutions can help your business enhance its IT and grow its operations. To understand why, let’s answer some of the key questions surrounding APM. APM involves the use of technologies and tools to maintain consistent application availability, performance, and response times. So, your business can use APM solutions to monitor apps across its operations.

moesif

A Playbook to Properly Implement Pay As You Go Pricing

Usage-based pricing, consumption-based pricing, and PAYG (Pay As You Go) are relatively new SaaS pricing models that enable you to drive both top of line growth while also increasing net revenue retention over more traditional subscription pricing models such as license or seat-based pricing. With Pay As You Go, a customer only needs to pay for what they consume such as hours of a VM or number of messages sent.

sysdig

Sysdig contributes Falco's kernel module, eBPF probe, and libraries to the CNCF

Today, I’m excited to announce the contribution of the sysdig kernel module, eBPF probe, and libraries to the Cloud Native Computing Foundation. The source code of these components will move into the Falco organization and be hosted in the falcosecurity github repository. These components are at the base of Falco, the CNCF tool for runtime security and de facto standard for threat detection in the cloud.

lookout

Top Three Threats Facing US Government Employees Amid Telework

We’re all familiar with what happened in 2020. Amid the coronavirus pandemic, organizations worldwide were forced to send their workforces home. Along with the private sector, federal, state and local government agencies and departments across the United States implemented telework programs. Now that we’ve been living with telework for a year now, I wanted to understand how it has affected the government sector.

bitrise

5 ways the best mobile teams use release trains for increased speed and efficiency

Releasing with speed and confidence is every mobile team’s dream. To help you on that journey, mobile release trains can introduce a quicker release model and faster mobile cycles — making distributed development teams, that work on different parts of an application, become more aligned — regardless of their size.

jelastic

Kubernetes Cluster Automated Upgrade in Jelastic PaaS

Flexibility, accelerated development and delivery, improved scalability and high availability are the main reasons companies are adopting Kubernetes (K8s) technology. But managing and keeping the system up to date can be so complex for organizations that they need to hire a separate department just to handle everything properly. With Jelastic’s Kubernetes automation you can improve DevOps productivity and focus on your business aims rather than fighting infrastructure complexity.

time doctor

10 Powerful Time Management Tools For Individuals And Teams In 2021

Looking for powerful time management tools? Effective time management is as important for an ambitious individual as it’s for a mission-driven team. Fortunately, modern software can enable you to leverage powerful time management skills. In this article, we’ll highlight ten powerful time management tools that can boost your focus and productivity. We’ll go over their key features, pricing, and ratings to help you make an informed decision.

nightfall

A Guide to VPN Security

Many people are familiar with VPNs in the context of trying to stream TV shows for free. A VPN can make it seem like you’re in a different country by displaying an IP address in Europe or the US, for instance. Appearing to be in New York while traveling in the Netherlands gives you access to sites like Netflix, Hulu, and HBO Max — but the advantages of VPN security go beyond streaming the latest TV shows.

influxdata

Monitoring DigitalOcean Billing with InfluxDB

I’ve always had a good experience using DigitalOcean, a cloud infrastructure provider which offers developers cloud services that help deploy and scale applications that run simultaneously on multiple computers. I’ve used DigitalOcean a lot for my personal projects — for example, to host my personal blog, its stats, and a NextCloud instance, all running in Kubernetes.

virtualmetric

Why Monitoring Should be a Part of Your DevOps Strategy

DevOps came about as a result of ever-growing lags between development and operation. It’s a framework that deals with communication bottlenecks, allowing for smooth change management. DevOps monitoring is a crucial element and a necessity for this framework to succeed. Monitoring plays a vital role in realizing the underlying goals of DevOps. DevOps is all about eliminating technical inefficiencies and improving the speed of the whole cycle from development to deployment.

qlik

Becoming the Most Loved Baby Products Brand Globally With Qlik

I’ve been a Business Intelligence (BI) analyst and evangelist for over two decades now. As you can imagine I’ve worked with many different BI platforms throughout my career, especially during my time as a BI Consultant. In this role, I was product agnostic, so from Power BI to Tableau, you name it, I used it! However, Qlik Sense quickly stood out to me as the most powerful and intuitive platform on the market.

qlik

You're Not the Only One With Data Problems

I’ve met with lots of customers and prospects throughout my career. And, I’ve noticed that, when I’ve asked them to describe their current software situation, many would say the same things. “We should have updated this a long time ago.” “It’s embarrassing how long it takes to do a simple task.” “I bet other companies stopped doing things like this years ago.”

puppet

Enhance your secrets management strategy with Puppet + HashiCorp Vault

Security is paramount in today's digital world. Bad actors can use sensitive data to wreak havoc across thousands of machines in minutes if organizations do not have a solid cybersecurity strategy. Compliance requirements and regulations are increasingly calling for key management and strong encryption as part of a business's cybersecurity strategy. These are no longer optional but mandatory security requirements as DevOps also gains in popularity for agile development and application deployment.

netskope

Cloud and Threat Report: Shadow IT in the Cloud

The number of cloud apps being used in the enterprise increased by 20% in 2020, when the COVID-19 pandemic caused a sudden and dramatic shift to remote work for knowledge workers worldwide. Individuals, teams, and organizations all turned to cloud apps to help address some of the new challenges of remote work. The increase in the number of cloud apps was led by an increase in consumer and collaboration apps, the fasting spreading of which included Discord, Zoom, Lumin PDF, and…Xbox LIVE?

Tanzu Tuesdays - Modern Application Configuration in Tanzu with Craig Walls

Historically, application configuration has been managed internal to an application deployment, in environment variables, or in files placed in the filesystem of the running application. As applications evolved into microservices, however, that approach become inadequate. Centralized configuration, including application-specific and shared configuration, versioning and rollback capabilities, and auditing became necessary. As more applications and microservices are becoming containerized and deployed in Kubernetes, configuration continues to be challenging. While Kubernetes offers configuration via ConfigMaps and Secrets, there’s no clear way to manage the properties going into those resources. In this Tanzu Tuesday session, we’ll explore the Tanzu Configuration Service, a means of managing configuration in a Kubernetes-native way using ConfigMaps, but that also offers the benefits afforded in a centralized configuration option.
jaegertracing

Jaeger Persistent Storage With Elasticsearch, Cassandra & Kafka

Running systems in production involves requirements for high availability, resilience and recovery from failure. When running cloud native applications this becomes even more critical, as the base assumption in such environments is that compute nodes will suffer outages, Kubernetes nodes will go down and microservices instances are likely to fail, yet the service is expected to remain up and running.

d2iq

Kaptain Is Aboard: v. 1.0 Is GA!

AI and Machine Learning (ML) are key priorities for enterprises, with a recent survey showing that 72% of CIOs expect to be heavy or moderate users of the technology. Unfortunately, other research has found that the vast majority—87%—of AI projects never make it into production. And even those that do often take 90 days or more to get there. Why this disconnect between intent and outcome? What are the roadblocks to enterprise ML? And what can be done about them?

synopsys

Analysis of an attack on automotive keyless entry systems

The convenience of keyless entry systems can come at a price: your security. Learn how key fob hacks happen and why proactive security measures are a vital part of stopping them. With increased connectivity capabilities and larger and more complex software in automotive systems, modern vehicles are becoming more susceptible to cyber security attacks.

freshworks

How to encourage customer self-service?

We know that companies have been trying to persuade customers to use self-service for at least the past ten years, with mixed success. Now due to the pandemic it is being adopted at unprecedented rates according to the Boston Consultancy Group. So how do we encourage customers to carry on using self-service portals when life returns to ‘normal’?

solarwinds

APM Integrated Experience

We’ve been listening to our customers. Whether you’re a SolarWinds® Loggly®, SolarWinds AppOptics™, or SolarWinds Pingdom® user, we’ve been working hard to make your life easier. We’re happy to announce a brand-new experience designed to bring together real user monitoring, synthetic transactions, metrics, traces, and logs in a single platform, making it faster and easier to identify, triage, and troubleshoot application issues.

bigpanda

Can enterprises move fast without breaking IT?

In one of our recent webinars we discussed a challenge in digital transformation that is top of mind for many IT Ops leaders: how to actually transform with the least amount of pain… No matter how tired people are of the term “digital transformation”, it still represents an imperative strategy for enterprises wishing to survive in today’s dynamic business environment, let alone see growth and increased market value.

grafana

You should know about... transformations in Grafana

Transformations were introduced in Grafana v7.0, and I’d like to remind you that you can use them to do some really nifty things with your data. All performed right in the browser! Transformations process the result set of a query before it’s passed on for visualization. They allow you to join separate time series together, do maths across queries, and more. My number one use case is usually doing maths across multiple data sources.

tasktop

SAFe, Scrum, Kanban Share a Bottleneck and It's Not What You Think

Even in today’s economic downturn, where U.S. job postings are down overall compared to 2019, tech hiring is showing signs of being more resilient than average. In fact, seven of the ten most in-demand tech jobs are for developers—and none are for QA. That’s a bit alarming, because the Flow Metrics of several Fortune 100 companies now practicing value stream management (VSM) in their software portfolios have revealed an acute resource scarcity in QA.

cloudera

Five Trends for the Financial Services Industry to Track in 2021

With a new year ahead, it’s time for financial services to pause, take stock of the “new normal,” and plan a path forward. COVID-19 forced nearly every industry to adapt to a new reality, and the financial services industry was no exception. Consumer habits shifted drastically. Suddenly, many people started working from home. Employee and customer needs changed. Adaptability was a necessity.

splunk

Defense Department Cybersecurity: All Ahead on Zero Trust

With the Defense Department’s quick and successful pivot to a remote workforce last Spring via its Commercial Virtual Remote (CVR) environment, it proved that the future to fully operate from anywhere in the world is now. Gone are the days of thousands of civilian employees heading into the Pentagon or other installations everyday. However, with this new disparate workforce comes increased risks for network security. As my colleague Bill Wright expertly noted last Summer.

ivanti

Get more insights into your organization's mobile device posture information by using the Cortex XSOAR Pack for MobileIron (acquired by Ivanti) Core and Cloud

More than 52% of organizations now offer their employees, contractors and frontline workers the ability to work securely from any endpoint of their choice. This modern workplace includes diverse endpoints such as iOS, macOS, Android, Windows 10 devices, as well as other immersive and rugged devices such as HoloLens, Oculus, Zebra and more - and IT teams need a scalable solution to secure and manage them.

opsani

Human in the Loop (HITL) and the Move to AIOps

Implementing DevOps practices for application development has generated an incredible acceleration in code velocity and reliability, and that is just on the Dev side. As the infrastructure that runs applications is increasingly treated as code, similar benefits are being seen in the operations (Ops) side that deploy and run those applications.

SolarWinds Web Performance Monitor - Product Walk-Through

Web application availability is crucial for your organization. Whether your applications are accessed inside or outside the firewall, your business depends on them being up, available, and performing optimally. Watch this short video and learn how WPM allows you to constantly monitor availability and response time from one location or locations around the globe. Find problems before your users do. WPM is the easiest to use, most affordable application in this space.
siemplify

How SOAR Helps Service Providers Meet MSSP Challenges, Featuring Forrester Research [Video]

The modern SOC is a hybrid SOC, featuring a blend of in-house and outsourced professionals. For the latter group, security operations is their business, and MSSPs have discovered that SOAR technology provides a slew of benefits, including process consistency, speed and efficiency for analysts, and client collaboration and transparency.

kong

APIOps: End-to-End Automation Throughout the API Lifecycle

It is a truth universally acknowledged that the culture change side of any technology transformation program is the hardest and slowest part to get right. If you cannot efficiently operationalize a technology investment, that investment is wasted. This is no different in the world of APIs and microservices, where every service is designed to support a change to a digital-first culture. APIOps makes this change possible.

servicenow

Out of the box GRC Processes - How two companies prospered

At first glance, AltaGas Ltd. and Align Technology don’t have much in common. AltaGas Ltd. is a North American energy infrastructure business with a focus on owning and operating assets to provide clean and affordable energy to its customers. Align Technology is a leading manufacturer of 3D digital scanners and clear aligners used in orthodontics. However, the two companies share similar stories when it comes to the technology they use to manage governance, risk, and compliance (GRC) issues.

bigquery

How to use a machine learning model from a Google Sheet using BigQuery ML

Spreadsheets are everywhere! They are one of the most useful productivity tools available. They make organizing, calculating, and presenting data a breeze. Google Sheets is the spreadsheet application included in Google Workspace, which has over 2 billion users. Machine learning, or ML for short, has also become an essential business tool. Making predictions with data at low cost and high accuracy has transformed industries.

solarwinds

What Is Ticketing Software?

When something goes wrong with a user’s device, who do they turn to for help? Maybe an employee walks up to their favorite IT team member’s desk or sends them a Slack message. They may even try to find a DIY solution by browsing the web. Though these methods may ultimately give the user the result they’re looking for, they aren’t necessarily the most effective way to handle technology issues.

netreo

Product Update: Netreo On-prem Version 12.2.26 and Netreo SaaS Upgrade

With the recent release of Netreo On-prem v12.2.26, your premiere solution for full-stack IT management and AIOps is even better! Your latest release includes powerful new features and enhancements that simplify IT management with a single source of truth about the status of your entire infrastructure.

tripwire

10 Database Security Best Practices You Should Know

According to Risk Based Security’s 2020 Q3 report, around 36 billion records were compromised between January and September 2020. While this result is quite staggering, it also sends a clear message of the need for effective database security measures. Database security measures are a bit different from website security practices. The former involve physical steps, software solutions and even educating your employees.

zeronorth

Meet Your New CPSO: The Next Generation of Product Security

Over the past ten years, rising security breaches within leading companies have continually reinforced the need for a chief information security officer, or CISO, to protect critical things like IT systems, brand reputation, revenue and even stock prices. As a result, many boards and other invested figures currently demand a higher level of accountability and focus for managing cyber-preparedness, threat prevention and executive reporting, all of which the CISO must provide.

veracode

Dangers of Only Scanning First-Party Code

When it comes to securing your applications, it’s not unusual to only consider the risks from your first-party code. But if you’re solely considering your own code, then your attack surface is likely bigger than you think. Our recent State of Software Security report found that 97 percent of the typical Java application is made up of open source libraries. That means your attack surface is exponentially larger than just the code written in-house.

xplenty

Introducing Component Previewer

The component previewer is a feature that allows you to preview your data at each component step without having to validate packages and run full-scale production jobs. It gives you the ability to extract, transform and preview your data on any transformation component, allowing you to debug your pipeline and/or to confirm and validate your data flow logic. Component previews are similar to the data previews available on source components, which you might already be familiar with.

zendesk

Post-pandemic trends from a futurist-what consumers and employees want next

We’ve heard it a thousand times: “the pandemic is unprecedented.” And it’s true—COVID-19 has changed the lives of billions of people around the world and many of those changes are here to stay. The good news is that the pandemic has also shown that many businesses are able to adapt and thrive. Bernard Salt AM, one of Australia’s leading social commentators on trends, business, and society, has a hopeful view for the future.

teramind

Contact Centers Take On Remote Employee Management Challenges

It has been nearly a year since COVID-19 hit the Western world, bringing most of our in-person interactions to a grinding halt. As face-to-face commerce became far less tenable at the old brick-and-mortars, more of our businesses moved to the virtual. With companies no longer able to greet their customers with a smile, the responsibility for maintaining relationships with customers shifted increasingly over to the contact centers.

opsramp

The OpsRamp Monitor: February

Don’t stop thinking about tomorrow: For enterprise IT leaders everywhere, it’s no longer enough to lead well today and have teeth in the business. You must now be prepared for all manner and scope of uncertainty and change, and according to Accenture, very few organizations are there yet. In a recent report, the consultancy reports that only 7% of organizations are “future-ready”.

wandera

Develop your SASE strategy now, and get ahead of the curve

There are more devices, more networks, and more apps, in more places than ever before and many companies have changed their business practices to move outside of the corporate perimeter. This means revising IT policy to accommodate the new dispersed workforce. The most successful IT operations focus on enabling users while they are working remotely. A cloud-first model is needed to support more agile and flexible security strategies.

How to get your first green build on CircleCI

In this video we'll help you set up your first CircleCI build, run your first CircleCI build, break that build, use workflows to build our configuration file, and then advance workflows by fanning in and fanning out. We’ll then be adding some changes to use workspaces. And finally, we will conclude this learning activity by SSH’ing into your build.
circleci

Is my CI pipeline vulnerable?

Your continuous integration (CI) pipelines are at the core of the change management process for your applications. When set up correctly, the CI pipeline can automate many manual tasks to ensure that your application and the environments it runs in are consistent and repeatable. This pipeline can be an integral part of your security strategy if you use it to scan applications, containers, and infrastructure configuration for vulnerabilities.

circleci

Managing reusable pipeline configuration with object parameters

CircleCI pipelines are defined in configuration files using the YAML syntax, which has been widely adopted by many software tools and solutions. YAML is a human-readable declarative data structure commonly used in configuration files and in applications where data is being stored or transmitted. The data in pipeline configuration files specifies and controls how workflows and jobs are executed when triggered on the platform.

circleci

The path to production: how and where to segregate test environments

Bringing a new tool into an organization is no small task. Adopting a CI/CD tool, or any other tool should follow a period of research, analysis and alignment within your organization. In my last post, I explained how the precursor to any successful tool adoption is about people: alignment on purpose, getting some “before” metrics to support your assessment, and setting expectations appropriately.

circleci

Using the CircleCI API to build a deployment summary dashboard

The CircleCI API provides a gateway for developers to retrieve detailed information about their pipelines, projects, and workflows, including which users are triggering the pipelines. This gives developers great control over their CI/CD process by supplying endpoints that can be called to fetch information and trigger processes remotely from the user’s applications or automation systems.

nice

NiCE VMware Management Pack 5.3

Virtualization is part of many IT environments and a very effective way to reduce expenses while boosting efficiency and flexibility. The NiCE VMware Management Pack enables advanced health and performance monitoring for VMware to leverage your existing investment, reduce costs, save time, and build efficiencies that will help shape a future-proof business.

Featured Post

Using Technology to Keep Compliance Costs Down

Regulatory compliance is overwhelming for any company without the right tools. Think of multinational financial firms that have to comply with laws in multiple jurisdictions where they operate. Thus, as various governments continue to implement programs to lower regulatory burdens on businesses, company leaders know there's a need to cut down on regulatory compliance costs. Luckily, technology can help cut compliance expenses without cutting regulations-related oversights and protection.
datadog

Use Datadog geomaps to visualize your app data by location

Being able to track and aggregate data by region is important when monitoring your application. It can provide visibility into where errors and latency might be occurring, where security threats might be originating, and more. Now, you can use Datadog geomaps to visualize data on a color-coded world map. This helps you understand geographic patterns at a glance, including where users are experiencing outages, app revenue by country, or if a surge in requests is coming from one particular location.

freshworks

Crayons: Coloring web experiences, the Freshworks way

If you have worked on building user interfaces for a large project, you would probably have learned the importance of component libraries. They contain a set of ready-to-use components that help you build UI fast and also maintain consistency across the entire project. Building a consistent and seamless user experience is hard. This is where component libraries can help.

freshworks

12 Customer Support Tools You Absolutely Need To Have in 2021

In a world that is so technologically-driven, having the right customer support tools is essential to delivering great customer service, keeping employee health in check, and gaining an edge over your competitors. With the range of support tools available today — one for shared inbox, one for bug tracking, another one to allow for inter-team collaboration, and yet another one for project management — how do you identify the tools that you really need?

alienvault

Cybersecurity and online gaming: Don't be a victim

Theresa Lanowitz collaborated on this blog. The proliferation of technology and internet connectivity has made it possible for people to seek out most things online, and gaming and gambling are not exceptions. In addition to online video games, social media, music, and video streaming, there are also online casinos and gambling for real money. Well, for gambling in the USA there are state laws to mind, but in some states online gambling is permitted.

cookdown

Four ways to send SCOM alerts to ServiceNow

If you work with Microsoft System Center Operations Manager (SCOM) and ServiceNow then you will be familiar with the fear of missing a critical infrastructure alert! But fear no more, we have just the ticket! Imagine if you could get these two tools working together, to fully synchronize your alerts and incidents for the lifetime of an issue – you’d be living the ITSM dream, right! So, here are our top four methods for making this dream a reality.

appian

Low-code in the Insurance Industry: Facing the Challenge of Digital Transformation

The insurance industry is among those most impacted by the COVID-19 pandemic. Claims are likely to top €190 billion in 2021, according to reinsurer Lloyd’s of London. However, the pandemic did not fire the starting pistol in challenging insurers to transform, although it has amplified the issue. You can read more about the challenges specific to this sector in a recent interview with Gijsbert Cox, EMEA Insurance Industry Leader at Appian.

metricfire

Single-Tenant Cloud vs Multi-Tenant Cloud

In this article, we shall talk about the advantages and disadvantages of single-tenant cloud and multi-tenant cloud. So let us get started! In the past decade adoption of cloud computing has been off the charts. For a long time most companies (primarily enterprises) managed their own IT infrastructure and they could reap the benefits of isolation, privacy and greater management control. This is what is known as a single tenant cloud architecture i.e.

sematext

How to Find Memory Leaks in Websites and Web Applications

Knowing how your users interact with your web application and how they experience it is crucial to provide the best possible experience. So what do you need to know? Start with metrics such as page load times, HTTP request times, and core Web Vitals – time to the first byte, first contentful paint. If you use Sematext Experience you’ll see a number of other useful metrics for your web applications and websites there. However, metrics themselves are only a part of the whole picture.

cyphere

How to perform a cyber security risk assessment? Step by step guide.

Taking cyber security risk assessment out of the equation, risk assessments are nothing new to the world. Industries such as nuclear, aerospace, oil, agriculture, military and railroad have long-established processes to deal with risk. Continuous risk assessments are performed by food, medical, hospital sectors to control risks affecting their environments.

Dear CISO

As security practitioners, we all have things we want to be able to tell our CISO’s. We need to tell them we need more money, more headcount, we need to be able to tell them their baby (security program) is ugly. Everyone wants the ear of a CISO for the dollars they control. We just want their ear to help them understand what’s really going on in the industry and in their organization.

It Came From The Clouds

Beware that which lives amongst the Clouds. Or, ya know, just attack them mercilessly. One of the best parts about having such talented security pros at Splunk, is they also make amazing products. And some are even free. Enter the Cloud Attack Range, a detection development platform written/maintained by Splunkers Jose Hernandez and Mike Haag and open-sourced to everyone. Joining us will be Co-Founder of Red Canary Keith McCammon. Red Canary integrates with Attack Cloud to help generate attack data. It’s a true community project and we’re going to chat about it.

I Wish Someone Had Squished That Phish

It’s long since been established that it’s not if a breach will occur in your enterprise, it’s when. Are you prepared for that response? As Dave Kennedy, CEO of TrustedSec once asked a Brrcon audience, “If all you had was Sysmon, could you still do a successful IR?” Best practices are only best if you actually practice them. Along with Robert Wagner, Staff Security Specialist at Splunk, we’ll talk about ways to get your teams to their fighting weight when the bad guys sneak in through the basement.

Introduction to Azure Service Bus | Serverless360

We are back with a discussion on Azure Service Bus, the most popular messaging service from Microsoft Azure. In this video, we throw light on the Queues and Topics, along with guidance on choosing the right service for your business scenario. Also, discover the significance of topic subscription rules using Serverless360.

Accelerating support to Microsoft Azure Serverless resources | Serverless360 #webinar

Discover how Serverless360 could efficiently complement the Azure portal in managing and Monitoring all your Azure resources under one roof. Also, our experts will provide solutions to mitigate the challenges in supporting your Azure applications. This video elaborates on how to achieve Proactive Monitoring, Holistic Application View & End-to-End tracking to accelerate support to Azure Serverless Services which eventually reduces the Total Cost of Ownership.
unravel

Creating a Data Strategy & Self-Service Data Platform in FinTech

In this episode of CDO Battlescars, Sandeep Uttamchandani, Unravel Data’s CDO, speaks with Keyur Desai, CDO of TD Ameritrade. They discuss battlescars in two areas: Building a Data Strategy and Pervasive Self-Service Analytics Platforms. Keyur is a data executive with over 30 years of experience managing and monetizing data and analytics.

time doctor

13 Best Virtual Management Software In 2021 (Features, Pricing, Ratings)

Searching for great virtual management software? Managing a virtual environment is not easy. For starters, you need to monitor things like resource distribution, security, and backup. And without a dedicated platform, it can be challenging to know the current status of any virtual machine on your network. That’s why you need virtual management tools. But with hundreds of apps out there, which one should you choose?

thundra

Ebbs and Flows Of DevOps Debugging PART 2

This piece is the second part of a two-part series on how focusing on cloud debugging practices can accelerate our DevOps intentions. In part 1, we explored how an increased move to the cloud pushed for the adoption of DevOps practices. However, throughout the past decade or so, since we have been looking at DevOps with the advent of the cloud, we have hit a glass ceiling in our DevOps practices.

squadcast

Overview of Incident Lifecycle in SRE

Incidents that disrupt services are unavoidable. But every breakdown is an opportunity to learn & improve. Our latest blog is a deep dive into best practices to follow across the lifecycle of an incident, helping teams build a sustainable and reliable product - the SRE way As the saying goes, “Every problem we face is a blessing in disguise”.

trello

How AI And Machine Learning Streamline Collaboration

While technology has yet to make good on futuristic predictions of flying cars and portable cities, technology has delivered on one prediction that makes everything from work to private lives easier: artificial intelligence (AI). The application of AI and its subset, machine learning, is fast-growing—especially in the business world: A 2019 Gartner survey found that the number of enterprise companies implementing AI had grown 270% over the previous four years.

nightfall

5 Identity and Access Management Best Practices

Stolen credentials are among the biggest threats to data security across industries, accounting for around 90% of data breaches. The identity and access management market — consisting of expertise, identity access management tools, and software, and training — is predicted to grow from about $10 billion in 2019 to over $22 billion by 2024. Here’s what you need to know about this increasingly important aspect of data security.

nightfall

Nightfall simplifies data security & HIPAA compliance for SimpleHealth

SimpleHealth takes their company name to heart. They are a reproductive tele-health company, focused on building thoughtful and impactful services that enable patients to own their reproductive health journey. Today, the core vertical is an online birth control prescription and free home delivery service.

kong

Tutorial: Using Kong Kubernetes Ingress Controller as an API Gateway

In this first section, I’ll provide a quick overview of the business case and the tools you can use to create a Kubernetes ingress API gateway. If you’re already familiar, you could skip ahead to the tutorial section. Digital transformation has led to a high velocity of data moving through APIs to applications and devices. Companies with legacy infrastructures are experiencing inconsistencies, failures and increased costs. And most importantly, dissatisfied customers.

coralogix

SaaS vs Hosted Solutions: Which Should You Choose and Why?

A key decision that must be made in a product’s lifecycle is SaaS vs Hosted. Should we be only employing the use of hosted solutions, or are we going to utilize SaaS offerings? Hosted solutions are services from providers like AWS and Azure, that take away the operational burden from some well-known pieces of tech, like Kafka or Grafana. SaaS solutions on the other hand are platforms like Coralogix, that offer proprietary value. They each offer benefits and drawbacks. Let’s get into it.

coralogix

Key Differences Between Observability and Monitoring - And Why You Need Both

Observability and Monitoring are viewed by many as interchangeable terms. This is not the case. While they are interlinked, they are not interchangeable. There are actually very clear and defined differences between them. Monitoring is asking your system questions about its current state. Usually these are performance related, and there are many open source monitoring tools available. Many of those available are also specialized.

influxdata

InfluxDB C Client Library for Capturing Statistics

Currently, there is no official InfluxDB C language client library. Fortunately, I wanted to do exactly that for capturing Operating System performance statistics for AIX and Linux. This data capturing tool is called “njmon” and is open source on Sourceforge. So having worked out how and developing a small library of 12 functions for my use to make saving data simple, I thought I would share it. I hope it will prove useful for others.

auvik

11 Network Traffic Terms to Know

Every industry loves its terms and jargon. Stop me if you’ve heard this one before: “I’ve always said that one of my core competencies is getting the most bang for my buck out of the sweat equity I put in during my 9-to-5.” Sure, the sentence doesn’t really make any sense, but it sounds good enough when you say it. And that’s just the point jargon tends to make. The IT industry is no different.

sysdig

What's new in Sysdig - February 2021

Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new features to all of our customers, automatically and for free! We hope you all managed to make it through January, and happy Lunar New Year! February welcomes the launch of our always-popular fourth annual Sysdig Container Security and Usage report, which looks at how global Sysdig customers of all sizes and industries are using and securing container environments.