Docker Security 101: challenges, risks, and 33 best practices

Containers, along with orchestrators such as Kubernetes, have ushered in a new era of application development methodology, enabling microservices architectures as well as continuous development and delivery. Docker is by far the most dominant container runtime engine, with a 91% penetration according to our latest State of the Container and Kubernetes Security Report.


Understanding page faults and memory swap-in/outs: when should you worry?

Imagine this: your library is trying to step up its game and compete in the Internet age. Rather than you browsing the shelfs, trying to remember how the Dewey Decimal works, you'll enter your book selections from your phone. A librarian will then bring your books to the front desk. You place your book order on a busy weekend morning. Rather than getting all of your books, the librarian just brings one back.


"Easy Instrumentation" or "Portable Instrumentation" - Choose Two

The contribution of Datadog’s automatic instrumentation code to OpenTelemetry will make it easier than ever to get started with distributed tracing. With support for hundreds of popular frameworks across seven languages, the new OpenTelemetry auto instrumentation initiative is off to a great start. However, you don’t need to wait for the OpenTelemetry port to take advantage of automatic instrumentation in LightStep!


Five worthy reads: Infrastructure as Code, the single source of truth

From server setup and hardware configuration to application deployment, traditional end-to-end IT infrastructure management has high overhead and takes a lot of time and effort. With the advent of cloud computing, IT infrastructure has evolved to address the availability, scalability, and agility problems organizations face. Yet the issue of inconsistent configurations remains, because the manual setup of cloud infrastructure can still lead to discrepancies.


A look inside Kafka Mirrormaker 2

In our previous blog on A Case for Mirromaker 2, we had discussed how enterprises rely on Apache Kafka as an essential component of their data pipelines and require that the data availability and durability guarantees cover for entire cluster or datacenter failures. As we had discussed in the blog, the current Apache Kafka solution with Mirrormaker 1 has known limitations in providing an enterprise managed disaster recovery solution.


What is CSIRT? What are CSIRT Roles and Responsibilities?

What is CSIRT? CSIRT (pronounced see-sirt) refers to the computer security incident response team. The main responsibility of the CSIRT is to expose and avert cyber attacks targeting an organization. As the number of cyber threats grow each and every day, the importance of having a security team that is solely focused on incident response (IR) is fundamental.


What You Need to Know About B2B Customer Success to Beat Your Competition

Great companies have always cared about their customers. When a customer pays for a service or offering, it’s up to the company to make sure what they paid for meets their needs. In the past, this may have meant a follow-up call or two, and then the company moved on. However, as the B2B customer experience evolved, a single phone call is no longer good enough. Now, companies have entire “customer success” teams that focus solely on ensuring the customer is happy and remains that way.


What are Microservices? Code Examples, Best Practices, Tutorials and More

Microservices are increasingly used in the development world as developers work to create larger, more complex applications that are better developed and managed as a combination of smaller services that work cohesively together for more extensive, application-wide functionality. Tools such as Service Fabric are rising to meet the need to think about and build apps using a piece-by-piece methodology that is, frankly, less mind-boggling than considering the whole of the application at once.


What is the Dark Web?

The dark web is a collection of websites that exist on encrypted darknet, overlay networks that can't be found by search engines or visited with traditional web browsers. Almost all websites on the dark web require special software (like the Tor browser), configurations or authorization to access. One common misconception is the confusion between the dark web and the deep web. The dark web makes up a small part of the deep which, the part of the Internet that is not indexed by search engines.

super monitoring

LiveAgent: Help Desk Software with Unlimited Options

Customer service is trendy topic these days. After there was a boom around technology at the start of 21st century, the internet has settled down and now it’s more about the basics. Automation has taken huge part of the overall human resources and people are demanding human approach, even if it’s on the internet. Today we are going to review one of the oldest customer service software around, LiveAgent.