IT Operations in 2020: Five Things to Prepare for - From AIOps to Multi-cloud and More

The following first appeared in Cloud Tech News. The threat of digital disruption has forced senior executives and technology leaders to rethink business models, data assets, and distribution channels, in order to create innovative products and services that will delight customers and overcome nimbler competitors. Over the last decade, enterprises have completely transformed the way they build, deploy, manage, and maintain mission-critical services as a response to increasing digitization.


Get a Free LogDNA Account in The Github Student Developer Pack

As a student, developing your software engineering skills is about continuous learning and practice. When building software in the real-world, developers are expected to be proficient with a variety of tools and stacks. Internships, class and personal projects provide great opportunities for students to gain the experience needed to become more effective.


Top 10 security traps to avoid when migrating from a monolith to microservices

Your team is thinking about migrating from a monolithic architecture to microservices. You’re intrigued. The promises of additional scalability and more predictable deployments sound nice. You’ve also been down this road before, and you know that those promises don’t always equal reality. You also know that migrations to a microservice approach don’t always go as planned.


Good to Go: Getting Started with AWS Lambda and Go

Go is undoubtedly one of the fastest-growing languages today. Since its 1.0 release in March 2012, it has seen adoption in a vast number of industries, but particularly in the cloud computing space. From microservices to the tools and components that power some of the largest cloud infrastructures, it’s hard to ignore Go’s contribution.


The same, but different: Boosting the power of Elasticsearch with synonyms

Using synonyms is undoubtedly one of the most important techniques in a search engineer's tool belt. While novices sometimes underestimated their importance, almost no real-life search system can work without them. At the same time, some complexities and subtleties arising from their use are sometimes underestimated, even by advanced users.


The Difference Between Alert-Centric vs. Threat-Centric SOAR (Video)

After years of investing in best-of-breed detection and SIEM tools, security operations centers are buried in alerts, giving rise to interest in security orchestration, automation, and response (SOAR) technologies. Not unlike other security solution categories, many of the vendors in the SOAR space tout similar, if not the exact same, benefits.


Know Your Logs: IIS vs. Apache vs. NGINX Logs

Today’s web server ecosystem has three big players: IIS, Apache and NGINX. Although only two of them (Apache and, to a lesser extent, NGINX) are cross-platform, it’s increasingly important to be able to work with all three of these servers, because you never know which type of operating system and web server platform you’ll be asked to support. That’s why understanding the nuances of IIS, Apache and NGINX logs is important.

ca technologies

Achieve Faster Time To Value with New Cluster Management Console in DX APM

Today’s APM solutions often require a vast amount of time and effort to implement – especially for enterprise companies who are monitoring a large number of applications. As businesses are focused on digital transformation, traditional solutions have become a bottleneck by slowing down the on-boarding process, making it difficult to scale-out while creating a lot of administrative overhead.


How Bug Bounty programs work

With cybercrime on the rise, companies are always looking for new ways to ensure they are protected. What better way to beat the hackers than to have those same hackers work FOR you. Over the past few years, corporations have turned to Bug Bounty programs as an alternative way to discover software and configuration errors that would’ve otherwise slipped through the cracks.


Loki's Path to GA: Query Optimization, Part Three

Launched at KubeCon North America last December, Loki is a Prometheus-inspired service that optimizes storage, search, and aggregation while making logs easy to explore natively in Grafana. Loki is designed to work easily both as microservices and as monoliths, and correlates logs and metrics to save users money. Less than a year later, Loki has almost 6,500 stars on GitHub and is now quickly approaching GA.