December 2020


Kubernetes Threat Vectors: Part 6 - Credentials Access

Welcome to our sixth blog post on the Kubernetes threat vectors series. We are covering different tactics on the Kubernetes attack matrix, published by Microsoft and originally based on the MITRE ATT&CK framework. In this blog post, we will review the Credential Access tactic, and cover its techniques.


Serverless Monitoring is No Longer Finding a Needle in a Haystack

At, we use AWS Serverless Stack and Kubernetes for all the core real-time pipelines, and it is a data-driven execution across all AWS Services — ECS, Lambda, SQS, Fargate, etc. With hundreds of services and thousands of invocations, each day presents significant complexity to configure, monitor, review logs, measure latency, etc. For configuration and CI/CD, we use the Serverless Framework for packaging and deploying AWS Lambda functions.


Definitive Guide to Remote Java Debugging

In the world of software development, there’s no such thing as writing perfect code. As such, almost every software developer ends up spending a great deal of their time debugging code. Therefore, one of the best ways to increase your efficiency as a developer is to have the ability to locate errors, identify the root cause, and fix it to resolve problems in your codebase.


How To Become A Kickass Dev Manager In 2021

As all dev managers, including ourselves, have witnessed, the last few years have been characterized by unprecedented and rapid technological advances. Due to this, there has been a fundamental change in the way applications are being developed. The software world as we knew it shifted from monolithic app development to new methods such as microservices architectures, cloud functions, and distributed systems that are faster and more agile.

power admin

Steps for Developing IT Organization Strategies for Your Business

Does your IT department perform re-actively to problems as they occur or are they proactive, attempting to head off problems before they occur? Sadly, many IT departments are reactive because they lack the proper IT organization strategies to use technology and apps to become proactive. Taking a reactive approach is ineffective and affects productivity and the potential growth of your business.


A New Year and a New Ivanti

2020. A year that will never be forgotten and one that has had everlasting impacts on business operations, how we work, and our daily lives. As I reflect on this past year, I realize that 2020 has been the longest test for us all. 365 days long. It’s been the year of rapid change, one where adopting innovative adaptability is critical. I have been thinking about my New Year’s resolution and discovered that 2021 is the year when we make a collective resolution.

squared up

On/Off NOC Dashboards with SquaredUp

How do you define your workday? You walk into your office, grab a coffee, turn on your laptop and take a look at your central source of information – often dashboards – to glance at things happening overall, tasks assigned to you and sketch your schedule accordingly. A lot of our customers we talk to share a routine like this, and SquaredUp dashboards are often their one-stop-shop for consuming alerts/tasks that need their attention.


Developer Tooling for Kubernetes in 2021 - Helm, Kustomize, and Skaffold

Over the last few years, we have seen an avalanche of tools to enable easier software development on Kubernetes (let’s face it, it is quite hard out of the box). As often happens in growing ecosystems, some tools grow and adapt, while others get left behind, or at the very least, merged into new offerings. What’s a better way to open 2021 than with an up-to-date review of the options we have?


MSP Security Incident Response Planning (a Quick Guide)

Every second counts when it comes to Managed Service Provider (MSP) security — the longer it takes an MSP to complete security incident response, the greater the ramifications of the incident on the service provider and its stakeholders. When faced with a cyber attack, it’s crucial to understand the potential consequences of the security incident. It also is paramount for an MSP to establish a plan, so it can quickly and effectively respond to cyber attacks and other security incidents.


Revisiting 2020, the year of the new normal

Compared to other years, 2020 has been a lot different in every single aspect; from how we all interacted to how we operated, everything changed. It was the year where the adjective "unprecedented" was overused. As the world embraced remote work policies, the only thing that remained unchanged was the fact that we operated uninterrupted and our customer support kept churning out replies to customers’ questions. It was business as usual for us.


Why Test Automation Tools Are Important For New Work Style?

2020 was a testing year for one and all. There were many challenges we had to face and still continue to face. One of them was the challenge to continue working even with the pandemic situation. But, thanks to technological advancements, most of us were able to figure out a way to keep working. And that gave birth to a new style of working for the majority of people around the world. The new style of working includes working from home.


Good Catch: Customer Experience Monitoring

As the customer experience has moved almost entirely online, finding and fixing issues before they impact your conversions, retention, and revenues has become an increasingly complex task. In this article, two real-world examples are presented from the gaming and eCommerce industry that showcase the limitations of static thresholds and the impact that has on customer experience.

Looking Back on 2020: A Timeline of Product Innovation

2020 might be a year many of us want to forget, but this year, we also unveiled a variety of new products and features worth remembering. For the team, 2020 was a year full of innovation as we worked to continuously improve our product and complete our unified observability vision. We also launched a variety of new capabilities for Log Management, Infrastructure Monitoring, Cloud SIEM, and Distributed Tracing, that make our product faster, smarter, and more cost-efficient.


How to Monitor Network Traffic With NetFlow

Troubleshooting Network problems in a timely manner is extremely critical for maintaining network performance and delivering advanced network services within an organization. For network engineers and administrators, troubleshooting network bandwidth related issues can be achieved by taking advantage of existing flow technologies within the routers and switches. By using NetFlow, monitoring network traffic not only becomes much simpler but also provides broader visibility within the network.

super monitoring

13 Marketplaces to Sell or Buy a Website or a SaaS Business

Web design is creative and time-consuming at the same time. But sometimes, selling a design, a template, or a ready to use website can get challenging. It might not prove to be as much of a revenue generator as one would like, and there could be several reasons for it. For one, the justified asking price might get slightly high due to the scale of investment and time involved, and thus, buyers might move to other vendors.


WLSDM Blog: Oracle Internet Directory Component Monitoring

In this blog, we will examine the changes in OID 11g and 12c and how to track the component’s health through WLST and WLSDM. Please read complete blog post about the structure of Oracle Internet Directory and related OID component monitoring in WLSDM. Oracle Internet Directory is an LDAP Directory that uses an Oracle Database for storage. OID provides user management and group information from a central location within complex systems.


Introduction to Serverless Machine Learning (Part 2)

In the previous post of our Serverless Machine Learning mini-series, we discussed how to develop and package a predictive model using scikit-learn. This was to prepare a model that could be used in the future to deploy to AWS Lambda, allowing a developer to call your serverless machine learning model like an API end-point without the need to design and implement an entire API.


Top Cloud-Native Guides for 2020

2020 was a busy year for Civo, and we couldn’t have done it, and get where we are now, without our community of users. Between the wider community, our Civo Ambassadors, and our staff team, there is an enormous amount of knowledge and skill to be found. I’d like to present some of our top cloud-native guides for the year gone by, drawn both from guides published on our site and around the web by our community of users.


NodeSource brings arm64 support, C++ API and Event Profiler to N|Solid!

NodeSource is excited to announce the release of N|Solid 4.4.0 This latest release includes exciting features that users of the N|Solid Node.js Enterprise Runtime will want to understand and start utilizing right away. They include support for arm64 architecture, a C++ API (Beta), and the new Event Profiler tool.


VirtualMetric: 2020 at a Glance

2020 was a year we all will remember. The whole world got an experience like never before. At VirtualMetric we have always believed in a global team with no borders. This year almost every company joined us in the remote work approach. Despite the challenges we were surrounded by, our team had a productive year. We not only saved our entire crew but hired more talented people to our VirtualMetric family, which helped us to achieve our ambitious goals.

Observability at Scale: Analyzing Billions of Microservices | DeveloperWeek Enterprise

As more enterprises adopt cloud-native environments and with the growing complexity of infrastructures and systems, understanding your modern architectures is crucial. At scale, with thousands of microservices, visualization becomes critical to understand performance, flow, and the health of applications. and In order to properly scale and still obtain full control, you have to have the right observability strategy and tools. In this talk, we'll go over the challenges, the solutions, and the tools to truly achieve end-to-end observability and get you scaling with confidence.

Visualizing and Analyzing APIs and Microservices in Distributed Environments | API World 2020

Modern, distributed applications are often seen as a graph of nodes and edges, each node representing a container, a function, or an API service. At scale, with thousands of small microservices visualizing and analyzing becomes critical to understand performance, flow, and the health of our applications. To accomplish that we need to learn about observability, distributed tracing, popular tools and frameworks, and more. In this talk, we'll go over the challenges, the solutions, the approaches, and the tools to help you understand your APIs and microservices.

Serverless + DevOps: A Perfect Fit | DeveloperWeek Cloud 2020

Serverless - Devs love it as it enables them to move much faster, but Ops tend to be suspicious towards it as it entails “loss of control” over your infrastructure. When making the DevOps transformation, these worlds seem to collide. But serverless is actually a great fit with the DevOps culture, and it can even help you make the transformation.

How to add Moesif API Analytics and Monitoring to Kong Ingress Controller

Kong is a popular open-source API gateway to help manage your APIs. With Kong, you can handle authentication, rate limiting, data transformation, among other things from a centralized location even though you have multiple microservices. Kong is built on NGINX at it’s core, one of the most popular HTTP servers. Being open-source, Kong is very easy to deploy on-premises usually in just a few minutes without requiring the installation of many components other than a Postgres or Cassandra store.


Threat Thursdays: 2020 A Year in Review

We can finally bid a not so fond farewell to 2020. Looking back at our Threat Thursday series in reflection there is no way other than to say 2020 was a brutal year in cybersecurity. 2019 had already driven ransomware into high gear, but the seven-figure ransom extorted from Travelex really set the tone for what was to come this year. The New Year is a time to reflect, but most importantly it’s a time to learn from the past to create a safer, more secure future.


CrunchMetrics Year in Review 2020: A Year That Was an Anomaly in Itself!

2020 in itself was an anomaly – one that no one saw coming! It made us all learn and adapt quickly – turning couches at home into workstations, finding new ways to meet clients through platforms like Zoom, accelerating digital transformation like never before, driving our resilience to come together and support one another. We had our share of some big and small moments worth looking back at!

sauce labs

2020 Firsts

Like most other companies (essential workers notwithstanding), we were forced to shift to an all-remote workforce, meaning many Saucers found themselves working from home for the first time. This presented challenges, of course—some of us simultaneously became homeschool teachers, we lost the ability to have quick hallway conversations, and we just plain missed seeing our coworkers—but in the end, we rallied together and embraced the new normal (or should we say the Zoom normal?).


Escaping GKE gVisor sandboxing using metadata

GKE is a Google Cloud service that offers a managed Kubernetes cluster, the nodes of the clusters are running on Google Cloud VM instances, the control plane and network is fully managed by GKE. GKE offers a sandboxing feature ( ), based on gVisor ( ) it protects the host kernel from untrusted code.


What is ChatOps?

The term ‘ChatOps’ was first coined by Github to describe how their internal teams used a bot called Hubot to handle DevOps. Since then, ChatOps has been practically (and successfully) adopted by numerous organizations as an additional enabler to the DevOps framework. ChatOps is a conceptualized collaboration model that embeds DevOps processes and tools within an organization’s communication channels to aid transparency and workflow automation.


Site Reliability Engineer Job Interview - Tips and Questions

Preparing for an interview is a never-ending process, because you will never know what the interviewer is going to ask you and how. And that's why IT people always say, "I'm still not the Master in my field as improvements plus new technologies are coming up day-by-day". People often consider SRE and DevOps as “Siblings”, but in-reality they are different.


AWS Aurora vs RDS

Aurora is an AWS database service that is compatible with MySQL and PostgreSQL, but uses an innovative database engine behind the scenes. Applications that currently use MySQL/PostgreSQL can be migrated to Aurora with minor or no changes. An Aurora database instance can store between 10 GB—64 TB, with data divided into 10 GB blocks and distributed on different disks.


Monitoring Telegraf Plugins in Your Architecture

Monitoring Telegraf — the open source, plugin-driven server agent for collecting metrics from stacks, sensors and systems — is important because it allows you to track the health of Telegraf plugins in your stack. It’s for this purpose that the Telegraf Monitoring Template was developed. Before introducing the template, it’s helpful to recall how Telegraf works.


50 Best Customer Experience Management Solutions

Customer experience includes so much more than a single interaction or impression; it involves a range of interactions and experiences throughout the lifetime of a customer relationship, from the first awareness of your brand to post-purchase support experiences. Customers today interact with brands through a diverse set of channels that includes messaging services, social media platforms, websites, mobile apps, in-person visits, emails, and more.


5 Best practices for ensuring secure container images

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the application life cycle is a critical part of security, but many organizations don’t even follow basic best practices for ensuring secure container images.


Things You Should Know Before Choosing Application Performance Monitoring Tools

Application Performance Monitoring tool has become the most emerging business to organizations to deal with complex applications. It helps in optimizing and monitoring the performance of your application. To ensure your app's performance, since it is of utmost importance for the better user-experience, the recommended approach would be to use APM tools. There are wide spectrum of application monitoring tools available in the market place.


3 Times CloudZero Helped Real Companies Take Action With Cloud Cost Intelligence

One of the many aspects of CloudZero’s cloud cost intelligence is anomaly detection. Unlike solutions which require you to set budgets or thresholds, CloudZero uses machine learning to automatically detect and alert on anomalies, then send them directly to dev team Slack channels where the responsible engineers can view and take action. Here are just a few examples of real customer anomalies, what caused them, and the action the customer took.


COVID-19's lasting effect on cybersecurity and what to expect in the new year

As 2020 comes to an end, it’s normal to reflect upon the year’s challenges, innovations, and achievements. When we look back on 2020, the hardships we all endured collectively across the globe seem to stack higher than other recent years. A pandemic swept across the world, rapidly shifting the ways we communicate, work, and connect with others. And hacks, scams, and ransomware attacks were at an all-time high.

CMMC Explainer

The Department of Defense (DoD) issued an interim rule to amend DFARS to implement the Cybersecurity Maturity Model Certification (CMMC) framework, making anyone in the defense contract supply-chain require a certification between Level 1 and Level 5 to qualify for government contracts. The CMMC is an advanced step in the DoD’s efforts to properly secure the DIB.

Calico in 2020: The World's Most Popular Kubernetes CNI

Calico and Kubernetes go hand-in-hand. Kubernetes is the de facto standard for deploying and managing container-based applications at scale, both on-premises and in the cloud. Calico continues to be the most popular open-source networking and network security solution for Kubernetes. Despite the cataclysmic events that occurred in 2020, the Calico community, supported by the team at Tigera, remained focused and achieved several major successes. We are excited to share these highlights.


Best Practices for Naming REST API Endpoints

REST APIs are a powerful tool for multiple applications or systems to communicate and exchange information according to the REpresentational State Transfer architectural pattern. While REST APIs are extremely useful, creating them and deploying them into production can be a highly complex and time-consuming process. If you’re building your own REST API, you should be familiar with some of the industry best practices for doing so—including the best practices for naming your REST APIs.


Podcast on How to Build an API-First Company with Nick Patrick, Radar CEO

Ep. 6: Nick Patrick, CEO of Radar On today’s episode we have Nick Patrick, the CEO of API-first location platform company Radar. Nick cut his teeth in PM roles at Microsoft, Foursquare and Handy, before starting Radar in 2016. As cofounder and leader of Radar, Nick shares his experience on how to fuel growth, choose your partners, ship products faster & with confidence, and many more invaluable perspectives for professionals in the API platform ecosystem.


Challenges to Database DevOps: Dealing With Drift

Sometimes, people start their DevOps journey by getting their database into source control, but then, they don’t deploy from source control. Instead, they continue their manual deployments to production. Quickly they find that the database code in their production instances and the database code in their source control system don’t match.


7 Ways to Create Efficiency for Small Teams

‍Throughout the workweek or during the process of any project, even the best small teams can hit obstacles. Issues with miscommunications, unproductive meetings, too many emails, and not knowing what the other members of the team are doing can all work together to stall your team's productivity and efficiency. The term Team Efficiency refers to a team achieving maximum productivity with minimal wasted effort or expenses.


Key Kubernetes audit logs for monitoring cluster security

Kubernetes continues to be a popular platform for deploying containerized applications, but securing Kubernetes environments as you scale up is challenging. Each new container increases your application’s attack surface, or the number of potential entry points for unauthorized access. Without complete visibility into every managed container and application request, you can easily overlook gaps in your application’s security as well as malicious activity.


Automated IT Software and Customer Services: The Key to Today's UX

Service experience is more important than the service itself! Successful service experience goes beyond simply delivering the right business outcome. As your user base has all sorts of individuals, it is necessary to make sure that your solution is the perfect fit for all of them. It should satisfy their professional needs in the best possible way and also deliver a service experience that meets the contextual needs and professional expectations of the end-user.


Reduce log management costs with advanced compression

When Humio’s founders sought out to build a modern log management platform, they targeted pain points enterprises still struggle with today. One of those is the impact of growing log volumes on resource allocation and cost. In a previous blog post I explain how Humio’s index-free architecture helps lower log management total cost of ownership (TCO). In this post, I cover how Humio leverages advanced compression techniques to further reduce log management TCO.


Cross Browser Compatibility Testing - what browsers you should test?

In recent years, cross browser compatibility testing has gained a lot of traction as it helps ensure that no customers are left behind after updates. The pace of technological advancement has increased exponentially, leading to faster upgrades and changes. However, not all people evolve as rapidly as they are resistant to change, leading to outdated technology such as which consist of minor options, specifications and less compatible ones.


7 top tools for responsive web design testing

Responsive design is an approach to design websites such that it responds well on all screen sizes, platforms, and orientations. with the user’s devices depending upon their screen dimensions and orientation. This approach eliminates the need to design a new set of code for each new device. The primary focus is to deliver a consistent browsing experience to the users no matter what device is being used.


7 tips for successful cross browser compatibility testing

Cross-browser compatibility testing is the most important testing for someone whose business is completely dependent on a website. Take for example an online service provider company. It may have gone through rough testing phases but is there a point in exhausting all your energy when the end-user is not able to communicate with the website properly? Cross-browser compatibility testing is extremely important for a successful running website where you have one less thing to worry about.


Top Observability tools for DevOps Engineers and SREs

Better visibility is the first step to improved system stability. Our latest blog outlines Top Observability tools for DevOps Engineers & SREs to help you get started on your journey to gain valuable insights into your infrastructure. “We can't fix something which we can't observe” - whether it's a steam engine or a complex microservice based cloud deployment, great observability makes troubleshooting things easier.


Delivering faster analytics projects with Stitch in the EU

It’s no secret that businesses are undergoing a dramatic digital acceleration during the pandemic. A recent Gartner CFO Survey characterizes this acceleration as “from the pace of a multi-year marathon to a 12-month sprint,” while a McKinsey survey estimates that organizations have shortened the digitization of their customer and supply-chain interactions by three to four years. Lagging behind in turning data into answers is no longer an option.


Introduction to Serverless Machine Learning (Part 1)

If you’ve worked in a data science or machine learning position, you know that deploying machine learning models isn’t always easy or straightforward. You often need to answer questions like, “Where will the model live?,” “How often will it be run?,” and “How well do you have to maintain it?” Originally, you might have deployed models to run in batches or with an API call.


Alooma vs. MuleSoft vs. Xplenty: Features, Support and Pricing

The main differences between Alooma, MuleSoft, and Xplenty: Data-driven organizations pull data from multiple locations such as in-house databases, SaaS, and cloud-based apps, making it difficult to determine accurate business insights. Moving all this information into a single location makes data analytics easier. This is where Extract, Transform, and Load (ETL) comes in.


How To Detect and Prevent Memory Leaks

A memory leak in an application deployed on the cloud can affect the availability and reliability of the application. Therefore, it is highly important to identify and ultimately resolve it quickly. However, in the production environment running on the cloud, memory leak detection is a challenge without the knowledge of the application or its internal object allocation details.


Qlik Analytics 2020 - Alerting, Augmented Analytics, Active Intelligence and More

2020 was quite a year of innovation for Qlik analytics. We delivered key new augmented analytics capabilities with big updates to Insight Advisor, we integrated intelligent alerts fully into Qlik Sense in less than a year, we continued to expand our visualization capabilities to make it easier to showcase your data in exciting and compelling ways, and we made it even easier to execute analytics in the cloud.


Qlik Analytics 2020 - Alerting, Augmented Analytics, Active Intelligence and More

2020 was quite a year of innovation for Qlik analytics. We delivered key new augmented analytics capabilities with big updates to Insight Advisor, we integrated intelligent alerts fully into Qlik Sense in less than a year, we continued to expand our visualization capabilities to make it easier to showcase your data in exciting and compelling ways, and we made it even easier to execute analytics in the cloud.


Avoiding Common Internationalization Mistakes

Languages are complicated, and every language is complicated in different ways that can be hard to understand without learning every single one of them. Some languages form words from multiple characters while others have symbols that represent entire concepts. Some feature words without pluralization or gender and rely on context for that while others have two or even more genders for words. Some are very phonetic while others pronounce words seemingly at random (cough English, though cough).


How to Monitor OID Status and Restart the LDAP Service When OID is Down?

We prepared WLSDM OID DevOps MBean blog about when OID shuts down due to external problems such as a network issue, the system will be provided to stand up. First of all, We are going to create WLSDM DevOps MBean then assign restart script on it. If the dummy LDAP search on DevOps MBean does not return any result, the opmnctl service will be restart by triggering the action script.


5 Common Elasticsearch Mistakes That Lead to Data Breaches

Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year, all three were on the wrong side of it when they suffered massive data breaches. At Avon 19 million records were leaked, and Family Tree had 25GB of data compromised. What do they have in common? All of them were using Elasticsearch databases. These are just the latest in a string of high profile breaches that have made Elasticsearch notorious in cybersecurity.


FlashDrive's mission

This is everything you need to know about FlashDrive, and how it can help you reduce your infrastructure costs while improving your applications' responsiveness and overall quality. FlashDrive is a Docker cloud hosting service constituted in a network of high availability clusters located in North America and Europe. To completely understand what FlashDrive is and how it can help you, let's first talk about the Docker cloud, containers, and the purpose of containerization.


Heroku vs AWS: What to choose as a startup?

Cloud computing sometimes spoils one with choices. Let's just take a look at a couple of common cloud services. You can use cloud services to deploy and scale web and mobile apps besides monitoring them. AWS and Heroku provide cloud computing resources. AWS is from Amazon, while Heroku is from Salesforce. In this article, let us see which one is better to use from the start-up perspective.


Sol1 Releases Meerkat - Next Generation Dashboards for Icinga 2

Meerkat is a lightweight Go and Javascript Icinga 2 client, that connects to the API and displays the status of various checks using elements, like cards, SVGs or images. If you need new users to see at a glance what is important and how it is laid out, Meerkat is the tool for you. It can even play sounds, making for the ultimate sysadmin soundboard! It is quick and easy to setup and use, simply grab the docker container or build from source.

eg innovations

The Symbiosis Between the OSI Model and Application Performance Monitoring (APM)

It’s no secret that Application Performance Monitoring (APM) is becoming a critical competency in today’s enterprise networks. After all, so many enterprises are moving to a cloud-based model that leverages tiers of service, which brings unforeseen complexity into the task of keeping things running smoothly.

How ThoughtSpot Navigates the Cloud | Part 2 | Snowflake Inc.

COVID-19 has pushed ThoughSpot to emphasize it's capabilities in cloud technology. CMO Scott Holden talks about how ThoughtSpot's search engine can sit atop & use cloud technology and how he's shifted the company's marketing efforts and campaigns. Rise of the Data Cloud is brought to you by Snowflake.

Uptrends' free IPv6 ping test makes it easy to check IPv6 connectivity

Uptrends offers two free ping test tools: IPv4 Ping Test and IPv6 Ping Test. If you’re wondering why Uptrends has two separate tests that ping servers, you’re in the right place. Uptrends has two separate tests because the two addressing systems work independently of each other, often over the same network devices. IPv4 is a bit zombie like. The aging protocol is zombie like because we keep pronouncing it dead, but it keeps hanging on.


German research organization bids adieu to multiple management platforms using OpManager

GFK is Germany’s largest market research institute and the fourth biggest market research organization in the world. It has a global digital presence in over 60 countries, with around 120 offices, and has been providing consumer and market insights for over 85 years. How OpManager helped GFK GFK struggled to find the right solution while managing its data centers and relied on too many management platforms.


Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as many as 30,000 computers were affected per day. Although classified as adware, Adrozek is also designed to collect information extracted from browsers by modifying browser settings and extensions.


Loki 2020 year in review

What a year 2020 has been for Grafana Loki! Just a little more than a year ago, we announced Loki’s 1.0.0 GA release. We’re excited to report that 2020 brought a big uptick in its adoption (users have quickly realized the advantages of a small index—plus, Loki has non-technical advantages, too); significant performance enhancements; and the recent release of Loki 2.0.


Monitoring Microservices on AWS with Thundra: Part II

This is part two of a three-part article series about monitoring microservices on AWS with Thundra. In the first part, we talked about monitoring a serverless architecture based on API Gateway, Lambda, S3, and SES. In that article, we built a system that passed objects between Lambda functions with S3 buckets, and sent an email after a computation task has been completed. First, we used CloudWatch to debug your serverless system, and then we integrated the Thundra monitoring service into that system.


Introducing: Business Impact Alerts

Anodot is the only monitoring solution built from the ground up to find and fix key business incidents, as they’re happening. As opposed to most monitoring solutions, which focus on machine and system data to track performance, Anodot also monitors the more volatile and less predictable business metrics that directly impact your company’s bottom line. Now there’s an easy way to measure the business impact of every incident.

power admin

How Active Directory Management Tools Help Quickly Find and Troubleshoot Issues

Active Directory is part of Microsoft Windows software environments primarily for networks where some sort of domain control is required. The service is much more than just authenticating and authoring access to network resources. Active Directory is also used to enforce various network security policies, enable various processes, and enable various services. Active Directory consists of a logical structure that allows the server to execute the appropriate actions, authentication, services, and so on.

Accelerating the Build-Out of Digital Platform in the Public Cloud

In this Kong Summit 2020 session, we will cover the architecture and approach we used to build out our digital platform at Goldman Sachs by leveraging Kong’s API gateway to implement a secure ingress controller for all digital channels, including private/public API and web interfaces. We will discuss how we integrated Kong’s API gateway with AWS native services to implement mTLS, observability and container runtime, as well as share our operational experience of running resilient API workloads in production.

Amazon Kinesis vs. Kafka: A Detailed Comparison of Data Stream Services

The key differences between Amazon Kinesis and Kafka are: Introducing data streamers! These services validate and route messages from one application to another, managing workload and message queues effectively. The result? Users process messages through a centralized processor and handle large data streams more efficiently. Amazon Kinesis and Apache Kafka are two data stream services.


Track Datadog metrics in Sleuth

Data from monitoring tools like Datadog are useful for developers to help them understand whether the code they've deployed is healthy or needs to be fixed or rolled back, or when there is an incident to investigate. As a deployment mission control, Sleuth helps developers see metrics data from a developer-centric point of view - by deployment - and interpret such data for them. ‍‍

Building a Cloud Strategy with Kubernetes

Enterprises are increasingly trying to leverage diversified cloud infrastructures. Specifically, to scale as business demand varies. So, how can you scale your applications to meet customer demands? The answer is you want to deploy your software on-premises or to a specific public cloud, based on business value. Kubernetes is the answer to your cloud strategy and it provides a holistic solution that simplifies the deployment, management, and operational tasks. Write to us:

Best practices for monitoring authentication logs

If you are running a user-facing web application, you likely implement some form of authentication flow to allow users to log in securely. You may even use multiple systems and methods for different purposes or separate groups of users. For example, employees might use OAuth-based authentication managed by a company-provided Google account to log in to internal services while customers can use a username and password system or their own Google credentials.


5 Takeaways from Gartner's 2020 IOCS Conference

I recently had the pleasure of attending the Gartner IT Infrastructure, Operations & Cloud Strategies (IOCS) Conference. Like most events in 2020, this event was virtual and brought together infrastructure and operations (I&O) leaders from across the world together to redefine, reassess, and prepare for what normal might be in the near future. Here are some of the major takeaways from my experience at this four-day event.


How to Manage MSP Businesses More Efficiently

By leveraging specialist tools built to save time, money, and effort, MSPs can manage their business more effectively. There has been an increased demand for high-quality IT services and MSPs this year. Due to the pandemic, the majority of companies have been forced to adopt remote working conditions, which has led many to seek out support for their IT services that they haven’t necessarily needed in the past.


Synthetic Monitoring: When Bad things Happen to Good Checks

Running synthetic monitoring thinking it will match up with a user’s reality throw for throw is a fool’s game. While you can test in prod, your testing parameters are limited by an insider’s knowledge of the transaction’s pathways – making true objectivity challenging to achieve in testing. Yet still, every transaction tells a story.


An introduction to the Elastic data stream naming scheme

With Elastic 7.9, the Elastic Agent and Fleet were released, along with a new way to structure indices and data streams in Elasticsearch for time series data. In this blog post, we'll give an overview of the Elastic data stream naming scheme and how it works. This is the first in a series of blog posts around the Elastic data stream naming scheme.


Webinar Recap: Scale your Software Development with Automation Testing and CI/CD

Last week, our team at Katalon partnered with CircleCI to present a webinar: Scale your Software Development with Automation Testing and CI/CD. There’s no denying the benefit of automation testing in CI/CD pipeline has on product development cycles: it enables faster builds and deploys by continuously generating quicker and more efficient feedback loops.


How to Replace Your Opsgenie ConnectWise Manage Integration

Looking for a replacement for your Opsgenie ConnectWise Manage integration? Conversations are popping up on Reddit with concerns over the recent deprecation of Opsgenie’s ConnectWise Manage Integration. In case you’re interested, here is more info about that. And, here’s the warning in Opsgenie’s docs.


Getting Started with Spring Boot and Kubernetes

In the cloud-native world, where microservices are developed, distributed, and operated, the operational burden becomes more complicated as the services become smaller and smaller. Fortunately, there are technologies available to vastly reduce both the time and costs associated with development and operations. This article will cover two essential technologies to run Java applications in a cloud-native way: Spring Boot and Kubernetes.


The road to data quality: Getting to customer 360 faster with Machine Learning

Read Part 1 here > Data analytics is a complex process that demands time and effort from data scientists. From cleaning and prepping data to performing data analysis, data scientists go through an extensive procedure to uncover hidden patterns, identify trends, and find correlations in data to make informed business decisions. The task of integrating, cleaning, and organizing data assets often take up the bulk of the data scientist’s time.


Detect CVE-2020-8554 using Falco

CVE-2020-8554 is a vulnerability that particularly affects multi-tenant Kubernetes clusters. If a potential attacker can create or edit services and pods, then they may be able to intercept traffic from other pods or nodes in the cluster. An attacker that is able to create a ClusterIP service and set the spec.externalIPs field can intercept traffic to that IP. In addition, an attacker that can patch the status of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.


Modernizing AIX Workloads using CloudHedge

On a given month, we get 1/3rd of requests for modernizing AIX workloads, and that’s perfectly fine because though it’s not a widely used platform there are still thousands of businesses running their mission-critical apps on AIX. Modernizing AIX workloads is a challenging task, and the next question that comes to your mind is where do you start.


#NeotysPAC - Performance - Cloning Automation from Users in the Past, by Leandro Melendez

Performance testing and load testing automation is being done mostly the same ways that it’s been done since prehistoric times (about 20 years ago). Nowadays, new tools and technologies have arisen that can revolutionize the way we create, maintain, and configure automation for performance and load testing. They both leverage and depart from the traditional methods.

Automating Contract-Centric Experiences to Accelerate Front End Development

This Kong Summit 2020 session focuses on the war stories, and subsequently the patterns HyperCurrent employed, from building an API chargeback/monetization product using OAS, Kotlin, Spring Boot and Kong. We will discuss how a programmatic approach can be used to deliver an elegant REST-ful API while enforcing an anti-corruption layer for domain logic without writing API contracts by hand. By using Kotlin and Spring Boot along with a controller/DTO approach, we can automatically produce an OAS contract, HTML docs, a console and a client side SDK.

Introducing Monitoring Query Language, now GA in Cloud Monitoring

Developers and operators on IT and development teams want powerful metric querying, analysis, charting, and alerting capabilities to troubleshoot outages, perform root cause analysis, create custom SLI / SLOs, reports and analytics, set up complex alert logic, and more. So today we’re excited to announce the General Availability of Monitoring Query Language (MQL) in Cloud Monitoring! MQL represents a decade of learnings and improvements on Google’s internal metric query language.


Top 7 Trends in Marketing Analytics for 2021

Powered by advances in machine learning, marketing analytics delivers more bottom-line impact with each passing year. It enables organizations to improve the targeting of ads and other content, optimize their ad spend through advanced marketing attribution, increase customer lifetime value, reduce churn, and more. While technology is making granular targeting and measurement possible, marketers are also doubling down on measures to ensure consumer privacy and data governance in their initiatives.


SDLC Security: It's Personal for JFrog

The SolarWinds hack, which has affected high-profile Fortune 500 companies and large U.S. federal government agencies, has put the spotlight on software development security — a critical issue for the DevOps community and for JFrog. At a fundamental level, if the code released via CI/CD pipelines is unsafe, all other DevOps benefits are for naught.


What It Actually Means to be HIPAA Compliant

The Health Insurance Portability and Accountability Act, or HIPAA, is a federal regulation in the United States that protects healthcare data containing personal health information, or PHI. It also covers Electronic PHI, or E-PHI, which are digital records of this information. The ability to effectively using healthcare data is essential for improving patient outcomes, quality of care, resource allocation, revenues, and other operations.

What to Expect from DevOps in 2021

As we move into the next year, we are hoping for a return to relative normalcy. That goes for our personal lives, social lives, and professional lives. Professionals have acclimated to the situation, or now see a return to relative normalcy just around the corner with the development of vaccines. And despite the wait, different industries and the DevOps community in particular have persisted.


Podcast with Charles Miller on Documentation Best Practices

Ep. 5: Charles Miller, documentation strategist. To help you fend off documentation from being the Achillies heel of your API product, we have a thirty-year veteran of technical writing on our podcast today. Charles Miller is currently the lead content strategist for APIs at Medidata Solutions, a Dassault Systems company.


Improve DevOps Workflows Using SMLE and Streaming ML to Detect Anomalies

Modern IT & DevOps teams face increasingly complex environments — making it harder to quickly detect and resolve critical issues in real-time. To overcome this challenge, Splunk users can take advantage of ML-powered IT monitoring and DevOps solutions available in a scalable platform with state-of-the-art data analytics and AI/ML capabilities. In this blog, we deploy Splunk’s built-in Streaming ML algorithms to detect anomalous patterns in error logs in real-time.


How to centralize test automation in Jira and Xray

Xray is a powerful and highly customizable tool that can be adapted to fit your needs. We have a vibrant testing community and user base that often surprises us with unexpected solutions and workarounds. Simon Champenois is a QA Manager and member of the “Xray France User Club.” He created a unique workflow that allows Xray users to centralize test automation in Xray and Jira.


Wake on LAN with IP address manager: A holistic approach to remote booting

Wake on LAN(WOL) has been a go-to solution for most network admins to ensure an uninterrupted IT resource. Aiding in remote booting of wired and wireless networks, WoL helps optimize energy usage even as it ensures your network resources are readily available. Enabling you to boot your machines on demand, and switch them to a low power mode when not in use, WoL saves you hefty power bills and helps you avoid the time-consuming manual task of restarting your network devices physically.


Share Datadog dashboards securely with anyone outside of your organization

Datadog dashboards provide a unified view of your application, infrastructure, and business data, giving stakeholders the context they need to make decisions. Sharing dashboards publicly is useful when you want to make them easily accessible to a large audience. But oftentimes, your dashboards include sensitive information, which is why you need finer-grained controls over the data you share—and who you share it with.


Send SMS alerts with webhooks and Twilio

When an alert triggers in your application or environment, you want your team to know as soon as possible so you can troubleshoot quickly and minimize any user-facing issues. Datadog can automatically alert you via email and collaboration services like Slack and PagerDuty. The simple, real-time communication provided by SMS can also be an effective way to alert your team.


Podcast: Break Things on Purpose | Ep. 11: Ryan Kitchens, Senior Site Reliability Engineer at Netflix

Get started with Gremlin's Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. We’re excited to kick off Season 2 of Break Things on Purpose next month. In anticipation of our next season, here’s a bonus show from our archives! Subscribe to Break Things on Purpose wherever you get your podcasts. Find us on Twitter at @BTOPpod or shoot us a note at!


Best Network Diagram Software + Guide

Network diagram software plays a crucial role in helping businesses understand their network and how their network components interact. This guide explains what a network diagram is and how network diagram software can help your business improve efficiency, in addition to recommending the best software for network diagrams available in 2020.


2020 in Review: Highlights from Jelastic Multi-Cloud PaaS

2020 is rapidly coming to a close and for many of us it is a relief. This year has been full of challenges and obstacles like no other, on all fronts around the globe. But let’s not forget that growth often takes place in the midst of our greatest challenges. 2020 brought us numerous opportunities to learn, accelerate change and create new paths forward in spite of an ever-changing and complex landscape.


Kubernetes CPU Incident: What We'd Do

Kubernetes, an open source container orchestration platform, helps to orchestrate your containerized application. One does not need to worry about scaling in, scaling out, availability of the application if Kubernetes is in place. Before the application is migrated or moved to the Kubernetes cluster, the cluster needs to be highly available with in-built disaster-recovery, as well as secure, scalable and optimized.


How To Determine The Optimal Website Hosting Bandwidth

Running a business in 2020 requires that you have a digital presence. Building a website is one of the first tasks of a new business's checklist. With that comes registering and buying a domain, website design, web development, and paying for hosting. As of December 2020, there were 1,8+ billion websites in existence, according to Internet Live Stats. With so many websites vying for attention, yours must offer a positive user experience and be quick and easy to navigate.


What is Employee Experience Management?

In many ways, employees are the heart and soul of your organization. Without them it would be impossible to achieve your goals, increase revenue, and develop stronger customer relationships. One practice that has emerged in recent years to increase workforce engagement is Employee Experience Management (EEM). This concept considers the entire experience that an employee has with a company, from interviewing through departure.


Top 49 Must Have DevOps tools for 2021

Creating software products without DevOps and DevOps tools is nearly impossible today. Unless you are a huge fan of buggy code and chaotic version deployments. Development Operations professionals, combine IT, QA, infrastructure, and even some development tasks in their work. Devops are increasingly important members of any R&D department aiming to efficiently produce and deploy software products.


In the aftermath of the SolarWinds hack, IT Ops leaders should reconsider on-premises tooling investments

Solarwinds is a 21-year old publicly traded monitoring and network management vendor with 300,000+ customers across the world. It’s familiar to IT operations and monitoring teams across enterprises big and small. And this week, it found itself in the news for all the wrong reasons.


How to perform a zero-downtime upgrade of Elasticsearch in production

Many users need their Elasticsearch clusters to always be available. And a lot of these same users also want to upgrade their Elasticsearch environment when a new version is released, so they can take advantage of all the new features and functionality. The result is that admins end up upgrading the Elasticsearch engine while it is operating at full capacity in production. Sound too good to be true?


Dashboards Beta v0.9: All Things Inputs

If you’re new to the Splunk Dashboards app (beta) on Splunkbase and you’re trying to get started with building beautiful dashboards, this blog series is a great place to start. The Splunk Dashboards app (beta) brings a new dashboard framework, intended to combine the best of Simple XML and Glass Tables, and provides a friendlier experience for creating and editing dashboards.


A Recap of the KubeCon + CloudNativeCon Observability Track

OpenTelemetry has evolved so much since the 2019 KubeCon North America in San Diego, where I live-demoed OpenTelemetry on the keynote stage and highlighted our alpha to the world. We’re excited to be entering general availability of our Collector and Tracing SDKs soon. While I missed the energy from the packed crowd of over 10,000 technologists cheering me on, it was wonderful that this year’s event was more accessible than ever to a worldwide audience.


Cooking the perfect holiday ham with IoT, Prometheus, and you

With the holidays upon us around the world, some folks here at Sysdig decided to take a technological approach to holiday cooking. How, you ask? By adding a little PromQL to the mix. A home kitchen during the holidays can be a very frenetic place. There are often many, many dishes being prepared at the same time and cooked in sequence. Some are short and easy, others can take several hours. It’s inevitable that a dish will get missed, or a step forgotten.


Using Helm to Deploy a Kubernetes Application to Multiple Environments (QA/Stage/Prod)

One of the most typical challenges when deploying a complex application is the handling of different deployment environments during the software lifecycle. The most typical setup is the trilogy of QA/Staging/Production environments. An application developer needs an easy way to deploy to the different environments and also to understand what version is deployed where. Specifically for Kubernetes deployments, the Helm package manager is a great solution for handling environment configuration.


Generate Code Coverage Reports using Coveralls and Codefresh

Coveralls is a web service that allows users to track the code coverage of their application over time in order to optimize the effectiveness of their unit tests. Once you are managing your application and associated resources within a CI/CD platform like Codefresh, you want to receive insights on the test coverage automatically with every pipeline build. This post provides an overview of how this can be achieved with Coveralls and Codefresh.


3 Things Gartner Says Are Difficult About Cost Management and Optimization That CloudZero Makes Easier

Earlier this year, Gartner published a report called “How to Manage and Optimize Costs of Public Cloud IaaS and PaaS.” Overall, we agreed with the piece and wrote a blog post about what they get right (and where they miss). However, one thing that stood out to us is how many aspects of optimization Gartner described as very difficult — which CloudZero can help make easier.


The Wait is Over: Ivanti Desktop and Server Management (DSM) 2020.2 is here

Ivanti’s extended products group is pleased to bring you the latest release – Desktop and Server Management 2020.2. This update includes improved password encryption, tighter Ivanti Xtraction integration, a new remote control feature (BETA), and a new MSIX Packaging Wizard.

Comcast's Self-Service API Gateway Development Journey

Comcast has taken a journey to develop an API gateway initially using open source software and in-house enhancements, and later transitioning to open core commercial software to improve the overall service delivery experience for developers. In this session, Comcast will discuss enhancements that the team made to adapt the community edition of Kong, and subsequently the enterprise edition, to support a self-service, multi-tenant, yet still managed, production API gateway solution, as well as open source contributions made to the Kong community along the way.

Collaborative API Design and Testing with Insomnia

Insomnia Designer is a collaborative API design tool for designing and managing OpenAPI specs. This session will cover how to design and test APIs, as well as how to extend Insomnia with custom plugins. Kong Champion Mert Simsek will dive into how as a team is leveraging Insomnia Designer to share information and data APIs across teams to improve their overall process.

A Few of Our Favorite Things: 2020 Resource Roundup

It’s that most wonderful time of year! Even though it’s been extra challenging for everyone, we can still take a breath, reflect on lessons learned, and look to fill our proverbial cups with knowledge to take into the New Year. We thought we’d revisit a few of our most popular Automation and AIOps resources from 2020.


Reduce operational risk with a strong data classification foundation

Alcon Laboratories is the global leader in eye care, with a history spanning more than seven decades. The company offers a broad portfolio of products to enhance sight and improve people’s lives. Each year, more than 260 million people in 140+ countries rely on its surgical and vision care products to address conditions such as cataracts, glaucoma, retinal diseases, and refractive errors.


How to Implement Xplenty In Your Data Stack

A Big Data stack has several layers that take your data from source to analytics tools. Extract, Transform, Load tools integrate data from sources into a data warehouse or lake. Business intelligence solutions use centralized data for their analytic needs. An ETL tool such as Xplenty offers a user-friendly experience for ingesting data from many sources, transforming it as needed, and sending it to the next layer. Here’s how you can implement this handy tool in your organization.


New Vulnerability Exposes Kubernetes to Man-in-the-Middle Attacks: How to Mitigate CVE-2020-8554

A few weeks ago a solution engineer discovered a critical flaw in Kubernetes architecture and design, and announced that a “security issue was discovered with Kubernetes affecting multi-tenant clusters. If a potential attacker can already create or edit services and pods, then they may be able to intercept traffic from other pods (or nodes) in the cluster.” If a hostile user can create a ClusterIP service and set the spec.externalIP field, they can intercept traffic to that IP.


Splunk Connect for Syslog: Turnkey and Scalable Syslog GDI - Part 3

In Part 1 and Part 2 of this series, we explored the design philosophy behind Splunk Connect for Syslog (SC4S), the goals of the design, and the new HEC-based transport architecture, as well as the rudiments of high-level configuration. We'll now turn our attention to the specifics of SC4S configuration, including a review of the local (mounted) file system layout and the areas in which you'll be working.


Splunk Connect for Syslog: Turnkey and Scalable Syslog GDI - Part 4

Previous installments of this series have given you the overview and configuration details you need to ingest any source that is supported by Splunk Connect for Syslog and configure customizations and overrides that match your enterprise. This leaves one key capability of SC4S that we have not yet covered, and that is extending the platform itself. In this installment, we'll walk through the configuration of an entirely new data source – one that SC4S does address out of the box.


New SQL Change Automation Filter Features for Enterprise Teams: Migrations and Drift Report

Options for filtering when generating migrations and when reporting on database drift help teams make the best of tricky database environments. From Enterprises to tiny startups, most developers prefer to do work in small teams these days. But when it comes to database development, teams in Enterprises often have a hard time keeping these small teams fully separate in the development process.


Using Mattermost as a tool for COVID-19 contact tracing

VCLB Ghent is a Belgian non-profit organization that serves pupils between the ages of 3 and 18 years old. Every two years, we offer students a free medical checkup. The organization also works with schools to support students that struggle with learning disabilities, behavioral problems, and other issues. As a multidisciplinary team, VCLB Ghent’s staff does contact tracing for schools in the event of an outbreak of a contagious disease, such as meningitis, hepatitis, or measles.


Monitor applications running on VMware Tanzu Application Service

Cloud Foundry is an open source deployment and orchestration platform that gives developers a readymade workflow for launching applications without configuring the underlying infrastructure. VMware Tanzu Application Service for VMs (TAS) is a commercially available certified platform for Cloud Foundry that provides complementary products like a partner network, auto-scaling CLI, and operations interface, and is used by enterprise-level customers like T-Mobile, The Home Depot, and Comcast.


Collect and monitor Microsoft 365 audit logs with Datadog

Microsoft 365 is a suite of cloud-based productivity and communication services that includes Microsoft Office applications (including OneNote and OneDrive) as well as other popular Microsoft tools like Skype and Teams. Microsoft 365 tools and services are at the core of many organizations’ data management and day-to-day workflows, so monitoring activity across your environment is key to making sure that these services remain secure and meet compliance standards.


How to Expose and protect Logic App using Azure API Management (Part 5) - API operation documentation: Descriptions (Part 1)

There is no doubt that organizations have a difficult task to address the current requirements for building and managing APIs, especially if they don’t use tools like API Management. APIs require up-to-date and strong documentation, increased security levels, comprehensive testing, routine versioning, and high-reliability to be appropriately utilized.


How to Choose Your Web Monitoring Provider | Advice from for 2021

Waking up at 3 AM to deal with a downed service is a special kind of pain, isn’t it? A cross between annoyance, fury, and half-asleep melodrama. Maybe you curse yourself or your team. It’s ok. We’ve all been there. Here at we want to help you get through life’s painful little moments with some advice on how to choose a web monitoring provider. It’s what we do, so we hope our advice and suggestions will lead you to a good fit.

pandora fms

The Benefits and Drawbacks of SaaS: The New Paradigm vs On-Premises Software

SaaS has rapidly become the go-to software and computing solution for businesses and industries across the world. While it’s costly to develop and deploy servers and infrastructure for your business out of pocket, you will be glad to hear that software-as-a-service seems to be a more affordable and more scalable solution for just about everyone. What are the benefits and drawbacks of SaaS?


When Time Is Of The Essence, You Need Context-Rich Alerts

Understanding the health status of your systems is important, and Observability tools, such as Instana, help you to achieve deep insights into every element of the overall architecture. As long as everything is fine, that is enough. When things get out of hand though, then what? With your DevOps teams on call, there are people around to immediately react to any alert.


Top 5 Must-Have Features of Regression Testing Automation Tools

As the world moves forward, it wants to progress, more efficiency, more speed, and the same is the case with the software development industry. Every software development organization wants to save time, effort, and money at every step possible. Software Testing being a major part of software development also needs more efficiency. Thus, comes automation.


The Nexthink Library: Q4 Overview

The Nexthink Library allows IT teams to extend and tailor their Nexthink Experience platform to cater to their specific business, IT and employee initiatives. By leveraging over 100+ out-of-the-box content packs and integration, users can use actionable content to overcome some of the most common IT challenges with ready-to-use dashboards, metrics, Engage campaigns, remote actions, targeted insights and more.


Yellowfin 9.4 Release Highlights

In the latest release, the Yellowfin team focused on several new enhancements that expand the ability to share Stories and valuable insights more widely, and deliver greater consistency and governance in the user experience when building dashboards and reports. For the full list of updates, read the release notes and check out the video below to see some of these new enhancements in action.

console connect

Top Technology Trends To Watch In 2021 (Part 1)

The way we all work fundamentally changed during 2020. The global pandemic has accelerated the pace of digital evolution for many businesses, while prompting others to pivot or change course completely. The response to the crisis will continue well into 2021, but as we edge closer to the end of the year, many organisations will already be thinking about the longer term impact of the pandemic and how to realign their business for growth.


What is Web Experience Management?

Maintaining a web presence today means so much more than simply having a website. With customers using social media, email, and chat platforms more than ever before, today’s businesses must adapt to remain competitive. Web experience management (WEM) is an intuitive framework that can help companies develop their online presence and ensure a consistent and positive experience for users or customers across platforms.

vmware tanzu

I'm a VMware Admin: What Do I Do with Tanzu Kubernetes Clusters?

In previous blog posts, we’ve talked about the process of setting up vSphere with Tanzu (see our quick start guide) and creating your first Tanzu Kubernetes Cluster (TKC). As a vSphere Administrator, you might be saying to yourself, “This is cool and all, but what’s next? What’s an easy application to deploy?” The easiest target is the standard NGINX Kubernetes deployment, but that’s very basic.

Request management in ServiceDesk Plus

Are ineffective #ITSM technologies or inadequate fulfillment processes standing in the way of your request management strategy? Reshape your #request_management approach with ServiceDesk Plus. With smart automations and an intuitive self-service portal, you can now stay on top of all service request tickets and deliver a better experience for your end-users.

How to Install Kubeapps Using vSphere with Tanzu and Tanzu Kubernetes Clusters

Looking for an easy application to deploy? Kubeapps dubs itself “your application dashboard for Kubernetes.” Through an intuitive user interface, you can deploy up to 80 applications. Learn how simple it is to get Kubeapps up and running using Tanzu Kubernetes Grid and vSphere with Tanzu.

Capturing 2020 - an Eventful Year With Alcide

A year ago, when we planned our strategy and had our predictions for 2020, we most definitely could not predict how erratic 2020 would turn out to be. We too had to adjust and provide support for our employees’ and clients’ new needs. However, 2020 turned out to be a tipping point year for the Kubernetes community with a massive K8s adoption across the globe.


Play: Modernizing telecommunications with the Elastic Stack

The telecommunications world is in the middle of its fourth industrial revolution. Organisations are trying to bring out as many new services as possible to monetise their infrastructure, but despite their modern approach, they still own and maintain legacy — and most importantly — multi-vendor infrastructures. Due to complex organisational structures and decentralised management systems, most responsibilities are divided between multiple departments.


Route SSH Connections with HAProxy

Route SSH connections through HAProxy using the SSH ProxyCommand feature and SNI. Did you know that you can proxy SSH connections through HAProxy and route based on hostname? The advantage is that you can relay all SSH traffic through one public-facing server instead of needing to grant users direct access to potentially hundreds of internal servers from outside the network.


Leveraging Multi-Tenancy For Your Team

Remote teams that work on dependent products face resource crunches and delays. When several teams work on interrelated projects, the chances are high that they will soon end up meeting at some point where they have to wait for resource release from another team or teams. For instance, when team A wants an update to an app currently maintained by Team B, they would want to automatically access the latest version of the app whenever a new bug is fixed and an update is made.


Deep Learning Toolkit 3.4: Grid Search, Causal Inference and Process Mining

With a turbulent year and 2020 coming to its end, I’d like to thank you for your continued interest in my blog posts. In my last .conf talks I received a lot of positive feedback combined with the ask to have more posts with such content, so thanks for motivating me and here we go! Recently, my colleague Dimitris wrote about how you can set up DLTK on a AWS GPU Instance.

squared up

Why choose the Connect license for SquaredUp 5.0?

Every enterprise has its arsenal of tech tools to tackle an array of different challenges. Useful, and necessary, but often a pain to monitor. Whatever your data sources, being able to bring all these metrics into a unified dashboard provides valuable context, which in turn helps you identify and correlate problems more quickly, resulting in improved reaction time and decision making.


Three Takeaways from Amazon CTO's Keynote at AWS Reinvent 2020

One of the highly anticipated events every year is the keynote from Dr. Werner Vogels at the annual AWS Reinvent conference. As CTO of Amazon, Dr. Vogels has considerable influence on product and engineering innovation that directly impacts hundreds of millions of users and developers. Here are three takeaways from Dr. Vogels’ keynote this year.


2020 Good Riddance: An "Interesting" Year in Review

We gathered on February 10, 2020, for our Sales Kick off. We held it in Boston and, for the first time, had external speakers. We announced our president club destination. 2019 was a good year, and we were looking forward to 2020. When I went to visit some customers in Europe in late February / early March, I noticed the nervousness of the folks on the plane back from Barcelona. Some were even starting to wear masks. I landed in NY; everything was normal.


Save $1M with Software Asset Management

In this new series of Now on Now stories, we share how we use ServiceNow products internally to transform our operations and create great experiences. We hope our stories will inspire our customers and partners to harvest even more business value and resiliency from the Now Platform®. For more information, visit the Now on Now Workflows Book of Knowledge.


An A-Z Data Adventure on Cloudera's Data Platform

In this blog we will take you through a persona-based data adventure, with short demos attached, to show you the A-Z data worker workflow expedited and made easier through self-service, seamless integration, and cloud-native technologies. You will learn all the parts of Cloudera’s Data Platform that together will accelerate your everyday Data Worker tasks.


Splunk AR: Object Detection

The Splunk Augmented Reality (AR) team is excited to share more with you. In our first AR post, "Splunk AR: Taking Remote Collaboration To The Future is Already Here," from .conf20, we talked about our new Remote Collaboration feature, which helps field workers and remote experts collaborate in AR. In today’s post, we'll talk about our advancements in Object Detection. This new feature makes it even easier to deploy Splunk AR with your assets.


The role of the IT Manager in Leading Digital Transformation

As organizations embrace digital transformation, the IT industry has had to change along with it. Expectations are high for the potential effects of implementing new and emerging technologies and organizations are competing to keep pace. With this desire for rapid change, IT managers have been faced with mounting pressure to adopt tools, process and models of digital business as part of enterprise digital transformation initiatives.


Helm vs. Ketch when Deploying Applications

Kubernetes has become the de-facto standard for deploying microservices and containerized applications. Still, there is a learning curve for a developer to get familiar with Kubernetes concepts and objects, how to write and manage the required YAML files, etc. While there is undoubtedly value in learning these concepts and tasks, I believe there is even greater value in getting your applications deployed faster and spending more time on your application code than on infrastructure-related objects.


Investment in Knoema Puts Global Public Data Sets At Snowflake Users' Fingertips

The world is rich with publicly available data sets that can provide immense value to businesses, in areas as diverse as economics, health, agriculture and transportation. But the data is highly fragmented, stored in different formats and databases around the world, making it very hard for businesses to consume and monetize.


Unlocking Value by Going All-in On The Data Cloud

Snowflake met with Mark Stange-Tregear, Vice President of Analytics for Rakuten Rewards, and Andrew Parry, Vice President of IT Application Development for Office Depot, at Data Cloud Summit 2020. The Data Cloud is unlocking new ways of delivering products and services to customers, managing supply chains, and collaborating globally. Rakuten Rewards and Office Depot are going “all- in” on the Snowflake Data Cloud to transform their businesses. Q. How does data affect your business?


Automation: The Future of Work

Whether or not you know it, your organization is at a tipping point. On one side, siloed and inefficient business processes represent the status quo, and on the other, your organization needs to leave this status quo back where it belongs–in 2020–and rethink and reshape your business. Digital transformation is the Emerald City we’ve been marching towards for years, but the yellow brick road has been far more perilous than expected.


Install JFrog Platform on Kubernetes in Under 20 Minutes

We get it, installing Artifactory and the JFrog DevOps Platform on Kubernetes can be daunting. As easy as we’ve sought to make it with our official JFrog installation Helm charts, there are a lot of decisions to be made. That’s meant to give you the widest possible choice for how to best fit your JFrog installation to your infrastructure. But choice can be overwhelming, too.


How ASEAN Retailers Can Become insight driven with a Hybrid Cloud data strategy

There has been an e-commerce explosion this year as consumers seek safety and convenience from the comfort of their own homes using digital tools to purchase everything from durable hard goods to fashion accessories to daily living consumables like food perishables, cleaning products and even school supplies.

vmware tanzu

(Almost) Everything You Need to Know About SRE

Site Reliability Engineering (SRE) is a hot topic, but what exactly does it entail? And do you have to follow the principles to a T in order to achieve benefits from it? If you’re searching for answers to these common questions, look no further. In this episode of the Cloud & Culture podcast, VMware Tanzu’s Hannah Foxwell explains the what, why, and how of SRE—from key principles (such as SLI, SLO, and error budgets) to real-life examples of enterprise adoption.


Will XDR Change Incident Response?

Extended Detection and Response (XDR) is a new security technology that promises to change the way security organizations operate, and introduce important efficiencies to day-to-day processes. In particular, XDR is expected to have a huge impact on incident response teams. In this article, we’ll explain the basics of XDR, show how it addresses incident response challenges, and how it can transform traditional processes in the SOC.


If the best of the best can be bested, what chance do the rest of us have?

This is a very relevant question as news of the FireEye and SolarWinds breaches aired. FireEye is a major player in the cybersecurity world. They are one of the top choices to be brought in to respond to a data breach. If they can be hit how can the average company hope to stay safe? The reality is, none of us are safe. No amount of technology, personnel or caliber of skills in the world can guarantee you will never have a data breach or be the victim of ransomware.


Using Hybrid and Multi-Cloud Service Mesh Based Applications for Distributed Deployments

Service Mesh is an emerging architecture pattern gaining traction today. Along with Kubernetes, Service Mesh can form a powerful platform which addresses the technical requirements that arise in a highly distributed environment typically found on a microservices cluster and/or service infrastructure. A Service Mesh is a dedicated infrastructure layer for facilitating service-to-service communications between microservices.


Set up K3s in High Availability using k3d

Have you ever wanted to try K3s high availability cluster “mode,” and you either did not have the minimum three “spare nodes” or the time required to set up the same amount of VMs? Then you are in for a good treat: meet k3d! If you’re not familiar with k3d, its name gives you a hint to what it’s all about: K3s in Docker.


Jitterbit vs. MuleSoft vs. Xplenty: An ETL Tool Comparison

The major differences between Jitterbit, MuleSoft, and Xplenty: Extract, Transform, and Load (ETL) streamlines data integration by consolidating data from multiple sources, turning it into useful formats, and loading it into a centralized location. The world's most successful organizations use ETL to tame big data, produce visual data flows, and garner business-critical analytics. But with so many ETL tools on the market, which one should you choose?


2020: A Continuous Focus on Data and Analytics Innovation

Despite the challenges COVID-19 brought to the world this year, Qlik continued to innovate – integrating new capabilities directly to our core offerings in the areas of alerting, augmented analytics and conversational analytics. We also continued to enhance our solutions in the direction of making data less passive and more active, and made key acquisitions like Knarr Analytics and, continuing our journey of delivering a true end-to-end solution that enables Active Intelligence.


Where does the tech sector go in 2021?

Like every industry sector, 2020 has been a tough year in tech. The pandemic has changed the way we work, it’s changed the way our customers work, and it’s been a rollercoaster ride. In August 2020, IDC’s Global ICT Spending Forecast 2020 – 2023 predicted 2020 revenue in the sector would fall to $4.8 trillion compared to its original estimate of $5.2 trillion.


2020: A Continuous Focus on Data and Analytics Innovation

Despite the challenges COVID-19 brought to the world this year, Qlik continued to innovate – integrating new capabilities directly to our core offerings in the areas of alerting, augmented analytics and conversational analytics. We also continued to enhance our solutions in the direction of making data less passive and more active, and made key acquisitions like Knarr Analytics and, continuing our journey of delivering a true end-to-end solution that enables Active Intelligence.


How to Test Responsive Web Design Cross-Browser Compatibility

Responsive Web Design (RWD) is a term that was defined by Ethan Marcotte in 2010 according to which, design and development of web pages should be responsive to different screen size, platform, and orientation. Basically, the idea was to create web pages that look good on all devices and size screens.


5 ways Testsigma makes your regression testing easier

Regression testing is one of the most critical aspects of quality assurance. It helps developers to check for issues that are introduced by new additions to their codebase or due to a bug fix. The aim is to check all those pieces of code that could be impacted due to these changes. It goes without saying that adopting effective regression testing strategies can save development teams hundreds of hours of debugging.


Boosting Monitoring Efficacy for Telecom via Correlation Analysis

In the first and second part of the blog series, we discussed the importance of correlation analysis in root cause analysis in general and in the context of promotional marketing. In a similar vein, in this blog we walk through how to leverage correlation analysis to address challenges in the telecom space.


Where is Your Next Release Bottleneck?

A typical modern DevOps pipeline includes eight major stages, and unfortunately, a release bottleneck can appear at any point: These may slow down productivity and limit a company’s ability to progress. This could damage their reputation, especially if a bug fix needs to be immediately deployed into production. This article will cover three key ways using data gathered from your DevOps pipeline can help you find and alleviate bottlenecks in your DevOps pipeline.


10 Elasticsearch Configurations You Have to Get Right

Elasticsearch is an open source, distributed document store and search engine that stores and retrieves data structures. As a distributed tool, Elasticsearch is highly scalable and offers advanced search capabilities. All of this adds up to a tool which can support a multitude of critical business needs and use cases. To follow are ten of the key Elasticsearch configurations are the most critical to get right when setting up and running your instance.


Insprint Test Automation - Round up

Whenever a new methodology or a new system is introduced, with it – certain terms and guidelines are introduced too. These terms and guidelines are meant to be followed to ensure maximum output. But during implementation, some of these guidelines might be deemed not-so-important and might not be followed. Similar has been the case with Scrum Agile Methodology. Since it was introduced, it has been adopted by a majority of software development teams.

Who Uses A Network Performance Monitor | Obkio

Network performance monitoring has become a standard practice for modern businesses. Because of that, tools like network performance monitoring software have piqued the interest of users even outside of the IT team. So let’s go over how different employees use a network performance monitor. A network performance monitoring solutions allows IT directors and their teams to essentially do 80% of the work, with 10% of the effort.

Why do businesses need network mapping software?

Networks are rapidly becoming larger and more complex, with numerous different technologies playing into their expansion. Network mapping is increasingly important for network administrators tasked with handling these growing networks. Network mapping provides network admins with a visual map so they can check network performance, the status of connected devices, monitor the network, and analyse networks before initiating troubleshooting efforts.


ITOM basics: Process monitoring

Monitoring the performance of server infrastructure is crucial to any organization. While metrics such as health and availability will sometimes suffice for measuring overall efficiency, getting visibility into more details, such as the underlying processes, tasks, and scheduled jobs, is often crucial for not just identifying a performance problem but also isolating its root cause.


IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration of a group membership could lead to a security incident? This blog elaborates the most common misconfiguration or security loopholes that can cause damage to the sensitive data in your network.


Five worthy reads: Decision intelligence for critical business moments

AI and analytics are playing critical roles in driving innovation among many businesses riding the digital transformation wave during this pandemic. Many business leaders realize that people are not wired to think exponentially, but incrementally in a linear world, unable to see the ripple effects of their actions. The pandemic has highlighted the enormous impact this has on the quality of decisions made, especially in the context of business.


Explore your data effortlessly with the Datadog Clipboard

When investigating a complex system—or learning about it for the first time—you need to explore metrics, traces, logs, and other kinds of data. But as you navigate across different views of your data in dashboards, alert notifications, flame graphs, and so on, it can be hard to keep track of what you have already seen. When a potential issue comes up and time is tight, the last thing you need is to spend time remembering a crucial graph or finding the right browser tab.


End-to-end application monitoring with Datadog

For complete visibility into the performance of your applications, you need telemetry data—traces, metrics, and logs—that describes activity across your entire stack. But if you’re using multiple monitoring tools, your data can end up in silos, making it difficult to troubleshoot issues that affect your user experience.


Are You Feeling Burnout? Let's change that!

With the pandemic, there has been a major shift to remote work. This can cause burn out for employees. Working from home blurs the line between life and work. With this lack of work-life balance, workers are feeling more stressed than ever. We want to give you some tools that have helped our team deal with the new work-life adjustment.


Xplenty Workspaces

Today we are delighted to introduce our new Workspaces feature that allows users to organize and group their packages together. It’s always been a bit challenging to organize packages within Xplenty especially if you have hundreds of packages, or if there are many users using the account. Finally, all those issues should be addressed by the new Xplenty Workspace feature.

How to Report on Remote Worker Productivity

Learn how Goliath can help you better document the end-user productivity experience for your home workers using Citrix or VMware Horizon with: end-user productivity and activity reports, experience reports tracking logon speeds and other KPIs, overall IT performance for host, VMs, and storage.

Combining supervised and unsupervised machine learning for DGA detection

It is with great excitement that we announce our first-ever supervised ML and security integration! Today, we are releasing a supervised ML solution package to detect domain generation algorithm (DGA) activity in your network data. In addition to a fully trained detection model, our release contains ingest pipeline configurations, anomaly detection jobs, and detection rules that will make your journey from setup to DGA detection smooth and easy.


Why we helped AWS build its Prometheus service

During a re:Invent keynote on Dec. 15, Amazon announced its AWS Managed Service for Prometheus. The service is built using the CNCF’s Cortex project, the open source, horizontally scalable Prometheus-compatible project that I started with Julius Volz over four years ago. I’d like to take this opportunity to extend a warm welcome to the Prometheus-as-a-Service club! We think you’ve made a good choice choosing Cortex, and see this as a massive vote of confidence in the project.

eg innovations

Containers vs Virtual Machines (VMs)

As microservices gain in popularity, containers have become a hot topic for developers. But how do they differ from virtual machines? Will containers replace virtual machines? And when should you choose containers over virtual machines? When it comes to defining virtual machines, the name says it all – machines (servers or desktops) that have been virtualized.

Coralogix - On-Demand Webinar: Auto Scaling a 1000 Nodes k8s Kafka & Elastic Stateful Cluster

The biggest challenge for your Kubernetes cluster is autoscaling stateful services. In this webinar, we explain how to architect a Kubernetes cluster to meet the increasing demands of your business in a stable and cost-efficient way.

Data's Impact on Business & Technology | Part 2 | Snowflake Inc.

DataRobot’s quest to digitally transform companies has led them to revolutionize artificial intelligence and machine learning technology. Dan Wright, President and COO of DataRobot, discusses how his company uses Snowflake, and provides examples detailing DataRobot’s ability to track the spread of COVID-19 in vulnerable areas around the United States using artificial intelligence. Rise of the Data Cloud is brought to you by Snowflake.

That's a wrap! re:Invent 2020

AWS’s annual re:Invent wrapped up this week, and although we didn’t get to see customers, colleagues and, friends in Las Vegas this year, it was still an eventful three weeks. Spot by NetApp sponsored the virtual conference and hosted a number of activities including our AWS JAM session on Kubernetes and infrastructure scaling, an expert session on cloud compute optimization, and an interview with Spot by NetApp’s CEO and founder, Amiram Shachar.


End-to-End Testing on a JS App

There’s no doubt which programming language is winning the battle for global supremacy right now. JavaScript has powered past the 12 million developers mark, and 5 million of its loyal fans (some 40%) have come aboard within the last three years. Initially thought of as merely a Java spin-out, it is now used to power everything from machine learning libraries to space exploration robots. But to truly maximize the potential of JavaScript, developers have to implement an effective testing regime.


What Gartner Gets Right About Cloud Cost Optimization (and Where They Miss)

Earlier this year, Gartner published “How to Manage and Optimize Costs of Public Cloud IaaS and PaaS,” by analysts Marco Meinardi and Traverse Clayton. As a company that is focused on enabling engineering teams with cloud cost intelligence, we were of course curious what they had to say. Now, if you are familiar with Gartner, you know they have a reputation for serving enterprise clients, so they can sometimes be — well, enterprisey.


#NeotysPAC - Performance - What's Next, Post-Pandemic?, by Hemalatha Murugesan

We are at a critical juncture where many professionals are seeking an answer to considering the job loss, budget cuts, shelving of programs/projects, workforce trimming, micro-management by managers, etc. — what’s next, post-pandemic? Historically, we have gone through many incidents that have affected both humans and the environment. Many animals like woolly mammoths became extinct due to glacial retreat and, of course, dinosaurs too.


Geospatial data processing with streaming SQL for Apache Kafka

An old airport customer of mine (whilst I worked for another company) used to pop someone next to a busy runway with a stopwatch strapped round their neck. The unfortunate person had to manually log the time aircrafts spent on the runway to measure the runway occupancy. All very archaic. Even in those days.

pandora fms

We achieved ISO/IEC 27001

We live in an uncertain world and monitoring should try to make sure that whatever happens we will always be informed. Therefore, security is the basis of everything in monitoring and for us it has always been one of the pillars of our strategy as a product. Security is not a technology, it is a way of thinking and acting, we could even say that it is an attitude. For years we have attended international fairs, events where computer security is offered as specific products.

pandora fms

Monitoring and security: an open marriage

Confidentiality, integrity and availability are the three basic laws of security. Availability is a kind of wayward son who becomes prodigal when he likes to, even if it is just to write eulogies with it when the systems go down, although the truth is that it is the most neglected out of the three of them and perhaps that is why monitoring has become more approached for what it may come from outside than what it is inside.


A Year of Learning & Growth at Martello

Perspective is important; 20/20 to someone who has just completed an eye exam is good news, however, the experience of 2020 that the rest of us have been privy to was much less clear. Martello has navigated through the challenges brought on by a global pandemic by taking proactive measures, being flexible, pivoting quickly when necessary, and continuing to work together – albeit as a socially distant team.


Digital Transformation: What Does It Mean for Enterprise Organizations?

From tiny startups to massive Fortune 500 firms, businesses of all sizes and industries are making heavier investments in digital transformation initiatives. Yet despite this increased awareness and effort, too many large enterprises are still struggling to adapt to a rapidly changing business landscape.

GitOps 2.0 hands-on workshop: Setting up your repositories with ArgoCD and Codefresh

Follow along with Anais as she takes you from setting-up an active ArgoCD installation in your cluster to connecting it with the GitOps Dashboard in Codefresh. We will: By the end of the session, you will have a Codefresh pipeline that will use a standard Git trigger to monitor the GitOps repository for updates using the Codefresh ArgoCD step. Throughout the workshop, we will also highlight GitOps best practices and how you can make the most out of the ArgoCD Codefresh integration.

Appian Workforce Safety

Appian Workforce Safety is designed to help your organization deliver a safe onsite work experience in the wake of the COVID-19 pandemic. See how this solution provides contact tracing, capacity management, health status reporting, and return-to-workplace certification. Plus, built on Appian's low-code automation platform, and available in our HIPAA-compliant and HITRUST-certified cloud, you can trust your organization's information is secure.

Day 0 to Day 2 With Kuma, Helm and Kubernetes | FinTech Studios

During the early days of finding product-market fit, clouds were small. Often, we start with an EC2 instance here, a managed service there, then some Docker containers, microservices, and wait, Kubernetes! As clouds grow with the teams that maintain them, stable relics and legacy systems remain in production. The effort first goes towards building the future and satisfying clients — they’re paying!

Web performance: How to load test

Website owners commonly ask why they need a website performance load tester. Throughout web history, some extremely popular sites have had their fair share of serious downtimes. Either they get massive traffic volumes, or their website simply crashes. Thus, web performance load tester services check the application’s ability to perform under anticipated user loads.


Considerations for Deploying a Multi-Cloud Architecture with Kong Gateway, Kuma Service Mesh and Aviatrix

Building a multi-region or multi-cloud environment for your applications requires a lot of attention. In a typical deployment, you would have an API gateway running close to the several application runtimes. You should enhance your deployment to support different regions in a given cloud, or in an even more distributed and hybrid scenario, multiple services running across other public clouds and on-premise environments.


Agent vs. Agentless Monitoring: Which is best for your infrastructure?

Agent and agentless monitoring are the two methods used for infrastructure monitoring you’ll see in the market today, and while they have their differences, both are valid options when you’re looking at monitoring platforms. Agent: While sometimes designed for a specific system, agent monitoring can also be vendor agnostic and uses a small client installed on servers to collect data and metrics. This typically allows for richer data and more flexibility.


Top 3 New Highlights of Ivanti Endpoint Security

With cybercriminal attacks becoming smarter and more difficult to prevent, traditional authentication methods using username and password have become less secure. This is mainly due to techniques such as account takeovers and brute force attacks. Multi-factor authentication is now considered to be one of the most effective ways to provide authentication security. Ivanti Endpoint Security 8.6 introduces multi-factor authentication for accessing the Console.


Sourcepoint - Scaling Business and Optimizing Customer Journey with Catchpoint

Sourcepoint, founded in 2015, works with both sellers and buyers of media and data, including marketers, heads of advertising operations, and privacy professionals. Sourcepoint provides solutions that ensure compliance with privacy regulations like GDPR and CCPA while helping its clients optimize revenue.


Why Grafana Labs delivers the best Prometheus in the Cloud

Over the last several months, there have been a variety of service providers that have launched Managed Prometheus offerings. This is a testament to the rise in popularity of the Prometheus project, and how it’s becoming a de facto standard for metrics. The most recent announcement in the Managed Prometheus landscape came from AWS. During a re:Invent keynote on Dec. 15, Amazon announced its AWS Managed Service for Prometheus.


Personas Are Not Just For Marketing

“The business does not exist for IT. IT exists for the business”, said David Paul, Director of IT at TRC, a Nexthink customer, during the recently wrapped up Experience Everywhere virtual conference. David seems to be stating the obvious. Indeed, this is something CIOs and IT leaders have always understood. But the lower into the IT rank and file you go, this sense of existential purpose often becomes forgotten in the daily hustle and bustle.


Code Coverage Analysis Using Codecov and Codefresh

Codecov is a code analysis tool with which users can group, merge, archive, and compare coverage reports. Code coverage describes which lines of code were executed by the test suite and which ones were not. However, this is not to be confused with a testing tool. Codecov does not run your tests, that is the job of your testing tools. The analysis that Codecov provides will classify code in either of the following states: Additionally, In this tutorial, we will.