Operations | Monitoring | ITSM | DevOps | Cloud

Debug iOS crashes efficiently with Datadog RUM

Unsurprisingly, application crashes due to fatal errors can be a major pain point for iOS users. Recent research shows that roughly 20 percent of mobile application uninstalls were due to crashes or other code errors. As a developer, it’s paramount to manage this potential churn by capturing comprehensive crash data in order to track, triage, and debug recurring issues in your iOS apps.

Sponsored Post

Troubleshooting Office 365 Issues Made Simple

Do you often ask yourself the question - Is there an Office 365 problem today? While you try to find the answer, your customers (end-users) complain because they can't access their business applications. Apart from all this, your boss needs an immediate status update. Trust me. It doesn't feel great to be in that situation. And we know it. Despite Microsoft claiming to provide 99.9% SLA, issues will occur with the Office 365 applications such as Teams, Outlook, OneDrive, Exchange Online, SharePoint, Yammer, etc. Often, the issues aren't even Microsoft's problems but an ISPs or internal network change. There can be lot of reasons (Network, OS, browser, personal device, upgrade errors, Internet, and much more), but which one is it?

Sponsored Post

5 Security Automation Myths Debunked

It has been argued that automation in the workplace tends to be misunderstood. Analysts are keen to point out that, despite myths to the contrary, automation isn't going to put most people out of work, for instance. Nor is AI going to become a real substitute for actual human intelligence. These are compelling arguments for rethinking the way we think about automation in general. But you can take the points further if you analyze the impact of automation on specific domains, such as cybersecurity. Indeed, automation is perhaps nowhere more misunderstood than in the realm of cybersecurity. To prove the point, here are five common myths about automation's impact on security, and why they're wrong.

Network-As-A-Service And The Cloud

The almost wholesale shift of enterprise workloads into the public cloud have cemented the appeal of greater business flexibility and agility through on-demand consumption of services (X-as-a-Service) and pay-as-you-go pricing. But bridging the connectivity gap between the enterprise network and the cloud is a complex process and one where one size does not fit all.

HAProxy Kubernetes Ingress Controller Reaches 10 Million Community Downloads

It’s almost wild how two years have passed already since we first announced the HAProxy Ingress Controller for Kubernetes. Note that this project is different from the jcmoraisjr/haproxy-ingress HAProxy ingress controller project on GitHub. Our project is also an open-source project, but it is overseen by engineers at HAProxy Technologies, which has allowed us to streamline its release cycle.

Metrics Dashboard, Scale testing upto 500K events/sec - Signal 05

A month and thousands of code lines later, we're here with our monthly product update - Signal #05. We squashed bugs, shipped custom metric dashboard along with improvisations in our frontend. We also got featured by one of the top online analytics magazines as one of the leading Data Observability platforms. 🥳 Let's dive in to see what humans at SigNoz have been up to!

How Do You Monitor Cassandra Performance: Key Metrics to Measure

Apache Cassandra is a distributed database known for its high availability, fault tolerance, and near-linear scaling. It was initially developed by Facebook, but it is a widely used open-source system used by the largest tech companies in the world. There are numerous reasons behind its popularity, including no single point of failure, exceptional horizontal scaling with a data layout designed as a perfect fit for time-series data.

gRPC-web: Using gRPC in Your Front-End Application

At Torq, we use gRPC as our one and only synchronous communication protocol. Microservices communicate with each other using gRPC, our external API is exposed via gRPC and our frontend application (written using VueJS) uses the gRPC protocol to communicate with our backend services. One of the main strengths of gRPC is the community and the language support. Given some proto files, you can generate a server and a client for most programming languages.

SBC Interoperability: How Do I know if This Works with That?

Growing up, I was the youngest member of my family, so I was not very fond of the game “Keep Away” that my older brothers liked to play. The idea of the game (it has a few different names) is that two people toss a ball back and forth while the third person stands in the middle and tries to intercept it. Being the youngest, and therefore the smallest, it often seemed like a futile game that wasn’t much fun.