Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Alert fatigue, part 3: automating triage & remediation with check hooks & handlers

In many cases — as you’re monitoring a particular state of a system — you probably know some steps to triage or in some cases automatically fix the situation. Let’s take a look at how we can automate this using check hooks and handlers.

Agile and DevOps: great union for IT

It’s been some time since devops and agile to walk side by side. Combining both has become the basic precept for any IT area, since that way you can get better business results. However, this union still generates much discussion. To better understand the two concepts, it is interesting to note that all of DevOps’ efforts within an organization are geared towards enabling “value delivery” to customers and businesses as quickly as possible.

5 Easy Ways to Improve Site Speed

When it comes to loading time, every second counts. In fact, studies show people will never return to your site if it takes longer than a couple of seconds to load. Site speed should be high on your list of performance improvements. On the internet, you really do only get one chance to make a first impression. That’s why speed testing is so important, but it shouldn’t stop at the development phase. Site speed should be continually monitored every step of the way.

Eliminate Blind Spots - How to Deliver Total IT Visibility

The cost of unexpected downtime is rising. IT Ops teams need an IT service assurance model that allows them to see everything happening in their infrastructures through data collection, processing that data to determine service health, and integrating with other ITOM systems to accelerate incident resolution.

6 Ways to Avoid the 'Swivel-Chair' Effect

When an incident occurs, do you shudder when either you or your team proceed to open multiple browser tabs for each of your monitoring tools? This is the picture painted by the “swivel-chair” effect, context-switching between tools to gather information needed to determine a path of resolution.

Simplifying security auditing, part 6: Compliance and the cloud

In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security. While those concerns are still valid, technological advancements have created new scenarios that need to be addressed.