Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Best Practices for Analyzing and Troubleshooting Networks

Have you ever encountered a tough network issue and needed a step-by-step troubleshooting process and the right tools to quickly identify and remedy it? For the most challenging network analysis issues, you may have resorted to costly, time-consuming “sniffer” tools that require a degree just to set up and capture data—let alone to make heads or tails of the results.

Advanced ASP.NET Trace Viewer - WebForms, MVC, Web API, WCF

Software is a complex thing. As soon as you deploy an application to production—especially when you don’t have any control over the environment it’s running on—anything could happen. You’ve created this “monster” and set if free. It’s now free from your control. How do you tame this beast before it creates havoc? The first step is to trace its steps (no pun intended).

Top 8 Tools Every Blockchain Developer Should Know About

While Blockchain technology offers unprecedented security solution and information sharing solution, it remained as of now mostly limited to the cryptocurrencies. While cryptocurrencies made Blockchain their core technology strength, other industries remained mostly silent bystanders.

Improving our broken links checker & mixed content reporting

We're excited to announce that we've shipped some nice improvements to our broken links & mixed content checks. These checks both make use of the crawler that powers those features. When we first launched Oh Dear!, we decided to limit the crawls to the first 1.000 unique pages we find. This was mostly a protection for infinite loops, since those are really hard to detect.

Best Practices for Automating Monitoring

Developer teams and even operational teams often ignore monitoring applications. Deadlines, inexperience, company culture, and management can lead to poor or neglected monitoring inside developing platforms. Automating all monitoring tasks is an excellent way to avoid this scenario. Automation leads to lower costs, less time spent solving issues, and more efficient teams.

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to their use, or rather misuse, of legitimate credentials, machines, and access privileges. Traditional SIEM solutions use simple rule-based alerting to detect potential insider threats, which cannot analyze user behavior or detect any anomalies therein.