Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Splashing into Data Lakes: The Reservoir of Observability

If you’re a systems engineer, SRE, or just someone with a love for tech buzzwords, you’ve likely heard about “data lakes”. Before we dive deep into this concept, let’s debunk the illusion: there aren’t any floaties or actual lakes involved! Instead, imagine a vast reservoir where you store loads and loads of raw data in its natural format. Now, pair this with the idea of observability and telemetry pipelines, and we have ourselves an engaging topic.

More modern monitoring: how telemetry and machine learning revolutionize system monitoring

It’s time, take your things and let’s move on to more modern monitoring. Relax, I know how difficult the changes are for you, but if you were able to accept the arrival of DTT and the euro, you sure got this! But first let us do a little review: Traditional system monitoring solutions rely on polling different meters, such as the Simple Network Management Protocol (SNMP), to retrieve data and react to it.

Transforming Bank Operations

With the recent advancements in technology and online digital services have transformed the way the banks work. Decades ago, banks used to handle everything on paper and the services opted for were very limited. Services were not unified, and account holders were forced to visit the bank even for small number of deposits or withdrawals or just to raise concerns. Today, technology has penetrated almost every industry and the banking sector is no exception to this undeniable reality.

Data Retention Policy Guide

Data retention policy will become a major focus for CIOs in 2021. Here’s why: First, enterprise organizations are producing larger volumes of data than ever before and utilizing enterprise data across a wider range of business processes and applications. To maximize its value, this data must be managed effectively throughout its entire life cycle - from collection and storage, through to usage, archiving, and eventually deletion.

How system enterprise vendors are adopting AIOps through acquisitions/organic growth

It’s been two years since Gartner published the Market Guide for AIOps Platforms in April 2021. The report states, “There is no future of IT operations that does not include AIOps. It is simply impossible for humans to make sense of thousands of events per second being generated by their IT systems.” The recent wave of acquisitions of AIOps vendors makes us reminisce about a time when AIOps was a buzzword.

How to Monitor the Performance of Mobile-Friendly Websites

Mobile-friendly websites are a must. We are all using mobile devices more and more to access information and perform all kinds of work and tasks – shopping, banking, communication, dating, etc. Needless to say, if you operate a website, you more likely want to ensure people accessing it using mobile devices – tablets, smartphones, etc. – have a great experience.

Agentless Network Monitoring: An Introductory Guide

From communication and collaboration to data storage and sharing, networks are critical to almost every business operation today. Thus, monitoring the reliability and security of your network infrastructure is more critical than ever. Network monitoring entails observing and analyzing network traffic to identify issues, optimize performance, and ensure security.

Install Pandora FMS with our online installation tool

Hello again, Pandoraphiles! Today on our beloved blog we want to introduce you to a video. You know that from time to time we do just that, don’t you? Bringing back some video from our channel, the nicest and most relevant one, no question, and break it down a little bit in writing. All of that so that you may have the book and the audiobook, so to speak.

Container Security Fundamentals - Linux Namespaces (Part 4): The User Namespace

In this video we continue our examination of Linux namespaces by looking at some details of how the user namespace can be used to de-couple the user ID inside a container from the user ID on the host, allowing a container to run as the root user without the risks of being root on the host. To learn more, read our blog on Datadog’s Security Labs site.