Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

The challenges of agent-based monitoring for cloud virtual machines and how to overcome them

Imagine discovering that 40% of your cloud infrastructure went unmonitored for a week because monitoring agents failed to deploy during an auto-scaling event. This scenario isn’t just hypothetical—it’s a growing reality for organizations relying on traditional agent-based monitoring in dynamic cloud environments.

SCOM 2025 upgrade: In-place upgrade or side-by-side installation

SCOM 2025 upgrade: In-place upgrade or side-by-side installation SCOM 2025 was released last year, and now is the time to start planning your upgrade. But where do you begin? Upgrading can be a complicated process, and it is important to consider the different options to make the process as smooth as possible. When upgrading, you can choose between an in-place upgrade or a side-by-side installation, and each approach leads to different outcomes. The right path for you depends on several factors.

Why Super Bowl 2025 was a triumph for Internet Resilience

When you’re spending close to $8 million for a 30-second Super Bowl ad, the one thing you don’t want to leave to chance is your website—especially when millions of viewers, whether they came for the game, Kendrick Lamar, or to catch a glimpse of Taylor Swift in the stands, might head there right after the spot airs. Make no mistake: web performance is just as critical as the ad itself.

NIS2 Directive and Cybersecurity: Requirements, Risk Management, and Monitoring

The days when an antivirus and common sense were enough to guarantee an organization’s cybersecurity are long gone. Especially if you work in a critical sector. That’s why the NIS2 Directive (2022/2555) of the European Union establishes cybersecurity obligations for these key activities… and the consequences of non-compliance. These consequences are significant, so let’s analyze the regulation, when it applies, and how to implement it.

Shorten your MTTR with Checkly Traces

We all know that Checkly is a ‘secret weapon’ for engineering teams who want to shorten their mean time to detection (MTTD). With Checkly, you can know within minutes if your service is unavailable for users, or acting unexpectedly. In this article we’ll talk about how Checkly traces can help you expand on the benefits of Checkly, adding insights that will help you diagnose root causes, and further reduce your mean time to resolution (MTTR) for outages and other incidents.

AI Governance in 2025: A Full Perspective on Governance in Artificial Intelligence

In a world where artificial intelligence (AI) is leaping forward — growing at a CAGR of almost 36% from 2024 to 2030 — questions about governance and ethics with the use of AI are surfacing. As humans continue to develop AI systems, it is crucial to establish proper guidelines to ensure powerful technologies like generative AI and adaptive AI are used in a responsible manner.

Key metrics to monitor for optimal SQL Server performance

Microsoft SQL Server is a critical database component of many business applications, ensuring data integrity, fast query performance, and seamless transactions. However, maintaining peak performance requires proactive monitoring of essential metrics. In this blog, we’ll explore the key SQL Server performance metrics you should track and how they help prevent performance issues, optimize resource usage, and enhance database efficiency.

Challenges in Monitoring Applications That Use OAuth

OAuth (Open Authorization) has become a critical component in enabling secure and third-party access to APIs which makes it one of the most widely adopted authentication protocols for modern applications. From allowing users to sign into apps using their Google or Facebook accounts to enabling third-party service integrations, OAuth simplifies the process of granting access to resources without compromising security.