Operations | Monitoring | ITSM | DevOps | Cloud

Interview

What's the value of a unified stack and application-centric approach to network monitoring?

In the third part of this 451 Research 4-part video series, senior analyst Mike Fratto shares his views on why full network stack visibility and a application-centric approach to network monitoring will enable successful network operations.

Video AMA: Ana Medina

Ana is currently working as a Chaos Engineer at Gremlin 10, helping companies avoid outages by running proactive chaos engineering experiments. She last worked at Uber where she was an engineer on the SRE and Infrastructure teams specifically focusing on chaos engineering and cloud computing. Catch her tweeting at @Ana_M_Medina 11 mostly about traveling, diversity in tech, and mental health.

Monitoring Microservices: IT's Newest Hot Mess

In this THWACKcamp session, you’ll learn how microservices are different from other applications, when performance bottlenecks most often occur, how they tend to break, and where you can add monitoring to stay ahead of trouble. You’ll also see how to extend existing infrastructure dashboards to include microservice workloads, cut troubleshooting time, and include new business metrics that measure the business goals driving microservices in the first place.

Six Ways to Improve Your Security Posture Using Critical Security Controls

Security policies within organizations are under a lot of scrutiny in today's times. Trying to stay up to date with these policies can create stress to users and the IT staff managing the infrastructure. Just like network standardization is a must, so is security standardization.