Operations | Monitoring | ITSM | DevOps | Cloud

Practical CPU time performance tuning for security software: Part 1

Software performance issues come in all shapes and sizes. Therefore, performance tuning includes many aspects and subareas, and has to adopt a broad range of methodologies and techniques. Despite all this, time is one of the most critical measurements of software performance. In this multi-part series, I’ll focus on a few of the time-related aspects of software performance — particularly for security software.

The State of IT Operations Management in 2021

It's all changing! So, business as usual! Working flexibly from home quarantine these past two years has brought a few things into sharper focus. For a start, there's really no such thing as an IT system---there are only Human-IT systems. IT isn't an accessory, it's an integral part of us. Multiple tech cultures are playing a larger role in decision making. Technology decisions are becoming more distributed and more market-driven, from the bottom up rather than exclusively from the top down.

Understanding the DoD's Data Strategy: Part 2

Published in late 2020, the DoD Data Strategy emphasizes the importance of unlocking and operationalizing data-value from across its enterprise to support mission operations and maintain battlefield advantage. The strategy highlights seven goals and objectives that the DoD believes will align the DoD's Data Strategy with industry best practices.

How to Use Observability to Reduce MTTR

When you’re operating a web application, the last thing you want to hear is “the site is down." Regardless of the reason, the fact that it is down is enough to cause anyone responsible for an app to break out into a sweat. As soon as you become aware of an issue, a clock starts ticking — literally, in some cases — to get the issue fixed. Minimizing this time between an issue occurring and its resolution is arguably the number one goal for any operations team.

How Log Analytics Powers Cloud Operations: Three Best Practices for CloudOps Engineers

At the turn of the 20th Century, enterprises shut down their clunky generators and started buying electricity from new utilities such as the Edison Illuminating Company. In doing so, they cut costs, simplified operations, and made profound leaps in productivity. The promise of modern cloud computing invites easy comparisons to those first electric utilities: outsource to them, save money and simplify.

DNS Lookup Explained

The Domain Name System, DNS for short, is one of the most important protocols on the internet, and yet relatively few people understand its purpose. DNS is a protocol which governs how computers exchange data online. Its purpose, simply stated, is to match names with numbers, helping to convert memorable domain names (such as statuscake.com), into an IP address (such as 8.8.8.8 for Google.com) that your browser can use. DNS is essentially a map or a phone book of the internet.

Everything You Should Know About Spam Filters

We are all aware of the spam folder in our email dashboard. This article deals with how spam filters automatically identify and divert spam mail from our inbox to the spam folder. Spam filters are used to screen inbound emails (the emails entering a particular network) and outbound emails (the emails leaving the network). The Internet Service Providers utilize both methods for protecting the receiver and the sender. There are many types of spam filtering solutions available.

Multi-tenant Architecture for SaaS Apps

A multi-tenant architecture is essentially a framework in which a common instance of a software application is used to service several client applications or tenants. This multi-tenant architecture has found extensive adoption in SaaS applications, which cater to requests from tens and thousands of clients. The main reason for the adoption of multi-tenancy is the efficient and optimal use of resources and funds, along with delivering seamless service.

3 ways to manage digital risk in any organization

Digital transformation is vital to business today. However, it can increase digital risks, which can take many forms. To help ensure your organization is protected against business disruptions, noncompliance, and errors, you need a robust digital risk management program. Our three-part Managing Digital Risk and Beyond webinar series is designed to help you prepare for, manage, and address digital risks in your organization: Develop a risk management program.