Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How to Fix JavaScript Errors

My computer programming teacher had always told me that 10% of our time is spent developing 90% of our application, and the other 90% of our time finishing the last 10% of our project. Even with a good project plan and a concept that makes logical sense, most of our time will be consumed with fixing errors. Moreover, with JavaScript, our application can run without obvious errors preventing it from being run, so we have to employ several techniques to make sure everything is running smoothly.

How to Migrate from Magento 1 to Magento 2

A growing number of online retailers are now migrating to Magento 2 from the earlier version, Magento 1. This trend of migration is driven both by functional advantages and strategic planning as Magento will stop supporting its 1.x versions after 2020. That’s the reason why so many business owners are upgrading their online stores with the latest technology.

What Is Real User Monitoring? How It Works, Examples, Best Practices, and More

Real User Monitoring is a type of performance monitoring that captures and analyzes each transaction by users of a website or application. It’s also known as real user measurement, real user metrics, end-user experience monitoring, or simply RUM. It’s used to gauge user experience, including key metrics like load time and transaction paths, and it’s an important component of application performance management (APM).

Top Kubernetes Tutorials & Resources for All Levels

If you are a developer who uses containers, chances are you and your team have heard about Kubernetes. At its core, Kubernetes is a container operating system for the web, but has grown to be much more. Sure, Kubernetes can manage your containers, network traffic, and bring up a crashed ad, but it has also become a widely adopted platform with a growing community.

AWS Elastic Beanstalk .NET Core Getting Started

AWS offers a variety of services to solve specific needs. There are some core services, like EC2 and VPC, that let you create an infrastructure for your applications that scales easily. But if you’re new to AWS and also new to infrastructure, you might need to invest some time reading before you deploy your application to AWS. I remember my first time using AWS; the sysadmin explained to me what systems we were using in AWS to run the company’s main application.

5 Best Security Practices for Tomcat Servers

Tomcat servers are widely used application servers for today’s development architectures, popular for hosting Java based applications. Below is a guide on best security practices for security your Tomcat Server environment. Banner grabbing is the process of gaining information from computer systems including services, open ports, version, etc. When sending a server host request via telnet command, you pass along the server name, port, and version.

Kubernetes as a Service

DevOps teams are increasingly looking toward Kubernetes as a scalable and effective way to package application containers of all sorts.. However, while Docker and Kubernetes have paved the way for the container and microservices revolution, there is still plenty of room for innovation. The strength of the Kubernetes tool lies in its ability to blend the simplicity of Platform as a Service with the stability of Infrastructure as a Service software.

Top Server Monitoring Tools for the New Year

DevOps teams have more on their plate than ever. As infrastructure needs grow, so does the time required to ensure that everything’s running smoothly. This makes automation crucial – especially in the server and network monitoring world. Server monitoring tools can save teams time by automating server management and providing real-time performance updates.

AWS Redshift Monitoring: The Complete Guide

Would you like to detect problems in your Amazon Redshift environments? Does your team need a high-level overview of what monitoring options they can choose from when they deploy Redshift nodes and clusters? First, we’ll start with one of the most important components of any monitoring strategy: performance and availability monitoring. Then, we’ll continue with monitoring Redshift configuration changes and how to meet compliance requirements with Redshift.