Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

A DBA's Habit for Success: CMMI (Part Three)

Welcome back! As we enter the halfway point of this five-part series, we’ll discuss Level 3 of the capability maturity model (CMM) and the role it plays in helping DBAs grow their organization and increase the functionality of their business. By now you should be familiar with the definition of CMM and the Information Maturity Model (IMMM). If you need a refresher, part one and two of this series cover the basics of the models and the overall benefits of following a maturity model.

Going Beyond Exclude Patterns: Safe Repositories With Priority Resolution

You probably remember the Namespace Shadowing a.k.a. “Dependency Confusion” attack that was in the news a couple of weeks ago. I blogged back then about the Exclude Patterns feature of JFrog Artifactory which we’ve had forever and was always intended to protect you against those kinds of attacks.

ITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 1 of 2

Actor 1: “Hey, you got peanut butter on my chocolate.” Actor 2: “Well you got chocolate in my peanut butter.” This 1970’s ad campaign of “Two Great Tastes that Taste Great Together” put Reese’s Peanut Butter Cups on the map. Know what else makes a great combo? IT Service Management (ITSM) and IT Asset Management (ITAM).

Long Weekend and you Locked Yourself Out of Your Computer

The latest Verizon DBIR report is out and we all should realize, normal is not the new workplace. Picture this: You’re logging into the work account after a long weekend of gratitude, remembrance and maybe even getting to hug someone safely. Okay, we’re exaggerating a little but variations of this scene are playing out all over the country this week. You’re frustrated and you haven’t even gotten started on the work that piled up over the weekend.

Serverless Vs. Containers: Which One Should You Use?

Containers and serverless computing are two of the most popular methods for deploying applications. Both methods have their advantages and disadvantages. To choose the one that’s right for your business, you need to understand the pros and cons of managing your own containers versus using serverless services.

Google Authenticator and Pandora FMS, defend yourself from cyberattacks

For a long time, the Internet has been an easily accessible place for most people around the world, full of information, fun, and in general, it is an almost indispensable tool for most companies, if not all, and very useful in many other areas, such as education, administration, etc. But, since evil is a latent quality in the human being, this useful tool has also become a double-edged sword.

AWS Kinesis vs SNS vs SQS (with Python examples)

How to choose a decoupling service that suits your use case? In this article we’ll take you though some comparisons between AWS services – Kinesis vs SNS vs SQS – that allow you to decouple sending and receiving data. We’ll show you examples using Python to help you choose a decoupling service that suits your use case. Decoupling offers a myriad of advantages, but choosing the right tool for the job may be challenging.

7 Reasons Why Your Internal Developer Platform will Fail

In a previous post, we discussed the rise of the developer platform and how developer productivity is one of the main reasons why many organizations are either looking for or building an internal developer platform (IDP). According to a recent global survey done by Stripe, on a scale of 0 – 100%, developers responded that only 68.4% of their time is productive, which means that developers could be nearly 50% more productive than today: (100% — 68.4%) / 68.4% = 46%

Understanding Splunk Phantom's Join Logic

If you’re an active Splunk Phantom user, it’s safe to assume you know what a playbook is. If not, here’s a quick summary: Phantom playbooks allow analysts to automate everyday security tasks, without the need for human interaction. Manual security tasks that used to take 30 minutes can now be executed automatically in seconds using a playbook. The result? Increased productivity and efficiency, time saved, and headaches avoided.

What is Network Optimization? 8 Reliable Techniques

Network optimization is a set of tools and techniques used to improve network performance and reliability. As such, it’s not a “one and done” operation but an ongoing process. Business requirements dictate a certain level of performance, but time and budget often limit what you can and can’t tweak. So, you optimize within those constraints.