Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Analyze your GKE and GCE logging usage data easier with new dashboards

System and application logs provide crucial data for operators and developers to troubleshoot and keep applications healthy. Google Cloud automatically captures log data for its services and makes it available in Cloud Logging and Cloud Monitoring. As you add more services to your fleet, tasks such as determining a budget for storing logs data and performing granular cross-project analysis can become challenging.

Looking back at almost a decade of DevOps and forward to what's coming next

TL;DR: This year’s State of DevOps Report is the 10th anniversary edition of this annual research on how practitioners are making DevOps work for them. Whether you’re a big time CircleCI user or are just beginning your career, we want to hear from you. Please take the survey so your voice is represented in the 2021 State of DevOps.

How to Detect Memory Leaks in Java: Causes, Types, & Tools

A memory leak is a situation where unused objects occupy unnecessary space in memory. Unused objects are typically removed by the Java Garbage Collector (GC) but in cases where objects are still being referenced, they are not eligible to be removed. As a result, these unused objects are unnecessarily maintained in memory. Memory leaks block access to resources and cause an application to consume more memory over time, leading to degrading system performance.

Consolidate Knowledge Base Articles from Multiple Departments in 5 Steps

After adopting foundational practices of knowledge management many organizations aim to expand this practice outside of IT. While comprehensive knowledge management is an effective way to connect employees to solutions from multiple departments, maintenance can be a major challenge. This post will dive a little deeper into how to consolidate knowledge base articles from multiple departments.

Why We're Embracing Password 3.0...And You Should Too

Password 1.0 was your cat’s name and your birth year and you used it across every endpoint for a decade. We see you, Sprinkles1979. Password 2.0 was SSO and MFA and WTF because literally everyone used Facebook for authentication. We all saw how well that went. It’s time for Password 3.0 We’ve always operated at the leading edge of innovation, and this is no exception. While the industry gets bogged down in sending texts to confirm authorization, we’re moving forward.

Resolve Network and VPN Performance Problems Faster with Endpoint Monitoring

IT professionals are now adapting to remote environments and learning to manage a distributed, homebound workforce. In recent conversations with IT pros, many have cited that connectivity/VPN and home network issues are their top challenges but they lack the visibility to diagnose and troubleshoot these problems. Catchpoint for employee experience monitoring gives IT teams what they need: visibility from remote users’ devices to any business-critical application across any network.

Introducing Stackoscope For Serverless Applications

Here at Lumigo, we are focused on helping customers succeed with serverless and make it easier for them to build and run serverless applications in production. We love serverless and operate one of the largest serverless systems out there as we ingest and process billions of events from our customers. One thing many customers have asked us for help with is to identify misconfigured resources or places where they can improve by following best practices.