Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

A LogicMonitor Employee Reflects on Two Years of Rapid Growth

Some may consider kicking off another new year with their organization a daunting continuation of 2020, however, this is not the case with LogicMonitor. Personally, coming up on my two-year anniversary, I have felt intrinsic energy from day one. With two years under my belt at LogicMonitor, and witnessing first-hand the organization growing at a rapid rate, I thought I would reflect on the opportunity at hand for my colleagues and myself.

3 Steps to Deliver ROI and Business Value from IT Automation

Today’s CIOs and IT organizations have a challenging juggling act. On the one hand, they’re leading digital transformations and investing in customer experience, analytics, application modernizations, cloud migrations, and experiments in AI and IoT. On the other hand, they must reduce costs, drive efficiencies, and improve the reliability, security, and performance of business-critical applications and systems.

Series D: Moving Faster and (Not) Breaking Things

In the software lifecycle, you need to know what is affecting the customer from your frontend code to your underlying infrastructure. However, no one to date has solved for monitoring the health of software code vs. systems at the level that we have taken on — or at the scale that our customers require, as everything from grocery shopping to gaming is now digital.

7 Things DBAs Should Do Before Going On Holiday

Thanks to 2020, many of us don't remember the last time we took a holiday or vacation. If you were able to get away from the office, kudos to you. Hopefully, 2021 will be kinder to us, and we can take some time to recharge. Whether you're a veteran DBA standing watch over million-dollar, mission-critical database systems or a jack-of-all-trades who maintains your organization's SQL Servers, Windows Servers, and all the other corporate IT assets, everyone deserves to take a relaxing holiday.

The New Ivanti Browser Management

A targeted approach to improving users’ browser experiences while minimizing the impact on IT As today’s modern IT estates see an exponential increase in the use of SaaS-based applications year-over-year, many of those applications are being accessed through the browser. The ability to manage browser usage, data, and synchronization has become critical to positive experiences for local, mobile, and remote users.

How To - Monitor IoT with Catchpoint

In this How-To, we’re going to look at a specific Catchpoint synthetic monitor that helps you analyze the health of systems built around the Internet of things (IoT). Now, IoT is obviously a huge category, so in this case, we’re going to look at systems that utilize the Message Queuing Telemetry Transport or MQTT for short.

Our Relentless Roll: D2iQ Konvoy 1.7 and D2iQ Kommander 1.3 are GA!

The latest versions of Konvoy and Kommander are now generally available: the D2iQ Kubernetes Platform (DKP) continues on its relentless roll. DKP is the leading independent Kubernetes platform for enterprise grade production at scale and Konvoy and Kommander are the reason why. You can learn more about Konvoy here, Kommander here, and our general approach here.

Getting Started with Java & OpenTelemetry

It’s easy to get started with Java and Honeycomb using OpenTelemetry. With Honeycomb being a big supporter of the OpenTelemetry initiative, all it takes is a few parameters to get your data in. In this post, I will walk through setting up a demo app with the OpenTelemetry Java agent and show how I was able to get rich details with little work by combining automatic instrumentation from the agent with custom instrumentation in the code.

Top 5 SIEM trends of 2021 and how Elastic Security solves them

Security information and event management (SIEM) systems are centralized logging platforms that enable security teams to analyze event data in real time for early detection of targeted cyber attacks and data breaches. A SIEM is used as a tool to collect, store, investigate, and report on log data for threat detection, incident response, forensics, and regulatory compliance.