Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Key Takeaways from DEJ's IT Performance Management Study

It goes without saying that 2020 has been a challenging year for businesses. Faced with unexpected and unfamiliar hurdles, organizations have been under immense pressure to maintain or improve performance in all areas of their business. But this has also been a year of innovation. We’ve seen modern organizations embrace new, innovative technologies and tactics that have reshaped the way they manage IT performance.

Achieve comprehensive observability with Sensu and Elasticsearch

Elasticsearch is a great platform for any data lake initiative, and ideal for analyzing your monitoring and observability data. But if you’re working with a number of different monitoring and observability tools, especially across multiple cloud environments, you might find it challenging to get all your data into Elasticsearch.

By Spurring Digital Transformation, COVID-19 Is Preparing Orgs for an Uncertain Future

What made the COVID-19 pandemic and subsequent lockdowns so novel in recent history is that they were true existential threats to many businesses. This was not a case of getting “Ubered,” whereby the erosion of revenue can take years to fully materialize. Rather, this was a case of companies needing to—sometimes literally overnight—expand their digital operations and adopt new business models.

DevOps Customer Success - How to increase service availability, accelerate innovation, and improve pipeline performance

By industrializing software delivery, DevOps has the potential to transform IT in the same way that Henry Ford transformed manufacturing Back in 1913, Henry Ford started a manufacturing revolution. On December 1, the first automotive assembly line heralded the advent of mass production and reduced the time required to build a Model T to only 2 ½ hours. That allowed Ford to slash manufacturing costs as well as the price of his iconic automobile.

Tidal Migrations hearts FinOps - Welcome!

Tidal Migrations is proud to welcome Shana Cunha to the team as our Director of FinOps Strategy. Working in the cloud since 2015 at AWS and holding the FinOps Practitioner certification, Shana has worked with many Enterprises ensuring maximum return of their Cloud Investment and seeking opportunities to deliver value to customers around the globe. We asked Shana for her thoughts on FinOps and what it means to Tidal Migrations customers. Shana?

Instrumenting Node.js for Tracing in Jaeger

There is more to Distributed Tracing with Jaeger than just capturing machine data as with metrics, or tailing log files. To start, you should read this primer. In this article, I will walk you through the initial principles you’ll need before executing anything within your codebase. This is going to focus on Node.js, as slight differences and concerns exist for browser applications.

Choosing the right event-routing service for serverless: EventBridge, SNS, or SQS

Serverless is synonymous with Event-Driven Architecture, where Events are a fundamental block of information that is passed around to execute certain application logic. It is very important that events are delivered to the right destination with expected behavior to make sure the whole serverless application works as one. Events are relayed from one place to another through communication services, either in sequence or in parallel.

How a mobile device management solution can help with securing devices in the digital workspace

The past decade has witnessed many organizations adapting to a digital workspace, replacing the traditional physical offices setups with virtual workplaces encompassing all the technologies that employees require to get their work done. Because of the pandemic, even companies that were once against the concept of a distributed workforce have now been forced to embrace remote work. Though a digital workspace offers a more flexible user experience for employees, it comes with its own set of challenges.

Monitor Windows hosts with Network Performance Monitoring

If you’re running a mix of Windows– and Linux–based hosts in hybrid or cloud environments, network monitoring is especially important—and especially difficult. As network topologies are becoming increasingly distributed and dynamic, you need a quick way to identify connectivity issues across regions, services, and operating systems.

Accelerate security investigations with Datadog Threat Intelligence

Attackers (i.e., threat actors) often reuse techniques or resources, such as IP addresses, hashes, and domains, in multiple attempts to find and exploit vulnerabilities in your systems. Defenders can categorize this data as indicators of compromise (IOCs) and create collections of IOCs in order to look out for potential attacks. These IOC collections are known as threat intelligence.