Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Station: A powerful smart browser for all your web applications

The internet has become an integral part of our lives. Be it work or daily chores, we can’t imagine getting through the day without it. As our reliance on internet increases day by day, a majority of applications we’re switching to have web-based interfaces. The growing popularity of smartphones and portable devices has fueled this tech revolution. Most applications that have web-based interfaces are hosted on the cloud these days.

Synthetic Monitoring vs. APM Stack Trace Tools

The complexity of an application’s digital architecture is increasing dramatically every day. In an era of cloud infrastructure, the goal is to integrate all your web services into one place: CDN, DNS, third-party API services, QA tools, analytics tools, and any other component you can think of, are working with each other to make your services function. With so many components in place for an application to run, each one of these behaves like its own black box within your IT infrastructure.

Week 3 highlights from Knowledge 2020

Week 3 at Knowledge 2020 was another big one, covering everything from Now on Now innovations to what’s next for companies who are plotting a path to bring employees back to the workplace. Here are a few highlights from a busy week. (Be sure to register or sign in to get access to everything below.) Great CX starts with great EX A global pandemic shouldn’t distract CEOs from their focus on implementing digital technologies and workflows or from fundamentally improving their businesses.

How to encrypt a file using Azure Logic App

This blog will brief on how to encrypt a text file using Azure Logic App out of the box. In this blog, we will use keys from the Azure Key Vault to encrypt the file. Consider a scenario in which I receive an e-mail with high importance along with the attachments. When it happens, I wish to back up those attachments carrying sensitive information in Azure Storage blobs in an encrypted format. As mentioned above I will use keys from Azure Key Vault to encrypt the files.

How to choose the right compliance management software for your business

While keeping data safe from modern cyberthreats is difficult enough, you also have to keep in mind compliance with common regulations, i.e., ensuring your company’s compliance to SOX, which deals with transparency in disclosures from public companies. Nowadays, it’s not enough for businesses to rely on dismissive financial documents that satisfy the intermittent audit; you need to level up your game, and create detailed day-to-day records of activities.

Five worthy reads: How should your business approach multi-cloud adoption?

Businesses are emphasizing remote work options, and workers are now accessing more applications and data from their respective locations using the cloud. Even before opting for the current work-from-home mode, it was predicted that 83 percent of the workload will be on cloud for all enterprise activities. It was also predicted that 73 percent of workers from all the departments will be telecommuting by 2028. Looking at the on-going trend, these are highly likely to happen.

How to "leave the office" when the office is your home

Remember that movie Groundhog Day? Where Bill Murray experiences the same day over and over and over and heartwarming hilarity ensues? Working from home can feel like a lot like that (minus the heartwarming hilarity). The hours meld together because there’s no natural divider to separate work time from personal time.

GrafanaCONline Day 7 recap: The past, present and future of Loki, and making dashboards that tell stories

GrafanaCONline is live! We hope you’re able to check out all of our great online sessions. If you aren’t up-to-date on the presentations, here’s what you missed on day 7 of the conference.

New in Grafana 7.0: Trace viewer and integrations with Jaeger and Zipkin

Moving to a scalable, distributed microservice architecture poses a great deal of challenges for any organization. It gets harder to understand the system and pinpoint where errors originate. Logs get much messier, and stitching together a coherent picture of a particular request can be time-consuming or downright impossible. Distributed tracing can help with all of that.

A note of appreciation from our CEO - Business Continuity Edition

Dear SCOM community, It's been 8 weeks since we launched the free Business Continuity edition (BCE) of our SCOM dashboarding product, and I’m glad to see that many community members have taken us up on the offer. The early feedback we received was encouraging and heartening, and we are happy to have helped ease the pressure on IT teams during these uncertain times, in however small a way.