Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Here's How the Internet of Things is Transforming Healthcare

Industry 4.0 technology is transforming industry all over the world. Digital innovations such as data, virtual reality, automation, and robotics are all helping brands create products and services and deliver them to customers in better and more efficient ways than ever before. One of the most useful elements of Industry 4.0 technology comes from the Internet of Things.

Announcing secrets management in Sensu Go

In order to determine the health and current state of your systems, monitoring by its very nature requires access to internal and external services. Traditionally, users have had to get creative in terms of how they expose sensitive information (secrets, like access credentials) to their monitoring tool; operators typically would leverage local environment variables or give up entirely by putting secrets in the monitoring configuration.

DevOps Incident Management: A Guide With Best Practices

This is the one post I hope you’ll never need. However, should you ever need it, this is your one-stop shop for understanding how to proceed with DevOps incident management. Have you just been attacked? Did the commit go wrong? A CI pipeline went haywire? Don’t worry. I got you.

The Data-to-Everything Platform: What It Is, What It Means

As a company leader, what value are you extracting from your business and IT? What about from security data lakes and processes? Are you able to drive speed for your business because of real-time, advanced analytic capabilities? Successful companies are making technology architecture their business architecture—aligning stakeholders, processes, data, and analytics in an integrated fashion to deliver faster, data-driven decisions that are more accurate than ever before.

9 essential UEM capabilities that empower your IT administration

Unified endpoint management (UEM) is an IT best practice and strategy for securing and controlling desktop computers, laptops, smartphones, and tablets in a connected, secure manner from a single console. It’s increasingly important for enterprises today because of the prevalence of corporate-owned, personally-enabled (COPE) devices, and bring your own devices (BYOD) policies.

Unpatched zero-day vulnerability in Internet Explorer exploited in the wild

Barely a week after Patch Tuesday, internet security company Qihoo 360 has discovered yet another vulnerability in Internet Explorer (IE), this time due to a remote code execution vulnerability in the jscript.dll scripting engine. The vulnerability, identified as CVE-2020-0674, is considered Critical for IE 11, and Moderate for IE 9 and IE 10.

December 2019 Outage Report

December was a busy month with systems we don’t normally see experiencing server downtime. Our first story, in particular, is an excellent example of how complicated monitoring can get as infrastructure grows. We saw every level get hit, from the government to big-name players, with ransomware being one of the major thorns in our collective sides. But we also bring you the heartwarming tale of the little Minecraft Server that could.

A Rubyist's Introduction to Character Encoding, Unicode and UTF-8

Have you ever dealt with a unicode bug? Where plain text — the substance you work with all day — can no longer be trusted? It can be disorienting to say the least! This article will help prepare you so that the next time that happens you’ll be able to spend less time hyperventilating and more time troubleshooting.

How Grafana Enterprise Helped 84.51° Centralize Its Metrics and Tell a Holistic Story

84.51°, the data analytics and marketing company owned by The Kroger Company, found out it needed centralized metrics the hard way. When Erin O’Brien was brought into the company in the spring of 2019 as a Lead Service Manager, she was tasked with evaluating and seeking ways to continuously improve how the Technology and Product teams worked together.

2020 SRE Predictions

It’s a new year, so what will 2020 have in store for SRE? Here’s our two cents: SRE adoption will only continue to grow. However, the practice and culture shift, rather than the role, will take priority in 2020. More people (not just SREs) will have a reliability mindset, shifting reliability left through the software lifecycle. SLIs, SLOs, and error budget policies will become common practice to make this shift actionable.