Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Top 6 Link Building Tools and How to Use Them

Content marketing in the modern age has become more about link building and ranking on Google than just reaching audiences. Link building practices have been helping marketers improve the organic reach for their content while also building connections within the industry. You can read more about link building success stories with Pitchbox’s case study.

Weaveworks Combines Jaeger Tracing With Logs and Metrics for a Troubleshooting Swiss Army Knife

Founded in 2014, Weaveworks Inc. makes software that helps developers and DevOps teams build, run and manage containerized applications on Kubernetes. Its products include GitOps-based cluster management, and application delivery, observability and monitoring solutions for services running on Kubernetes. It is a founding member of the Cloud Native Computing Foundation.

Digital Enterprise Journal, 451 Research, and Gartner Highlight OpsRamp's Platform for Hybrid Infrastructure Monitoring and Service-Centric AIOps

The third quarter of 2019 has seen OpsRamp receive market recognition from three independent analyst firms, Digital Enterprise Journal, 451 Research, and Gartner. Leading media publications, DevOps Online News and ITOps Times, have also highlighted OpsRamp’s capabilities for DevOps and IT Operations Analytics.

Serverless Computing for Dummies: AWS vs. Azure vs. GCP

Serverless computing is the latest, greatest thing in the technology world. Although the serverless concept has been around in one form or another for more than a decade, the introduction of serverless platforms from major cloud providers—starting with AWS Lambda in 2014—has brought serverless mainstream for the first time.

Talking with Nexthink About the Future of Digital Employee Experience

Tori Kaufmann-Paulman is a Senior Manager of End User Technology and Sales Enablement at Putnam Investment. I had a blast presenting on the joint Nexthink / IDG webinar talking with peer leaders about the future of digital employee experience. To really dig in I encourage you to consider each of these words on its own.

API Monitoring and OAuth 2.0 Authentication

OAuth 2.0 Authentication, as explained by oauth.net, is a “delegation protocol that is used for conveying authorization decisions across a network of web-enabled applications and APIs.” OAuth was created in 2006 by developers from Twitter and Ma.gnolia, a social bookmarking site. Ma.gnolia was looking for a way to use OpenID, along with the Twitter API, to delegate authentication.

Kubernetes Phase 2-Key Challenges at Scale

Kubernetes is THE buzzword these days. Almost every IT organization is currently using it or is in the process of implementing it as part of their infrastructure. The transition to Kubernetes is complicated, whether a company is using an on-premises, cloud, hybrid, or managed solution, and it usually involves other changes in the codebase, such as shifting to a microservices architecture. While the implementation phase is led by the DevOps team, it requires the participation of the whole R&D group.

Yet another malware attack: macOS now the target for security attacks

Mac usage, as you’ve probably seen in your workplace, has risen exponentially in enterprises. According to a Jamf survey, 74 percent of those who previously used a PC for work experience fewer issues now that they use a Mac. Just like you’ve been watching the rapid rise of Macs in enterprises, so have attackers—the ones wreaking havoc in enterprises through malware attacks.

The life of a sysadmin: Encircled by excessive tools

It’s 3am, and you’re woken up by frantic calls and messages from users at your company—this is the everyday life of a sysadmin. Constantly surrounded by numerous tickets and persistent users who require immediate solutions, the life of a sysadmin is not a bed of roses. Their tasks are not limited to server management, maintenance, and repair, but also completely supporting a smoothly running production environment with minimal or no complaints from end users.