Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Loki's Path to GA: Version 0.2.0

Friday, August 2, marked the second beta release for Loki, a long overdue version 0.2.0. Why did it take so long? In large part this was my fault. Having done some work to create a release process for version 0.1.0, I found myself focusing on other things, so improving that process ended up on the backburner. This entire time, in the back of my mind, I was delaying a new release until I could improve that process.

Zooming in on UEBA: Answering the "what" and the "how"

User and entity behavior analytics (UEBA) is a relatively new category of cybersecurity tools that utilize machine learning (ML) algorithms to detect abnormalities in the behavior of the users and entities that belong to an enterprise network. UEBA monitors and continuously learns from the behavior of various user accounts and devices in the network, and establishes a baseline behavioral profile for each using statistical and probability models.

Optimizing Business Response When Technical Incidents Happen

Most technical incident response plans typically account for stakeholder communications—for both internal teams and external customers. But at PagerDuty, what we’ve learned from our customers is that there’s still a painful and expensive gap in alignment between IT and business teams. To close that gap, we need to focus on what incident response means for business teams.

Identify, Track, and Fix Issues Faster with Sentry

Modern software applications are capable tools with a wide range of functionalities. The most popular software applications existing today haven’t achieved the pinnacle of success without many bumps along the way. Developing software is difficult and you need to ensure your development doesn’t collapse under the weight of unexpected errors. This is where error tracking software comes into picture.

Advanced ASP.NET Trace Viewer - WebForms, MVC, Web API, WCF

Software is a complex thing. As soon as you deploy an application to production—especially when you don’t have any control over the environment it’s running on—anything could happen. You’ve created this “monster” and set if free. It’s now free from your control. How do you tame this beast before it creates havoc? The first step is to trace its steps (no pun intended).

Top 8 Tools Every Blockchain Developer Should Know About

While Blockchain technology offers unprecedented security solution and information sharing solution, it remained as of now mostly limited to the cryptocurrencies. While cryptocurrencies made Blockchain their core technology strength, other industries remained mostly silent bystanders.

Why Should You Containerize Applications?

A container is a type of an operating system virtualization which helps in the efficient running of applications across platforms with minimum consumption of resources. As a matter of fact, a single container can be used to run anything from necessary executables to libraries, configuration files or even basic or advanced binary codes. Containers are lightweight and portable, a major point to consider while deploying them in cloud.