Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Is Your Data Center Ready for AI? 3 Hidden Bottlenecks You Need to Know

The rapid adoption of Generative AI (GenAI) tools like ChatGPT is transforming how businesses operate. These tools hold immense potential, impacting everything from marketing campaigns to legal research and software development. A recent study by PwC found that a staggering 54% of companies had integrated GenAI into their workflows as of November 2023 – a testament to the technology’s rapid adoption. However, this rapid integration presents challenges for IT leaders.

Writing Your First Visual Regression Check in Playwright

Visual regression testing ensures that your web application looks as expected and that any visual changes are intentional. These tests amount to comparing two screenshots and looking for pixels that are different. With Playwright, you can achieve this with just a few lines of JavaScript. Let's walk through the process using a simple example. Once we’ve done a visual regression test start to finish in Playwright, we’ll show how you can add Checkly tools to create visual regression monitors.

AWS GP2 Vs. GP3 Volumes: A Side-By-Side Comparison

Amazon Elastic Block Storage (EBS) is an efficient and durable block storage service. It is especially great for rapidly changing data on Amazon Web Services (AWS). Besides, Amazon EBS GP volumes promise a balance between performance and cost savings. In this guide, we see if that is the case. We’ll also tell if switching from your current EBS volume type is worth the while.

Focus on code that matters with source code previews in Continuous Profiler

The use of code profiling to troubleshoot application performance can appear daunting to the uninitiated, and many software engineers even assume that this domain is reserved for niche specialists. But here at Datadog, one of the key goals for our Continuous Profiler product has been to take this seemingly intimidating practice of code profiling and make it more accessible to engineers at all levels.

Feature Friday #14: variablesmatching() & variablesmatching_as_data()

Did you know you can find variables by name and tag? Like the ability to find currently defined classes (as described in Feature Friday #13: classesmatching()) that match a name or tag, you can find variables by name and tag. It’s a nifty capability. variablesmatching() returns a list of variable names that match the name and tag criteria.1 variablesmatching_as_data() returns a data container of the matching variables along with their values2.

How Dell successfully migrated to Grafana Cloud and consolidated its observability in the process

While some monitoring tools excel at a specific task, observability works best when you have a holistic view of your system. You need a platform capable of working with all of your telemetry collectively, otherwise you can end up with a complex, inefficient, and expensive collection of incongruent, siloed tools. That’s what one team at Dell Technologies realized before they made a switch to Grafana Cloud last year.

Lessons From Our Fathers: On Network Operations Tools and Expertise

“It’s the network again.” That is what most people think of when they experience degradation in their digital interactions. Whether it’s an app that won’t load, a 404 error, or garbled speech in a streaming conversation—the network’s reputation always seems to take a hit when things go wrong. Battling this perception with facts is essential. This requires knowing what’s up, what’s down, and what’s affected.

Curated dashboards in Honeybadger

Earlier this year, we introduced a new logging and performance monitoring tool, Honeybadger Insights. You can finally send your logs, application events, and telemetry data to Honeybadger! Once you do, you can query your logs and events to diagnose performance issues, perform root-cause analyses, and create beautiful charts and dashboards to see what's happening in real time.

Complete Guide: Understanding and Preventing DCSync Attacks

Gaining insights into DCSync attacks is key to fortifying your Active Directory (AD) against these sophisticated threats. By exploiting legitimate AD replication protocols, attackers can discreetly extract sensitive information, such as password hashes and Kerberos tickets. Recognizing these attack vectors enables you to implement more effective monitoring and auditing tools, enhancing your overall security posture.