Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Feature Friday #38: Developing modules that take input

CFEngine build modules are great for quickly integrating 3rd party policy into your policy set. Module input (not to be confused with inputs in body common control or body file control which are the list of policy files to load) allows you to define values that apply for a particular module as it’s integrated into your policy set. Let’s take a look at a case of extending a module to support input.

Essential Guide to Building an Effective AIOps Strategy

We often hear about the many benefits AIOps (Artificial Intelligence for IT Operations) brings to businesses. But how can you develop an effective AIOps strategy? Where do you even start? What are the best practices or implementation challenges? These and many more questions must be answered before beginning your AIOps journey. In this guide, we will explore the steps for creating an effective AIOps strategy and discuss crucial components, obstacles, and best practices for successful implementation.

Optimizing Database Performance with MurmurHash and Atatus Monitoring

Atatus database monitoring takes you to the next level by offering comprehensive tools to track query performance, uncover bottlenecks, and optimize database efficiency. A core feature of our database monitoring is query signatures, where we leverage MurmurHash to generate unique, consistent identifiers for normalized SQL queries. This enables efficient aggregation and analysis of query metrics, even for complex workloads.

A Simple Guide To AWS Lambda Pricing And Cost Management

AWS Lambda is an event-driven compute service, which means it executes tasks automatically when triggered by a compute event. This automation also means that your Lambda costs can quickly exceed your budget. That is especially true when you’re not familiar with AWS Lambda pricing. In this guide, we’ll discuss the AWS Lambda pricing model, including how billing works and how to optimize Lambda costs.

Reducing Repetitive Customer Calls Through Better Agent Training

Dealing with repetitive customer calls can quickly drain customer support teams. These repeated issues drive up expenses, leave customers dissatisfied, and push your team to its limits. When calls take too long or unresolved problems keep coming back, things spiral fast. How can you ensure your team resolves issues on the first try while maintaining quality and morale? This article provides key strategies to enhance training for your team. Using tools like call center quality management software, you can reduce repetitive calls, increase efficiency, and create a better customer experience.

How to Install Components in Delphi IDE to Boost App Development

Components in Delphi save the essential time it often takes for developers to write code from scratch, providing pre-built options you can continuously reuse to assemble software, create a smooth user interface, and handle complex data connectivity tasks. Streamlined development, reduced number of errors, and consistency are only some of the advantages that you get when using components while you work with Delphi.

How to Install and Connect ODBC Drivers in UNIX

Imagine you’re working in a UNIX-based environment, managing multiple databases like MariaDB, PostgreSQL, or Oracle, and you have to connect their data to different applications. Without UNIX ODBC drivers, you’d have to write custom code for each database, which would quickly turn into a nightmare — each database has its own way of handling queries, connections, and authentication. Luckily, ODBC drivers can save the day by acting as “translators”.

Protecting Against Ad-Hoc Query Exploits

Ad-hoc queries are temporary SQL queries created and executed to perform a specific task without prior preparation or to save as permanent procedures or functions. Usually, they can be used to analyze data, search for particular information, or solve temporary tasks. However, if user-defined input data generates the text in ad-hoc queries dynamically, they may be vulnerable to SQL injections. In the article, we’ll explore what ad-hoc queries are and what security and access risks they may cause.