Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Multilingual Web Design - How Not to Get Lost in Translation

Most designers have learned, often the hard way, that language differences can wreak havoc on their web designs. Leaving aside the issue of languages that go right to left instead of left to right, or down rather than across, there’s the big issue of variable word lengths. How do you accommodate this variability when designing web pages? The translation services company I founded, Tomedes, supports more than 1,000 language pairs, so we have some experience to share.

Building a Scalable End-to-End Host Monitoring Solution with InfluxDB Enterprise

“If you can’t measure something to get results, you can’t possibly get better at it. Worse yet, you won’t know what you should be focusing on,” says Dennis Brazil, Sr. Engineering Manager, SRE Monitoring at PayPal. Brazil and his team needed a scalable end-to-end host monitoring solution to keep pace with the company’s infrastructure modernization to a container-based architecture.

Increase Visibility with Configuration Monitoring

Network devices underpin every modern infrastructure environment with the switches and routers of your environment representing the roads information needs to travel on to reach its intended destination. And if switches and routers are the roads, picture configuration files as the traffic lights, they direct, protect and support the flow of information.

Instrumenting Lambda with Traces: A Complete Example in Python

We’re big fans of AWS Lambda at Honeycomb. As you may have read, we recently made some major improvements to our storage engine by leveraging Lambda to process more data in less time. Making a change to a complex system like our storage engine is daunting, but can be made less so with good instrumentation and tracing. For this project, that meant getting instrumentation out of Lambda and into Honeycomb.

Memory leak detection - How to find, eliminate, and avoid

As a software developer, you might not be used to thinking about the memory usage of your applications. In today’s development world, memory is plentiful and usually quite fast. Odds are, the programming language you use doesn’t require you to allocate your own memory, or free it when you’re done. That doesn’t mean that you’re in the clear when it comes to memory leaks though. The reality is that memory leaks can strike any application in any language.

Multiple Hacking Groups Attempt to Skim Credit Cards from Perricone MD

During research into Magecart attacks, I recently uncovered malicious code from two hacking groups attempting to steal credit card information on the European e-commerce websites for the science-backed skincare brand Perricone MD (affecting perriconemd.co.uk, perriconemd.it and perriconemd.de). Founded by U.S. celebrity dermatologist Nicholas Perricone, the company generated sales of $86 million in 2014 and are looking to fetch more than $200 million in a rumoured upcoming sale.