Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Now's the Time to Perfect Your Customer Experience

As the COVID-19 outbreak progressively impacts the world, many companies are grappling with the strain. It’s a very uncertain time for business right now. Even with so many factors out of your control, but there are a few things you can do proactively to protect your business. Keep your customers happy. Do everything you can to provide the best customer experience and remedy leaks early.

COVID-19 Pandemic: How to Use AlertOps to Keep Your Enterprise Running

The coronavirus (COVID-19) pandemic has forced many global enterprises to temporarily shut down their operations, resulting in lost productivity and revenue losses. Yet, with a business continuity management (BCM) strategy, enterprises are well-equipped to limit business interruptions until the pandemic passes.

How Professional Serverless Teams Manage Software Issues

No matter how careful developers are or how comprehensive tests are applied before deployment, there will always be some level of issues to deal with in production. When it comes to managing issues and ensuring application quality, two main metrics should be on our radar: time to discover and time to resolve issues.

Work from home better with secure and reliable enterprise service

Today, we are facing an unprecedented situation. The COVID-19 pandemic is affecting everything we know -- our families, our businesses, our communities, and our way of life. In these tough times, many organizations have resorted to mandatory remote working for employees so they can still be productive and safe. Saas productivity tools like Zoom, Slack, G-Suite and Office 365 became seemingly mandatory in this new distributed workplace.

Alcide kAudit Integrates with Sumo Logic

Alcide recently introduced Alcide kAudit, an automatic tool for analyzing Kubernetes Audit logs. This tool focuses on detecting non-compliant and anomalous behavior of users, automated service accounts and suspicious administration operations. Alcide’s recent integration with Sumo Logic enables users to gain full access to insights and real-time alerts from Alcide kAudit.

What Is a Requirement Traceability Matrix?

When developing software applications, we want to make sure the application does what the software requirements say it’s supposed to do, and testing proves that it does. In this article, I’ll explore how to link requirements to test cases, and I’ll explain what a requirement traceability matrix is and how to build a simple one.

Migrating to Kubernetes

The reasons to move to Kubernetes are many and compelling. This post doesn’t make the case that you should migrate, but assumes you have already decided that you want to. When you’re clear on what you want to do and why you want to do it, the questions of “When?” and “How?” become your focus. What follows centers on the question of how to approach making Kubernetes the platform on which your workloads thrive.

Now on Now: A new line of defense

Some would liken the ServiceNow Security team to a silent, but highly skilled group of warriors working continuously to protect our customers and our services. To deliver that we have to ensure our company, people, and assets are secure. The fact is that our Security team is much more than that. They work tirelessly behind the scenes to constantly enrich ServiceNow’s security posture.

How Road Traffic Insights Derived from Sensor Data Improve Public Safety and Reduce Emergency Services Response Times

It’s easy to see the value of sensor data that enables acting in time. Just picture driving as the scene of a massive traffic accident unfolds and ambulances race to the rescue…what a difference a few seconds can make. What if past traffic patterns could help city operators predict and manage traffic flow at critical times?

Top 5 Cybersecurity Threats to Watch in 2020

These days, cybercriminals are ambitious and innovative, with no shortage of tools and resources at their disposal to go after high-stakes targets and execute malicious code — all while flying completely under the radar. To prepare you for what’s ahead, below are five of the top cybersecurity threats you might encounter in 2020.