Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What is vulnerability management and why should enterprises adopt it?

In the current digital era, enterprises across the world heavily rely on information systems for day-to-day operations and for accessing business-related data. In essential institutions, such as banking and financial, health, and government, protecting information is critical and any security mishap could disrupt daily operations. The intention of attackers is to either deny services until a ransom is paid or breach security to gain access to critical information.

Five worthy reads: The privacy implications of AI

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the relationship between AI and data privacy. From smart devices and voice assistants to mediating traffic and enhancing personalized shopping experiences, artificial intelligence (AI) has found widespread application in many aspects of life.

Extending LogicMonitor with LogicMonitor: An IT Glue Integration

We talk a lot about LogicMonitor's flexibility and extensibility, one reason is that our architecture makes it easy to write integrations to other tools' APIs, while our API lets other tools talk to our platform. This also means you can make LogicMonitor talk to itself.

How to Troubleshoot Logon Duration and Find Root Cause

When trying to identify the root cause of a Citrix end-user experience issue, one of the key pieces of information is if the issue is widespread or if the issue is somewhat isolated. The quickest way to make that determination is by using the Automatic Citrix Discovery and Dependency Map (topology view) within Goliath Performance Monitor.

Killer Customer Experience Requires IT Operational Excellence, Empathy and Data Sophistication

Today on the blog, we feature a conversation with Michael Krigsman, an industry analyst and host of CxOTalk. He has been named a top CIO and IT influencer by several industry organizations. Michael writes extensively on the evolution of customer experience, and why technology is more critical to the delivery of competitive, compelling digital experiences than ever before. MK: Customer experience is a significant driver of revenue over time.

How to View Logs in Kubectl

Kubernetes has become the de-facto solution for container orchestration. While it has, in some ways, simplified the management and deployment of your distributed applications and services, it has also introduced new levels of complexity. When maintaining a Kubernetes cluster, one must be mindful of all the different abstractions in its ecosystem and how the various pieces and layers interact with each other in order to avoid failed deployments, resource exhaustion, and application crashes.

Cold starts get the cold shoulder - Provisioned Concurrency has changed the game

Among the many, MANY announcements at re:Invent this year is one that settles a years-long debate or concern amongst people considering using AWS Lambda to build serverless applications: cold starts. AWS Lambda is now 5 years old. For all of that time, there’s been a concern about latency the first time a function is called. Well, fret no more: with Provisioned Concurrency you can pay a tiny fee to know Lambda functions are always available.