Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Successful Website Migration Checklist

Are you in the process of migrating your content to a new website? If so, you’ll already know that this is one of the most taxing and demanding experiences a webmaster or business owner can undergo. Unfortunately, the process known as content migration is a necessary part of a website redesign. This is where content elements such as text, images and videos, are migrated from your old website to the new design.

Audit Log: Feature Guide for Security and Compliance

In computing, an audit log is a record of an event. An event is any significant action that impacts the hardware or software of a computer – anything from a mouse click to a program error. Besides documenting which resources were accessed and what for, an audit file system will also include the source and destination addresses, the timestamp, and the user ID information.

How to Get Started With Your Website Content Security

The rate of cyberattacks is alarming. The number keeps increasing every year. According to the FBI’s 2019 Internet Crime Report, in 2018, cybercrime leads to a $2.7 billion loss. This means that you have to up your game when it comes to protecting your website content. You can prevent cyber attacks by controlling any form of data that comes from users.

8 Best Free Resources for Chatbot Development

Want to learn chatbot development and advance your career? Here’s a little warning: You need to read. A lot! After all, keeping up with the fast-paced digital marketing means being able to not just go with the flow, but being able to adapt to the changes and apply it to your business’ marketing strategies.

New SCA-ready Payments System

The Downtime Monkey payments system looks super simple but behind the scenes it's not trivial... This took several months to develop in 2017 and we're proud to say it worked like clockwork. So when we learned that we'd have to redevelop the system to comply with new SCA regulations you can understand that we weren't overcome with enthusiasm...

How Grafana Labs Is Running Jaeger at Scale with Prometheus and Envoy

At Grafana Labs, we are always working on optimizing query time on our Grafana Cloud hosted metrics platform, which incorporates our Metrictank Graphite-compatible metrics service, and Cortex, the open source project for multitenant, horizontally scalable Prometheus-as-a-Service.

Speed and Quality are Not Mutually Exclusive: Telemetry is the Key

All engineering teams strive to build the best product they can as quickly as possible. Some, though, stumble into a false dichotomy of choosing between speed and quality. While that choice may have been necessary in the past, it’s not the case today. What I’d like to do in this article is explain why.

Combating threats with UEBA: Health is wealth

In this four-part series, Combating threats with UEBA, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at unforeseen security attack scenarios, and discover how user and entity behavior analytics (UEBA) can be leveraged to safeguard organizations.