Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Upgrading Your AWS Kubernetes Cluster By Replacing It

With the recent panic over the zero-day Kubernetes vulnerability CVE-2018-1002105, Kubernetes administrators are scrambling to ensure their Kubernetes clusters are upgraded to a version that is patched for the vulnerability. As of this writing, the minimum versions that have the patch are 1.10.11, 1.11.5, 1.12.3, and 1.13.0-rc.1.

2018 Website Outages: Key Lessons from Popular Website Downtime

Now that companies depend on the cloud for access to key services and business operations, downtime has a larger impact on productivity. Uptime is just as critical to small businesses as it is to major ecommerce retailers on Black Friday. Even the public relies on various services like Alexa and email to be available throughout the day. Looking at major outages over the past year provides insight into how companies prepare to handle these events.

Why MSPs Need Application Availability Monitoring

I’ve lived in the virtualization and cloud world for a really long time. During that time, I’ve also seen the impacts on users when you don’t have a good performance monitoring and troubleshooting system in place. That said, what if you have managed services? Do you understand what challenges managed services providers (MSPs) face when working without a monitoring and troubleshooting tool? How are you effectively resolving common VDI performance as well as connectivity issues?

CloudReady Dashboards Tips & Tricks Part #3

This is the third part of a series on the CloudReady dashboards and visualizations. The first part covered basics like Overviews, Refresh, and Layout settings. The second part covered more advanced dashboard usage like layout pinning, capture and embedding. In this third part we’ll cover key widgets, their usage and settings.

Part II: Anomaly detection within monitoring: how can you get started?

In a previous post we introduced anomaly detection as a group of techniques used to identify unusual behavior that does not comply with expected data pattern. In this article we will find out how we can apply anomaly detection within monitoring.

Detecting Data Breaches by Example - Vision Direct

Just as we were getting ready to launch our Data Breach Monitor, we heard the unfortunate news that fellow Yorkshire based business Vision Direct had suffered a malware attack, which resulted in the loss of financial data of around 6,600 customers. So we asked ourselves, could we have detected the same attack using our new monitor? The only way to find out was to infect a website and see what would happen…

Scaling DevOps for the Enterprise

A decade ago, an enterprise adopting DevOps was a rare event. In the last decade, some businesses dipped their toes in, others spent big money going all in. Now the question isn’t whether to make the culture shift, but how to be successful as it grows. It’s how to scale the adopted DevOps practices in the enterprise. This article is going to focus on highlighting common missteps and offer advice that can help you make decisions to handle the challenges ahead.

Business Chat Apps in 2018: Top Players and Adoption Plans

Even though email is ubiquitous in the workplace, and is undoubtedly a useful communication tool, using it can also pose some challenges. Email is prone to spam, it can be unnecessarily slow, and it’s easy for email recipients to be dropped from threads or excluded from conversations entirely — which can lead to missed connections and frustration.