Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Steps to Taming Hybrid Cloud Complexity: Eliminating Visibility Gaps & Enabling Actionable AI-Powered Insights

For years “the move to the cloud” implied a singular event – a singular migration to a singular entity. It all sounded so simple. Yet, the “simple” act of moving to the cloud stands in stark contrast to the reality of today’s complex, hybrid IT estates where the overwhelming volume of data flows can make it challenging for IT teams to effectively pinpoint and rectify service incidents.

What Is Intelligent IT Automation (and How Do I Get Started)?

So, you’ve been tasked with automating one or more of your tedious, time-consuming IT processes… but, what exactly does that mean? And perhaps more importantly, where on earth do you start? IT process automation (ITPA) can cover a broad spectrum of potential use-cases, ranging everywhere from the Service Desk, to the NOC, to Infrastructure, and well beyond.

Cloud-based DCIM Software Powers Modern Data Center Operations

Traditionally, data centers have been managed using on-premises software – and for many companies, this solution has been sufficient. However, as the data center environment becomes more intricate and dynamic, a new approach to management is required. Cloud-based Data Center Infrastructure Management (DCIM) software has emerged as the next generation of management tools, offering unmatched flexibility, scalability, and cost-effectiveness.

Improving INP and FID with production profiling

On March 12 Google began promoting INP (Interaction to Next Paint) into a Core Web Vital metric in an effort to push performance beyond page loads. This means your website or application’s SEO ranking may be impacted if users do not have smooth interactions on the site or app. While this change is a net positive for users, finding the root cause of these reported slow interactions can be tricky for developers.

Fine-tune observability configurations for all your Azure integrations in one place

Microsoft Azure provides an array of managed services to support many aspects of cloud computing, including application development, workload migration, and data management. To help you monitor the health and performance of these services, Datadog offers integrations with more than 40 Azure services, including Azure Kubernetes Service (AKS), Cosmos DB, and Azure App Services. Each integration provides robust data visualizations, meaningful alerts, and one-click Datadog Agent deployment.

CI/CD observability: Extracting DORA metrics from a CD pipeline

Last November, Dimitris and Giordano Ricci wrote a blog post about CI/CD observability that looked into ways to extract traces and metrics in order to get a better understanding of possible issues inside a CI/CD system. That post focused on getting data from a continuous integration (CI) system, and it really resonated with the community.

MSP Lawsuit Underscores Importance of Multi-Factor Authentication (MFA)

Sacramento, CA law firm Mastagni Holstedt has alleged that its MSP LanTech LLC failed to protect it from a ransomware attack that took down its systems. According to ChannelE2E, Mastagni Holstedt is also suing LanTech’s backup vendor Acronis, which has denied any responsibility for the ransomware attack. We’ll be watching to see how it all shakes out. In the meantime, let’s look at what happened and what we can take away from it. Hint: multi-factor authentication matters. A lot.

Microsoft Releases Out-of-band Updates to Address Critical Windows Server Domain Controller Issue

In a recent development that has sent ripples across the IT landscape, Microsoft has identified a critical issue plaguing Windows Server Domain Controllers (DCs). This issue, originating from a memory leak within the Local Security Authority Subsystem Service (LSASS), has emerged as a significant concern for organizations relying on both on-premises and cloud-based Active Directory domain controllers to process Kerberos authentication requests.

What is alert fatigue and its effect on IT monitoring?

Talking about too many cybersecurity alerts is not talking about the story of Peter and the Wolf and how people end up ignoring false warnings, but about its great impact on security strategies and, above all, on the stress it causes to IT teams, which we know are increasingly reduced and must fulfill multiple tasks in their day to day.