Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How to Get Java Code-Level Visibility

The toughest IT performance problems to solve today are the ones where a user complains that their application access is slow. An IT administrator must then figure out the cause of the problem: is it the browser, the network, the server, the storage, the cloud infrastructure on which the application is hosted, or the application code?

Use New Range Markers to Show The Duration of a State Change

In our world of distributed systems, state changes to your infrastructure often take some time to propagate. With a few exceptions (for example, feature flags), single point in time changes are rare. Deploys, outages, database migrations, failovers, stress tests; none of these things are instantaneous – all have some duration during which the system is changing.

A Start to Finish Guide to Docker with Java

Intro to managing and running a containerized Java Spring Boot application. Docker is a platform for packaging, deploying, and running applications in containers. It can run containers on any system that supports the platform: a developer’s laptop, systems on “on-prem,” or in the cloud without modification. Images, the packages Docker uses for applications, are truly cross-platform.

Fishing for Log Events with Graylog Sidecar

Getting the right information at the right time can be a difficult task in large corporate IT infrastructures. Whether you are dealing with a security issue or an operational outage, the right data is key to prevent further breakdowns. With central log management, security analysts or IT operators have a single place to access server log data. But what happens if the one log file that is urgently needed is not collected by the system?

SnapSecChat: The Demand for Security as a Service

Before you roll your eyes at another “as a service” term, listen to what Sumo Logic CSO George Gerchow has to say about it in this latest SnapSecChat video series. The reason why offering solutions “as a service” has become so widespread is because that’s the way it should be done, especially with security.

Quest Enhances KACE Product Line to Simplify Unified Endpoint Management

ALISO VIEJO, CALIF. – June 20, 2018 – Quest Software, a global systems management and security software provider, today announced several enhancements to its KACE product line. The updates enable and empower organizations as they move to a unified endpoint management (UEM) environment by simplifying their endpoint infrastructure to create a more secure computing environment.

NiCE Domino sMP for Micro Focus OBM released

NiCE is pleased to announce the availability of the NiCE Domino smart Management Pack 7.20 for Micro Focus Operations Bridge Manager (OBM). Domino servers and dependent applications are gatekeepers on your IT ecosystem. They need to be monitored at a very detailed level. The Domino sMP 7.20 provides you with the key features and improvements to achieve your goal. NiCE helps you to ensure high availability for your mission critical infrastructure.

How Droplr Uses Sentry to Debug Serverless Applications

Antoni Orfin, Chief Architect at Droplr, has years of hands-on experience building scalable web applications that serve traffic for millions of users across the globe. His journey started with bare-metal infrastructures. Then, he dove deep into cloud. Today, he’s responsible for making things run smoothly on state-of-the-art serverless architecture at Droplr.

Logz.io Available on the AWS Marketplace

The AWS marketplace gives users access to a large variety of SaaS and API products that can be easily found, subscribed to and used. One of the biggest advantages for users is the ability to benefit from an easier procurement and payment process — users can use their existing paying terms with AWS, and unify billing across all the AWS services they are consuming, including those offered in the marketplace. Logz.io is now available on the AWS SaaS Marketplace.