Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What is Docker Monitoring?

We have come a long way in the world of computing. From having computers that fill up entire rooms or buildings while performing relatively basic actions to having complex machines that literally fit in our pockets and palms, this advancement has been nothing short of breathless. With an emphasis placed on speed and efficiency, computers and the applications running on these computers have been tailored to ensure optimal use of resources, be these resources hardware or software resources.

Mattermost joins Red Hat, GitHub and Google in the CVE Program to maintain an international, open data registry of security vulnerabilities

Mattermost is joining Red Hat, Google, and GitHub and over 130 other leading technology organizations authorized to be a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA) by the CVE Program. The world’s most privacy-conscious enterprises and governments rely on Mattermost’s self-hosted, open source collaboration platform to keep their most vital communications safe and sovereign.

Three Ways Agencies Can Improve Cloud Security and Performance

The Federal Cloud Computing Strategy (FCCS) makes it clear government agencies have significant responsibilities for protecting cloud-hosted data. The FCCS states the need for agencies to develop their own governance models and create service level agreements to ensure they’ll have continuous access to log data and prompt notification from their cloud service provider if there’s a breach.

Keeping Clean with CloudZero Dashboard: Our Latest Updates

Here at CloudZero, we’ve made some updates to our dashboard that we’re excited to share with you! I actually prefer this original definition. When you hear the word dashboard, if you’re not thinking about software, you’re probably picturing the place in a car where you have various dials and readouts for safe operation of the vehicle. But did you know what the term dashboard predates cars?

Enriching data with GeoIPs from internal, private IP addresses

For public IPs, it is possible to create tables that will specify which city specific ranges of IPs belong to. However, a big portion of the internet is different. There are company private networks with IP addresses of the form 10.0.0.0/8, 172.16.0.0/12 or 192.168.0.0/16 scattered in every country in the world. These IP addresses tend to have no real information for the geographic locations.

Correlation Analysis: A Natural Next Step for Anomaly Detection

Over the last decade, data collection has become a commodity. Consequently, there has been a tremendous deluge of data in every area of industry. This trend is captured by recent research, which points to growing volume of raw data and growth of market segments fueled by that data growth.

Server Monitoring with OpsRamp

For decades, compute or server infrastructure has been the backbone of the IT world. Compute has gradually evolved from on-premise hardware to programmable compute in the form of software containers. Technology operators need to constantly monitor the performance of their Windows, Linux, and container infrastructure so that they can optimize their compute environments to match workload demands.

5 Great Reasons to Store and Analyze Centralized Logs

Whether you’re trying to troubleshoot a problem, defend against attacks, or simply optimize your environment, event logs are your best source of information. More than that, not logging or ignoring your logs is like not checking your blindspot when you’re changing lanes—sooner or later you’re going to seriously regret it because the effects will be disastrous.

7 Wins That Helped IT Save its Work-From-Anywhere Program

I think I have been reading way too many “doom and gloom” articles this year about IT. For many companies, the switch to a prolonged work-from-anywhere (WFA) model has exposed serious cracks within their IT infrastructure. To be honest though, the cards have been stacked against IT for some time and 2020 was just the tipping point. Employees often resist new work technologies and there’s mounting evidence to prove that IT tends to overestimate how well their services are received.