Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Deploy Application and Infrastructure Monitoring to Ensure Successful Migrations and Upgrades

Constant changes happen in today’s digital world. New versions of applications, databases, middleware, and virtualization technologies are being released regularly – at least once every 6-12 months. Patches and upgrades to operating systems and changes to anti-virus software are being released in weekly cycles rather than months. As DevOps gets adopted on a broader scale, changes to applications will be even more frequent.

How to Tell if You're Overspending on NAT Gateway (and How to Fix It)

We’re often asked what are some of the top areas where we see customers overspending? Data transfer costs from misconfigured NAT Gateway definitely tops our list as one of the most common. In this article we’ll walk you through five steps to find which data transfers you’re overspending on and how to you can eliminate those excess charges.

Embracing offensive tooling: Building detections against Koadic using EQL

This year at BSidesDFW, my local security conference, I highlighted a continuing trend of adversaries using open source offensive tools. The talk reviewed one of these post-exploitation frameworks named Koadic and walked through different ways defenders can build behavioral detections through the use of Event Query Language (EQL).

Word (and Warning) to the Wise: Site Downtime isn't Just a Technical Issue - it's a Customer Experience Problem

Businesses of all sizes — from small startups to large enterprises — are spending an enormous amount of money and time to deliver outstanding customer experience (CX). For example, they’re deploying contact centers, implementing customer-friendly return and warranty policies, training their workforce to be customer-centric, and the list goes on. And now, according to research by Walker Insights, CX is poised to overtake price and product as the most influential brand differentiator.

5 Best Security Practices for Tomcat Servers

Tomcat servers are widely used application servers for today’s development architectures, popular for hosting Java based applications. Below is a guide on best security practices for security your Tomcat Server environment. Banner grabbing is the process of gaining information from computer systems including services, open ports, version, etc. When sending a server host request via telnet command, you pass along the server name, port, and version.

Panguin Tool - Ace at Search Engine Optimization

Panguin SEO Tool is one of the best free Search Engine Optimization tools available in the market. It shows you the impacts and effects of all Google algorithm updates on your website. To earn more views by Search Engine Optimization, it is very important to learn what has affected your website in the past and caused you fewer views. Panguin directly shows what could’ve caused it so it can be easily resolved.

How to avoid one of the biggest critical incident headaches (no aspirin required)

You probably know this situation all too (painfully) well . . . A critical incident has hit. You get the alert and the race is on! First headache up on deck – coordinating all the stakeholders. You call, you email, you text – some people are available, some are not. Some might be sleeping, or just getting up in a completely different time zone.

Switching to the Cloud: Any Change Is Going to Be Challenging, Even If It's for the Better

At Skeddly we’re focused on bringing you the best in AWS help tutorials, AWS scheduler services, and AWS backup services. However, from time to time we like to reach out to other leaders in the AWS space to help you, our blog readers, stay on top of the latest developments and news within the AWS ecosystem. Today Skeddly had the opportunity to speak with a few of the bright minds behind Keyhole Software, a cutting edge technology company with an impressive amount of AWS experience.

Who's Better at Downtime Communication: IT or Marketing?

In her CIO online post, “6 Blunders to Avoid When Dealing with End Users,” Mary Brandel discusses some of the mistakes IT professionals make when interacting with end users. In short, the article calls attention to some common limitations within IT staff when communicating with customers. This isn’t a matter of intelligence or willingness.