Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The Top 10 Anomalies of the Last Decade

As a company known for our anomaly detection, we know a thing or two about spotting irregularities. So as we reached the end of 2019, we couldn’t help but think back on the 2010s and the anomalies that shook the world. Once we got to listing them, it really became tough to pick just 10. Ultimately, after much debate, we ranked them based on their impact, newsworthiness and how utterly unexpected they were.

Five IT Trends to Look Forward to in 2020

New Year’s Eve marks the transition into a new decade, beginning with personal resolutions and expectations for 2020. Much is the same in the IT industry, as support teams expect to adopt trending technologies to reduce their mean time to repair (MTTR) and improve incident resolution. This post will provide an in-depth look into five trends, discussing how growing technologies streamline IT workflows in the new year.

Determining ROI from Unified Hybrid Cloud Management

In my previous post on new approaches to managing hybrid cloud environments, I discussed the issues that commonly arise for IT operations teams. While hybrid cloud gives IT great flexibility to design infrastructure that’s uniquely suitable to diverse business and user requirements, it also brings about more complexity. Hybrid and multi-cloud businesses generate significantly more IT event data and its coming from many more places now.

Top Server Monitoring Tools for the New Year

DevOps teams have more on their plate than ever. As infrastructure needs grow, so does the time required to ensure that everything’s running smoothly. This makes automation crucial – especially in the server and network monitoring world. Server monitoring tools can save teams time by automating server management and providing real-time performance updates.

What Are the Differences Between On-premises and Cloud-based Log Management?

Cloud computing has changed the way we think about software, and opened up many new possibilities in both business and software development. Log management tools have also been affected by this, which begs the question – what are the pros and cons of cloud log management when compared to on-premises solutions? There are several key things you should consider before opting for either one, so here is a brief overview of the most important aspects that will help you make an informed decision.

Top IT Outages of 2019

Today’s news is filled with stories about the failures of IT and the impact to companies, consumers and brands. Because modern business relies heavily on IT, system outages and IT downtime have become a standard part of ‘doing business.’ 2019 saw several big outage stories. We’ve shared our Top 5 picks and discuss the importance of implementing an IT status page to help you successfully manage your organization’s IT downtime.

Log Forensics: The Basics of Finding Intel in Your Logs

Today’s post covers yet another log-related concept: log forensics. What’s this, and why should your organization care about it? Well, this is a topic related to logs, which are ubiquitous in the technology field. An IT organization that doesn’t generate many MBs worth of logs each day would be a rare occurrence nowadays. Even though logs are omnipresent, specific terms might not be so well-known. Not long ago, we covered log analytics, and today it’s log forensics time.

2019 at a glance: Looking back on a journey of transformation

Mark Twain once said, “Twenty years from now you will be more disappointed by the things that you didn’t do than by the ones you did do.” As another decade draws to a close, we at ManageEngine, started to reminisce about the roller coaster of a ride that began 20 years back. As 2019 winds down, we’re taking stock of what’s turned out to be an eventful year here at ManageEngine.

Dependency Injection in Azure Functions

This blog focuses on implementing the Dependency Injection design pattern to the Azure Functions. For a better understanding of Dependency Injection and Azure Function, Let’s take a simple Cab booking validation scenario, in which there will be a Function app implemented with the Dependency Injection that validates the user email Id that is valid or not. Before diving into the orchestration, let us know what the Dependency Injection is.