Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Open source software for open infrastructure

Implementing infrastructure using open-source software significantly reduces the total cost of ownership (TOC) of your infrastructure. Over the last few years, we’ve seen more and more companies moving to open source. These include Netflix, Uber, Visa, eBay, Wikipedia and AT&T. And this trend will only continue to grow. The migration is driven by better economics, improved flexibility, better integration capabilities and thus, the higher business value provided by the open source software.

What's the deal with edge computing?

With over 41 billion IoT devices expected to be active by 2027 — that’s at least 5 devices for every person on the planet — edge computing has emerged as a tenable solution to prevent the impending snowballing of network traffic. Allow me to lift the veil on this buzzword and explain why it’s been gaining attention in tech circles lately.

Challenges in Monitoring Applications That Use OAuth

In the internet ecosystem of increasingly intertwined applications, when one application wants to perform some action on another application on the behalf of a user, a need arises of how to do this without sharing the password of one application to another. A common example of this is sign-in with Facebook by apps that want to post something on your timeline or want to access your Google Drive.

Glitch List: May 2020

Hello, and welcome back (to some of you, at least) from quarantine. Although things may look as though they’ve reached a new normal, our present equilibrium still includes a number of glitches. In May, in addition to the usual outages due to overloaded servers, we also have outages due to failures of partner monitoring, plus – an Anodot first – a pizza arbitrage issue. Is it true that you can make money by selling pizzas to yourself?

Common causes of a website's downtime. Why does a website go down?

May 31, 2020, WebGazer Team We are living in a highly competitive world. One where many businesses leverage on the internet to get ahead of their competitors. Having a beautifully constructed website with rich SEO content is one way to drive traffic to your site and business. But just having a website is not enough. As a matter of fact, a website could do more harm to your business than good.

ITSM can Make Remote Working More Efficient Than You Thought: Here's How

As humans, it is common to find two tendencies when we work: Remote working began as a significant challenge. Many teams saw falling productivity and morale. Some people even declared it the end of ‘fixed working hours’ as we know it. As all of us started getting used to the concept, we started seeing solutions to alleviate, if not entirely eradicate the problems.

How to Overcome the Drawbacks of SIEM Tools

These days, “SIEM” (Security Information and Event Management) is all over the place. SIEM tools work by collecting data from multiple systems and noticing patterns in the data. This adds immediate value to the business by providing insights, security recommendations, and actionable intelligence. Despite being helpful tools for many companies, SIEM tools do have their drawbacks. This article will describe the four main ones and offer suggestions for how they might be overcome.

Flexibly route traffic to designated Kubernetes infrastructure nodes

Ocean by Spot is a Kubernetes data plane service that provides a serverless infrastructure engine for running containers. Ocean is designed to work in such a way that pods and workloads can take advantage of the underlying capabilities of cloud infrastructure such as compute, networking and storage across different pricing models, lifecycles, performance and availability levels, without having to know anything about it.

Introducing cf-secret - Secret encryption in CFEngine

Contributor and CFEngine Champion, Jon Henrik Bjørnstad, developed a tool for encrypting files using CFEngine host keys, called cf-keycrypt. Thank you to Jon Henrik and all of our contributors for helping improve the CFEngine project. Our developer, Vratislav Podzimek, recently took some time to review the cf-keycrypt code, and made many improvements and fixes.