Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Elastic Observability in SRE and Incident Response

Software services are at the heart of modern business in the digital age. Just look at the apps on your smartphone. Shopping, banking, streaming, gaming, reading, messaging, ridesharing, scheduling, searching — you name it. Society runs on software services. The industry has exploded to meet demands, and people have many choices on where to spend their money and attention. Businesses must compete to attract and retain customers who can switch services with the swipe of a thumb.

Top Four Payoffs of Being a Data Innovator in Financial Services

I recently chatted with Adam DeMattia from leading research and analyst firm ESG in a webinar about data use maturity in financial services. According to the research1, 21% of financial services firms identify as data innovators (compared to 11% of global respondents) — those who make smarter use of data as a matter of strategic importance.

Why Are Financial Services Companies Turning to Data and Analytics to Deliver Improvements in Customer Experience?

Splunk’s recent "What Is Your Data Really Worth?" report1 highlighted the importance of data and analytics to financial services companies. In our global survey of business and IT decision makers2, 89% of respondents from financial services companies felt that the intelligent use of data and analytics is becoming the only source of differentiation in the industry.

IT Operations: The Value of Data

I recently participated in a webinar exploring the question "What is Your Data Really Worth?" in the context of financial services. Enterprise Strategy Group (ESG), in partnership with Splunk, performed a global research survey of 1,350 business and IT decision-makers across leading economies and industries. Over the course of the webinar we discussed their findings with my participation focused on IT Operations.

What is Your Data Worth in the Fight Against Fraud?

You don’t need us to tell you that fraud and financial crime is on the rise. A quick google search will give you endless stats to support this claim. Fraud losses are increasing as a percentage of revenue, and that direct impact on the bottom line isan area of laser focus for senior execs.

Modern ITSM Solutions: Creativity in Incident Response (Bring Your Own Tools)

The IT landscape is constantly evolving. A tool that is heavily used this month, may be virtually obsolete the next. In a such a dynamic ecosystem, the methods used to implement these tools are unique to every organization. Therefore, it has become crucial for organizations to implement an incident response process that incorporates any combination of tools, even those that are highly siloed and departmental.

Updatable Ubuntu Server Live Installer

The Ubuntu Server Live Installer, introduced with the release of Ubuntu 18.04 LTS (Bionic Beaver), provides a live Ubuntu Server environment along with a streamlined server installation experience. Building on guided installs for LVM, RAID, encrypted disks and advanced networking configuration (VLANs and bonds) the installer can refresh itself to the latest version during the live session.

On-Demand Webinar - Modernizing Monolithic Apps with AWS & Stackery

A few weeks ago, Stackery had the pleasure of participating in a webinar with leaders from AWS and MasterStream ERP, a telecom-quoting company that has quite the architectural modernization story to tell due to their adoption of serverless with Stackery. Our very own Farrah Campbell (Ecosystems Director) sat down for a fireside chat with Santiago Cardenas (Sr.

Monitor ProxySQL with Datadog

ProxySQL is a MySQL/MariaDB protocol–compliant load balancer and reverse proxy with native support for a range of popular backends including ClickHouse, Amazon Aurora, and Amazon RDS. ProxySQL efficiently distributes queries to your database servers and caches results, improving resource management and boosting database performance. You can also configure ProxySQL for high availability to reduce downtime.

5 major risks that impact vulnerable network devices

Working from home has become our new normal, with many of our jobs being performed remotely. The experience of working remotely can be as seamless as it was from our workplace, with all the technological advancements available today. Businesses have also put network security on the forefront by implementing use of virtual private networks (VPNs). This enables users to securely access confidential information hosted on the organizations’ servers.