Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Open Banking, Fintech Disruption, And Other Trends In Financial Services IT

The accelerating pace of technological change is the most disruptive force affecting the financial services industry today, with fintech disruptors making significant headway across every segment across the sector—including banking, payments, lending, insurance, and trading.

How to Empower DevOps to Make Better Cloud Cost Decisions

When it comes to cloud strategy, companies rank “cutting costs” as their top priority for 2019, according to a recent Datamation survey. That’s not to say that they plan to cut back on cloud spending in general; in fact, those budgets are very much expected to grow. Rather, companies are looking for ways to reduce unnecessary costs and optimize cloud spend.

Toward a Maturity Model for Observability

Access to observability is becoming critical to organizations shipping software, running modern infrastructures in production, and to understanding how users are experiencing their service. To achieve success in delivering a complex service, it’s no longer optional to instrument for real visibility and ease of troubleshooting, to optimize alerting to enable a focused response, to do what is needed to drive toward real understanding and ownership of the code we deliver.

Integrate Akamai with Datadog to monitor CDN performance

Akamai is a leading provider of content delivery network solutions around the world, handling many millions of HTTP requests per second. By Akamai’s estimates, its CDN platform delivers 15 to 30 percent of global web traffic. If you’re using Akamai to accelerate and protect the delivery of content to your users, we are pleased to announce that you can now use Datadog to monitor the utilization and performance of your CDN.

Goliath Technologies Delivers Unmatched Troubleshooting Capabilities in New Release

Whilst Citrix Synergy 2019 was in full-flow in Atlanta, GA, Goliath Technologies were also keeping busy with the 11.7.8 release of Goliath Performance Monitor, which adds several features that were in demand by many customers. I’ve had the chance to review this latest release, and wanted to touch on some of the features that are new to version 11.7.8, as well as cover ground on some of the features and capabilities already existing in the product today.

Prometheus and Docker: Monitoring Your Environment

Coming back from Monitorama, I had a chance to sit back and start playing with some tools to see how they worked. Prometheus is a pretty ubiquitous tool in the monitoring space, it's pretty easy to spin up, and is open-source. Having a very active community of engaged developers means finding help articles or guides is easy. We are also going to use Grafana to build nicer looking graphs based on API queries from Prometheus.

Well, Isn't That Convenient? - The 4 Cs of Quality IT Monitoring Tools

Some things in life are easy and some things are hard. Sleeping-in on weekends (provided you don’t have small children), shifting into 6th gear and ‘flooring it’ on a deserted stretch of Eastbound I-70, and taking a swig of Breckenridge Brewery’s Vanilla Porter go in the “Easy” column. What kinds of things are on the “Hard” side of the ledger?

SaneBox: Using Artificial Intelligence for Smarter Email Services

We all struggle with overloaded emails and are always on the lookout for methods to ease this burden. To make a clutter-free inbox a reality, help comes in the form of Sanebox. This is a software program made especially to clean up and effectively organize the client’s inbox. This simple software program works by taking a complete overview of your email.

Why the LogDNA Agent Runs As Root

One question that customers often ask is “why does the LogDNA agent need to run as root?” With IT departments and DevSecOps teams pushing to secure systems against cyberattacks, running a cloud-based logging agent as root sounds like a huge risk. While it’s true that you should avoid running applications as root, there are several reasons why our agent runs as root out of the box and several ways that we reduce your risk of attack.