Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What Is Real User Monitoring? How It Works, Examples, Best Practices, and More

Real User Monitoring is a type of performance monitoring that captures and analyzes each transaction by users of a website or application. It’s also known as real user measurement, real user metrics, end-user experience monitoring, or simply RUM. It’s used to gauge user experience, including key metrics like load time and transaction paths, and it’s an important component of application performance management (APM).

NSA's Windows 10 Advisory - Is Your OS Really Secure?

New year, same old problems for Windows 10. But it doesn’t have to be that way. Earlier this month the United State’s National Security Agency (NSA) announced that they discovered a major vulnerability in Windows 10 and Windows Server 2016 that could have had dire consequences for businesses around the world. The vulnerability places Windows endpoints at risk to a broad range of exploitation vectors NSA official cybersecurity advisory

7 Online Proofing Tools to Make Life of a Designer Easier

When working on web and graphic designs there can be so much back and forth in emails and messages. There will be lots of email threads to keep up with. The review and approval process taking several turns. So, what do you do? Ask any designer about the pain they go through when it comes to the approval process. Luckily, the technology clearly will never disappoint any of us.

Accelerated App Containerization using AWS Container Services

App containerization has picked up momentum in recent years as it helps to save costs, time and resources. Resource vendors are available to assist in containerization of one or two apps, but most vendors struggle to execute a large number of app containerization projects with the same skill level and outcomes. As a matter of fact, it’s a manual approach in certain scenarios with a lot of dependencies which is not only time and cost consuming but also prone to errors and miscalculations.

Improve Your Logging Efforts by Leveraging Your Search History

When talking about log management, search history is overlooked more often than not. Past searches can be used as part of log analysis and forensic analysis, but the main issue with this data is the speed of search which gets compromised as data volume gets greater. We will discuss some ways to get the best out of your saved searches and to speed up the search process.

Top 10 predictions for AI in IT operations

This article originally appeared in TechBeacon. Gartner first coined the term "AIOps" a few years ago to describe "artificial intelligence for IT operations," and over the last few years, IT operations monitoring tool vendors have begun incorporating AIOps features into their products. Now AIOps tools are commonplace, but many IT leaders remain cautious about using these relatively new capabilities.

Building Auvik Into Your MSP's Standard Operating Procedures

Standard operating procedures—more commonly known as SOPs—are written, step-by-step instructions that describe how to perform a routine activity. While you can create an SOP for anything, SOPs that outline technical procedures are a well-known path to increasing efficiency in your MSP business. Whether you’ve got existing SOPs you’re interested in updating, or you’re looking for some basic steps to build brand new SOPs around, you’ve come to the right place.

Monitoring URLs With Query Strings

January is a good time for bug-fixing and we've spent the last couple of weeks making small tweaks and improvements to Downtime Monkey. We've focused on the kind of bugs that aren't urgent but shouldn't be overlooked and aim to continue this for a couple more weeks before starting development of the next major feature. We'll document each change in its own post. First up is an improvement to the range of webpages available for monitoring: webpages with query strings can now be monitored...