Operations | Monitoring | ITSM | DevOps | Cloud

%term

Q&A with Andrew Hewitt (Forrester)-Experience NYC '19

Experience NYC hosted several quality speakers but one in particular stood out to me for his unique message: Andrew Hewitt, a leading IT Analyst from Forrester. Probably the last thing you would expect to hear at an IT solutions conference is a captivating talk grounded in human psychology. Feelings? Perceptions? Beliefs? These topics don’t seem to fit nicely into bits and bytes. They’re perceived as foreign, un-engineer speak.

Network Throttling: Monitor the User Experience

When it comes to monitoring web application performance, not only is it necessary emulate user actions, but also network conditions of end-user devices. Network throttling allows you to control connection speeds to better match the experience of real users, allowing you to see web application behavior in specific network conditions. Network connections can vary for many reasons. User location, device type, and browser used are just a few factors that can affect a user’s experience.

Network Throttling: Monitor the User Experience

When it comes to monitoring web application performance, not only is it necessary emulate user actions, but also network conditions of end-user devices. Network throttling allows you to control connection speeds to better match the experience of real users, allowing you to see web application behavior in specific network conditions. Network connections can vary for many reasons. User location, device type, and browser used are just a few factors that can affect a user’s experience.

Screens Beta

Screens display a series of widgets that you can use to share across your organization. Widgets can display your log activity, from the number of logs ingested in the last 4 hours, to a line graph comparing today’s logs to yesterday’s logs. You can control the data you want to display by creating a “Screen” with a combination of different widgets. Post your screen on a company monitor to provide your organization with a snapshot of your system’s activity.

How Log Analytics Improves Your Zero Trust Security Model

Over the past few years, cloud computing has passed through its hype and early-adopter phases. Now we are hitting the peak of migration from on-premise to cloud-based infrastructure. Consequently, this transition and the advent of cloud computing has dramatically changed the way we think about security. Namely, the security paradigm has shifted towards a Zero Trust Security Model.

Trick-or-treat down Halloween Cyber Street for cyber awareness

Halloween is perhaps the one night of the year where ghosts and ghouls roam freely on the streets. In reality, these are all just harmless children in costume; however, as you enter Halloween Cyber Street, you’ll come to find there are real threats lying in wait for an opportunity to strike. On Halloween Cyber Street, there are eight houses, each providing a webinar offering solutions on how you can protect yourself against different cyberthreats.

Formjacking - How it can Affect your Ecommerce Site

Data theft or data skimming is not a new problem, it has probably been happening since the birth of the paper form. Today is no different, it is still around and happening on a much wider scale, leveraging the internet and the proliferation of online shopping. A popular modern tactic for data skimming is called formjacking. Not heard of it? Formjacking enables organised criminals to steal sensitive customer data as it is entered into an ecommerce shop. To the end user, this process is invisible.

A View of the Clouds

Not long ago, we talked about the need to maintain visibility across all of your multicloud investments so you can keep track of how well they are working for you as well as how much they are costing you. Historically, this has meant building reports on numbers of VMs in use, system utilization, storage consumption, and the like. But much has changed since the early days of hypervisors, and organizations creating cloud-based services today are moving quickly toward serverless models.