Operations | Monitoring | ITSM | DevOps | Cloud

%term

Chaos Engineering for ITOps

Chaos engineering (CE) is the discipline of experimenting on a system in order to build confidence in the system’s capability to withstand turbulent conditions in production. This approach is becoming commonplace in software development and operations (DevOps) practices. But how would its application extend to ITOps? CE for ITOps offers a similar framework for stress-testing a technology platform to understand its weak points and performance pitfalls under heavy pressure.

Announcing Runbooks

Since the beginning, we’ve wanted to make it faster, easier, and even a joy to respond to incidents. We’ve had the typical components of incident response for a while, but orchestrating them together was a manual task by our users. Today we’re marrying together all the features already available in our incident response tool into our newest release: Runbooks.

Java Profilers: Why You Need These 3 Different Types

Debugging performance issues in production can be a pain and, in some cases, impossible without the right tools. Java profilers have been around forever, but the profilers most developers think about are only one type: standard JVM profilers. However, using one type of profiler is not enough. Suppose you’re analyzing your application’s performance. There are multiple profiling activities which you may execute.

Q&A with Andrew Hewitt (Forrester)-Experience NYC '19

Experience NYC hosted several quality speakers but one in particular stood out to me for his unique message: Andrew Hewitt, a leading IT Analyst from Forrester. Probably the last thing you would expect to hear at an IT solutions conference is a captivating talk grounded in human psychology. Feelings? Perceptions? Beliefs? These topics don’t seem to fit nicely into bits and bytes. They’re perceived as foreign, un-engineer speak.

Network Throttling: Monitor the User Experience

When it comes to monitoring web application performance, not only is it necessary emulate user actions, but also network conditions of end-user devices. Network throttling allows you to control connection speeds to better match the experience of real users, allowing you to see web application behavior in specific network conditions. Network connections can vary for many reasons. User location, device type, and browser used are just a few factors that can affect a user’s experience.

Network Throttling: Monitor the User Experience

When it comes to monitoring web application performance, not only is it necessary emulate user actions, but also network conditions of end-user devices. Network throttling allows you to control connection speeds to better match the experience of real users, allowing you to see web application behavior in specific network conditions. Network connections can vary for many reasons. User location, device type, and browser used are just a few factors that can affect a user’s experience.

Screens Beta

Screens display a series of widgets that you can use to share across your organization. Widgets can display your log activity, from the number of logs ingested in the last 4 hours, to a line graph comparing today’s logs to yesterday’s logs. You can control the data you want to display by creating a “Screen” with a combination of different widgets. Post your screen on a company monitor to provide your organization with a snapshot of your system’s activity.

How Log Analytics Improves Your Zero Trust Security Model

Over the past few years, cloud computing has passed through its hype and early-adopter phases. Now we are hitting the peak of migration from on-premise to cloud-based infrastructure. Consequently, this transition and the advent of cloud computing has dramatically changed the way we think about security. Namely, the security paradigm has shifted towards a Zero Trust Security Model.

Trick-or-treat down Halloween Cyber Street for cyber awareness

Halloween is perhaps the one night of the year where ghosts and ghouls roam freely on the streets. In reality, these are all just harmless children in costume; however, as you enter Halloween Cyber Street, you’ll come to find there are real threats lying in wait for an opportunity to strike. On Halloween Cyber Street, there are eight houses, each providing a webinar offering solutions on how you can protect yourself against different cyberthreats.

Formjacking - How it can Affect your Ecommerce Site

Data theft or data skimming is not a new problem, it has probably been happening since the birth of the paper form. Today is no different, it is still around and happening on a much wider scale, leveraging the internet and the proliferation of online shopping. A popular modern tactic for data skimming is called formjacking. Not heard of it? Formjacking enables organised criminals to steal sensitive customer data as it is entered into an ecommerce shop. To the end user, this process is invisible.