Operations | Monitoring | ITSM | DevOps | Cloud

%term

Our Take on The New Stack's Guide to Serverless Technologies

We have read with great interest the recently released The New Stack ebook entitled: Guide to Serverless Technologies. It is a great report with great insights! We encourage you to read it as well (it's free!). We have recently closed our own survey and are tabulating the results and have seen many similarities and some differences in the responses. Weighing in on the findings of the New Stack survey in advance of releasing our report, we wanted to comment on three key themes from this eBook…

Level Up With Derived Columns: Wibbly-Wobbly Timey-Wimey Manipulation

When we released derived columns last year, we already knew they were a powerful way to manipulate and explore data in Honeycomb, but we didn’t realize just how many different ways folks could use them. We use them all the time to improve our perspective when looking at data as we use Honeycomb internally, so we decided to share. So, in this series, Honeycombers share their favorite derived column use cases and explain how to achieve them.

Improving Hospital Workflow with OnPage Alerting

At many points in a hospital’s functioning, workflow touches the outcome. The problem facing much of healthcare though is that the established workflow for alerting and messaging physicians is broken. What are ways for improving scheduling doctors? What are the potential impacts from improvement?

The Challenge Facing Compliance Officers in the Financial Services Sector

Compliance is a major challenge for firms operating in highly regulated industries that rely on external networks of agents or affiliates to sell and/or promote their products. In wealth management, insurance, and lending industries, regulations stipulate that any “content” that is publicly accessible is considered to be advertising and as such, subject to strict compliance oversight.

Improving the Signal-to-Noise Ratio in Threat Detection

Companies are generating massive amounts of data every minute. It’s impossible, unrealistic, and cost-prohibitive for analysts to spot every threat. That’s why even though breaches are in decline year over year, the first quarter of 2018 saw 686 breaches that exposed 1.4 billion records through hacking, skimming, inadvertent Internet disclosure, phishing, and malware.

Organize Your Monitoring With Tags and Filtering

If you’re responsible for keeping tabs on multiple domains, finding what you need when you need it is often half the battle. Want to access checks quickly and easily? Create custom tags for filtering checks in your Dashboard. You will get the info you need without having to look through unrelated information about other sites. Not sure how to organize your checks?

PagerDuty API Introduction

Learn how easy it is to get up and running with the PagerDuty API in just a few minutes. Harness automation in your incident response and digital operations by leveraging PagerDuty’s REST based API. This video covers basic concepts regarding APIs, REST and JSON. You will also be introduced to PagerDuty’s industry leading interactive API documentation that will automatically provide executable API code at your fingertips.