Welcome to the October edition of **"What's New at Kentik"**! Join host Leon Adato as he navigates through the latest updates and happenings at Kentik—with a dash of humor and a sprinkle of sarcasm.
Shadow IT is defined as the use of IT-related hardware or software by an individual without the knowledge of the IT admin. For example, if a user creates a new Bitbucket Cloud workspace within your organization without the knowledge of the organization admin, it can lead to potentially sensitive data being exposed.
Within the configuration management space, people often distinguish between agent-based and agent-less approaches. In short, an agent-based solution means that you install a software agent to run in the background / periodically on the system. That software agent then makes changes to the system as desired, and also commonly communicates over the network to send and receive updates, policy, commands, scripts, data, etc.
Apache Kafka’s thing is real-time data streaming. But keeping it running at full throttle? That takes more than just spinning up a cluster and hoping for the best. As your environment grows, you’ll need to do some tweaking to make sure Kafka keeps up with the pace. The good news? You don’t need to be a Kafka wizard to make a real difference. Even some basic tuning can have a big impact on performance.
The Digital Finance Strategy is a European directive that aims to support and develop digital finance in Europe while maintaining financial stability and consumer protection. There are three main components to the package: In this blog post, we’ll attempt to summarize the 113-page DORA proposal, highlighting how it will apply to incident management at financial entities. Side note: we also wrote a blog post about the other DORA, also known as the DevOps Research and Assessments.
At Honeycomb, we know how important it is for organizations to have a unified observability platform. This is why we’re launching Honeycomb Telemetry Pipeline and Honeycomb for Log Analytics: to enable engineering teams to send and analyze data—including logs—into a single, unified platform. For too long, teams have had to wrangle large volumes of logs, their context scattered across multiple teams and tools, leading to knowledge silos.
In a previous article, Julian provided a comprehensive overview of the characteristics and functionality of Incidents in Icinga Notifications. In today’s blog, I will explain the concept of Incident muting and its underlying mechanisms.
As enterprises continue to migrate workloads to cloud environments, they are reaping significant benefits, such as scalability, agility, and the ability to deploy applications in near real-time. However, these advantages are often undermined by the limitations of legacy networks. Traditional networks, restricted by long-term contracts and inflexible delivery timelines, are no longer fit for purpose in a cloud-driven world.
At UptimeRobot, we’re always evolving to serve you better—while understanding that change can sometimes be inconvenient. We’re excited to announce a major infrastructure upgrade designed to boost performance, scalability, and reliability. This upgrade will help us deliver faster, more reliable service as we grow, and we hope you’ll see the benefits soon.
With the precision of search and the intelligence of AI, Cisco uses Elastic on Google Cloud to create richer search experiences, so support engineers can quickly find the answers they need. Scaling from this success, Cisco's Search team added AI models, semantic search, and vector search to more than 50 internal- and external-facing apps, helping them innovate more quickly and increase overall operational efficiency.