Operations | Monitoring | ITSM | DevOps | Cloud

%term

Sponsored Post

How to Detect Threats to AI Systems with MITRE ATLAS Framework

Cyber threats against AI systems are on the rise, and today's AI developers need a robust approach to securing AI applications that address the unique vulnerabilities and attack patterns associated with AI systems and ML models deployed in production environments. In this blog, we're taking a closer look at two specific tools that AI developers can use to help detect cyber threats against AI systems.

Networking Basics: OSPF Protocol Explained

Open Shortest Path First (OSPF) is a standard routing protocol that’s been used the world over for many years. Supported by practically every routing vendor, as well as the open source community, OSPF is one of the few protocols in the IT industry you can count on being available just about anywhere you might need it. Enterprise networks that outgrow a single site will often use OSPF to interconnect their campuses and wide area networks (WANs).

Leveraging AI for Predictive Analytics in Observability

Predictive analytics has become a key goal in observability. If teams can foresee potential system failures, performance bottlenecks, or resource constraints before they happen, they can act preemptively to mitigate issues. AI holds the promise of making this possible. In this post, we explore how AI can push observability toward predictive analytics, the industry’s current hurdles, and practical use cases for leveraging AI today.

How Cortex Speeds Production Readiness: A Before and After Story

Engineering teams are always shipping something—new services, resources, models, clusters, etc. You probably have a set of standards you expect developers to abide by when doing that work, like adequate testing, code coverage, resolution of outstanding vulnerabilities, etc. But how are you actually tracking and enforcing those standards? Without an Internal Developer Portal, you might find that to be an incredibly manual effort.

What is log analysis? Overview and best practices

In today’s complex IT environments, logs are the unsung heroes of infrastructure management. They hold a wealth of information that can mean the difference between reactive firefighting and proactive performance tuning. Log analysis is a process in modern IT and security environments that involves collecting, processing, and interpreting log information generated by computer systems. These systems include the various applications and devices on a business network.

Hear how PayPal is accelerating their pace of innovation with Datadog

With over 426 million active users, comprised of consumers and merchants, Paypal processes approximately 25 billion transactions valued at around $1.53 trillion USD. Paypal is shaping the future of commerce for millions of customers globally, and to do that, they use Datadog to provide timely insights into their entire stack.

How Ecommerce Businesses Monitor Web Traffic

Businesses in many industries turn to MetricFire for one goal: to quickly set up hosted monitoring with an expert team. Developers everywhere ask, "Will setting up a monitoring solution with a free trial be worth my time?" How can you find the right monitoring solution for your use case? This article will review some common monitoring use cases for online retail and ecommerce businesses. If any part of this article rings true for your business, click here to contact us.