Operations | Monitoring | ITSM | DevOps | Cloud

%term

Payload Size and Max PPS on AWS EC2 - No Effect

While benchmarking packets per second (PPS) in AWS EC2 and searching for hard-coded or other software-based limitations, my early findings suggested that there definitely was a credit mechanism, complete with network throttling, in place. I now know that to be false, since finding the guaranteed throughput / best effort mechanic.

4 ways to build strong, diverse teams in the tech industry

I’ve been on a lot of teams in my journey from a software engineer to head of product for Confluence Cloud. All of the best ones have had one thing in common: they were comprised of people from different walks of life who could view the world from different perspectives. So naturally when I started hiring my own teams, I knew promoting diversity at the workplace would be a priority for me.

Introducing "HTTP Method Selection"

Uptime Robot sends HEAD requests for HTTP monitors and GET request for keyword monitors by default (and, this is a good default setting for most monitors). So, here comes the HTTP method selection which enables us to choose the method, send the parameters to be sent (if needed) and also decide if the data will be sent as JSON or not.

Advanced Mitigation Techniques to Stop DDoS Attacks in Their Tracks

In our last blog post, we learned what the Distributed Denial of Service (DDoS) attack is, and examined the DDoS picture globally. As we walked through some recent and well-known cases, we also surveyed a range of attack types and drilled down to specific examples. In this article, we’ll study the mitigation techniques you’ll need to resist these attacks. You’ll learn: 1. How to avoid becoming a bot; 2. How to prepare your own network for the possibility of an attack and finally; 3.