Operations | Monitoring | ITSM | DevOps | Cloud

%term

NIF, World's Largest Laser and Splunk

When you work with the world’s largest laser, you need secure and reliable IT Infrastructure. The National Ignition Facility uses Splunk Enterprise and Splunk IT Service Intelligence (ITSI) to improve control systems reliability, maximize system uptime and performance and proactively monitor and respond to IT and security challenges.

Analyzing Streaming & Digital TV Audiences: Elastic @ OzTAM

Oztam provides solutions to broadcasters throughout Australia collecting and analyzing digital television viewing data. The need to deliver strategy quickly and efficiently to broadcasters while logging hundreds of millions of events daily across many different technology devices, users, and pieces of content led Oztam to the Elastic Stack.

5 Easy Ways to Improve Site Speed

When it comes to loading time, every second counts. In fact, studies show people will never return to your site if it takes longer than a couple of seconds to load. Site speed should be high on your list of performance improvements. On the internet, you really do only get one chance to make a first impression. That’s why speed testing is so important, but it shouldn’t stop at the development phase. Site speed should be continually monitored every step of the way.

Eliminate Blind Spots - How to Deliver Total IT Visibility

The cost of unexpected downtime is rising. IT Ops teams need an IT service assurance model that allows them to see everything happening in their infrastructures through data collection, processing that data to determine service health, and integrating with other ITOM systems to accelerate incident resolution.

Top 3 AWS Lambda Performance Monitoring Tools

Serverless is often described as the abstraction to end all abstractions. VMs and standalone containers pale in comparison stateless functions. That pristine distinction between the application’s code and its stateful data is something we all dream of. Scalability, observability and high availability can now be realized on a global scale.

Alert fatigue, part 3: automating triage & remediation with check hooks & handlers

In many cases — as you’re monitoring a particular state of a system — you probably know some steps to triage or in some cases automatically fix the situation. Let’s take a look at how we can automate this using check hooks and handlers.

The Sound of Silence: Threats from Without and Threats from Within

Recent news has broken about a group of hackers which appears to be operating out of Russia. The group, dubbed “Silence,” is believed to be involved in the theft of over $800,000 from multiple Russian and Eastern European financial institutions. However, what is particularly notable about this group is they seem to count at least one former cyber security professional among their number.