Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Hybrid cloud and multi-cloud: what is the difference?

Hybrid cloud and multi-cloud are two exclusive terms that are often confused. While the hybrid cloud represents a model for extending private cloud infrastructure with one of the existing public clouds, a multi-cloud refers to an environment where multiple clouds are used at the same time, regardless of their type. Thus, while the hybrid cloud represents a very specific use case, multi-cloud is a more generic term and usually better reflects reality.

Ubuntu on WSL 2 Is Generally Available

Today Microsoft announced the general availability of Windows Subsystem for Linux 2 in the Windows 10 May 2020 update. WSL 2 is based on a new architecture that provides full Linux binary application compatibility and improved performance. WSL 2 is powered by a real Linux kernel in a lightweight virtual machine that boots in under two seconds. WSL 2 is the best way to experience Ubuntu on WSL.

Splunk - Creates real-time business impact from data

From dealing with security concerns to production monitoring, businesses need to analyze the log data of their systems to ensure everything is functioning normally. In a computing context, a log refers to automatically produced and time-stamped documentation of events related to a particular system. Analysis of log data helps businesses comply with regulations, security policies and audits, understand online consumer behavior, and comprehend system troubleshoots.

Monitoring Applications that Require Identity Management Authentication

Identity and Access Management (IAM) systems provide core directory services, application access management, and authentication and authorization services. IAM also helps developers with a base platform to provide access control to their applications based on centralized policies and rules. IAM manages user details, authentication, and access information for an organization. The responsibility of user management and authentication creates a great dependency on IAM.

Challenges in Monitoring Web Applications That Utilize SSO

With enterprise solutions and consumer technology platforms offering an array of applications, a need arises to securely navigate between different applications within the same product suite, and on role-based access. Single sign-on (SSO) is a solution to implement a centralized authentication system, and maintains an authenticated session to access multiple applications in a product suite without having the need of entering user credentials every time.

How to manage data in hybrid cloud environments

This article was originally published on DevOps.com. We’ve long-since established that multi-generational, multi-cloud environments are the new norm. But how does one go about managing data in those environments? In this post, we’ll take a look at the ramifications of this hybrid cloud reality and best practices for managing your data for increased scalability and heightened availability.

Why Website Maintenance? The Best Practices for Peak Site Performance

If you have a website, you almost certainly want it to function at its best. In today's digital age, having a website is essential to businesses of all sizes - and it is just as important to maintain those sites. A well-maintained website is crucial for its optimal performance. If you want to grow your number of visitors, maintain search engine rankings, and improve your branding, it's always best to have a solid maintenance plan in place.

Giraffe Visualization Library and InfluxDB

Giraffe is the open source React-based visualization library that’s used to implement InfluxDB’s v2 UI. It employs clever algorithms to handle the challenge of visualizing the incredibly high volume of data that InfluxDB can ingest and query. We’ve just published documentation describing how developers can take advantage of this library and I’ve tried to create a companion tutorial to further illustrate the power of this library.

Embrace Growing and Untapped Data Sources Without Price as a Limitation

At Splunk, we're listening to our customers and offering more predictable, flexible, and familiar pricing options as part of our Data-to-Everything Pricing model. In particular, Splunk’s new infrastructure pricing metric changes the paradigm of how much data you can analyze with Splunk, allowing users to move toward a value-driven pricing model that better aligns what you pay with real value you can extract from using Splunk products.

Improving Cybersecurity Starts at the Endpoints

Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to prioritize thwarting industrious hackers who are intent on getting to the treasure trove of information and personally identifiable information (PII) schools manage.