Operations | Monitoring | ITSM | DevOps | Cloud

Blog

5 Trends Transforming Digital and IT Operations Management

In 2018, digital transformation ushered in a radical shift in how enterprises harness customer insights, technology capabilities, and rapid experimentation to drive revenue growth, profitability, and market leadership. Enterprises spent $1.3 trillion in 2018 on digital transformation technologies like public cloud platforms, microservices and containers, edge computing, machine learning, and artificial intelligence to improve customer experiences, business agility, and employee engagement.

Thwart password spray attacks to secure employee access to cloud apps

Chances are you’ve heard of traditional credential-based attacks on Active Directory (AD) and cloud applications—brute force attacks, dictionary attacks, and keylogging, to name a few. There’s now another attack type you should familiarize yourself with: password spray attacks. In this blog, we’ll analyze why you should be wary of them and the best way to tackle them.

Logging Levels 101

If you’re a software developer, then you understand how vital application logging is in software development and a critical part of logging is something called logging levels. Log entries generally contain essential information—such as a timestamp, a message, and sometimes additional stuff like an exception’s stack trace. Those pieces of information are useful because they allow someone reading the log entry to understand how the application behaved in production.

6 myths and facts about deep learning

Despite decades of development, deep learning has been boosted by the increasing processing power of computers and the immense amount of data available, which has allowed it to obtain some achievements that were unthinkable years ago. Deep learning is at the heart of what we know today as artificial intelligence. However, like everything that is talked about a lot, deep learning has formed a series of myths that do not always obey reality.

A Beginner's Guide to Getting Started with Google Kubernetes Engine (GKE)

There’s no shortage of providers willing to host your containers. Many of the world’s biggest cloud platforms offer Kubernetes as a service, including features such as automatic scalability and high availability. However, Google Cloud Platform (GCP) stands out as perhaps the best tool for building and hosting a Kubernetes cluster for a number of reasons. In this article, we’ll present these reasons and why GCP offers a better Kubernetes experience than other providers.

The Sentry Workflow - Triage

We get it — errors suck. And you don’t want to spend too much of your time fixing them, dealing with them, investigating them, etc. In our Workflow blog post series, we’ll help you optimize your, well, workflow, from crash to resolution. To quote “the second-most frequently quoted writer in The Oxford Dictionary of Quotations after Shakespeare,” Alexander Pope, “to err is human.” There will always be errors, even in code written by the best developers.

Creating a Project Post Mortem | The Why's and How's of Finishing Projects

A project post mortem is a lethal-sounding term that seeks to answer the question: did this project work? Was it worth the investment and the time, and if it wasn’t can you learn from it? As the term implies, the project must be “no more” or “ceased to be” or “bereft of life.” Creating this document requires a time investment, and it’s tempting to just move onto the next project.