Operations | Monitoring | ITSM | DevOps | Cloud

Blog

A How-To Guide To SLAs (Service Level Agreements), Best Practices, And Why They Are So Important To Customers

You’ve heard it so many times: Transparent communication is the key to any successful relationship. The banking industry learned this lesson when cyber attacks began to plague their customers, and the official line for many financial institutions was to deny there was a problem. That is until the hacks became so profound and so persistent that it became impossible to cover them up any longer.

How To Monitor Almost Anything: Lifehacking Diabetes

What can you monitor with LogicMonitor? There are only two limitations. As a Sales Engineer, I'm often asked questions like "Do you monitor (insert specific technology resource here)?". Equally often, I'm asked whether and how easily LogicMonitor's core abilities can be extended to gather metrics from any resources that may be specific to the customer.

timeShift(GrafanaBuzz, 1w) Issue 78

Grafana v6.0 Beta1 was released this week, and it’s packed with new features! This is one of the biggest updates to Grafana and introduces a new way to explore your data, support for log data, and includes tons of other enhancements. We hope you’ll give v6.0 Beta1 a try and let us know what you think. You can see a few of the highlights below, but check out all of the updates in the What’s new in Grafana v6 documentation.

How to shorten your feedback loops (and reduce your team's stress)

You’re working on a project — let’s say it’s a presentation to introduce a new initiative at your company. You have a first draft of the content done, and you send it to your boss for her feedback. She makes a few revisions and then says she’d like to share it with the leadership team to see what they think.

OpsRamp Winter Release, January 2019: Be the First to Know and Take Action Faster with Context and Insight

The OpsRamp winter release delivers greater service-centricity and context for hybrid infrastructure management with intelligent incident management and cloud native monitoring. The January 2019 release features innovations such as a new UI for service maps, enhanced AIOps capabilities and cloud native monitoring features.

Cybersecurity Best Practices: Protect Your Team from Phishing Attacks

Phishing happens. It is probably happening as you read this. Right now, some well-defended company is having data under its care exposed. This data may contain sensitive information, such as login credentials, and in many cases, it is only known that an attack of this type has taken place after the fact. Protecting yourself and your employer against phishing attacks relies foremost on critical thinking; however, there are some business processes and technologies that can help.