Operations | Monitoring | ITSM | DevOps | Cloud

Blog

How to Stay Ahead of Data Retention Requirements - Part 2

In part 1 of this series, we tried to outline what data retention is and why it is needed to overcome increasing requirements for various regulatory standards. As detailed, there are some clear guidelines for organizations to take what we called a “data retention approach for compliance”. In this follow up post, outline some specific technological and procedural challenges you might face as well as some practical guidelines and strategies to overcome them.

Opsgenie Actions: Sign Up For Early Access

When operating always-on services, engineers need to quickly respond to alerts and prevent issues from becoming outages. Fortunately, many alerts can be resolved through easy changes to systems or network infrastructure. However, these tasks still require manual intervention and cause interruptions for on-call responders.

3 Common Application Performance Bottlenecks-And How to Avoid Them

Between increasing website and application complexity, global internet user growth, and the rapid rise of mobile, optimizing application performance today is an entirely different animal than it was even a decade ago. Here’s how to side-step slow-downs and eliminate the most common application performance bottlenecks.

Using Cybersecurity as an MSP Sales Tool

I regularly speak with managed service providers (MSPs) and one of the biggest challenges I hear them share is selling the concept of managed services to prospects. Many small and medium-sized businesses have yet to move past the concept of break-fix—only paying an IT company to fix things when they break. They don’t fully appreciate the value of the proactive approach that is managed services.

Use Case Focused Elasticsearch Online Training Classes to Fit Your Exact Needs

We’ve been working with Elasticsearch since its inception, either with clients on consulting for Elasticsearch products and Elasticsearch production support, or by building our own hosted log management solution. For the last 4 years, we’ve also been sharing our knowledge through Elasticsearch training classes. In 2018, we had remote public training classes on a fixed quarterly schedule, so you can more easily plan your learning time and budget.

Adding CVE scanning to a CI/CD pipeline

A Docker image contains an application and all its dependencies. As it also contains the numerous binaries and libraries of an OS, it’s important to make sure no vulnerabilities exist in its root filesystem, or at least no critical or major ones. Scanning an image within a CI/CD pipeline can ensure this additional level of security.

Increased Visibility to Manage the New Java Release & Support Model

According to Oracle, Java is a fast, secure and reliable programming language and computing platform first released by Sun Microsystems in 1995. There are lots of applications and websites that will not work unless Java is installed, and more are created every day. From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere.