Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Top 9 WebLogic Performance Metrics to Monitor

Oracle WebLogic Server (WLS) is one of the leading Java Enterprise Edition (Java EE) application servers in the market today. Offering a robust, mature, and scalable implementation of the J2EE specification, the WebLogic Platform is a unified, extensible platform for developing and deploying applications based on Service-Oriented Architectures (SOA).

Why I'm Grateful For Our Observability Community

It’s that season, when we take time to consider what we’re grateful for and extend thanks to those we value and the experiences we treasure. One special aspect of America’s Thanksgiving holiday is the inclusiveness of celebrating across all communities and simply sharing, taking time to enjoy the fruits of the land. Giving thanks in late November can bring some fulfillment, but it should also be a reminder that we need to practice gratitude more regularly.

KubeCon 2019 Ushers in New Era for Container Adoption and Maturity

Last week’s container event of the year, KubeCon, hosted by the Cloud Native Computing Foundation, attracted more than 12,000 attendees to the San Diego convention center. While there, I attended numerous sessions but I also spent a good portion of time chatting with DevOps professionals, Kubernetes practitioners, and vendors to understand the practicalities behind deploying and managing containerized workloads and microservices.

19 mobile apps that help you to manage your WordPress site

A flourishing website is a result of lots of hard work, constant management and thorough maintenance. If you are a one-man army or a small business, then managing all this plus your core task without help can seem like a tedious task. Instead of making it a job to sit at your desk and constantly monitor the progress, there are a lot of mobile apps that come to your aid, specifically with WordPress management and maintenance.

Safety first: the best backup applications

Surely you know what a backup is, right? It is what we could also call a “safety copy“. Free backups are precisely that, softwares through which you can create backup copies of your data, to save them on drives such as external hard drives, flash drives, network devices and others. What are they for? Simply put, to restore the original information that you had, of course, after having lost it by accident in some misfortune or careless incident.

Machine learning for cybersecurity: only as effective as your implementation

We recently launched Elastic Security, combining the threat hunting and analytics tools from Elastic SIEM with the prevention and response features of Elastic Endpoint Security. This combined solution focuses on detecting and flexibly responding to security threats, with machine learning providing core capabilities for real-time protections, detections, and interactive hunting. But why are machine learning tools so important in information security? How is machine learning being applied?

Dear Search Guard users #2, including Amazon Elasticsearch Service and Open Distro, and others

Back on September 4th, we filed a lawsuit against floragunn GmbH, the makers of Search Guard, a security plugin for Elasticsearch and Kibana, for a multi-year pattern of copying our proprietary code. After filing the claim, we have continued to investigate floragunn’s actions. Today, we have updated our lawsuit in two important ways. First, we have identified additional copying by floragunn with respect to the separate, proprietary code base for our Kibana product.

Stress Management Tips for IT Business Owners

I recently had a conversation with an IT business owner who told me he felt burned out. While his business experienced steady growth over the past 12 months—and he was pleased with the positive impact on his bottom line—he felt like he’d achieved this success at the expense of his health. I knew how he felt. I’d been there too. Chances are, like a lot of people in our industry, you’ve been there too.

Preventing and mitigating data loss with Graylog

If you’re handling sensitive information, dealing with data loss can be more than just a headache. Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a breach occurs in your database. Minimizing data loss with a fast and scalable logging solution is key if you want to bring your cybersecurity to the next level.

What Is MTTF? Mean Time to Failure Explained in Detail

“What is MTTF?” That’s the question we’ll answer with today’s post. Yep, the article’s title makes it evident that the acronym stands for “mean time to failure.” But that, on its own, doesn’t say anything. What does “mean time to failure” actually mean? Why should you care? That’s what today’s post covers in detail.