Operations | Monitoring | ITSM | DevOps | Cloud

%term

Are Your Data Centers and IT Closets Prepared for the Next CrowdStrike Event?

On July 19, 2024, a major IT disaster struck when a CrowdStrike update caused widespread chaos. CrowdStrike, a cybersecurity firm, inadvertently pushed a faulty “sensor configuration update” for its Falcon Sensor software. This update caused 8.5 million Windows devices to crash. The impact was severe, affecting airlines, banking systems, and healthcare networks, and the recovery process was laborious, requiring manual intervention for impacted devices.

Top Metrics for CRM companies

CRMs are a valuable tool for businesses to organize their sales and customers. The benefits of having one include increased revenue, better visibility into accounts, automated tasks, and more. But, if your CRM needs to be fixed, it can create challenges for your business. CRM monitoring helps you fix problems before they become apparent. In this article, we’ll show you how to start with MetricFire.

Monitor Your ZFS Volume Manager With Telegraf

ZFS (Zettabyte File System) is a file system and volume manager that has robust data integrity features and uses checksums for every block of data, ensuring that any data corruption is detected and corrected. Additionally, it offers advanced features such as pooled storage, efficient snapshots and cloning, built-in data compression, deduplication, and high scalability, making it ideal for large-scale and high-performance storage environments.

Enhancing Git Management in Python Projects

Git is an essential tool for version control, whether you are a developer or an IT pro. Git allows engineers to track changes, collaborate, and manage their code effectively. However, for beginners, navigating Git can be daunting. Enter GitLens, a powerful Visual Studio Code (VS Code) extension designed to enhance Git capabilities and simplify Git management.

Cyber Defense 202: Exploit Vulnerabilities | Security Insights Ep. 41

Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 in Chris' and Robert's hearts.

[New] Schedule Overrides is now live for every team member!

We are excited to announce a significant enhancement to our scheduling feature based on your valuable feedback! At Zenduty, we understand the importance of flexibility and efficiency in managing on-call schedules and ensuring seamless incident response. Previously, only team managers had the capability to edit schedules and add overrides. This meant that non-manager team members had to reach out to their managers to request override coverage, potentially delaying critical adjustments.

Going for gold: Testing the resilience of Olympic websites

As the world gears up for the Paris Olympics, it’s not just athletes who need to be in peak condition. This Olympics comes hot on the heels of the largest IT outage in history. Recovery efforts from the CrowdStrike outage are still ongoing. Lessons will be learned, no doubt, but at least one takeaway is already evident: the modern web is an oh-so-fragile thing; neglect digital resilience at your peril.

AKS Cost Optimization: How To Lower Your AKS Costs

Cloud-native applications continue to evolve and grow in complexity. And that complexity hurts the most when managing Kubernetes costs in Azure. AKS cost optimization may seem obvious, but it might also seem difficult to achieve. Microsoft’s fully managed Kubernetes service can help you run, manage, and deploy containerized applications. And while it optimizes performance, it can cause unexpected costs when improperly managed.