Operations | Monitoring | ITSM | DevOps | Cloud

%term

Best Practices for Managing Multiple On-Call Teams

Alerting has come a long way from the days of paging an on-call administrator in the middle of the night, to multiple on-call teams that run and manage incident response around the clock. This is because as organizations grow and scale, responding to incidents also gets more complex and you often need more than one team to get involved to successfully resolve an incident.

Monitoring Usage and Maintaining Effectiveness

In 2018, AWS pulled in $25.7 billion. Amazons serverless cloud-computing platform keeps growing every year, and with that growth comes the same types of problems every massive effort faces: the limits and deterioration of performance as time goes on. With the rise of serverless technology, developing application and new services has never been easier.

[OpsComm June] Driving Real Business Value with the OpsRamp Cost Savings Calculator

June 2019 saw the launch of The OpsRamp Cost Savings Calculator, a simple and powerful tool which helps IT experts quantify how much they can save with OpsRamp's service-centric AIOps platform. Our field marketing team had a blitz with two major events - HPE Discover and CloudExpo Santa Clara where we showcased our AIOps and hybrid IT monitoring capabilities. June also saw our resident experts making several contributions across different media outlets and events.

Docker Build: A Beginner's Guide to Building Docker Images

Docker has changed the way we build, package, and deploy applications. But this concept of packaging apps in containers isn’t new—it was in existence long before Docker. Docker just made container technology easy for people to use. This is why Docker is a must-have in most development workflows today. Most likely, your dream company is using Docker right now. Docker’s official documentation has a lot of moving parts. Honestly, it can be overwhelming at first.

5 Most Common Web Application Attacks and How to Defend Against Them

Globally, cybercrime was the second most reported crime in 2016, and cybercrime damages are anticipated to cost businesses and organizations $6 trillion annually by 2021. One of the ways that cybercriminals attack businesses is through the use of web application vulnerabilities. A web application vulnerability is a flaw or loophole in an application’s code that can be exploited by attackers to facilitate cybercrime. Imperva reports that web application vulnerabilities are on the rise.

Agent Smith materializes from the matrix of Android malware

There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate apps with compromised ones and is imaginatively named Agent Smith after the iconic villain in The Matrix. Yet another malware attack targeting Android—so what’s the big deal? Agent Smith is similar to other malware campaigns such as Gooligan, HummingBad, and CopyCat with respect to the destruction it can cause via fraudulent ads.

Bringing AIOps to Hybrid Cloud Monitoring and Management

Artificial intelligence for IT Operations is purpose-built to ingest large sources of data from infrastructure and point tools, and produce actionable insights on root-cause analysis and incident remediation. How do you bring these innovations to an enterprise ecosystem that’s also in the middle of cloud migration and overall digital transformation?

The Three Pillars of Kubernetes Observability

The three pillars of observability are metrics, logs, and traces. To get a complete view into your applications as well as the Kubernetes platform they run on, you need to be looking at all the different perspectives. In this session, we will look at each pillar to see how we can use the information collected to understand what is happening in our environment today and how to troubleshoot the problems we experience tomorrow. We will share how to do this using various open source tools as well as using the Datadog platform.

Automate workflows with Datadog's Amazon EventBridge integration

Amazon EventBridge is a serverless event bus that routes real-time data streams from your applications and services to targets like AWS Lambda. EventBridge facilitates event-driven application development by simplifying the process of ingesting and delivering events across your application architecture, and by providing built-in security and error handling. We are excited to announce that you can now use our new integration to route Datadog alerts to EventBridge with minimal configuration or setup.