Mattermost 5.0 has new features designed to improve productivity while enhancing security: Intercept and modify posts – customize Mattermost by creating plugins to automatically restrict, modify, censor and link posts, Advanced permissions – ensure everyone has the proper level of access with new system and team permissions schemes
(Editor’s note: This guest Mattermost Recipe was contributed by Brian Hopkins, a member of the Mattermost community.) Here’s the next installment of a new series of posts we’re doing on the Mattermost blog: Mattermost Recipes. The goal of these posts is to provide you with solutions to specific problems, as well as a discussion about the details of the solution and some tips about how to customize it to suit your needs perfectly.
A new MIT Technology Review report reveals why—and how—application performance monitoring (APM) is the key to deriving maximum business value from the Internet of Things. Here’s what IT pros can learn from the findings.
The jobs of everyone involved in the Software Development Lifecycle (SDLC) are made easier by having application and business performance information easily available.
It’s pretty well known that we live in a connected, always-on world where seconds matter when it comes to customer happiness. There are smaller incident management solution providers that offer what looks to be competitive pricing—but it’s important to consider the bigger picture outside basic alerting and incident response.
The toughest IT performance problems to solve today are the ones where a user complains that their application access is slow. An IT administrator must then figure out the cause of the problem: is it the browser, the network, the server, the storage, the cloud infrastructure on which the application is hosted, or the application code?
In our world of distributed systems, state changes to your infrastructure often take some time to propagate. With a few exceptions (for example, feature flags), single point in time changes are rare. Deploys, outages, database migrations, failovers, stress tests; none of these things are instantaneous – all have some duration during which the system is changing.
Intro to managing and running a containerized Java Spring Boot application. Docker is a platform for packaging, deploying, and running applications in containers. It can run containers on any system that supports the platform: a developer’s laptop, systems on “on-prem,” or in the cloud without modification. Images, the packages Docker uses for applications, are truly cross-platform.
Getting the right information at the right time can be a difficult task in large corporate IT infrastructures. Whether you are dealing with a security issue or an operational outage, the right data is key to prevent further breakdowns. With central log management, security analysts or IT operators have a single place to access server log data. But what happens if the one log file that is urgently needed is not collected by the system?