Operations | Monitoring | ITSM | DevOps | Cloud

%term

5 mobile apps you can use for VoIP calls

The VoIP (Voice over Internet Protocol) phone system is not an alien technology in this progressive world. People have left behind the traditional landline telephony system long ago and now enjoy un-interrupted, crystal-clear and almost free calls over the Internet. VoIP technology is increasingly used by everyone whether it is an individual or a business organization. the technology has impressed a lot of audience by its versatility.

How to Search through LogDNA Archives

Retention is a crucial factor in adopting a log management solution. For most organizations, 30 days is a perfect balance between having to access historical log data and the high cost of storage. However, some organizations need to retain logs for a much longer period of time, whether it’s to comply with regulations, perform frequent audits, or monitor changes to operations over time.

Incorporating Crash Data Into Your Workflow

Crash reporting can alter the balance between support and development, and swing it in your favor! Sure "literally" is an overused term. But, I think it’s fair to say that “LITERALLY” nobody likes it when software crashes. Users don’t like it when the software they love using breaks. They’re left wondering what happened and how long will it be until there’s a fix.

8 Ways To Love Your Computer More

We consider ourselves tech savvy. If you are reading this blog, you probably do too. And like us, you probably expect that computers are just supposed to work for you. However, in my experience, this close relationship we share with our machines just expands the realm of possible annoyances we encounter. Here are some easy ways to help you improve your relationship with the most important piece of equipment in your working life.

Monitoring Azure Application Gateway with Logz.io

Load balancers play a key component in any cloud-based deployment. By distributing incoming traffic across backend servers or services, load balancers help improve responsiveness and increase the availability of your applications. Monitoring load balancers is important for analyzing traffic patterns and troubleshooting performance and availability issues.

8 Things You Should Know About Docker Containers

These days Docker is everywhere! Since this popular, open-source container tool first launched in 2013 it has gone on to revolutionize how we think about deploying our applications. But if you missed the boat with containerization and are left feeling confused about what exactly Docker is and how it can benefit you, then we’ve put together this post to help clear up any confusion you might have.

CFEngine 3.12.2 LTS Released

We are happy to release the 2nd update to the CFEngine 3.12 LTS series. This update comes with many important stability and performance improvements and is thus well worth the upgrade from an older version of 3.12 LTS. CFEngine 3.12 LTS brings a lot of innovation, new features and improved performance to CFEngine, and allows you to make the most efficient use of your time. We are looking forward to your feedback on this release.

Deploying a Cachet Status Page to DigitalOcean

If you’ve considered having a status page for your service but are discouraged by the pricing of status page services – consider running an open source status page system like Cachet. This post explains how to install and configure a Cachet status page on the popular DigitalOcean hosting platform. You can run Cachet on DigitalOcean for as little as $5/ month.

Deep Learning for Time Series Data (O'Reilly Artificial Intelligence Conference)

Arun Kejariwal and Ira Cohen, both thought leaders in the deep learning space, share a novel two-step approach for building more reliable prediction models by integrating anomalies in them. They then walk you through marrying correlation analysis with anomaly detection, discuss how the topics are intertwined, and detail the challenges you may encounter based on production data. Present at the 2019 O'Reilly Artificial Intelligence Conference.

Getting Started with Free Elasticsearch Security Features

Elasticsearch Security: learn how to easily add new users, create roles, and set privileges using the Elastic Stack (6.8/7.1+). You'll create a 2 node Elasticsearch cluster, configure TLS communication between the nodes, and have a Kibana instance talking to the cluster to analyze the data.