Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Isolating Bottlenecks: How to Determine If Your Slowdown Is Due to the Database or API

Every slowdown in your application can be traced to specific components like a database or an API, and quickly identifying the source aids the troubleshooting process. But when an API is underperforming, it may be difficult to tell whether the issue is with the API logic itself or an external service like a database that it interacts with before sending responses.
Sponsored Post

Traffic-Driven Testing: All the Benefits of Shift-Right Testing with None of the Risk

The shift-right testing approach moves testing to later in your production cycle. Also known as "testing in production," with shift-right, you test software after it has been deployed. It gives you continuous feedback based on real-world user interactions. However, there are major drawbacks to the approach. For example, testing in production risks disrupting your user satisfaction and can mean you catch issues too late to respond to them effectively. It can also be difficult to test problems related to scale and traffic volume. Your tests are also difficult to repeat under the same conditions.

Mandatory Access Control (MAC): Definition and Implementation

Protecting sensitive information is more critical than ever. One of the most robust methods to ensure this protection is Mandatory Access Control (MAC).Unlike other access control methods, MAC is designed to strictly regulate who can access what data, based on predefined security policies set by an authority. This system is particularly important in environments where security cannot be compromised, such as government agencies, military operations, and large corporations.

Product Service Management: Definition & Types

Picture this: you’re unboxing a brand-new gadget, and it feels like it was crafted just for you. The design is sleek, the features are intuitive, and the customer support is just a click away. This delightful experience is no accident; it’s the result of effective Product Service Management at work. In today’s fast-paced world, where consumer expectations soar higher than ever, businesses are challenged to not just deliver products, but to create experiences that resonate.

How the Cribl SRE Team Uses Cribl Products to Achieve Scalable Observability

This is the first of a planned series of blog posts that explain how the Cribl SRE team builds, optimizes, and operates a robust Observability suite using Cribl’s products, Cribl.Cloud operates on a single-tenant architecture, providing each customer with dedicated AWS accounts furnished with ready-to-use Cribl products. This provides our customers with strict data and workload isolation but presents some interesting and unique challenges for our Infrastructure and operations.

HEAL Software - Understanding the Unknown Unknowns

The term “unknown unknowns” refers to problems or vulnerabilities that have not yet been identified or anticipated. Unlike known issues, which can be addressed with existing knowledge and tools, unknown unknowns require a different approach to detection and resolution. These hidden issues are often beneath the surface, only becoming apparent when they cause significant disruption.

Optimizing VPN Performance and Availability with Network Observability by Broadcom

In recent years, hybrid work approaches have grown increasingly commonplace, and for a significant percentage of users, VPN is the go-to approach for accessing secured corporate resources and services. In fact, one article reveals that 72% of desktop and laptop users employ a VPN. As the reliance on hybrid work models and VPN connectivity continues to grow, VPN health has emerged as a critical success factor for businesses.

How to Start Contributing to Open Source with OpenTelemetry

Today, open source software is everywhere – from Linux-based servers, to Android smartphones, to the Firefox Web browser, to name just a handful of open source platforms in widespread use today. But the open source code driving these innovations doesn't write itself. It's developed by open source contributors – and you could be one of them.

Building an asset attribution system for software security

Asset attribution is an operational necessity for robust digital protection, but hasn't always been easy to achieve. Especially when software state and ownership is unknown, or inconsistent. This blog delves into the historical complexities and challenges of asset attribution for security and engineering teams and explores how Internal Developer Portals like Cortex can help.