Operations | Monitoring | ITSM | DevOps | Cloud

N-central Hardening Part 2 (including some best practices)

In my final blog as the Head Nerd for N-central and now your newest Product Manager for N-central, I thought it would be time to update my previous blog from July, 2021 and provide a few more details as to why hardening the N-central server—and for that matter any on-premises server that has an operating system—is critically important.

Creating snapshots in Jest for testing React applications

Automated tests are especially important in large applications that have lots of moving parts. It is smart to learn about many methods of testing applications so that you can provide as much coverage as possible. If you are not familiar with using snapshots in testing, read on. Snapshot tests are written as part of frontend test automation.

New: Protect Your Status Page with a Password

We’ve just released highly-requested feature for our public, aggregated status pages: Password protection. Now, StatusGator’s customizable, brandable, aggregated status pages can be protected behind a password. This feature is now available on our Venture plan. StatusGator is a status page aggregator. We make it easy to publish single page with the status of all your cloud vendors in one place.

The one where the Lloyds Banking Group suffered downtime

In a world where we are so reliant on technology for everything, from doing our weekly grocery shopping to online banking, it’s no surprise that when something goes wrong, it has a huge domino effect impact. The pressures on apps and online platforms in 2022 is so high that we almost solely depend on them for all of our day to day activities. It’s no surprise, therefore, that when the banking apps suffered partial downtime in March, it felt like Armageddon.

IllegalArgumentException in Java

Let’s look at IllegalArgumentException, which is one of the most common types of exceptions that Java developers deal with. We’ll see when and why IllegalArgumentException usually occurs, whether it’s a checked or unchecked exception, as well as how to catch and when to throw it. We’ll use a few examples based on common Java library methods to describe some of the ways to handle IllegalArgumentException.

The Top 10 Best DevSecOps Tools for 2022

Over the last decade or so, we have seen organizations competing to rapidly launch products and new updates. This also often meant that information security lagged behind, as evinced by the fact that we have seen many companies facing major breaches and attacks over the last couple of years. The DevOps approach which focused on rapid development proved ineffective for robust security. This is where DevSecOps emerged. In this article, we explore the concept of DevSecOps and the top ten DevSecOps tools.

What are OKRs? A Guide to Objectives & Key Results

Objectives and Key Results or OKRs are a popular goal management framework that helps organizations achieve goals by building specific and measurable actions as well as communicating and monitoring progress toward them. Used effectively, an OKR framework can support increased transparency, better decision making, and better engagement with strategy by organizing colleagues and the work they do around achieving a common set of objectives.

Monitor your JumpCloud directory with Datadog

JumpCloud is a cloud-based directory platform that provides a unified approach to Active Directory and LDAP services centered around user authentication and network management. Using JumpCloud, companies can manage and provision user access to software, systems, and networks; enforce compliance with audit trails; and provide a unified login experience through single sign-on (SSO).

5 ways to become an effective enabler of IT service management

The business needs of IT Service Management (ITSM) are evolving, and I&O leaders must take sufficient action to position their ITSM practices as an enabler of digital business instead of a bottleneck. A recent Gartner report on the 2022 Strategic Roadmap For IT Service Management states, “By 2024, 80% of ITSM teams that have not adopted an agile approach will find that their ITSM practices are ignored or bypassed.”