Operations | Monitoring | ITSM | DevOps | Cloud

Can your AIOps platform do Log Noise Reduction in addition to Alert Noise Reduction? If not, it is time to re-evaluate your AIOps

One of the core value propositions of AIOps platforms is to increase IT efficiency & productivity by applying AI & ML techniques to perform Alert Noise Reduction. This in turn translates to direct cost reduction due to savings in IT man-hours. In this approach, the AIOps platform kind of becomes like a gatekeeper for all the IT alerts/events, and it can help effectively, reduce and correlate such events, so as to send meaningful incidents to NOC or Service Desk.

Tools For Business Consultants (Try These 12)

Have you been searching high and low to find the best tools for business consultants? Look no further. We have taken the time to pull together a comprehensive list of must-have tools for your consulting business. If you’re serious about taking your consulting business to the next level, you should consider investing in the best applications and solutions to drive growth.

Network AF, Episode 9: Learning from great mentors and by breaking things with Hank Kilmer

In a new episode of the Network AF podcast, your host Avi Freedman interviews Hank Kilmer, VP of IP engineering at Cogent. Hank has been running major internet backbones since the early 90s. He joined Cogent in 2011, and prior to that, held leadership positions with UUNET (now Verizon), Sprint, Digex, Abovenet and Terrapin Communications.

List app registrations with credentials about to expire

App registrations is a mechanism in Azure AD allowing to work with an application and its permissions. It’s an object in Azure AD that represents the application, its redirect URI (where to redirect users after they have signed in), its logout URL (where to redirect users after they’ve signed out), API access and custom application roles for managing permissions to users and apps.

Best Practices to Secure Your Corporate-Owned Personally Enabled (COPE) Android Devices

COPE stands for Corporate Owned Personally Enabled Device. These are devices that are owned and provided by the company for work but are also expected to be used for personal reasons. It’s a term that’s especially relevant today, with the adoption of Everywhere Workplace, as companies are giving employees more freedom with corporate-owned and controlled devices.

Server Uptime Monitoring: What, Why, and How?

In an earlier blog post, we had discussed how server performance monitoring is not just about monitoring CPU, memory, and disk resources anymore. There is more to server performance monitoring than just three resources or metrics. That blog post covered several key performance indicators (KPIs) that IT teams must track to ensure that their servers are performing well. In this blog post, we focus on another KPI – server uptime.

ICYMI: Achieving Visibility in Your CI/CD Pipeline With Honeycomb + CircleCI

Before continuous integration came to be, setting up builds was no fun because the complexity and overhead involved in a release cycle was compounded by inflexible, manual processes. The release cycle was slow and often resulted in breaking changes. Continuous integration and continuous delivery (CI/CD) has changed much of that through pipelines that automate how we build and test software—today, we can deploy, have builds fail, and resolve any errors faster than ever.

New Research: The State of Cloud-Driven Transformation

Over the last couple years, cloud transformation has become increasingly critical, evolving from a preferable priority to an urgent imperative. In our rapidly changing world, organizations have had to innovate at unprecedented rates — and those most successful are harnessing the power of cloud to move faster and smarter. But it’s more than a simple migration.

It's not ready for production until it has an Operational Readiness Checklist

Maintaining the reliability of complex services just got easier with Operational Readiness Checklists. Service owners and engineering leaders can now evaluate and maintain the production readiness of the services their users rely on every day: spot risks in your service dependencies before they cause incidents, and respond quickly if they do. Before you put a new service into production, readiness checklists help you dot-your-is and cross-your-ts.