Operations | Monitoring | ITSM | DevOps | Cloud

Sponsored Post

What is Incident Response?

When a service is down, a system is failing, or a security issue is in the midst of occurring, organizations need a solid incident response process to get up and running again. Incident response isn't just for high severity, lights out incidents either; if you've rebooted your computer to fix a problem, you've been an incident responder yourself! Incidents happen, and any successful organization knows that instead of pretending that one day nothing will ever go wrong, it's far more useful to develop a comprehensive operational response plan. And to do so, you need to know what incident response is! Let's get into it.

Monitor Dell EMC Isilon with Crest Data Systems' integration in the Datadog Marketplace

Dell EMC Isilon is a petabyte-scale network attached storage (NAS) system that allows you to archive unstructured data. Isilon operates in a cluster to provide high availability, and you can scale up its throughput, IOPS, and storage space by adding nodes to your cluster. Isilon automatically replicates your data throughout the cluster to ensure durability and provides caching to minimize data retrieval latency.

What is ServiceOps?

ServiceOps is a new business technology strategy that combines IT service management (ITSM) with IT operations management (ITOM). ServiceOps is fundamentally about connecting people, processes, and technology that are dependent on one another to enable successful service delivery and make user experiences better with automation, collaboration, and visibility across traditionally fragmented departments.

How to create an Azure storage account

So you finally are ready to try out some of Azure’s most common and loved technologies.Well the cheap storage they provide is definitely one of them that we do. Whether you want to store your own personal files and photos, or you have a requirement from your business to quickly expand some storage, with Azure its quick and easy to setup, access and use. In this quick tutorial I will run you through just how easy it is to setup an Azure Storage Account.

Have You Forgotten About Application-Level Security?

Security is one of the most changeable landscapes in technology at the moment. With innovations, come new threats, and it seems like every week brings news of a major organization succumbing to a cyber attack. We’re seeing innovations like AI-driven threat detection and zero-trust networking continuing to be a huge area of investment. However, security should never be treated as a single plane.

Patterns for better insights and troubleshooting with hybrid cloud logs

Hybrid and multi-cloud environments produce a boundless array of logs including application and server logs, logs related to cloud services, APIs, orchestrators, gateways and just about anything else running in the environment. Due to this high volume, logging systems may become slow and unmanageable when you urgently need them to troubleshoot an issue, and even harder to use them to get insights.

Uptime vs. Availability

Unlike physical stores and organizations that operate during set hours, the IT world never sleeps. In today’s highly connected digital environment, many believe that when an investment is made in technology, it should be accessible at all times — which is virtually impossible to guarantee. Since disruptions occur, organizations should evaluate the services needed to run operations smoothly. For example, what services are required during an IT service outage to ensure minimal disruptions?

Testing locally with CircleCI runners

Many development teams start their CI/CD journey with a local build box (or six) that run their tests. In several mobile teams I worked on, for example, we had a few Mac Mini boxes with physical devices plugged in that we used for running local UI and unit tests. Eventually we migrated to a cloud-based solution, which brought us much greater stability and many new features. But moving to the cloud also meant our local hardware was obsolete.

Efficient Container Monitoring with Pepperdata

Container monitoring strategies and purpose-built container monitoring tools just may be the next hot topics swirling around the Kubernetes discussion forums this year. Over 77% of IT professionals expected to migrate 50% or more of their workloads to containers with Kubernetes by the end of last year. With the rise of container usage growing, having the ability to monitor the performance of your containerized workloads is critical.