Operations | Monitoring | ITSM | DevOps | Cloud

How Do You Monitor Cassandra Performance: Key Metrics to Measure

Apache Cassandra is a distributed database known for its high availability, fault tolerance, and near-linear scaling. It was initially developed by Facebook, but it is a widely used open-source system used by the largest tech companies in the world. There are numerous reasons behind its popularity, including no single point of failure, exceptional horizontal scaling with a data layout designed as a perfect fit for time-series data.

gRPC-web: Using gRPC in Your Front-End Application

At Torq, we use gRPC as our one and only synchronous communication protocol. Microservices communicate with each other using gRPC, our external API is exposed via gRPC and our frontend application (written using VueJS) uses the gRPC protocol to communicate with our backend services. One of the main strengths of gRPC is the community and the language support. Given some proto files, you can generate a server and a client for most programming languages.

SBC Interoperability: How Do I know if This Works with That?

Growing up, I was the youngest member of my family, so I was not very fond of the game “Keep Away” that my older brothers liked to play. The idea of the game (it has a few different names) is that two people toss a ball back and forth while the third person stands in the middle and tries to intercept it. Being the youngest, and therefore the smallest, it often seemed like a futile game that wasn’t much fun.

Evaluating Splunk On-Call Alternatives

Splunk On-Call (Formerly VictorOps) is a popular incident response and on-call management platform that allows engineering and operations teams to collaborate with ease and resolve issues faster. As part of the Splunk Observability Suite, Splunk On-Call is combined with related products to achieve the goal of bringing monitoring, troubleshooting, and investigation, into a single, comprehensive view — simplifying the process from incident detection to resolution.

Ubuntu 20.04 Now Supported!

Announcing support for Ubuntu 20.04 on all Cloud 66 products (including registered servers). From this point onward, brand new applications will have Ubuntu 20.04 installed. We will continue to install Ubuntu 18.04 when scaling up servers in an existing application. Don't forget, you can control your target Ubuntu version through your manifest! It has been a while in the building and testing (and dependency pruning), but we are now very pleased to make it public.

How Real Estate Investors Can Use Artificial Intelligence

How do you determine whether one multifamily deal is better than another? Let me start by saying that a deal is only as good as the assumptions you’re making as an investor, and assumptions are not guaranteed to materialize. As a real estate investor, operator and syndicator through my company Blue Lake Capital, a significant part of our analysis when considering properties to invest in is looking at how the property performed in the past.

7 Best Log and Syslog Viewers

Many devices—such as switches, routers, firewalls, servers, and printers—support syslog protocol. This standard for sending log messages within a network offers critical information about your system. Consequently, monitoring your network and its syslog messages should be a top priority. Many IT professionals use log and syslog monitors or viewers to gather logs and syslog messages from across their network in a centralized location.

Put the Machines to Work for You: A Modern Approach to Increase IT Agility

Putting machines to work to enhance our everyday lives has been well-ingrained in our society for at least a couple of centuries now. IT workers use machine learning (ML) in their daily work routines, even if they don’t consciously realize it. Automated email alerts, issue escalations, and security patching are just a few examples of how ML has put the systems we rely on to work for us.

The Vulnerability Conundrum: Improving the Disclosure Process

The vulnerability disclosure process involves reporting security flaws in software or hardware, and can be complex. Cooperation between the organization responsible for the software or hardware, and the security researcher who discovers the vulnerability can be complicated. In this blog we’ll look at the vulnerability disclosure process, the parties involved and how they can collaborate productively.

Ivanti Delivers Day-Zero Compatibility and Key Feature Support for Android 12

Here at Ivanti, we are excited about Android 12. I’m pleased to share that we offer day-zero compatibility and key feature support across the Ivanti product portfolio for the new features built into Google’s updated OSs. Android 12 brings plenty of new things to see and experience with a combination of security and privacy.