Operations | Monitoring | ITSM | DevOps | Cloud

Extracting Value with Experience Data: A Nonprofit's Story

Leading an IT team often involves a careful balancing act between two priorities. On one hand, IT leaders must have an eye for innovation in order to keep up with rapidly changing environments. Meanwhile, there’s the constant pressure to reduce technological costs and ensure that IT is driving real value for the business. Within a nonprofit organization, managing these two priorities becomes an even more delicate process.

Building the bank of the future, today

New regulations like virtual banking licensing frameworks, advances in open banking and big techs rapidly gaining ground in financial services, are dramatically changing the banking landscape, forcing incumbents to reinvent themselves. To be successful, the bank of the future will need to embrace emerging technologies, focus on providing exceptional customer experiences and take a more holistic approach to ‘change’.

Introducing Ranged Annotations in InfluxDB Cloud

Adding annotations to your data is a great way to share context with other members of your team. In May, we added the ability to annotate individual points in your data. Today, we have added the ability to add ranged annotations to your dashboard graphs. We’ve also reworked some of the interactions with annotations based on user feedback so that they can be added quickly and easily. To learn more about working with annotations, check out our documentation.

Timely Delivery with Enterprise Alert

Murphy’s Law states that anything that can go wrong, will go wrong. The challenge for most businesses is putting the right method of communication in place for when the inevitable happens. The only way to handle this is to expect the worst and then prepare for it. A key factor in deciding for any alerting solution is can my team be notified properly when a major outage happens .

Boosting employee productivity on a conglomerate scale

At JG Summit Holdings, one of the biggest conglomerates in the Philippines, we drive business growth with a passionate mindset: “Dream big. Take bold, brave steps. Get it done.” Empowering employee productivity and efficiency has a big impact on the customer experience and, ultimately, on our business.

5 Automated Anti-Phishing Protection Techniques

In an age when attackers create over a million phishing sites each month, and phishing serves as a beachhead for 95 percent of all attacks against enterprise networks, how can businesses respond? Part of the answer lies in educating users to recognize and report phishing, of course. But user education only goes so far – particularly because the same statistics cited above show that, on average, only 3 percent of users will report phishing emails.

Monitor your entire serverless stack in the Serverless view

Serverless event-driven architectures are composed of AWS Lambda functions that regularly interact with databases, APIs, message queues, and other resources to facilitate complex workflows and functionalities. It is therefore crucial to monitor every component of your stack to ensure your applications perform optimally at scale. But traditionally, telemetry data for AWS resources has lived in silos, making it difficult to quickly get the context you need to debug issues.

How to Display All PHP Errors: For Basic and Advanced Use

During the execution of a PHP application, it is possible for it to generate a wide range of warnings and errors. For developers seeking to troubleshoot a misbehaving application, being able to observe these errors is critical. Developers, on the other hand, frequently encounter difficulties when attempting to display errors from their PHP applications. Instead, their applications simply stop working.

The number one business bad habit MSPs need to stop doing immediately

The N-able Head Security Nerd, Lewis Pope, just published a blog outlining the top 25 cybersecurity bad practices demonstrated by MSPs today. To accompany his post, I wanted to add one more risky bad habit to his list. It’s something I commonly see being practiced by too many MSPs from a business perspective—allowing a customer’s budget to dictate what a cybersecurity offering should look like.

25 cybersecurity bad practices: more than just bad habits

The CISA (Cybersecurity & Infrastructure Security Agency) recently started an initiative to create a catalogue of exceptionally risky cybersecurity bad practices. While this will be a welcome and very useful tool once it is complete, only two practices are currently listed. Since cybersecurity and business decisions can be time-sensitive, we wanted to expand on the CISA’s list.