Operations | Monitoring | ITSM | DevOps | Cloud

Sponsored Post

10 best error monitoring tools to use in 2021 - A comparison report

Software has the power to make the world a better place - but the real hero's are the people behind the code along with the technology they use to ship better software, faster. Today we're going to be looking into the top 10 error monitoring tools on the market to help you find the best solution for you and your team. Fortunately, there are plenty of innovative companies providing more powerful tools than ever before, all designed to make your life easier.

New: Push notification alerts via Pushover

Just launched: Push notifications via Pushover. Get outage and recovery alerts on all your devices, wherever you are... It's already weekend. Which means time away from the keyboard, and hopefully less screen-time from our always-around electronic devices. You don't want to go to dinner wondering if your online services are up and running, and also you might want to tone down the number of times you check your email. That's why we added the missing link to our alerting system.

Are 400GZR+ Pluggables an Embedded 800G Giant Killer?

We are now at the start of an era where 400GbE is breaking out of data centers and displacing 100GbE as the dominant client interface requiring wide-area optical transport. This is resulting in 400G lanes becoming the new building block of optical networks to transport existing 100GbE and growing 400GbE client traffic, for both metro and long haul applications.

A Guide To PHP Performance Monitoring

Performance is not something you should compromise on, and it's important to have a healthy development process that improves as your application grows. If your PHP application is not super-fast, it will be much harder to scale and maintain. You need to identify errors in the early stage to fix them as soon as possible. And if you don’t know where your bottlenecks are, you can’t fix them.

How to quickly find unused metrics and get more value from Grafana Cloud

As the complexity of software systems explodes, so does the amount of data that gets generated by instrumenting these systems. This poses a problem for our users — especially those who are in charge of observability teams and observability platforms at large enterprises. They have to strike the right balance between cost management and giving teams the freedom to instrument whatever they want. Often observability leaders are supporting dozens of teams that are using hundreds of dashboards.

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

Announcing WP Activity Log Integration

With over 40% of websites powered by WordPress, there’s a good chance you or someone in your company is using it to update content or manage websites. This is why we’re excited to announce an integration with WP Activity Log—a comprehensive WordPress activity log plug-in—and SolarWinds® Papertrail™.

End-to-End Monitoring of Citrix Infrastructures: FAQs

The webinar included a live demonstration of how our eG Enterprise solution provides an end-to-end view of the Citrix deployment including the Citrix ADCs, Delivery Controllers, License servers, Virtual App servers, Virtual Desktops, and other Citrix tiers including WEM, AppLayering, and others. Citrix Cloud is also supported.

Fashionably Late: The Zero Trust Trend is Here to Stay

I have often joked that IT, and in particular cybersecurity, is like fashion — not a lot is ever new, just reimagined and, in some cases, improved. As I sit pondering the beauty of my COVID-19 comb-over mullet, I have found myself thinking about how this fashion analogy applies to zero trust.

I Pity the Spool: Detecting PrintNightmare CVE-2021-34527

On Monday, June 21st, Microsoft updated a previously reported vulnerability (CVE-2021-1675) to increase its severity from Low to Critical and its impact to Remote Code Execution. On Tuesday, June 29th, a security researcher posted a working proof-of-concept named PrintNightmare that affects virtually all versions of Windows systems. Yesterday, July 1, Microsoft assigned this flaw a new CVE, CVE-2021-34527.