Operations | Monitoring | ITSM | DevOps | Cloud

Understanding the DoD's Data Strategy: Part 2

Published in late 2020, the DoD Data Strategy emphasizes the importance of unlocking and operationalizing data-value from across its enterprise to support mission operations and maintain battlefield advantage. The strategy highlights seven goals and objectives that the DoD believes will align the DoD's Data Strategy with industry best practices.

How to Use Observability to Reduce MTTR

When you’re operating a web application, the last thing you want to hear is “the site is down." Regardless of the reason, the fact that it is down is enough to cause anyone responsible for an app to break out into a sweat. As soon as you become aware of an issue, a clock starts ticking — literally, in some cases — to get the issue fixed. Minimizing this time between an issue occurring and its resolution is arguably the number one goal for any operations team.

How Log Analytics Powers Cloud Operations: Three Best Practices for CloudOps Engineers

At the turn of the 20th Century, enterprises shut down their clunky generators and started buying electricity from new utilities such as the Edison Illuminating Company. In doing so, they cut costs, simplified operations, and made profound leaps in productivity. The promise of modern cloud computing invites easy comparisons to those first electric utilities: outsource to them, save money and simplify.

DNS Lookup Explained

The Domain Name System, DNS for short, is one of the most important protocols on the internet, and yet relatively few people understand its purpose. DNS is a protocol which governs how computers exchange data online. Its purpose, simply stated, is to match names with numbers, helping to convert memorable domain names (such as statuscake.com), into an IP address (such as 8.8.8.8 for Google.com) that your browser can use. DNS is essentially a map or a phone book of the internet.

Everything You Should Know About Spam Filters

We are all aware of the spam folder in our email dashboard. This article deals with how spam filters automatically identify and divert spam mail from our inbox to the spam folder. Spam filters are used to screen inbound emails (the emails entering a particular network) and outbound emails (the emails leaving the network). The Internet Service Providers utilize both methods for protecting the receiver and the sender. There are many types of spam filtering solutions available.

Multi-tenant Architecture for SaaS Apps

A multi-tenant architecture is essentially a framework in which a common instance of a software application is used to service several client applications or tenants. This multi-tenant architecture has found extensive adoption in SaaS applications, which cater to requests from tens and thousands of clients. The main reason for the adoption of multi-tenancy is the efficient and optimal use of resources and funds, along with delivering seamless service.

3 ways to manage digital risk in any organization

Digital transformation is vital to business today. However, it can increase digital risks, which can take many forms. To help ensure your organization is protected against business disruptions, noncompliance, and errors, you need a robust digital risk management program. Our three-part Managing Digital Risk and Beyond webinar series is designed to help you prepare for, manage, and address digital risks in your organization: Develop a risk management program.

Mute Datadog alerts for planned downtime

We’re happy to announce the release of new muting features for Datadog monitors. Scoped monitor muting allows teams to eliminate unnecessary alerting during scheduled maintenance, testing, auto scaling events, and instance reboots. Your teams will therefore be able to filter out expected events and quickly pinpoint critical issues in your infrastructure. Previously, monitor muting was binary: all-or-nothing.

Best practices for shift-left testing

There are several different testing methods you can use as part of your development process to ensure you build high-quality applications. Shift-left testing is one approach that has become popular with agile teams because it enables them to move the testing phase to earlier stages of the development life cycle, which is a primary goal for agile development. Shift-left testing has a few advantages over traditional methods.