Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Containerizing Heavy Workloads to Cloud for Enterprises

For about a year, since we incorporated CloudHedge.io and during the 18 months of product building before that, we spoke with hundreds of prospects (both partners and clients included). Our team worked directly with clients and with partners, enabling them to try the product and later on-board them. While Partners are big global SI’s, customers range between SME to Fortune 100 companies.

New integration offers a consolidated look at your APM alerts

Application monitoring and alerting go hand-in-hand. Alerts point out critical issues in your infrastructure and help you identify and remediate components causing service degradation and disruption. To reduce the complexity involved in managing IT alerts, we’ve developed an integration between our application monitoring tool, Applications Manager, and our alert management solution, AlarmsOne.

Sponsored Post

EventSentry v4.0 - Introducing ADMonitor

Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.

An Introduction to Big Data Concepts

Gigantic amounts of data are being generated at high speeds by a variety of sources such as mobile devices, social media, machine logs, and multiple sensors surrounding us. All around the world, we produce vast amount of data and the volume of generated data is growing exponentially at a unprecedented rate. The pace of data generation is even being accelerated by the growth of new technologies and paradigms such as Internet of Things (IoT).

Everything You Need to Know About the OSS Licensing War, Part 2.

Where we left off: AWS had taken the Elasticsearch software and launched their own cloud offering in 2015, and Elastic N.V. had doubled down on an “open core strategy.” Once AWS decides to offer a project like Elasticsearch, it immediately becomes a truly formidable competitor to anyone trying to do the same, even the company behind the software itself. AWS has huge scale, operational expertise, and various network effects that really compound.

Providing Visibility and Security for AWS App Mesh

Microservice architectures running on containers have made applications easier to scale and faster to develop. As a result, enterprises are able to innovate faster and accelerate time-to-market for new features. To make management of microservices even more efficient and easier to run, service mesh solutions like Istio, Envoy, and Linkerd – and now AWS App Mesh – have become the next core building blocks of microservices infrastructure built on containers.