Operations | Monitoring | ITSM | DevOps | Cloud

6 quick ways to cut cost on your Lambdas

We’ve talked about how serverless architecture is a great option for companies that are looking to optimize costs. Just like with all app building and developments, monitoring the performance of your implementation is crucial and we, the folks at Dashbird, understand this need all too well – this is why we’ve spent the better part of the past year and a half to create a monitoring and observability solution for AWS Lambda and other Serverless services.

How to Monitor Amazon Redshift

Amazon Redshift is a cloud-based data warehousing solution that makes it easy to collect and analyze large quantities of data within the cloud. Cloud data warehouse services like Redshift can remove some of the performance and availability pain-points associated with on-premises data warehousing, but they are not a silver bullet. Getting the most out of Redshift requires carefully monitoring Redshift clusters in order to identify stability issues and performance bottlenecks.

The State of Robotics - November 2020

Goodbye Thanksgiving (well, for some of us), hello Christmas! The holiday season really is the best, and it always brings interesting robotics news, which we will now distill into a quick dose of delightful and easily-digestible tidbits. As always, if you’d like to see your work showcased here, please send an email to robotics.community@canonical.com, and we’ll feature it in next month’s blog.

Empowering Remote Users

2020 has certainly presented all of us with its fair share of challenges. Small businesses and large organizations alike have been forced to change policies and procedures to adapt to the concept of ‘the remote worker’. As more and more employees are working from home, it is critical that they are set up for success and armed with the tools to address issues that arise, no matter where they are located.

How to Ensure Your Website is Secure and Trustworthy

How is your website showing your customers that you care? You are selling a great product and making some good money, but what are you doing in return to assure your customers that all their payment and private data is protected? If you haven't thought about that before, now is the time because a significant data breach could mean the end of your company.

Galileo Enhancements: Spectrum Protect Logs and Summary Data

Anyone who has ever had to administer IBM Spectrum Protect™ (formerly Tivoli Storage Manager or TSM) knows that eventually, you’ll end up parsing the activity log for advanced problem determination or running advanced queries on the summary table for extended reporting. This is a huge pain! With the latest enhancements to Galileo for Spectrum Protect, you need not go elsewhere for answers.

Monitoring Endpoint Security States with InfluxDB

Several factors in recent years have increased endpoint vulnerability — from organizations’ need to make access to data more fluid, to threats targeting mobile device access and networks, to the growing work-from-home and work-on-the-go trends. Endpoints connected to a network — including remote devices, IoT devices, workstations, tablets, laptops and servers — create attack paths for security threats.

The Value of Operationalizing MITRE ATT&CK According to Splunk With Guest Speaker From IDC

The global pandemic has fueled a rapid digital transformation — and led to permanent shifts in cybersecurity. In a recent joint webinar with Bryan McAninch, senior solutions engineer at Splunk, and guest speaker Chris Kissel from IDC, "Sp(e)lunking Security with MITRE ATT&CK® featuring IDC Research," they shared seven overarching trends in cybersecurity for 2021. One notable, but foundational, trend mentioned was the need to understand risk.

IT security under attack: A typical day in the life of an IT admin or security analyst

The job of IT admins and IT security analysts are, without a doubt, some of the most important jobs in any company. When things are running smoothly, it is easy for everyone to forget they exist. However, the moment things go askew, everyone points fingers at them. IT security professionals are expected to know everything. Most of them are self-taught and have learned on-the-job. Over time, experience has turned them into battle-hardened soldiers.

Twitter Outage and Support Feeds Integrated with CloudReady Internet Outage Monitoring

Twitter as a social media channel has obviously taken the world by storm. Everything that happens and is trending around the globe takes place or is reported on Twitter. Additionally, most tech and cloud providers offer outage and support feeds through Twitter as a way of communicating problems and notifying customers. Example technology companies include Microsoft for Microsoft 365 Status, Azure and their products. Also Internet Service Providers like Comcast, CenturyLink and more.