Operations | Monitoring | ITSM | DevOps | Cloud

Best Practices for Logging in Kotlin

If you’re reading this, you have probably been convinced that taking on Kotlin for your mobile application is the most sensible choice. Now that you’ve come to this decision, it’s imperative to know what you need to do to stay on top of your monitoring and logging. Like with any application or system, they are essential, cornerstone qualities of any successful project.

Kibana Canvas: An In-Depth Guide

When we look at information, numbers, percentages, statistics, we tend to have an easier time understanding and interpreting them if they’re also represented by corresponding visual cues. Kibana Canvas is a tool that helps us present our Elasticsearch data with infographic-like dashboards – fully visual, dynamic, and live.

Major incident reporting template: Downloadable and with a tutorial

According to a recent report by IBM, the damage caused by major IT incidents is greater than ever. An incident that results from a data breach will cost the organization an average of $3.86 million, with the average time to breach containment coming in at 280 days! And according to the ITIC, hourly downtime costs come in at over $300,000, with some at even $1 million per hour.

Five worthy reads: Hyperscale: The path ahead for data centers and organizations

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about hyperscale data centers, including how they function, and the considerations and challenges organization face in deploying them.

Overcoming Bandwidth Bottlenecks

What is bandwidth? Bandwidth refers to the amount of data that can be sent or received by a particular device in a stipulated period. This is measured in Mbps (Megabits per second). Very often, people use bandwidth to refer to the speed of the internet connection. However, that is not the case. Talking about bandwidth vs. speed, the former helps understand the quantity of data transferred per second. At the same time, the latter focuses on the rate of data transfer from the source to the destination.

Ethical artificial intelligence: the most important movement you've never heard of

Fake news spreads six times faster than factual news. The algorithms built into social media software, in an effort to hold our attention, feed us information that triggers the basest instincts of our complex psychologies. These are some of the starkest realities exposed in the Netflix documentary “The Social Dilemma.” Holding our attention is what the robot (if you will) was programmed to do. And it’s doing its job really, really well.

Why Database Performance Is Key to Understanding Application Health

Traditional database and application monitoring used to mean talking about a single server, in a single data center, in a single location. Many monitoring tools were—and still are—built around this single data center, single node idea. And while we’ve progressed to cloud-native applications, our tools haven’t quite caught on.

The importance of Active Directory for Fast Citrix Logon Time

Most of you know that one of the most important user experience metrics in a Citrix environment is the logon time. A 2018 survey by eG Innovations and DABCC found out that Citrix logon time was the number one problem for administrators: 59% of respondents rated logon time as their biggest problem. There are many best practices to improve Citrix logon times. Slowness during the logon processing can, of course, increase logon times. Issues with group policies or slow profile loading is often a cause.