Operations | Monitoring | ITSM | DevOps | Cloud

Learn Your Organization's Potential ROI With PagerDuty by Using IDC's Snapshot Tool

Recently, I wrote about an IDC business value study PagerDuty commissioned and shared some of the results from the research. In summary, after in-depth interviews with eight enterprise customers, IDC applied its proven business value methodology to the aggregated results of those interviews and found that enterprise customers were averaging a three-year return-on-investment (ROI) of 731% and a payback period (break-even point) on their investment in just 4.3 months.

Elastic Stack 7.5.0 released

We’re excited to announce the general availability of version 7.5 of the Elastic Stack. Along with the introduction of Kibana Lens, a fast and intuitive way to craft visualizations, this release offers significant enhancements to our Observability and Security solutions and Elastic Enterprise Search joins the 7.5 release train. Read on to see the highlights and dive into the detailed release posts for all the details.

How AIOps Resolves Sporadic Anomalies

December 2, 2019 Corporate infrastructures get more complex as they expand, incorporate more applications, become more highly distributed, become more siloed, increasingly hybrid, and handle more data. This is a widely acknowledged phenomenon, even if there’s not yet a “Moore’s Law” of infrastructure complexity. And complexity invites issues.

re:Invent Serverless Talks - Scaling Up to Your First 10 Million Users

After months of planning and anticipation for sponsors, attendees, and speakers alike, it’s a bit surreal that re:Invent 2019 is actually upon us! In addition to setting up shop in the Expo hall with the team to chat with re:Invent guests about their current serverless development workflows (and how Stackery can supercharge it), I made sure to attend some choice presentations this week.

Why incident response automation is top-of-list for CISOs in 2020

When considering the state of critical incidents in 2019 – it’s no surprise that looking ahead to 2020, CISOs have one of the organization’s most challenging and stressful jobs. During the first half of the year alone 4.1 billion records were compromised, and the average cost of a data breach is now estimated at $3.92 million.

Configurable Ruby Modules: The Module Builder Pattern

In this post, we’ll explore how to create Ruby modules that are configurable by users of our code — a pattern that allows gem authors to add more flexibility to their libraries. Most Ruby developers are familiar with using modules to share behavior. After all, this is one of their main use cases, according to the documentation.