Operations | Monitoring | ITSM | DevOps | Cloud

Building an agile team's 'safety harness' with cmocka and FOSS

Netdata is made up from agile teams who are deeply committed to improving the usability of our product. We want to respond to our users and introduce in-demand features. Working directly with our community is the best way to make Netdata better. But we face the same the dilemma as all agile teams: How do we do this safely?

Safety first: the best backup applications

Surely you know what a backup is, right? It is what we could also call a “safety copy“. Free backups are precisely that, softwares through which you can create backup copies of your data, to save them on drives such as external hard drives, flash drives, network devices and others. What are they for? Simply put, to restore the original information that you had, of course, after having lost it by accident in some misfortune or careless incident.

Machine learning for cybersecurity: only as effective as your implementation

We recently launched Elastic Security, combining the threat hunting and analytics tools from Elastic SIEM with the prevention and response features of Elastic Endpoint Security. This combined solution focuses on detecting and flexibly responding to security threats, with machine learning providing core capabilities for real-time protections, detections, and interactive hunting. But why are machine learning tools so important in information security? How is machine learning being applied?

Dear Search Guard users #2, including Amazon Elasticsearch Service and Open Distro, and others

Back on September 4th, we filed a lawsuit against floragunn GmbH, the makers of Search Guard, a security plugin for Elasticsearch and Kibana, for a multi-year pattern of copying our proprietary code. After filing the claim, we have continued to investigate floragunn’s actions. Today, we have updated our lawsuit in two important ways. First, we have identified additional copying by floragunn with respect to the separate, proprietary code base for our Kibana product.

Stress Management Tips for IT Business Owners

I recently had a conversation with an IT business owner who told me he felt burned out. While his business experienced steady growth over the past 12 months—and he was pleased with the positive impact on his bottom line—he felt like he’d achieved this success at the expense of his health. I knew how he felt. I’d been there too. Chances are, like a lot of people in our industry, you’ve been there too.

Preventing and mitigating data loss with Graylog

If you’re handling sensitive information, dealing with data loss can be more than just a headache. Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a breach occurs in your database. Minimizing data loss with a fast and scalable logging solution is key if you want to bring your cybersecurity to the next level.

What Is MTTF? Mean Time to Failure Explained in Detail

“What is MTTF?” That’s the question we’ll answer with today’s post. Yep, the article’s title makes it evident that the acronym stands for “mean time to failure.” But that, on its own, doesn’t say anything. What does “mean time to failure” actually mean? Why should you care? That’s what today’s post covers in detail.

What is AIOps and How is it Changing IT Operations?

IT Ops teams are under nonstop pressure to work faster and deliver better results—at less cost. This isn’t easy, as IT organizations must support infrastructure in multiple clouds, on-premises, the connections in between, and SaaS applications to enable business advantages and keep up with stakeholder expectations.