Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Using Machine Learning for Root Cause Analysis

From a security breach to a complete system outage, when an incident occurs and your network or service is impacted, it’s typically the result of a chain of events. A problem with one service has impacted another service, and so on until finally, you’re facing a problem that’s compromising availability and damaging your customer experience. In the event of a serious incident, your team’s immediate response is to focus on identifying the root cause and restoring service.

The Future of Anomaly Detection

You may be using your log data in a completely wrong way. Today, your business produces more data than ever before, and log data is at the center of all this because it contains the signals of what caused a problem. If your teams have to search for these signals in an ad-hoc manner, then they are wasting their precious time. Nearly every company in existence is dealing with this challenge because it may not have the tools to filter these signals from the noise.

LM Container: Introducing Support for AWS Bottlerocket

Hybrid IT environments enable Enterprises to optimize factors such as performance, cost, agility, and security, but they also introduce complexity. Containers are a great way to reduce some of this complexity by standardizing how applications are developed and deployed.

Best Certifications for IT Professional Careers

The job market for IT professionals right now is challenging. Whether you’re seeking your first job in IT or looking to further your career into a more pronounced and distinguished role, certifications serve as a way to separate from the crowd of applicants. Certifications show a functional level of proficiency, often making them more valuable than college degrees in certain entry-level positions, and just as valuable as years of experience in more established roles.

How MSPs Can Future-Proof Their Business in the Era of Remote Work

The new era of remote work has accelerated the need for businesses to adopt digital transformation strategies faster than ever to ensure their relevance and longevity in the marketplace. As priorities shift in this direction, Managed Service Providers (MSPs) are quickly adapting to better serve their customers. Recently, LogicMonitor commissioned a research study of 500 IT decision-makers around the globe to understand how organizations are evolving in the face of unexpected crises.

Static Thresholds vs. Dynamic Thresholds

IT monitoring is a complex field with several approaches to manage monitoring and alerts. Most of the current monitoring solutions provide Static Threshold-Based alerting, where IT Operations staff are notified when resource utilization breaches the defined threshold. The problem with Static Thresholds is that these are manually adjusted, and tuning it to meet the specific environment and needs of an organization is a major challenge for IT Operations teams.

How We Use Quarkus With Kafka in Our Multi-Tenant SaaS Architecture

At LogicMonitor, we deal primarily with large quantities of time series data. Our backend infrastructure processes billions of metrics, events, and configurations daily. In previous blogs, we discussed our transition from monolith to microservice. We also explained why we chose Quarkus as our microservices framework for our Java-based microservices. In this blog we will cover.

What Do Pharmaceutical Companies Need to Prioritize for a Successful Digital Transformation?

Like many industries, the pharmaceutical industry is undergoing a rapid transformation powered by technology. These technologies allow companies to improve business operations and empower the innovation needed to be competitive in today’s market. For pharmaceutical companies, time to market a new product can be costly and time-consuming. In this complex and regulated industry, it can take over a decade to bring a new therapy to market, while costs can total over $2 billion.

Using Dynamic Thresholding to Monitor Your Cloud Platforms

Whether you are new to the Cloud, mid-transition, or a professional at cloud or hybrid systems, no one likes being bothered with useless alerts. The options are simple: If you take the approach of ignoring the alert like a bad cold-call, you risk the chance of missing a critical alert and watching your system crash around you. No one likes to open their inbox to a few hundred alerts they have been ignoring.