Operations | Monitoring | ITSM | DevOps | Cloud

Podcast: Break Things on Purpose | Carissa Morrow: Learning to be Resilient

Being new in tech an be intimidating! Thankfully, folks like Carissa Morrow are shining examples of how to come into tech from the ground up. Carissa began with a career shift and just started coding, went through the Boise Codeworks bootcamp, and made the jump to tech. Carissa talks about the resilience it took in her early days, and how those experiences reinforced her attitude on continually learning.

Tracking Stability in a Bluetooth Low Energy-Based React-Native App

For most of my career I’ve worked with health and wellness startups. Most of these companies have a wearable that tracks movement, heart rate, body weight or stimulates a body part. The common denominator between these apps is their use of sensor data to determine physiological progress an athlete is making. Problem is, your Bluetooth Low Energy (BLE) device does not have an internet connection and cannot send diagnostics anywhere if there are errors.

APM vs. Logging: Do I Need Both?

The final stage of the popular Software Development Lifecycle after planning, analysis, design, and implementation is maintenance. This is where a full-fledged application running in production is constantly looked after and taken care of. Bugs, bottlenecks, slow database queries, security loopholes, and other issues are discovered and fixed before deploying the updated code. Log records and Application Performance Monitoring (APM) tools play a crucial role in software development maintenance.

The Complete UX Audit Checklist 2022: for CIOs and Self Auditors

It’s essential to perform a UX Audit on your website from time to time. It helps improve the quality of your site by reviewing its strengths and weaknesses. Chief Information Officers often carry out this job. However you can perform the UX Audit yourself if the company is small. Either way, you’re going to need a complete UX Audit Checklist that makes sure you get the most valuable insights from your audit.

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a highly distributed, complex system. One of the most critical challenges to overcome is processing an ever-growing stream of analytics data, from IoT security data to business insights, coming from each device. Many protocols have been implemented for this, but could logs provide a powerful option for IoT data and IoT monitoring?

Debugging Node.js Memory Leaks: How to Detect, Solve or Avoid Them in Applications

In this article, you’ll learn how to understand and debug the memory usage of a Node.js application and use monitoring tools to get a complete insight into what is happening with the heap memory and garbage collection. Here’s what you’ll get by the end of this tutorial. Memory leaks often go unnoticed. This is why I suggest using a tool to keep track of historical data of garbage collection cycles and to notify you if the heap memory usage starts spiking uncontrollably.

Malware Civil War - Malicious npm Packages Targeting Malware Authors

The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling to avert potential software supply chain security threats, and reports any vulnerabilities or malicious packages discovered to repository maintainers and the wider community. Most recently we disclosed 25 malicious packages in the npm repository that were picked up by our automated scanning tools.