Operations | Monitoring | ITSM | DevOps | Cloud

Understanding bare metal Kubernetes

Bare metal Kubernetes is a powerful set of technologies that builds on the best ideas behind the public and private cloud, yet abstracts away some toilsome aspects related to virtualisation management and networking. For operators and users, it provides significant benefits, making it easier and faster to ship and maintain complex, distributed applications.

GripMatix Citrix MP most used SCOM 3rd-party Management Pack for Citrix

The Big SCOM Survey 2021 results are available and we are happy to see that at organizations the use of SCOM is still expected to grow according to more than half of the respondents. It is a survey executed by SCOMathon. But above all, our Citrix Ready Management Pack solution for monitoring Citrix Virtual Apps and Desktops scored as second-most used 3rd-party Management Pack of all 3rd-party Management Packs out there.

The secret to managing multiple websites

Forrester Research interviewed digital leaders at enterprise organizations and found that, on average, they were maintaining 268 customer-facing websites and applications. As the number of websites you manage continues to grow, so do the number of challenges in managing it. Often the websites are designed by different teams, are built using different languages and frameworks, and run on different hosting solutions with different DevOps tools and workflows.

Defining Your IT Security Perimeter

It wasn’t too long ago that a security system would be nothing more than a few walls, some cameras, and an inattentive security guard. That’s no longer the case In today’s digital landscape. Now organizations must invest in securing their assets from a growing number of cyberthreats. To start, they must first draw up the boundaries of their IT security perimeter.

Run Datadog Synthetic tests in your Jenkins pipelines

Continuous integration (CI) has become the mainstream approach to software development as it enables organizations to iterate quickly while minimizing the risk of releasing faulty code. To implement CI, many organizations rely on Jenkins—one of the most mature and widely used automation servers on the market. Jenkins comes with hundreds of community-backed plugins to help you easily integrate it with other tools in your development workflow.

11 of the most costly software errors in history

The mere mention of a serious software error can strike fear into the heart of any developer, project manager or tech leader. The wrong error in the wrong system can be incredibly expensive and difficult to resolve, not to mention humiliatingly public. Catastrophic software errors are mercifully rare these days, but the potential for chaos, PR disasters and spiraling costs still remains.

Data Mining Methods: The Top Five

Knowing what business problem you want to address will help you know which data mining technique will produce the best results. Each of the data mining strategies listed below addresses a different business challenge and yields a different result. We are surrounded by big data in today’s digital world, which is expected to rise at a rate of 40% per year over the next decade. The irony is that we are awash in data yet deficient in knowledge. Why?

Feature Spotlight: Centralized Log Collection

Speedscale is proud to announce its Centralized Log Collection capability. When diagnosing the source of problems in your API, more information is better. For most engineers, the diagnosis process usually starts with the application logs. Unfortunately, logs are usually either discarded or stored in Observability systems that engineers don’t have direct access to. Compounding this issue is that the log information is typically not correlated to what calls were made against the API.