Operations | Monitoring | ITSM | DevOps | Cloud

How We Use Mattermost to Build Mattermost

We started building Mattermost because there was no collaboration solution on the market that fulfilled our engineering teams’ needs as game developers. These days, we’re a software development startup with many of the same needs, processes, and frustrations as our customers. Mattermost has been 100% remote from the beginning, with employees all over the world.

A Primer on Prometheus Metrics

Keeping an eye on metrics is one of the essential things that every developer should do for their applications. Prometheus is a tool that has gained a lot of popularity in the field of metrics. When you start with Prometheus, you may not recognize its potential at first because it takes time to explore the entire tool. But once you become acquainted with the features, you will find it highly useful.

Achieving 86% Productivity Gains Through ITSM Automation

Manual incident management is an enormous challenge facing today’s enterprises. It wastes time and money, and often results in unhappy customers who have to deal with unreliable services because of persistent, unresolved issues. Manual ticket generation can take 20 to 30 minutes, and routing another 90—assuming the ticket is delivered to the right team.

IoT set to overtake cloud computing as primary Industry 4.0 technology

New research by Inmarsat, the world leader in global mobile satellite communications, reveals that investment in the Internet of Things (IoT) is set to overtake cloud computing, next generation security, big data analytics and other digital transformation technologies in the near future. Respondents drawn from multiple industries reported plans to invest the greatest proportion of their IT budget on IoT projects over the next three years.

Calico Cloud: What's new in October

Calico Cloud is an industry-first security and observability SaaS platform for Kubernetes, containers, and cloud. Since its launch, we have seen customers use Calico Cloud to address a range of security and observability problems for regulatory and compliance requirements in a matter of days and weeks. In addition, they only paid for the services used, instead of an upfront investment commitment, thus aligning their budgets with their business needs.

What Is CI/CD and How to Build ETL Processes

In today’s world of heterogeneous data ecosystems, managing and consuming data can be cumbersome. Organizations often have multiple systems of truth in corresponding to the applications managing the data. While data engineers dream of software that would make it easy to consume and digest different data streams from disparate systems, that scenario rarely comes to fruition.

WordPress Error Logs and Activity Logs

Logging is a fundamental part of software development. While an app is being developed, we rely on logging to confirm our inputs and outputs match our expectations. In production, logging can be an invaluable resource for tracking down bugs or measuring how users interact with the app. We can also consider logs as a sort of time-series value, where a timestamp is associated with a user’s specific action. These logs can be structured, gathered, and analyzed to provide teams with more information.

Stop the Chase: How Ivanti is Transforming Cybersecurity in the Everywhere Workplace

Threat actors have been a constant, persistent, and ever-evolving part of doing business in a digital world. For the entire history of digital business, security teams have been trying to keep pace with the threats. On a good day, they might be able to get a few steps ahead. But it’s always a chase. And it only takes falling behind one time to lose big.

A 'Friendly Ghost' Fixes IT Issues Before You Notice

Here in North America it’s that spooky time of the year again, Halloween. As always, children look forward to this late-October holiday, the chance to dress up in costumes to go door-to-door and amass large hauls of candy treats, leaving their parents to deal with any later ‘tricks’ from associated sugar highs.