Operations | Monitoring | ITSM | DevOps | Cloud

Put the Machines to Work for You: A Modern Approach to Increase IT Agility

Putting machines to work to enhance our everyday lives has been well-ingrained in our society for at least a couple of centuries now. IT workers use machine learning (ML) in their daily work routines, even if they don’t consciously realize it. Automated email alerts, issue escalations, and security patching are just a few examples of how ML has put the systems we rely on to work for us.

The Vulnerability Conundrum: Improving the Disclosure Process

The vulnerability disclosure process involves reporting security flaws in software or hardware, and can be complex. Cooperation between the organization responsible for the software or hardware, and the security researcher who discovers the vulnerability can be complicated. In this blog we’ll look at the vulnerability disclosure process, the parties involved and how they can collaborate productively.

Ivanti Delivers Day-Zero Compatibility and Key Feature Support for Android 12

Here at Ivanti, we are excited about Android 12. I’m pleased to share that we offer day-zero compatibility and key feature support across the Ivanti product portfolio for the new features built into Google’s updated OSs. Android 12 brings plenty of new things to see and experience with a combination of security and privacy.

Incident Review For the Facebook Outage: When Social Networks Go Anti-social

The following is an analysis of the Facebook incident on 10/4/2021. Marking a highly unusual state of events, Facebook, Instagram, WhatsApp, Messenger, and Oculus VR were down simultaneously around the world for an extended period of time Monday. The social network and some of its key apps started to display error messages before 16:00 UTC. They were down until 21:05 UTC, when things began to gradually return to normality.

How Netflix, Lyft, Slack, And Other Top Tech Brands Manage Cloud Costs

Breakthroughs in engineering best practices often stem from a handful of top tech companies. Many of them share their behind-the-scenes stories at conferences, in blogs, and slide decks — or open source code. These companies invest millions of dollars and dedicated headcount in optimizing everything from uptime to engineering velocity — so why wouldn’t you look to them for inspiration?

The Blog Is Dead; Long Live the Blog

Ever since the very beginning, Honeycomb has poured a lot of heart and soul into our blog. We take pride in knowing it isn’t just your typical stream of feature updates and marketing promotions, but rather real, meaty pieces of technical depth, practical how-to guides, highly detailed retrospectives, and techno-philosophical pieces. One of my favorite things is when people who aren’t customers tell me how much they love our blog.

Leverage Correlation Analysis to Address the Challenges of Digital Payments

In the first four parts of our series on correlation analysis, we discussed the importance of this capability in root cause analysis in a number of business use cases, and then specifically in the context of promotional marketing, telco and algorithmic trading. In this blog we walk through how to leverage correlation analysis to address the challenges in ensuring a seamless online payment experience by the end-user.

Deploy the RESTMon Microservice in Minutes

Within any enterprise, IT operations teams use a variety of solutions to monitor their technology ecosystem. These products are often business critical and cannot easily be replaced or migrated. Ultimately, it’s important that teams can analyze and correlate data from these different tools so they can produce the insights they need to improve decision making. To help address these requirements, Broadcom offers RESTMon.