Operations | Monitoring | ITSM | DevOps | Cloud

Zero effort performance insights for popular serverless offerings

Inevitably, in the lifetime of a service or application, developers, DevOps, and SREs will need to investigate the cause of latency. Usually you will start by determining whether it is the application or the underlying infrastructure causing the latency. You have to look for signals that indicate the performance of those resources when the issue occured.

The Stanza Story

We launched the Stanza log agent just over one year ago. Stanza is the result of an uncompromising stance on performance, processing, and configurability for log telemetry. It took mere days for friends and colleagues in the space to raise the obvious objection – there are already so many logging agents, so why spend time on a *new* one? We also heard from competitors who had a snarkier take…

Nameserver: What is It? How Does It Work? Why It is Important to Your Website?

You may have come across the word "nameserver" if you maintain your own website. You may, however, have no true idea of what one is or how it works. Knowing a little about the “nameserver” concept can help you manage your website. Simply said, nameservers help browsers in establishing links between URLs and websites. They're essential since we'd have to memorize IP addresses to visit websites if we didn't have them.

Cloud-Centric PCI Compliance Demands Cloud-Native Controls

Over the last 15-plus years, the Payment Card Industry Data Security Standard – a.k.a. PCI DSS – has endured as the bellwether of IT security standards. For today’s e-commerce vendors and cloud centric retailers, maintaining alignment with “PCI” remains as relevant as ever, especially given the continued proliferation of threats and diversity of cloud and hybrid environments.

Top 6 benefits of virtualization

Virtualization has been with us since the 1960s. In computer science terms, it is about as old as the hills. Yet this old-school idea has never been more relevant. We all know hardware is expensive. Despite the cost, many businesses squander their precious processing power. All too often, a “one server, one purpose” mindset leads IT departments to waste server capacity. With virtualization, we leave this myopic view of server management in the dust.

Event Correlation 101: Why It Matters, and Why It's Not Enough

You’ve seen the movie. You know the scene. There’s a diabolical criminal on the loose, a city in fear—and one obsessed investigator in dogged pursuit of justice. Her eyes are bloodshot from too many sleepless nights, too much caffeine, and too many cigarettes. She paces frantically in a windowless room. On the wall is a corkboard festooned with maps, notes, and pictures, and a web of red string is woven haphazardly across a clutter of seemingly unrelated clues.

A Year of Supply Chain Attacks: How to Protect Your SDLC

One of the most worrisome trends in cybersecurity today is the skyrocketing incidence of supply chain attacks, such as the ones that hit SolarWinds last year and Kaseya more recently. Because they focus on compromising software development and delivery, supply chain attacks have forced developers and DevOps teams to scramble for solutions. Unfortunately, supply chain attacks are particularly challenging to prevent, detect and remediate, and, because of their stealthy nature, are often devastating.

Spend Intelligence: Enjoy the Ride!

Every product is a never-ending journey and Ivanti Neurons for Spend Intelligence is no exception to the rule. From the very beginning, our teams have set out to target core fundamental problems that we hear people in asset management struggling with on a day-to-day basis. To imagine this on more metaphorical level, just think for a moment: you are going on a road trip and your next destination is an amazing seaside resort with fabulous weather with your every want and desire close at hand.