Operations | Monitoring | ITSM | DevOps | Cloud

Managing Microsoft 365? See What You're Missing

If a customer has an issue with any part of Microsoft 365, MSPs just don’t have the native visibility to identify the root cause, let alone respond to and remediate the problem. Most of the time, it’s little more than checking Microsoft’s Service Health status to see if Microsoft knows it’s having a problem.

Should Intune Be Part of Your Tech Stack? Time to Make a Choice

We’ve seen a number of MSPs hesitant to dive into using Microsoft Intune for their customers. One reason for this is that it may require them to encourage customers toward Microsoft 365 Business Premium, which, at an additional cost per seat, may seem like a tall order for a client for a 30-person team. It’s also a new discipline for many technicians, and often requires they find time to hone their skills while tackling existing tickets throughout a normal day.

What is Website Monitoring?

Website Monitoring is a broad phrase used to describe the way web teams measure website reliability, performance and security. In today’s increasingly fast-paced world, website monitoring is becoming much more than that. Businesses have been driven online by socio-economic issues like reductions in retail footfall and, most recently, the Covid-19 pandemic. Websites are critical.

Kubernetes security policy design: 10 critical best practices

In this blog post, I will be looking at 10 best practices for Kubernetes security policy design. Application modernization is a strategic initiative that changes the way enterprises are doing business. The journey requires a significant investment in people, processes, and technology in order to achieve the desired business outcomes of accelerating the pace of innovation, optimizing cost, and improving an enterprise’s overall security posture.

Overcoming SQL Server Blocking and Locking Challenges

One of the most common performance problems with SQL Server databases in production is the blocking of queries, which happens because database resources are locked. Understanding why locking happens is just half the battle. Being able to resolve locking, which will resolve blocking issues as well, is the second half.

IT Asset Management 101

If your business is growing, it won't be long until you need to develop an IT asset management protocol that allows you to manage your hardware and software assets throughout their lifecycle, helping to reduce business interruptions, plan budgeting effectively, mitigate risks, and gain high-level insight into how IT is driving success for your organization.

Improving Our Typography to Optimize the Honeycomb User Experience

This is the second post in our series about Lattice, Honeycomb’s new design system and how we’re applying a user-centric design philosophy to our product. Lattice begin! At Honeycomb, we understand that our users are often under a great deal of pressure when troubleshooting complicated issues in their applications.

How does search solve data problems?

Is enterprise data a benefit or a burden? Think about all of the data your organization generates and consumes in the digital age — from security event logs to application error messages, energy consumption to vendor contracts. There is so much, and all of it is usually stored in silos, making the data difficult to synthesize to provide better services, identify signals proactively, or make stronger business decisions.