Operations | Monitoring | ITSM | DevOps | Cloud

Basic DHCP concepts

Let’s step back and take a very basic look at DHCP. In fact, let’s look at the analogy of assigning a street address to your house. Usually, this is done by the local 911 dispatch office, or some other central authority. They typically use either a survey map or a latitude, longitude pair to locate you, before they assign your house numbers from a pool of available addresses, compatible with other addresses in the area.

Two-factor authentication coming to Ubuntu One

Two factor authentication (2FA) increases your account security further than just using a username and password. In addition to a password (the first factor), you need another factor to access your account. A great example to demonstrate this is when you withdraw money from an ATM. To access your bank account you need both your physical bank card and to know your PIN number. These are the two factors you need to withdraw money = 2 factor authentication!

OpManager makes network monitoring easy for Heritage Credit Union

About Heritage Credit Union Heritage Credit Union Limited is a US-based, non-profit financial institution founded in 1934. Today, it serves more than 28,000 members in Illinois and Wisconsin, with $450 million in assets and more than 120 employees. It takes care of its customers’ credit cards, banking, auto loans, mortgages, and savings accounts.

Real-time distributed tracing for Go and Java Lambda Functions

Serverless applications streamline development by allowing you to focus on writing and deploying code rather than managing and provisioning infrastructure. To help you monitor the performance of your serverless applications, last year we released distributed tracing for AWS Lambda to provide comprehensive visibility across your serverless applications.

Automate remediation of threats detected by Datadog Security Monitoring

When it comes to security threats, a few minutes additional response time can make the difference between a minor nuisance and a major problem. Datadog Security Monitoring enables you to easily triage and alert on threats as they occur. In this post, we’ll look at how you can use Datadog’s webhooks integration to automate responses to common threats Datadog might detect across your environments.

Monitor ActiveMQ Artemis and Classic with Datadog

ActiveMQ is a message broker that uses standard protocols to route messages between disparate services. ActiveMQ currently offers two versions—Classic and Artemis—that it plans to merge into a single version in the future. Both versions provide high throughput, support synchronous and asynchronous messaging, and allow you connect loosely coupled services written in different languages.

What role does ITIL Project Management play in ITSM?

Organizations with established ITSM strategy already know how ITSM can transform the IT department from a cost-center to a value-generating driver to offer real business value. As teams modify their service operations to meet increasing needs, IT departments are under more pressure than ever to swiftly execute changes without putting their service levels at risk. This is where organizations can leverage project management best practices along with ITSM best practices to introduce new services.