Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What Is Network Monitoring?

Network monitoring is a critical component of the modern IT industry. With a comprehensive network health and performance perspective, enterprise IT can proactively identify and fix possible issues, ensuring optimal network operation and reducing downtime. Unchecked, network failures can cause significant disruptions in business operations, lost productivity, and financial losses.

Security by Default: The Crucial Complement to Secure by Design

Legacy cybersecurity systems – many designed over a decade ago – fail to account for the new breed of attacker capabilities and vulnerabilities – nor for the reliance on human configuration that is the Achilles heel of so much software. This new reality is being answered with the software development concept called security by default, a necessary complement to the principles of Secure by Design set forth by the U.S. Cybersecurity & Infrastructure Security Agency (CISA).

Feature Friday #27: Multiple outcomes

When promises are actuated, a class can be defined based on its result. For example, if a promise modifies a file’s content, you could define a class that indicates it has been repaired. However, did you know that promises can have multiple outcomes concurrently? That’s right! Native promises (but not custom promises) can have multiple outcomes. For example, a promise can be both kept and repaired at the same time. Let’s take a look.

5 Essential Questions for Developing an Effective AVD Monitoring Strategy

Is your AVD monitoring strategy truly effective? As organizations increasingly adopt Azure Virtual Desktop (AVD) to support remote work, ensuring a seamless and secure user experience becomes a priority. A robust AVD monitoring, and observability strategy is essential to achieve this, allowing you to maintain performance, security, and user satisfaction across your virtual desktops and apps. But where do you start?

What Is FileVault Disk Encryption & How Does it Work?

FileVault disk encryption is the macOS feature that encrypts data on Mac computers. Encrypting the data on your devices means that your password is required to read it, so if the device is lost or stolen, it is protected. This is vital for protecting the privacy of individuals and the operational data of businesses and organizations. This article explains FileVault, the importance of disk encryption for individuals and organizations, and how to enable FileVault.

What Is ISO Compliance? Overview & Importance

Companies looking to compete on a global scale need to embrace ISO compliance. This will certify that your organization adheres to internationally recognized standards, which in turn promotes consistency, efficiency and trustworthiness. Understanding what ISO compliance entails can help your business not only meet industry expectations but also exceed them, positioning you as a leader in your field.

I Have SD-WAN, Do I Just Need SSE Security for the Branch?

As businesses increasingly adopt Software-Defined Wide Area Network (SD-WAN) solutions to enhance connectivity and performance across their branch offices, a common question arises: “Do I just need Security Service Edge (SSE) security for the branch?” The answer is a resounding “no”. While SSE provides essential security features, it is not sufficient on its own.

How to Integrate Filebeat with Logit.io

Filebeat is a straightforward log shipper that enables you to begin logging, rapidly. With observability solutions like Logit.io, this can be achieved in as little as 5 minutes, following our integration guide. To understand more about using Filebeat with Logit.io, this article will define what it is, how it works, and how to integrate Filebeat with Logit.io to ship logs from local files to one or more destinations.

How IDPs "nudge" developer behavior

I was recently cruising LinkedIn and saw Abi Noda from GetDX reference a paper Meta wrote in 2022 on improving code review time. Meta’s focus on this metric was sparked by a developer survey, but what they did as a result is even more interesting (at least to me!). Meta developed a “NudgeBot” to alert reviewers to take action on stale diffs. And it worked; both time to review and time in review went down.

AWS Instance Types Compared: Choosing The Right Option

You might wonder how companies using Amazon Web Services waste more than $10 billion annually. It’s easy to ask, “why don’t they just reduce their spending?” Well, it’s because there’s more to it than that. AWS offers many options — over 200 different services, for example. Amazon Elastic Compute Cloud (EC2) provides over 300 AWS instance types spread over five unique instance families.