Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Datadog vs Sentry - key features, differences and alternatives

Are you struggling to choose between Datadog and Sentry for your application monitoring needs? Datadog and Sentry are widely recognized for their roles in monitoring applications. Although they share some common features, they serve distinct purposes. Datadog excels in overseeing application performance and providing comprehensive system observability, while Sentry specializes in pinpointing and reporting application errors.

Improving Web Performance in China - with Chinafy and Catchpoint WebPageTest

This is a guest blog written by the Chinafy Team. Most people in the website space would have heard of the term Great Firewall of China. What those people won’t really know, though, is what that means. For context, most websites don’t work the same way in China that they do elsewhere. Due to the way the China internet is designed, most websites take a long time to load and fail to function properly.

What Makes for a 'Good' Pair Programming Session?

Software changes so rapidly that developing on the cutting edge of it cannot fall to a single person. When it comes to asynchronously disseminating information about projects, code comments, PR conversations, Slack, RFCs, and other investigatory documents do a wonderful job, but no amount of async communication replaces the magic of two brains bouncing ideas off of each other.

Spot Elastigroup and Spot Ocean are now available on Google Cloud Marketplace

We are thrilled to announce that Spot Elastigroup and Spot Ocean for Google Kubernetes Engine (GKE) are now available on the Google Cloud Marketplace, reinforcing NetApp’s commitment to providing customers with a more streamlined way to consume its CloudOps solutions and invest in intelligent automation to maximize efficiency across their infrastructure and teams.

Office 365 E3 vs Office 365 E5

In today’s fast-paced business environment, cloud-based productivity solutions have become essential tools for organizations of all sizes. These platforms offer a range of benefits, including improved collaboration, enhanced accessibility, and reduced IT overhead. At the forefront of this digital transformation is Microsoft 365, a comprehensive suite of productivity applications and services designed to empower businesses in the modern workplace.

Secure by Design Principles Are More Important Than Ever

The concept of Secure by Design, which means designing software with security built in before it leaves the drawing board, is fundamentally changing how software is developed. Software has often been designed with what’s known as “bolt-on security,” added after products are developed. But that means security is not inherent within the solution. Where there's a conjunction between the core product and a bolt-on, that’s an inflection point for an attack.

The Obkio Story: Building a Network Monitoring Solution

The increasing use of cloud services and SaaS applications has changed how networks and data flows work. This is especially true with the increased adoption of SD-WAN technology. These changes mean we rely even more on having a strong network to keep important applications running smoothly. Most traditional network monitoring tools were created before these changes and can't keep up with today's demands. They were designed for centralized systems and struggled with the new, decentralized network setups.