Operations | Monitoring | ITSM | DevOps | Cloud

Infrastructure as Code - IAC for Azure

Infrastructure as code and automating deployment and scale-up/down in Azure is becoming the new normal. Solution architects and system administrators are becoming coders and scripting is becoming part of their day-to-day job, whilst in parallel a raft of vendors is providing products to try and help avoid this need to script and address the shortage of staff with those skills to script and code this now necessary functionality.

Incident Review - AWS Outage Led To Spikes In Response Times For Applications Using AWS Services

On Tuesday August 31, users across large parts of the West coast (US-West-2 region) were impacted by major spikes in response time. Some of AWS’ most critical services were affected, including Lambda and Kinesis. SRE teams care about Service Level Indicators (SLIs) and Service Level Objectives (SLOs), and this practice is a must for SRE teams.

Why Your Cloud Costs Are So High (And What You Can Do About It)

For many organizations, cloud costs are a mystery. Beyond knowing their total cloud spend, businesses have little insight into the biggest drivers of their costs, let alone how they can better manage their cloud investment. With on-premise infrastructure, organizations have a predictable understanding of their costs, but the same cannot be said for the cloud.

Interview With Pieter Vaniperen

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Pieter Vaniperen, Managing Partner at PWV Consultants. Pieter is a veteran software architect and security expert who is an industry authority and influencer providing thought leadership and execution to develop widely adopted processes, methodologies, and technologies that are at the forefront of digital innovation and software development.

What to Do About Java Memory Leaks: Tools, Fixes, and More

Memory management is Java’s strongest suit and one of the many reasons developers choose Java over other platforms and programming languages. On paper, you create objects, and Java deploys its garbage collector to allocate and free up memory. But that’s not to say Java is flawless. As a matter of fact, memory leaks happen and they happen a lot in Java applications. We put together this guide to arm you with the know-how to detect, avoid and fix memory leaks in Java.

It's the experience that matters

We say it all the time: Behind every great experience is a great workflow. But what’s behind a great experience? If you ask ServiceNow’s User Experience (UX) team, it’s software that is user friendly, visually beautiful, empowering, and productivity-boosting; and that people connect with emotionally. That provides, from start to finish, and at every touch point along the way, a fantastic experience.

Why integrate SCOM with anywhere?

While SCOM is a valuable monitoring tool, you may also be using a suite of monitoring tools, such as SolarWinds to monitor network devices, VROps to monitor VMware, and Nagios to monitor your Linux devices, as all these tools are best in class. But, you don’t want to be looking in numerous different consoles to gather all your monitoring data!

Bi-Directional Integration for SCOM & your ITSM Tools

Bi-directional sync enables data to be sent to and from SCOM and your ITSM tools, in the following ways: a) OUTBOUND Notifications (PUSHES alerts from SCOM to another tool) b) INBOUND Notifications (PULLS updates on alerts into SCOM from another tool) This means you can choose which SCOM alerts to send across to your ITSM tools (Cherwell or ServiceNow), they are then raised as incidents, and then using bi-directional sync, info relating to the incidents is pulled back into SCOM (Incident ID, Configurat