How to Monitor Code You Didn't Write
Everybody uses third-party code. It saves time and money, increases agility, and lets you leverage the domain expertise of developers outside your company. But how do you monitor it?
Everybody uses third-party code. It saves time and money, increases agility, and lets you leverage the domain expertise of developers outside your company. But how do you monitor it?
A chasm remains between IT experts who live and breathe DevOps, and FinServ firms that struggle to embrace digital transformation. But by adopting pragmatic solutions, FinServ can make DevOps work.
Among other terms under the umbrella concept of cloud computing, we can find the Serverless technology which we have witnessed its growing popularity in the last three years. In principle, the cloud computing concept covers three levels of service: IaaS, Paas and SaaS.
Last week the “beta” tag officially came off of Checkly ! I bumped into many things in the period between launching a private beta and hammering down on all features and ripping the beta notice of the nav.navbar. In this post, I tried to funnel a bunch of these learnings into a somewhat logical order, as they felled like hoops I had to jump through to get to the next hoop.
At GrafanaCon EU in March, we had the pleasure of introducing one of Grafana Labs’ newest team members, Tom Wilkie, who joined as VP, Product with the acquisition of Kausal. And he came bearing gifts: his popular talk about the RED Method of monitoring microservices, which he created in 2015.
Announcing the following integrations: Kapacitor, Blue Matador, Instana, Zapier, BigPanda, ManageEngine
Malware / Virus checks from Uptime.com checks your site against two major malware databases. Malware is any type of unwanted or malicious code. Malware includes viruses, which are malware designed to replicate and spread, as well as spyware, adware, trojans and more. A Malware / Virus check uses the Google Safe Browsing List and the Yandex Safe Browsing List to determine if your site has malware.
You’re an end customer of a managed service provider (MSP). Outsourcing offers you many advantages but can also cause unease due to loss of control. Service assurance can bring peace of mind. So how do you achieve it?
In a recent tweet, I shared some of the open source tools and technology I use as an engineer at Microsoft. My team helps provide researchers in the Artificial Intelligence and Research Group shared resources to further their research goals. These tend to be both individual and clustered compute resources on both Linux and Windows platforms.
Yes, you heard it right. They both happened on the same day. I had no idea about WebGazer a few months ago, and now I am a part of it! It all started when a friend of mine texted me that he wanted some help. I said okay, but honestly, I did not think that it would become my new job.