Operations | Monitoring | ITSM | DevOps | Cloud

How we improved our Lighthouse score from 70 to 96.

We recently optimized the hell out of our Lighthouse score, and one of our landing pages went from a low 70s score to a cool 96 and above score. Below I describe what started as a quick lunch break peek into the Google Search Console. I recognized that our 'Pingdom alternative' landing page ranks surprisingly well with nearly no investment. BUT the competition was ranking even better. So, why? Common knowledge is that Google-Search is using hundreds of ranking factors.

How to deploy the Elastic Stack on Red Hat OpenShift with ECK

Managing hundreds or thousands of containers has quickly become the standard for many organizations. With infrastructures growing more complex, we want every user to find value with Elastic (regardless of where or how they operate). We created Elastic Cloud on Kubernetes (ECK) — the official Operator — to simplify setup, upgrades, scaling, and more for running Elasticsearch and Kibana on Kubernetes.

Alicorn Invests $3M in Anodot, Bringing Total Funding to $65.5M

Alicorn Global Ventures has completed an investment of $3 million in Anodot. Recently included in Forbes’ Top 20 Machine Learning Startups to Watch and a leading vendor in the fast-expanding AI analytics space, Anodot is helping companies such as Vimeo, Xandr, Atlassian and T-Mobile to leverage artificial intelligence to surface business incidents much faster and prevent loss.

AWS Step Functions Use Cases

As you probably already know, Step Functions is a serverless Workflow Service provided by Amazon Web Services (AWS). There’s a lot to discuss about this service, and you’ll find plenty of vital information in our AWS Step Functions: The Ultimate Guide as well as in our series of articles that’ll dive deep into various aspects regarding this AWS service.

Predictive Analytics Meets IT Operations

Using data to predict and prevent IT outages and issues is a growing best practice—especially as advances in monitoring software have made it easier to deliver analytics in a timely manner. IT predictive analytics, once known as IT operations analytics (ITOA), is still nascent in many organizations, but it’s far more streamlined than it used to be when one needed to export data sets to specialized analytics tools such as Tableau or Microsoft PowerBI.

3 Key Trends From the 2020 Network Vendor Diversity Report

In the inaugural Network Vendor Diversity report, Auvik discovered high diversity in the network devices IT teams and MSPs were managing. In 2019, the data showed complexity continuing to rise as all categories became increasingly fragmented. In the 2020 edition, we look at the same four categories of managed network devices—access points, switches, routers, and firewalls—deployed across a sample of 30,000 networks, and compared the data to both 2018 and 2019.

Full VPC traffic visibility with AWS Network Firewall and Sumo Logic

We’re happy to partner with AWS on their launch of AWS Network Firewall by providing a cloud-native integration that gives customers real-time visibility into network traffic and automated correlated events surfaced by AWS. Too often, virtual private cloud (VPC) traffic is a black box leaving many security operations teams unable to connect potential threats to their broader infrastructure.

Slack's Latest Outage - How Did Your IT Team Respond?

Monday, long regarded as the worst day of the week, made good on its reputation for several thousand Slack users a few weeks ago. What started as an initial server problem at Slack during the wee hours of October 5th, devolved into a performance outage that impacted users for more than six hours.

Cybersecurity defenses for IIoT

Cybersecurity attacks on industrial IoT solutions can have detrimental consequences. This is the case because IoT devices record privacy-sensitive data and control production assets. Therefore, demonstrable trustworthiness is prerequisite to IoT adoption in industrial settings. Fortunately, IT security is a mature field. Experts have identified classes of threats devices may be subject to. Let’s discuss these threat patterns and mitigation strategies in the IIoT context.

Distribute ROS 2 across machines with MicroK8s

Our simple ROS 2 talker and listener setup runs well on a single Kubernetes node, now let’s distribute it out across multiple computers. This article builds upon our simple ROS 2 talker / listener setup by running it on multiple K8s nodes. At the completion of this setup expect to have a ROS2 Kubernetes cluster running MicroK8s on three different machines. Applying a single configuration file distributes the ROS 2 workload across the machines.