Operations | Monitoring | ITSM | DevOps | Cloud

Five Reasons to Switch from Broadcom DX Infrastructure Manager to OpsRamp

In November 2018, chip manufacturer Broadcom announced the completion of its $18.9 billion purchase of infrastructure software company, CA Technologies. While CA’s enterprise software division has seen many changes after the acquisition, the products in their AIOps and Observability portfolio consist of operational intelligence, application performance management, network monitoring, and infrastructure monitoring.

Planning for a Post-Pandemic World as an IT Leader

As COVID-19 cases began to rise around the world in March 2020, governments and businesses had no choice but to take extraordinary measures to flatten the curve. As an IT leader, you were likely tasked with helping entire companies transition to remote work all at once. Cubicles were replaced by home offices. Face-to-face meetings were replaced by video calls. Work performance was measured by tasks completed instead of hours worked. Digital connectivity became more important than ever before.

A New Framework for Modern Security

We are in the midst of an unprecedented convergence of events that are forcing enterprises to dramatically change how they secure their modern businesses. With the acceleration of digital transformation from COVID-19, work-from-home initiatives, the continued growth of SaaS and the increasing adoption of microservices-based applications, the modern enterprise threat landscaping is transforming rapidly.

The rise of 'Compliance-ops': Bridging the tech and compliance gap in iGaming

Kimberley Wadsworth gambled £36,000 in a fortnight, committing suicide shortly after the loss and leaving her mother homeless as a result. Kimberley Wadsworth started gambling in 2015, visiting brick-and-mortar shops and playing at online casinos. There was no one to promptly alert or save Kimberly from her dreadful destiny.

Know your access control: RBAC vs. ABAC

Working together successfully as a team — especially in this increasingly remote world — is all about collaboration. As part of that collaboration, it’s critical that team members have access to the files and programs they need to accomplish their jobs, and that access should be easily revocable for when employees change roles or leave the company. This is achieved through access control, which, simply put, defines who is allowed to access what.

Now at Work 2020: The future of work is now

Each year, I look forward to Now at Work. When you’ve been doing this as long as I have, though, you look forward to some years more than others. Fortunately, this is one of those years, and the reason why is right there in its name. Has there ever been a more exciting time to explore what’s happening now at work?

Introducing the InfluxDB Template UI: Monitoring Made Simple

At InfluxData, we’re obsessed with time to awesome — how quickly can you start working productively with time series data? What can we do to make things better? InfluxDB Templates are a great example of this mindset. Back in April, we announced Templates as a way to package up everything you need to monitor a particular technology — Telegraf configurations and InfluxDB Dashboards, Tasks, Alerts, and related artifacts — into a single configuration file.

Six-peat! Once Again, IDC Ranks Splunk #1 in ITOA Market Share

We just got some great news. IDC has ranked Splunk #1 for both market share and market revenue in their IDC Worldwide IT Operations Analytics Software Market Shares, 2019 report. This is the sixth year in a row IDC has ranked Splunk as #1 in ITOA. While we’re proud of this recognition, let me say right away that our success is due to the continued success of our customers, and we’re very grateful for the opportunity to be a part of it.

Monitor code deployments with Deployment Tracking in Datadog APM

Continuous integration and continuous delivery (CI/CD) pipelines have become fundamental to modern software development and code deployment. Implementing CI/CD practices can let teams deploy code more quickly and efficiently. But with these methods come a number of new challenges: bad code deploys are a major source of downtime and can lead to a loss of revenue and customer trust.