Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Serverless Computing for Dummies: AWS vs. Azure vs. GCP

Serverless computing is the latest, greatest thing in the technology world. Although the serverless concept has been around in one form or another for more than a decade, the introduction of serverless platforms from major cloud providers—starting with AWS Lambda in 2014—has brought serverless mainstream for the first time.

Kubernetes Phase 2-Key Challenges at Scale

Kubernetes is THE buzzword these days. Almost every IT organization is currently using it or is in the process of implementing it as part of their infrastructure. The transition to Kubernetes is complicated, whether a company is using an on-premises, cloud, hybrid, or managed solution, and it usually involves other changes in the codebase, such as shifting to a microservices architecture. While the implementation phase is led by the DevOps team, it requires the participation of the whole R&D group.

The life of a sysadmin: Encircled by excessive tools

It’s 3am, and you’re woken up by frantic calls and messages from users at your company—this is the everyday life of a sysadmin. Constantly surrounded by numerous tickets and persistent users who require immediate solutions, the life of a sysadmin is not a bed of roses. Their tasks are not limited to server management, maintenance, and repair, but also completely supporting a smoothly running production environment with minimal or no complaints from end users.

Datadog + New Relic: Monitor every layer of your stack

Application performance monitoring (APM) dovetails nicely with infrastructure monitoring, allowing you to monitor app performance and end-user satisfaction in context with the rest of your infrastructure. That’s why we unveiled Datadog APM to complement our infrastructure monitoring platform and provide full-stack observability.

Efficiently retrieve old logs with Datadog's Log Rehydration

Logs provide invaluable information about issues you need to troubleshoot. In some circumstances, that may mean that you have to look back at old logs. For example, you may be running a security audit and need to analyze months-old HTTP request logs for a list of specific IP addresses over a period of time. Or you might need to investigate why a scheduled service never occurred, or run an exhaustive postmortem on incidents that happened over a couple months but that you suspect are related.

Deep in the heart of Tech-sys: SpiceWorld 2019 Recap!

In case you missed it, we just wrapped up our keynote to kick off SpiceWorld 2019! Last year, we shared our vision to empower you to use technology to transform your organizations, community, and the world – every day. This year, you’re seeing the first steps of that vision coming to life!

The 2020 State of IT: Four tech trends to watch

Many say that in the world of tech, the only constant is change. For businesses, this dynamic reality presents opportunities as companies continuously scan the horizon for new IT products and services they can deploy to help them stay competitive. At the same time, businesses must navigate computing challenges, such as staying up to date and safe in an expanding universe of cyberthreats.

Chef vs Puppet: Differences, Similarities, and How to Choose

Chef and Puppet are two popular tools for configuration management. These type of tools help engineers to maintain a consistent configuration in all servers. For instance, all servers might need to have IIS with a binding to port 443 for HTTPS access and the respective firewall rule for inbound traffic. More importantly, if anyone removes the firewall rule, these type of tools will keep consistency by creating the firewall rule again.