Operations | Monitoring | ITSM | DevOps | Cloud

Using Cisco Meraki Solution for SD WAN? ScienceLogic Was Built for That.

Since its acquisition by Cisco in 2012, Meraki has taken off as one of the most valuable tools for simplifying networking in the cloud era. Organizations using Meraki to install and configure software-defined networking (SDN) and software-defined wide area networking (SD-WAN) devices across their IT estates can attest to the fact.

The benefits of web performance testing with Grafana k6 browser and Grafana Faro

Performance tests created with the Grafana k6 browser module use lab data collected from pre-defined environments, devices, and network settings. Lab data allows you to repeatedly reproduce performance results, making it useful for detecting and fixing performance issues early. Lab data, however, doesn’t account for one very important testing component: real user experience.

Can People Notice How Many Times You Watch Their Instagram Profile or Story?

Despite all the diversity of online communication, lots of social media users close their apps with a lingering sense of discontent, feeling that their interactions lack the genuinely human component. In a subconscious attempt to enrich their browsing and messaging sessions, people double down on the consumed content, often repeating their profile visits and story views.

Flight, DataFusion, Arrow, and Parquet: Using the FDAP Architecture to build InfluxDB 3.0

This article coins the term “FDAP stack”, explains why we used it to build InfluxDB 3.0, and argues that it will enable and power a generation of analytics applications in the same way that the LAMP stack enabled and powered a generation of interactive websites (by the way we are hiring!).

The Dangers Lurking in Open Source Software

Our 1st blog in our series on securely consuming OSS. Today, I'll give an overview of some of the most common types of attacks from consuming OSS. Open-source software (OSS) fuels innovation. Over 96% of commercial applications rely on at least one OSS component (Synopsys, 2023). At Cloudsmith, we champion OSS and understand its indispensable role in today's software landscape. However, the escalating threat of supply chain attacks targeting OSS demands a robust defence.

Kubernetes Deep Dive: Key Features, Visibility and Optimization

Kubernetes or K8s is an open-source production-grade container orchestration system for automating, scaling, and managing containerized applications. A container is a lightweight, standalone, executable ready-to-run software package that contains everything needed to run an application. It includes the runtime, code, libraries, systems tools, and default values for any essential settings.

How OpsRamp Closes the Complexity Gap with Distributed Tracing

As distributed, interconnected microservices have replaced monolithic applications, application monitoring has had to evolve to support these modern, complex architectures. Rather than monitoring a single application and code base, organizations need to monitor the performance and network connectivity of multiple services that interact with each other.

How to Calculate Uptime? And 5 Tips for Achieving 99.9%

The lifeblood of any online business lies in its accessibility. When your site or application is accessible, your customers are happy, your brand reputation remains intact, and revenues keep flowing. Because of this, understanding and calculating uptime becomes crucial. Let’s face it: any downtime translates to lost revenue.

How to Use ITAM Software as Your Equipment Check-Out System? [Video Tutorial]

An equipment check-out system is a lifesaver for any organization. This is especially true for sectors like education, healthcare, mining, and construction, where the need to loan and track numerous assets is a priority. But what if there’s a way to take that system even further? Utilizing IT Asset Management (ITAM) software as your equipment check-out system brings your organization a whole new level of efficiency and control.