Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Kubernetes vs Docker Swarm: Comparison of Two Container Orchestration Tools

With the rise of the containerization technology and increased attention from enterprises and technologists in general, more and more containerized applications have been deployed to the cloud. Moreover, research conducted by 451 Research predicts that the application container market will grow dramatically through 2020, which will continue to expand the number of containerized applications being deployed to the cloud.

Runc CVE-2019-5736

Today CVE-2019-5736 was announced which impacts all known versions of runc. Runc is the underlying component that creates containers in Docker, Kubernetes, and many other container systems. The full details of this vulnerability are available in the Openwall oss-security mailing. Due to the severity of this issue, exploits will not be published for another week, giving people time to patch.

Tracking insider threats with AI

If you thought masked hackers in dark rooms spreading malware were your only security concern, think again. In its Insider Threat Report for 2018, Crowd Research Partners brought to light that almost 90 percent of organizations find themselves vulnerable to insider threats. What’s worse is that 50 percent of these organizations experienced an insider attack in 2018.

Honeybadger and Slack - Error Monitoring Awesomeness - Part Deux

When Honeybadger originally partnered with Slack, it was the dawn of a new era. Dev teams everywhere were thrilled that they could receive exception, uptime, and check-in alerts instantly from within their teams' Slack channels. That was, and still is, a lethal weapon. However, Honeybadger and Slack have partnered up again and have been hard at work pushing error monitoring to the limit. Why? Because bugs and exceptions don't rest, and neither do Honeybadger and Slack.

Dashbird becomes AWS Advanced Technology Partner

It’s the celebration time of the year! Dashbird is now an official Amazon Web Services (AWS) Advanced Technology Partner (APN). Our team has demonstrated that we can build a strong, secure and reliable AWS-based business that can benefit Amazon Web Services users. The new partner status is recognition of Dashbird ability to help companies to better monitor and troubleshoot their Lambdas by providing state of the art solution for serverless observability.

4 Business Disasters That Could Have Been Avoided With Real-Time Anomaly Detection

Digital, network-connected systems are transforming every aspect of business — from your mission-critical workloads to your most rarely used applications. But the increases in scalability and cost efficiency come at a cost. Because every system is so reliant on network connectivity, unplanned downtime is becoming increasingly expensive.

Cost Tracking For Serverless Architectures

Today we’ll talk more about the cost tracking for serverless architecture. Following the cost of serverless architecture utilization it might give you insights on how and what should you change or adapt to, to be able to reduce the cost. After all, we’re all always trying to improve our performances in every field while keeping the costs to a minimum (if possible).

5 Trends Transforming Digital and IT Operations Management

In 2018, digital transformation ushered in a radical shift in how enterprises harness customer insights, technology capabilities, and rapid experimentation to drive revenue growth, profitability, and market leadership. Enterprises spent $1.3 trillion in 2018 on digital transformation technologies like public cloud platforms, microservices and containers, edge computing, machine learning, and artificial intelligence to improve customer experiences, business agility, and employee engagement.

Logging Levels 101

If you’re a software developer, then you understand how vital application logging is in software development and a critical part of logging is something called logging levels. Log entries generally contain essential information—such as a timestamp, a message, and sometimes additional stuff like an exception’s stack trace. Those pieces of information are useful because they allow someone reading the log entry to understand how the application behaved in production.