Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Introducing Mezmo Edge: A Secure Approach To Telemetry Data

Mezmo Edge enables users to deploy telemetry pipelines and process data in their own environment. A significant advancement in Mezmo’s capabilities, Edge is especially useful when working with sensitive medical or financial records. Organizations that need to comply with PCI, GDPR, or CCPA or that generally work with PII will benefit from Edge’s secure approach to data protection. Edge also provides the telemetry data optimization benefits of a pipeline without cloud data egress charges.

Industry Cloud Platforms, Explained

Cloud computing changed the way enterprise IT works. Investments in public technologies are forecasted to grow by 21.7% to reach the $600 billion mark by the end of this year. The trend is driven by two major factors: Business organizations view these capabilities as an imperative for digital transformation — especially the domain-specific IT services that solve problems unique to their industry verticals.

Maturity Models for IT & Technology

Setting meaningful goals for your technology investment decisions requires an understanding of your requirements. Primarily, that’s… Measuring your IT maturity is one way to advance your IT performance — in a way that aligns with your organizational goals and minimizes the risk of failure. You can compare your current situation to a group of peers or competitors and also to industry benchmarks. Let’s take a look.

Unpacking the Hype: Navigating the Complexities of Advanced Data Analytics in Cybersecurity

The cybersecurity industry is experiencing an explosion of innovative tools designed to tackle complex security challenges. However, the hype surrounding these tools has outpaced their actual capabilities, leading many teams to struggle with complexity and extracting value from their investment. In this conversation with Optiv‘s Randy Lariar, we explore the potential and dangers of bringing advanced data analytics and artificial intelligence tools to the cybersecurity space.

The Evolution of Search: How Multi-Modal LLMs Transcend Vector Databases

As we venture deeper into the data-driven era, the traditional systems we have employed to store, search, and analyze data are being challenged by revolutionary advancements in Artificial Intelligence. One such groundbreaking development is the notable advent of Large Language Models (LLMs), specifically those with Multi-Mod[a]l abilities (e.g., Image & Audio).

Field Data vs Doc Values | Understanding Elasticsearch Performance Issues

🚀 Dive into the world of Elasticsearch performance with our expert at Sematext! In this insightful conference talk, we explore the crucial differences between Doc Values and Field Data, shedding light on the best practices for optimizing your Elasticsearch clusters. Discover how the choice between Doc Values and Field Data can significantly impact your Elasticsearch queries, indexing, and overall system efficiency. Gain the knowledge and insights to supercharge your Elasticsearch deployments.

Introduction to Grafana Plugins

Grafana is a powerful open-source platform for monitoring and observability, but what truly makes it shine are its plugins. For technology engineers looking to expand Grafana's capabilities, plugins are the way to go. In this post, we'll dive into the world of Grafana plugins and offer some unique tips to get the most out of them.

Coralogix vs Grafana Cloud: Pricing, Features and More

While Grafana is one of the better known names in the industry, Coralogix offers a full-stack observability platform. Despite the popularity of the Grafana brand, the cloud based solution lacks in some key areas. This article will go over the differences between Coralogix and Grafana Cloud, from features, customer support, pricing and more.

Can You Use the ELK Stack as a SIEM? A Fresh Take

A SIEM system (Security Information and Event Management) is often used by security operations centers (SOCs) for real-time detection of suspicious activity and security events. While some teams choose to adopt a purpose-built SIEM, others rely on the same DevOps tools they are already using for tasks like troubleshooting and operational log data analysis.