Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

European enterprises prioritise governance in AI deployments, as North America accelerates towards full autonomy

Digitate report reveals differing approaches to AI deployment between Europe and North America, but ROI remains consistent. Europe leading on governance while NA organisations show faster progress towards autonomous operations.

Here's What a Network Needs After a Cloud Migration

By now, most organizations have realized the benefits of moving some, most, or all of their business applications to the cloud. The cloud typically offers better security and performance, at a lower price, than housing resources on-premises. You may have helped them in that migration or you may have been hired after it was complete. Either way, a client with cloud hosting has different network requirements than one whose infrastructure is primarily on-premises.

Configuring an Internet Connection for a Cloud-Hosted Environment

Part 2 in our series on Here’s What a Network Needs After a Cloud Migration. Part 1 looked at how to redesign the LAN. When a company’s application infrastructure moves to the cloud, a reliable Internet connection becomes mandatory. Hiccups in Internet service that might have been an inconvenience when apps were in-house now grind the business to a halt. Unfortunately, the Internet link happens to be the single least reliable element in an IT infrastructure.

Managing User Access & Authentication in a Cloud-Hosted Environment

This is the third and final instalment in a series on Here’s What a Network Needs After a Cloud Migration. Part 1 looked at how to redesign the LAN. Part 2 outlined strategies for the Internet connection. One of the things that becomes more important in a cloud-based application environment is managing user access and authentication.

Stop the Insanity! Quit Doing These 7 Manual Network Management Tasks

Active network infrastructure management is a key element of any managed service offering. Traditionally, network management has involved a lot of tedious manual work, making it expensive and very hard to scale. And that’s why many MSPs have shied away from actively managing the network. But not managing network infrastructure at all is a risk to your business. Your clients likely expect you’re looking after the network whether you’ve promised it or not.

Monitor Everything is an Anti-Pattern!

Bullshit and nonsense. But let’s take it from the beginning. The industry’s story goes something like this: Then, in the same breath: You see the contradiction already, right? The same industry that tells you “collect less, simplify, trust the experts” is also the industry where: This isn’t an observability strategy. It’s observability by hindsight. Right. Good. Now we’re having fun.

How to Write a Cover Letter That Actually Helps You Get the Job

Cover letters are supposed to help you shine, but most of them blur together into the same polite, forgettable paragraphs. The intention is good (“I want them to notice me!”), but the execution… not so much. So, here’s a simple, honest guide to writing a cover letter that actually works, especially if you’re applying to Checkly. Spoiler: shorter is better. And authenticity in this AI era is better than perfect polished perfection.

How To Migrate Away From DogStatsD Using Telegraf

Datadog is a popular monitoring platform, and one of its key components is DogStatsD which is a customized extension of the original open-source StatsD protocol. DogStatsD adds powerful features like tagging, histograms, and distributions, but it also introduces vendor lock-in. This is because DogStatsD metrics follow a specific wire format that many other monitoring platforms do not natively support.

Honeycomb Frontend Observability - See Everything

Chapters: In this video we take a tour through Honeycomb's Frontend Observability offerings for Web and Mobile. We see how the launchpads can help spot performance errors, how errors that occur in the frontend can be traced all the way to their cause in other backend services easily with the error investigations feature, and how easy it is to find differences between traces across various devices.