Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Event in Review: MIT Sloan CIO Digital Learning Series - MIT Digital Transformation Insights

The final episode in the MIT Sloan School of Management CIO Symposium series took place on 14th October and ended with a focus on digital transformation, offered by a diverse set of business leaders across a range of industries. The previous two episodes focussed on the shift in workplace and how enterprises are handling the new normal.

The Ultimate Guide to AWS Step Functions

The use of serverless computing has become a must nowadays, and some of you may already know a thing or two about Amazon Web Services like Lambda Functions, Step Functions, and other services AWS provides. However, if this is the first time you hear about them – fantastic! In this article, we’ll discuss AWS Step Functions, what they are used for, how to use them, and the advantages or disadvantages that they bring.

How to Leverage File Monitoring as an Effective Breach Detection Tool

One thing that all organizations of any size need to realize is that data breaches only occur when there are not sufficient breach detection tools in place. Simply having a data loss prevention system does nothing unless you are actively using it to identify and stop a data breach from occurring. This is not to say that even with the best secure data solutions that your data is not at risk. Hackers are constantly evolving and adapting their methods, so you should never rest on your laurels.

LDAP authentication with Sensu Go: troubleshooting & tips

SSO is often accomplished by using Lightweight Directory Access Protocol (LDAP). While LDAP has a variety of use cases, in this post, I’ll focus on authentication — specifically, how to use LDAP authentication for single-sign on (SSO) with Sensu Go. First off, a quick overview of Sensu authentication.

AWS Distro for OpenTelemetry will send metrics and traces to Datadog

Datadog has a long-standing commitment to open standards. Our integrations with OpenMetrics, JMX, and WMI, as well as our implementation of the tried-and-true StatsD protocol, enable you to collect data with the tools and libraries that fit best into your workflows.

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly conceal their malicious intentions, and fly under the radar by leveraging the victim’s fear, anxiety, or plain negligence.

Web application performance monitoring: measuring and alerting

Everyone knows that web performance is everything for a quality user experience. Web performance affects conversion rates because users quickly form opinions based on a website’s or app’s responsiveness. In this article, we explore the importance of performance to your web application throughout the entire user journey, how to examine your web application performance results, and how to set up your web application monitoring to alert based on performance.

Track open source security exposure with Snyk and Datadog

Using open source code makes it easier to build applications, but the freely available nature of open source code introduces the risk of pulling potential security vulnerabilities into your environment. Knowing whether or not customers are actually accessing the vulnerable parts of your application is key to triaging security threats without spending hours fixing an issue that doesn’t affect end users.

JavaScript Internals: Garbage Collection

Garbage collection (GC) is a very important process for all programming languages, whether it’s done manually (in low-level languages like C), or automatically. The curious thing is that most of us barely stop to think about how JavaScript — which is a programming language, and hence, needs to GC — does the trick. Like the majority of high-level languages, JavaScript allocates its objects and values to memory and releases them when they’re no longer needed. But, how?