Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Monitoring critical business applications while working remotely

With a huge number of employees around the globe working remotely during the COVID-19 pandemic, delivering uninterrupted business services to customers has become a major challenge. This requires strict monitoring of all critical business applications in order to accommodate an increased amount of requests, which can cause a critical downtime if not monitored appropriately.

7 Reasons for Monitoring Network Performance | Obkio

Modern Networks are complex systems, but nowadays often the backbone of businesses. When your business' network doesn't perform to the best of its capabilities, your business may suffer as a result. How do you avoid that? Well, you continuously monitor your network network performance to ensure your business is running at its full capacity. Watch our quick video to find out 7 reasons why you should be monitoring your network performance, from our IT pros here at Obkio!

Staying Focused on Digital Transformation During Covid-19

CIOs and other IT leaders know the importance of having a well-oiled machine to support the vast requirements of the business. Not having a Google-like experience of an always-up, always-fast, easy to use technology ecosystem can be a competitive disadvantage. More pressing is that while most businesses want to reinvent, through digital transformation or other methods, these large-scale efforts fail 70% of the time.

This is why you should use content checks with all your web monitors

Do all your synthetic monitors include a content check? Why not? Content checks are free with all our monitor types, but for the most part, Uptrends users underutilize content checks. In this article, we talk about why content checks are important for your monitoring, and we touch on some tips to help you pick the content checks that work best for you.

SQL Server, Part 1: Why you should monitor SQL logs

Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the top most targeted assets for malicious actors to exploit organizations’ confidential data. Often, organizations don’t realize their databases have been compromised for months. Once sensitive data is leaked, the damage can’t be undone.

Ride Down Into JavaScript Dependency Hell

Every JavaScript project starts ambitiously, trying not to use too many NPM packages along the way. Even with a lot of effort on our side, packages eventually start piling up. package.json gets more lines over time, and package-lock.json makes pull requests look scary with the number of additions or deletions when dependencies are added. “This is fine” — the team lead says, as other team members nod in agreement. What else are you supposed to do?