Operations | Monitoring | ITSM | DevOps | Cloud

Time to rethink backup

When was the last time you thought about your backup process? Is it one of those things you’ve just accepted to be the way it is? If so, your backup may be consuming more time and resources than it should. The state of backup technology has moved forward, and many of the old assumptions about it are no longer true. N-able recently interviewed about a dozen MSPs from around the world and heard first-hand what they discovered when they took a fresh look at backup.

Rollbar Tip of the Day: Item status & Severity level

Control the state and priority level of your incoming items, and learn how you can quickly act upon them via Slack! Rollbar is the leading continuous code improvement platform that proactively discovers, predicts, and remediates errors with real-time AI-assisted workflows. With Rollbar, developers continually improve their code and constantly innovate rather than spending time monitoring, investigating, and debugging.

How Do I Add a Major Incident Response to an Existing Integration? - Ask Adam

When we receive an alert, the obvious choice is to accept responsibility for the issue and start resolving it ourselves. But, what happens when the incident is far more major than we thought? With xMatters, you don't have to scramble to find who else is on-call, you can configure the platform to help find other responders for you.

Bring IT On in the Year of the Ox

IT Pro Day is here, and it feels like the new year in IT! It’s a time to reflect on lessons from the past year and celebrate your achievements while setting goals for the season ahead. The theme for this year, Bring IT On, feels especially appropriate as we’ve been in the Year of the Ox. According to the Chinese zodiac, the ox is known as the “good helper” symbolizing strength, diligence, and persistence. I can’t think of a better sign that embodies IT pros.

Head-to-Head: Penetration Testing vs. Vulnerability Scanning

To release reasonably secure products, vendors must integrate software security processes throughout all stages of the software development lifecycle. That would include product architecture and design; implementation and verification; deployment and monitoring in the field; and back again to design to address the changing threat landscape, market needs, and product issues.