Operations | Monitoring | ITSM | DevOps | Cloud

How to Introduce Automation to Incident Response with Slack and PagerDuty

Major-incident war rooms are synonymous with stress. Pressure from executives, digging for a needle in a haystack, too much noise—it’s all weight on your hardworking technical teams. Incident responders clearly need a more effective way to collaborate across various technical teams. A method that both minimizes interruptions and keeps stakeholders up to date while ensuring everyone has the right level of context to do their job.

Designing Honeycomb for Our Users

You might have noticed some visual changes happening in Honeycomb lately. Colors, typography, icons, and some features have started to look a bit different. While these changes are just beginning to make their way into the product, we’ve been working on them for some time. Let’s look at what has been going on behind the scenes to make them happen.

Practical CPU time performance tuning for security software: Part 1

Software performance issues come in all shapes and sizes. Therefore, performance tuning includes many aspects and subareas, and has to adopt a broad range of methodologies and techniques. Despite all this, time is one of the most critical measurements of software performance. In this multi-part series, I’ll focus on a few of the time-related aspects of software performance — particularly for security software.

The State of IT Operations Management in 2021

It's all changing! So, business as usual! Working flexibly from home quarantine these past two years has brought a few things into sharper focus. For a start, there's really no such thing as an IT system---there are only Human-IT systems. IT isn't an accessory, it's an integral part of us. Multiple tech cultures are playing a larger role in decision making. Technology decisions are becoming more distributed and more market-driven, from the bottom up rather than exclusively from the top down.

Understanding the DoD's Data Strategy: Part 2

Published in late 2020, the DoD Data Strategy emphasizes the importance of unlocking and operationalizing data-value from across its enterprise to support mission operations and maintain battlefield advantage. The strategy highlights seven goals and objectives that the DoD believes will align the DoD's Data Strategy with industry best practices.

How to Use Observability to Reduce MTTR

When you’re operating a web application, the last thing you want to hear is “the site is down." Regardless of the reason, the fact that it is down is enough to cause anyone responsible for an app to break out into a sweat. As soon as you become aware of an issue, a clock starts ticking — literally, in some cases — to get the issue fixed. Minimizing this time between an issue occurring and its resolution is arguably the number one goal for any operations team.

How Log Analytics Powers Cloud Operations: Three Best Practices for CloudOps Engineers

At the turn of the 20th Century, enterprises shut down their clunky generators and started buying electricity from new utilities such as the Edison Illuminating Company. In doing so, they cut costs, simplified operations, and made profound leaps in productivity. The promise of modern cloud computing invites easy comparisons to those first electric utilities: outsource to them, save money and simplify.

DNS Lookup Explained

The Domain Name System, DNS for short, is one of the most important protocols on the internet, and yet relatively few people understand its purpose. DNS is a protocol which governs how computers exchange data online. Its purpose, simply stated, is to match names with numbers, helping to convert memorable domain names (such as statuscake.com), into an IP address (such as 8.8.8.8 for Google.com) that your browser can use. DNS is essentially a map or a phone book of the internet.

Everything You Should Know About Spam Filters

We are all aware of the spam folder in our email dashboard. This article deals with how spam filters automatically identify and divert spam mail from our inbox to the spam folder. Spam filters are used to screen inbound emails (the emails entering a particular network) and outbound emails (the emails leaving the network). The Internet Service Providers utilize both methods for protecting the receiver and the sender. There are many types of spam filtering solutions available.