Operations | Monitoring | ITSM | DevOps | Cloud

What is Docker Monitoring?

We have come a long way in the world of computing. From having computers that fill up entire rooms or buildings while performing relatively basic actions to having complex machines that literally fit in our pockets and palms, this advancement has been nothing short of breathless. With an emphasis placed on speed and efficiency, computers and the applications running on these computers have been tailored to ensure optimal use of resources, be these resources hardware or software resources.

Mattermost joins Red Hat, GitHub and Google in the CVE Program to maintain an international, open data registry of security vulnerabilities

Mattermost is joining Red Hat, Google, and GitHub and over 130 other leading technology organizations authorized to be a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA) by the CVE Program. The world’s most privacy-conscious enterprises and governments rely on Mattermost’s self-hosted, open source collaboration platform to keep their most vital communications safe and sovereign.

Three Ways Agencies Can Improve Cloud Security and Performance

The Federal Cloud Computing Strategy (FCCS) makes it clear government agencies have significant responsibilities for protecting cloud-hosted data. The FCCS states the need for agencies to develop their own governance models and create service level agreements to ensure they’ll have continuous access to log data and prompt notification from their cloud service provider if there’s a breach.

Keeping Clean with CloudZero Dashboard: Our Latest Updates

Here at CloudZero, we’ve made some updates to our dashboard that we’re excited to share with you! I actually prefer this original definition. When you hear the word dashboard, if you’re not thinking about software, you’re probably picturing the place in a car where you have various dials and readouts for safe operation of the vehicle. But did you know what the term dashboard predates cars?

Enriching data with GeoIPs from internal, private IP addresses

For public IPs, it is possible to create tables that will specify which city specific ranges of IPs belong to. However, a big portion of the internet is different. There are company private networks with IP addresses of the form 10.0.0.0/8, 172.16.0.0/12 or 192.168.0.0/16 scattered in every country in the world. These IP addresses tend to have no real information for the geographic locations.

Correlation Analysis: A Natural Next Step for Anomaly Detection

Over the last decade, data collection has become a commodity. Consequently, there has been a tremendous deluge of data in every area of industry. This trend is captured by recent research, which points to growing volume of raw data and growth of market segments fueled by that data growth.