Operations | Monitoring | ITSM | DevOps | Cloud

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a standard baseline of their behavior through machine learning techniques. By using that information, you can identify anomalies and protect your network from cyberattacks.

Monitor Oracle Cloud logs with Datadog

Oracle Cloud Infrastructure (OCI) is an infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) cloud used by enterprise-scale companies. With a full suite of services for hosting, storage, networking and more, OCI lets customers deliver, maintain, and scale secure, highly available applications. But as your cloud infrastructure becomes more complex, monitoring the full scope of activity across your services and accounts can be increasingly difficult.

Expand your monitoring reach with Datadog's enhanced Azure integration

Microsoft Azure is one of the fastest-growing cloud platforms in the world, offering a wide range of products for deployment, testing, and cloud storage. Datadog is committed to maintaining an extensible monitoring solution for Azure’s growing ecosystem that doesn’t require lots of manual configuration. That’s why we are excited to announce the following enhancements to Datadog’s Azure integration.

6 Myths of DevOps

Have you ever heard someone say "no one has the same definition of DevOps." While the definitions of DevOps principles and DevOps practices are pretty clear, there is a lot of myths and subjectivity in how the principles play out in the real world. In this episode of Dissecting DevOps, Dave and Chris debunk six common DevOps Myths. Dave McAllister and Chris Riley are DevOps Advocates at Splunk. Follow them on Twitter at @dwmcallister​ and @hoardinginfo.