Operations | Monitoring | ITSM | DevOps | Cloud

One Year of Automation, 100K Staff Hours Saved: A Telco Giant's Big Gain

A leading mobile communications company, based in South Africa, had big plans for its growth in the upcoming months. To ensure customer loyalty as they continued to grow their subscribers, they had to make sure their networks evolved while maintaining performance. That meant the organization’s IT and network teams needed a way to support business goals for growth with their existing capacity.

Using DX NetOps Dashboards To Harness the Power of AppNeta Data

In today’s dynamic, complex network environments, there’s a big difference between having monitoring data and having intelligence. To troubleshoot issues quickly, it’s vital to have timely, intuitive visibility into the metrics that matter. With the combination of AppNeta and DX NetOps, teams can gain the insights they need to efficiently and intelligently manage their environments.

Dual Subsea Cable Cuts Disrupt African Internet

On Sunday, August 6, an undersea landslide in one of the world’s longest submarine canyons knocked out two of the most important submarine cables serving the African internet. The loss of these cables knocked out international internet bandwidth along the west coast of Africa. In this blog post, we review some history of the impact of undersea landslides on submarine cables and use some of Kentik’s unique data sets to explore the impacts of these cable breaks.

Sentry Profiling now supports Browser Javascript, React Native, and Ruby

Profiling is an essential component of a developer’s toolkit for identifying and addressing the thorniest performance bottlenecks. Whether you’re a backend developer looking to cut down cloud infrastructure costs, a frontend developer trying to speed up page load times, or a mobile app developer working to ensure smooth scrolling for users, Sentry Profiling pinpoints hot code paths in your production environment, so you can identify and optimize the slowest parts of your code.

How to Effortlessly Deploy Cribl Edge on Windows, Linux, and Kubernetes

Collecting and processing logs, metrics, and application data from endpoints have caused many ITOps and SecOps engineers to go gray sooner than they would have liked. Delivering observability data to its proper destination from Linux and Windows machines, apps, or microservices is way more difficult than it needs to be. We created Cribl Edge to save the rest of that beautiful head of hair of yours.

How Qovery Could Have Saved Time and Effort in Compare the Market's EKS Migration

During the AWS summit in London, Renee Hunt, the CTO of Compare the Market, shared their journey of migrating from EC2 to EKS and the obstacles they faced along the way. As I listened to their story, I couldn't help but think about how Qovery could have greatly streamlined its migration process; here is my take on the subject.

The ABC of Warranty Management

Efficient Warranty Management is a critical aspect of ensuring smooth IT operations and maximizing the lifespan of assets. Handling warranties for various sets of equipment or devices demands for a systematic and well-organized approach to make sure nothing is missed or forgotten. But don’t worry, implementing InvGate Insight as your IT Asset Management tool can help you to seamlessly track and manage warranties, alerting you well in advance of expiration dates, and automating critical tasks.

Maximize Long-Term Savings From Cloud Providers with Densify

One of the first considerations for FinOps teams trying to lower their public cloud spend is investing in long-term savings vehicles available from their Cloud Service Provider. These programs can provide customers with upwards of 72% savings off on-demand prices, in return for a 1-to-3-year usage commitment, so it’s pretty common that we see them in use by our customers.

Introducing the Splunk App for Behavioral Profiling

Splunk is the platform for a million use cases, used to investigate operational data across security, observability, fraud, business intelligence and many other domains. But, in my time at Splunk, I’ve come to realize that all of our customers face challenges that stem from the same core problem: Within exploding data volumes, finding the anomalously behaving entities that are most threatening to the resilience of their organization.