Operations | Monitoring | ITSM | DevOps | Cloud

How to Get Full-Stack Visibility for Your Java Applications - A Comprehensive Guide

Just a quick blog to let you know our new whitepaper “How to Get Full-Stack Visibility for Your Java Applications” is now available, download it here: How to Get Full-Stack Visibility for Your Java Applications | White Paper (eginnovations.com).

Troubleshooting a SaaS performance problem with Kentik

Discover how Kentik’s network observability platform aids in troubleshooting SaaS performance problems, offering a detailed view of packet loss, latency, jitter, DNS resolution time, and more. Phil Gervasi explains how to use Kentik’s synthetic testing and State of the Internet service to monitor popular SaaS providers like Microsoft 365.

DoD Compliance + DoD Configuration Management: How to Get Compliant with Less Effort

DoD compliance is a set of rules and expectations for IT cybersecurity in organizations that do business with the US Department of Defense (DoD). Discover everything you need to know about DoD compliance and DoD configuration management in this blog – plus how to manage DoD compliance better and faster with Puppet.

Architecting Cloud Instrumentation

Architecting cloud instrumentation to secure a complex and diverse enterprise infrastructure is no small feat. Picture this: you have hundreds of virtual machines, some with specialized purposes and tailor-made configurations, thousands of containers with different images, a plethora of exposed endpoints, s3 buckets with both public and private access policies, backend databases that need to be accessed through secure internet gateways, etc.

Debunking Misconceptions: Amazon Prime Video's Approach to Microservices and Serverless

This is the second blog in our deep dive series on serverless architectures. In the first installment, we explored the benefits and trade-offs of microservices and serverless architectures, highlighting the case of Amazon Prime Video's architectural redesign for cost optimization.

Docker Container Lifecycle Management

Managing an application's dependencies and tech stack across numerous cloud and development environments is a regular difficulty for DevOps teams. Regardless of the underlying platform it uses, it must maintain the application's stability and functionality as part of its regular duties. However, one possible solution to this problem is to create an OS image that already contains the required libraries and configurations needed to run the application.

Observability vs. Monitoring: Understanding the Differences

This post was written by Siddhant Varma. Scroll down to read the author’s bio. Software development isn’t just about building and deploying software. There’s a wide range of operations and activities you need to tackle even after you’ve successfully deployed it. The two most common are observability and monitoring. While they’re similar in a lot of ways, it’s important to understand that they are not exactly the same, and each has its own purpose.

Critical Incident Management - Roles and Responsibilities

Critical Incident Management is designed to handle disruptive and unexpected events that threaten to harm an organization or its stakeholders. These incidents range from cyber attacks and system failures to natural disasters and global pandemics. The importance of critical incident management cannot be overstated, as it is a pivotal process that maintains business continuity and ensures smooth operations despite adversities.

How to Measure Bandwidth: Techniques for Precise Network Measurement

For businesses managing large enterprise networks, network performance is critical for productivity and seamless communication. To ensure optimal operations and user experience, accurately measuring your network's bandwidth is key. In this blog post, we'll explore techniques and tools tailored for businesses to achieve precise network bandwidth measurements. Measuring bandwidth goes beyond assessing Internet speed.