Operations | Monitoring | ITSM | DevOps | Cloud

How to monitor your key process with Bleemeo?

This article explains how to monitor service process on your service with Bleemeo using MySQL as an example. This feature is what we called "Key Process Monitoring" and is described by our documentation. Currently, you can monitor any service process automatically discovered by Bleemeo. All metrics are detailed in our documentation, in a few words, metrics related to memory, cpu, network and i/o used by this process are gathered by the agent.

Forbes names CircleCI to America's Best Startup Employers list

Our team at CircleCI has been hard at work this past year. From rolling out major product additions like CircleCI Insights and private orbs, along with educational resources like our developer hub and State of Software Delivery Report that includes the first CI/CD benchmarks for high-performing engineering teams, it seems like every day there is something new to look forward to. All of this has taken place during unprecedented times for everyone across the globe.

Elastic Security 101

Elastic Security empowers analysts to collect data from multiple data source integrations, perform traditional SIEM functions, and take advantage of machine learning-based malware protection on the endpoint. Analysts can filter, group, and visualize data in real-time while performing automated threat detection across various security events and information. In this video, you’ll learn about the components that make up Elastic Security and what those components do to help you protect your data.

How to configure your Endpoint Integration policy in Elastic Security

Elastic Security offers the ability to open and track security issues using cases. Cases created directly in Elastic Security can be sent to external systems like Atlassian’s Jira, including Jira Service Desk, Jira Core, and Jira Software. In this video, you’ll learn how to connect Elastic Security to the Jira Service Desk.

How to get mobile push notifications from any service

Love 'em or hate 'em, mobile push notifications can be very useful. They are not as intrusive as a phone call and have better information formats and control than text messages. Which is why it can be very frustrating to not get push notifications for your favorite product because it doesn't have a mobile app. In this post, we will see how to get mobile push notifications from any service, even if they don't have a mobile app.

Alloy Software Earns Prestigious Stevie Award for Outstanding Customer Success

BLOOMFIELD, N.J., March 11, 2021 (Newswire.com) – Alloy Software, Inc., a leading IT Service Management and IT Asset Management solution provider, announced today that it had been named a Silver Award winner in the 15th annual Stevie Awards for Sales & Customer Service. This award, which the company has received for the second consecutive year, is an undeniable proof of its focus on customer success and uncompromising commitment to the highest customer service standards.

Further Tips on our Database Migration to the Azure Cloud Session at MS Ignite 2021

I was really stoked to deliver a session at Microsoft Ignite with my long-time friend and fellow Head Geek™, Tom LaRock, on the topic of migrating an on-premises SQL Server database to the Azure cloud. You can watch the session on demand here. In addition, Microsoft MVP and SQL Server expert David Klee provides an excellent recap on each of the major elements Tom and I discussed.

What's New with Ivanti Device and Application Control 5.3

What’s New in Ivanti Device & Application Control 5.3 Nearly every company in the world incorporates a Mac endpoint into the organization. Without a device control solution to manage these stations we see a real possibility for data leakage risk. This loss happens mainly because of insider threats. Ivanti Device and Application Control has historically performed well protecting our customers against these types of threats, but the Mac endpoints can still represent a risk.