Operations | Monitoring | ITSM | DevOps | Cloud

Observability vs. Monitoring: What's the Difference?

People often conflate monitoring and observability, and I can’t blame them. Marketers often use the terms interchangeably. However, monitoring and observability are two fundamentally different but related things. Understanding the differences between the two both technically and intuitively can help you become a better network troubleshooter, architect, and manager. After all, like many buzzwords before it, observability is an important concept if you can get past the fluff.

The Role of Threat Hunting in Modern Security

Security and IT teams may be loathe to admit it, but security has historically been mostly a reactive affair. Security engineers monitored for threats and responded when they detected one. They may have also taken steps to harden their systems against breaches, but they didn’t proactively fight the threats themselves. That is changing as more and more teams add threat hunting as one pillar of their cybersecurity strategies.

Industry global survey from Canonical: 85% of enterprises have yet to cross the chasm to full Kubernetes and Cloud Native adoption

London, UK, June 29, 2021 – Despite high adoption rates of cloud native technologies in recent years, enterprises have yet to cross the chasm to full adoption, but they’re quickly moving in that direction, according to initial results of a first-of-its kind survey released today by Canonical, the publishers of Ubuntu.

TL;DR InfluxDB Tech Tips - Using and Understanding the InfluxDB Cloud Usage Template

So you’re using InfluxDB Cloud, and you’re writing millions of metrics to your account. Whether you’re building an IoT application on top of InfluxDB or monitoring your production environment with InfluxDB, your time series operations are finally running smoothly. You want to keep it that way. You might be a Free Plan Cloud user or a Usage-Based Plan user, but either way, you need visibility into your instance size to manage resources and costs.

Superfast Troubleshooting of Network User Performance Issues

In our first edition of our Work From Anywhere series, we look at the value of troubleshooting end-user hardware and application issues. Exploring the granular detail that the solution provides, we look at how understanding information around the end-users hardware can help reduce mean-time-to-resolution and increasing productivity of service/support desk teams. #TeneoGrp #WorkfromAnywhere

Why companies need URL filtering for enhanced cloud protection

The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with the accelerated adoption of cloud applications in the workplace—has created an urgent need to scrutinize and control the use of these online resources to prevent data theft, exposure, and loss. This blog elaborates on how a robust URL filtering solution can help manage what cloud services your employees use and how they interact with these services.

5 Tips for SaMD Development

Software as a Medical Device (SaMD) is a booming tech segment expected to skyrocket in the near future. Experts expect the global SaMD market to grow from $596.3 million to over $7.36 billion between 2021 and 2027, an astonishing 38.4% compound annual growth rate. Software developers understandably want in on the action-not only to profit, but to provide solutions that save lives and improve the quality of life for millions of healthcare consumers. But even software developers who have worked in regulated industries have not necessarily prepared themselves for the unique challenges of developing SaMD.

Secure Software Development: How to Check Your Code

In May of 2021, a cybercrime organization called DarkSide successfully locked operators of the Colonial Pipeline, which supplies the east coast with 45% of its petroleum fuel, out of their own software system with a type of malware called "ransomware." True to its name, ransomware returns access to your software (in theory) if you pay a ransom. The result-fuel supplies collapsed across the eastern United States, with gas lines, price spikes, and panic. People began hoarding gasoline in states not even served by the Colonial Pipeline. The US government passed emergency legislation. Even DarkSide seemed shocked at the impact of their cyberattack.