Operations | Monitoring | ITSM | DevOps | Cloud

%term

How to Create a Changelog with Uptime.com

A changelog is a chronological list of important changes users can reference as an application or service expands. Logs explain what features are added, which are changed or adjusted and what those changes do. They sometimes provide explanation or instruction. Logs are useful for preparing your user base for scheduled downtime, and giving your most loyal users something to look forward to.

How to Monitor AWS Lambda with CloudWatch

Since Amazon released Lambda in late 2014, the notion of serverless applications and function-as-a-service has steadily gained steam. Being able to focus on application code and simplifying infrastructure management is alluring, but traditional monitoring methods are no longer applicable. With less visibility, it becomes even more important to take advantage of the available monitoring methods. In this post, we discuss those monitoring methods, CloudWatch Metrics and CloudWatch Logs.

Product management tips for high-growth environments: How to tame fires

As a product manager in a high-growth environment, I have come to accept that at any given time, something is on fire. Or, at the very least, smoldering. Five or so years ago, the team at Raygun, was just five people. Now, we’re building software products for businesses like Nordstrom. With this growth also comes many learning opportunities for a product manager like myself.

Conquer it with correlation-Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s network activity or siphoning off sensitive data, as opposed to openly damaging or locking down network resources.