Operations | Monitoring | ITSM | DevOps | Cloud

5 Most Common API Errors and How to Fix Them

As software got more complex, more and more software projects rely on API integrations to run. Some of the most common API use cases involve pulling in external data that’s crucial to the function of your application. This includes weather data, financial data, or even syncing with another service your customer wants to share data with. However, the risk with API development lies in the interaction with code you didn’t write—and usually cannot see—that needs debugging.

7 paw-some traits you didn't know about Freddy AI

Watch this video and find out the seven ways in which Freddy AI helps your IT agents work smarter and faster with intelligent recommendations. Does your organization have someone like Freddy AI to empower your support team and maximize their productivity? No? Then allow us to tell you a little bit something about our enterprise-grade AI engine, Freddy AI! Empower your agents with intelligent recommendations, and free up their valuable time.

Rollbar Tip of the Day: Linking to AWS CloudWatch logs from Rollbar

Learn how to link to log data in AWS CloudWatch from Rollbar to help you quickly understand the root cause of an error. Rollbar is the leading continuous code improvement platform that proactively discovers, predicts, and remediates errors with real-time AI-assisted workflows. With Rollbar, developers continually improve their code and constantly innovate rather than spending time monitoring, investigating, and debugging.

Dun & Bradstreet Reduces Mean Time to Resolution with xMatters

How does a business continue to improve its incident management processes, when it’s already using some of the best tools on the market? Join Nick Romanelli, Site Reliability Engineering Lead at Dun & Bradstreet, and Zoe Na, Customer Success Manager at xMatters, as they discuss how Dun & Bradstreet has been able to use xMatters to reduce MTTR and streamline major incident management. With their innovative use of Flow Designer, Dun & Bradstreet have created unique workflows that you’re going to want to know about!

A Sneak Peek at the "Calico Certified Operator: AWS Expert" Course

Recently, we released our new “Calico Certified Operator: AWS Expert” course. You can read more about why we created this course and how it can benefit your organization in the introductory blog post. This blog post is different; it’s an opportunity for you, the potential learner, to get a glimpse of just a few interesting parts of the course. You won’t learn all the answers here, but you’ll learn some of the questions!

What Is an Intrusion Detection System (IDS)?

More personal and proprietary data is available online than ever before—and many malicious actors want to get ahold of this valuable information. Using an intrusion detection system (IDS) is essential to the protection of your network and on-premises devices. Intrusion detection systems are designed to identify suspicious and malicious activity through network traffic, and an intrusion detection system (IDS) enables you to discover whether your network is being attacked.

How to Use Cargo Repositories in Artifactory

For five years running, Rust has taken the top spot in Stackoverflow’s survey of most loved programming languages. Seen by many as the next step after C/C++, the language is fast becoming embraced by embedded device developers and as a robust system for IoT. At JFrog, we took notice and are eager to welcome Rust developers to the empowerment of robust binaries management and how it contributes to continuous integration.

JFrog detects malicious PyPI packages stealing credit cards and injecting code

Software package repositories are becoming a popular target for supply chain attacks. Recently, there has been news about malware attacks on popular repositories like npm, PyPI, and RubyGems. Developers are blindly trusting repositories and installing packages from these sources, assuming they are secure.

Tale of the Beagle (Or It Doesn't Scale-Except When It Does)

If there’s one thing folks working in internet services love saying, it’s: "Yeah, sure, but that won’t scale." It’s an easy complaint to make, but in this post, we’ll walk through building a service using an approach that doesn’t scale in order to learn more about the problem. (And in the process, discovering that it actually did scale much longer than one would expect.)