Operations | Monitoring | ITSM | DevOps | Cloud

%term

Business Chat Apps in 2018: Top Players and Adoption Plans

Even though email is ubiquitous in the workplace, and is undoubtedly a useful communication tool, using it can also pose some challenges. Email is prone to spam, it can be unnecessarily slow, and it’s easy for email recipients to be dropped from threads or excluded from conversations entirely — which can lead to missed connections and frustration.

NiCE VMware MP 5.00 Preview Release

Be the first to get a complete picture of the health and performance of your business critical VMware environment using the new NiCE VMware Management Pack. The NiCE VMware Management Pack delivers first-rate monitoring for business critical, highly dynamical virtualized environments. Leverage your existing investment and reduce costs, save time and build efficiencies now.

Key metrics for monitoring Tomcat

Apache Tomcat is a server for Java-based web applications, developed by the Apache Software Foundation. The Tomcat project’s source was originally created by Sun Microsystems and donated to the foundation in 1999. Tomcat is one of the more popular server implementations for Java web applications and runs in a Java Virtual Machine (JVM).

Analyzing Tomcat logs and metrics with Datadog

In Part 2 of this series, we showed you how to collect key Tomcat performance metrics and logs with open source tools. These tools are useful for quickly viewing health and performance data from Tomcat, but don’t provide much context for how those metrics and logs relate to other applications or systems within your infrastructure.

Introducing Sysdig Secure 2.2: Kubernetes auditing, compliance, and access control.

Over the past four years we’ve helped hundreds of organizations run reliable, secure, and compliant Kubernetes and Openshift clusters. Some of the key themes we’ve seen from organizations that have successfully grown their Kubernetes footprint are: they have immaculate labeling, understand how to leverage internal Kubernetes features to harden their platform, and understand what developers need access to and manage it with RBAC and namespaces.

Part I: Anomaly Detection in monitoring: what can we really do?

In recent years we have frequently found the term anomaly detection in monitoring. In fact, some monitoring tools have introduced in their features the customized application of anomaly detection algorithms and some companies offer anomaly detection from data collected by monitoring tools.