Operations | Monitoring | ITSM | DevOps | Cloud

Technology

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

Monitoring a RESTful API on a Headless CMS Using Pingdom

There are plenty of ways to gain insights on website availability and performance, from setting up complex monitoring agents to browsing through real-time logs. Few services are as straightforward and robust as SolarWinds® Pingdom®. Pingdom lets you set up checks for your website including uptime, page speed, and user interactions. It then collates the results in a dashboard for you to visualize.

Anomaly Detection with Machine Learning

Unsupervised machine learning can help you detect anomalies in your data and forecast trends. The Elastic Observability and Security solutions have preconfigured machine learning models right out of the box. In this video you will see how you can get started with creating your own machine learning jobs.

B. Paques & K. Polossat | Combining the Power of InfluxDB & AWS for IoT | InfluxDays EMEA 2021

Data from sensors and systems flows in from a myriad of sources in industrial settings. In this session, learn how to combine the power of InfluxDB with IoT tools and cloud resources from AWS to extract the most value out of your IoT data. We’ll also be sharing some real-world examples of how customers are using these combined solutions to gain a competitive edge.

Grafana Loki: Open Source Log Aggregation Inspired by Prometheus

Logging solutions are a must-have for any company with software systems. They are necessary to monitor your software solution’s health, prevent issues before they happen, and troubleshoot existing problems. The market has many solutions which all focus on different aspects of the logging problem. These solutions include both open source and proprietary software and tools built into cloud provider platforms, and give a variety of different features to meet your specific needs.

Incident Reporting and Crime Detection: The Role of Computer Vision

One of the most important uses of Artificial Intelligence (AI) and Machine Learning (ML) lies in the detection and prevention of criminal activities. Today, companies are widely using AI-powered computer vision devices to predict and detect crimes ranging from frauds and theft to violence and cybercrimes. The developments in computer vision technologies enabled authorities to simplify incident reporting and crime detection more efficiently.

Is "Vendor-Owned" Open Source an Oxymoron?

Open source is eating the world. Companies have realized and embraced that, and ever more companies today are built around a successful open source project. But there’s also a disturbing counter-movement: vendors relicensing popular open source projects to restrict usage. Last week it was Grafana Labs which announced relicensing Grafana, Loki and Tempo, its popular open source monitoring tools, from Apache2.0 to the more restrictive GNU AGPLv3 license.

B. Paques & K. Polossat | Combining the Power of InfluxDB and AWS for IoT | InfluxDays EMEA 2021

Data from sensors and systems flows in from a myriad of sources in industrial settings. In this session, learn how to combine the power of InfluxDB with IoT tools and cloud resources from AWS to extract the most value out of your IoT data. We’ll also be sharing some real-world examples of how customers are using these combined solutions to gain a competitive edge.

Automating load tests for APIs

In most cases, when users start to access and use a new application or a new release, app performs pretty well. As the user base grows and usage increases, the app can outgrow its infrastructure. Users can start experiencing a dip in performance. Latency increases, bandwidth and memory get exhausted quickly, and some code architectures start to fail because they do not scale well with the increased amount of users.

Quick Demo: Leaky App Detection and Remediation

Here's a quick two-minute video demonstrating the power of Ivanti's UEM for Mobile and Mobile Threat Defense and this time detecting a leaky app, specifically the very popular video-sharing TikTok app. Tiktok has had a history of vulnerabilities where the personal information of users was exposed and could have potentially been harvested and leaked out by malicious cyber threat actors.

AI-powered API operations with Apigee

APIs are packages of data and functionality that contain business-critical information. However - as API programs scale - it becomes impossible to individually manage each API. In this video, we demo how Apigee helps simplify API operations and allows you to deliver seamless and connected experiences for your customers.