Operations | Monitoring | ITSM | DevOps | Cloud

Technology

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

Splunk Cloud Monitoring Console on Mobile (in 60s)

The Cloud Monitoring Console (CMC) lets Splunk Cloud administrators view information about the status and performance of their Splunk Cloud deployment at a glance. On Splunk Mobile, you can access many of the same CMC dashboards as on Splunk Web. Whether you’re interested about your users, indexes, searches, or ingest volume, you can access this data on the go or at the comfort of your own couch.

Remote Debugging & Device Observability: How Memfault & Diamond Kinetics fix firmware bugs together

With their original products in the market, Diamond Kinetics relied on customer reports with little detail to fix issues in the field. They soon realized that this process of “psychic debugging” sensors in the wild was not enough and even delayed release dates as they tried perfecting each device before shipment. When they decided to launch a new generation of their product in 2020, they knew they needed a more efficient process.

5 Most Common API Errors and How to Fix Them

As software got more complex, more and more software projects rely on API integrations to run. Some of the most common API use cases involve pulling in external data that’s crucial to the function of your application. This includes weather data, financial data, or even syncing with another service your customer wants to share data with. However, the risk with API development lies in the interaction with code you didn’t write—and usually cannot see—that needs debugging.

Detecting unusual network activity with Elastic Security and machine learning

As we’ve shown in a previous blog, search-based detection rules and Elastic’s machine learning-based anomaly detection can be a powerful way to identify rare and unusual activity in cloud API logs. Now, as of Elastic Security 7.13, we’ve introduced a new set of unsupervised machine learning jobs for network data, and accompanying alert rules, several of which look for geographic anomalies.

Announcing the GA of the LogDNA Configuration API and LogDNA Terraform Provider

We’re excited to announce that our Configuration API and Terraform Provider are now generally available for all LogDNA customers. We received tremendous feedback from our public beta release and, based on that feedback, we are enabling several new features with the GA release that allow for more programmatic workflows with LogDNA. First, we are enabling Preset Alerts as a new resource that can be configured with the configuration API as well as within Terraform.

7 paw-some traits you didn't know about Freddy AI

Watch this video and find out the seven ways in which Freddy AI helps your IT agents work smarter and faster with intelligent recommendations. Does your organization have someone like Freddy AI to empower your support team and maximize their productivity? No? Then allow us to tell you a little bit something about our enterprise-grade AI engine, Freddy AI! Empower your agents with intelligent recommendations, and free up their valuable time.

AI in Predictive Maintenance and Forecasting

Industry 4.0 is taking every industry by storm with unprecedented advancement with innovative technology solutions. Its key technologies such as automation, AI, ML, Data Analytics and IoT enables industries to drive business operations with automated data-driven intelligence. Integrating the physical and digital systems, the manufacturing industry is increasingly adopting intelligent manufacturing in this Industry 4.0 era.

Defending the Internet of Things from hackers and viruses

The 2010 Stuxnet malicious software attack on a uranium enrichment plant in Iran had all the twists and turns of a spy thriller. The plant was air gapped (not connected to the internet) so it couldn’t be targeted directly by an outsider. Instead, the attackers infected five of the plant’s partner organizations, hoping that an engineer from one of them would unknowingly introduce the malware to the network via a thumb drive.