Lessons from the Recent Facebook iOS SDK Crash

On July 10, popular apps like Spotify and Tinder suffered crashes due to a Facebook SDK issue. OverOps CTO Tal Weiss breaks down a few key learnings development teams can take from this mishap. The recent Facebook iOS SDK crash highlights how a code or environment change by another company (e.g. FB) whose API you rely on can bring down your own app for no fault of your own. In 2020 no app is an island.


BIRCH for Anomaly Detection with InfluxDB

In this tutorial, we’ll use the BIRCH (balanced iterative reducing and clustering using hierarchies) algorithm from scikit-learn with the ADTK (Anomaly Detection Tool Kit) package to detect anomalous CPU behavior. We’ll use the InfluxDB 2.0 Python Client to query our data in InfluxDB 2.0 and return it as a Pandas DataFrame. This tutorial assumes that you have InfluxDB and Telegraf installed and configured on your local machine to gather CPU stats.

super monitoring

Top Seven E-commerce Platforms in 2020

The introduction of e-commerce stores has made life so easy for the people. It does not make a difference if you are the consumer or a seller. For a seller, it provides the opportunity to express the worth of their brand and product(s). For a consumer, it gives them an all in one platform, where they can shop for multiple categories. With this, the most significant ease for both parties is to opt for e-commerce business is that you can do all this without taking a step out of their house.


Semiannual Report of Unplanned Server Downtime | 2020 Q2

No, this isn’t physics news; hold that Nobel Prize. This is about downtime; the dark matter of the web. It’s invisible to most of us, but its gravity has huge effects on commerce, companies, and markets. For everybody who does business online, unplanned website or service outages drag down their revenue, drag down their profits, and drag down their brand.


How Do Chatbots Help With Training Customer Service Teams Remotely

How a support agent is introduced to a new role and how they’re coached until they can get up to speed plays a huge role in their performance throughout their career. In fact, organizations with a strong training and onboarding process improve new hire retention by 82% and productivity by over 70%1. So, it’s vital that you train and onboard your agents well, especially in a remote work environment.

Removing Performance Barriers to Improve Patient Care

Learn how Goliath has helped health systems anticipate EHR performance issues before end-users are impacted, troubleshoot poor performance quickly when issues do arise, and document end-user performance trends to foster collaboration among other IT teams, vendors, management and end-users.

Product Update: Smart Insights on Detected Anomalies

Over time, our customers have adopted and used our tool for detecting anomalies or discovering opportunities. We understand that the journey does not stop there. We still have to find the root cause of the incidents. To help our customers in their endeavor to investigate and reach closure, we now introduce Smart Insights on detected anomalies.


5 Tips to Encourage Effective Teamwork While Remote

As the saying goes, teamwork makes the dreamwork. Building an effective and successful team takes time, and it’s even harder in the case of distributed, remote teams. How can you run effectively a team of persons without, well, meeting in person? With the rise of remote work worldwide, many teams have found themselves juggling projects, deadlines, and goals while spread all over the country, or even all over the world. When the team works like a well-oiled clock, they can achieve big things.


What is Adaptive Threat Protection?

According to McAfee, Adaptive Threat Protection (ATP) is an endpoint security’s optional module that analyzes organizational content and decides action based on file rules, reputation, and reputation thresholds. According to another source, the ATP is a security model that monitors threats, improves cybersecurity risks changes, and evolves to meet the need for security systems that are integrated with IT for continuous deployment, as well as in hybrid environments and the virtual cloud.