May 2021


Best practices for modern frontend monitoring

Single-page applications (SPAs) provide some significant benefits over multiple-page apps. For JavaScript developers using frameworks like React or Vue, they offer flexibility in moving application logic to the frontend, reducing the need for complex backend operations. For users, SPAs can provide a smooth experience with a highly interactive UI and fewer page loads. But, with increased sophistication, there are some tradeoffs.


What is FIPS 140-3? The Critical Updates You Must Be Aware Of

FIPS 140-3 is the long-awaited update to FIPS 104-2 which was established on May 25, 2001. This updated validation process is finally capable of addressing the cryptographic modules that have evolved since 2001. This validation process includes testing with respect to certain standards or protocols and then the issuing of an official certificate from NIST (National Institute of Standards and Technology) confirming compliance with FIPS 140-3.


What is inherent risk? Your sensitive data could be In danger

Inherent risks are the cyber risks and vulnerabilities within an organization before security measures are implemented. In contrast, residual risk is calculated after cybersecurity protections have been put in place to protect against all of these inherent risks; its calculation includes every possible attack vector that could affect a system or data.


Weekly Cyber Security News 07/05/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. With images of all the best spy movies out there, you just can’t help enjoy this one. While its not possible to control the driving of the car, flinging the car doors open at speed might have an interesting effect on the occupants (and allow our spy to gain access of course while swinging from the drone).


Product Update: Address Net Model for Address Verification

Complex address systems and its verification have continued to be a big riddle for technology companies. Currently address verification is done manually by matching the address mentioned in the identity document with the address filled in any kind of application form filled by the customer.

Your thing is Discovery, Discovery: AWS

We will use the powerful Discovery tool to simply configure an AWS (Amazon Web Services) environment, going through all the steps to create a task with the wizard. We will see all agents created thanks to this discovery task, as well as its modules. To finish off, we will focus on Discovery Cloud general view, where we will see expense analysis graphs and a map wth the number of instances per region.

Webinar: Boost up your serverless applications with Amazon EventBridge

EventBridge makes it easy to build event-driven architectures using data from your own applications, Software-as-a-Service (SaaS) applications, and AWS services. In this webinar, AWS Solution Architect Sarah Fallah-Adl, and Lumigo's, Lead Solution Engineer, Timi Petrov, present how to remove the friction of writing "point-to-point" integrations with Amazon EventBridge. They will then share best practices for working with EventBridge and serverless apps.

Top SRE Toolchain Used By Site Reliability Engineers

We have compiled a list of the most popular and sought out tools (some you may have heard of) that SREs need in their toolkit - at every phase of a production system to keep up with SRE best practices Site reliability engineering (SRE) practices help organizations by ensuring smooth functioning of their deliverables with utmost reliability and resilience. These can be achieved by a set of well-defined tools that are deployed at every phase of the production system to keep up with SRE best practices.


Failover Conf 2021 Wrap-Up

That’s a wrap! Gremlin hosted Failover Conf 2: Fail Smarter on April 27, 2021. In attendance were over 500 SREs, developers, sales engineers, product managers, DevOps experts, C-level execs, and other reliability pros from around the globe! This year’s conference included discussions around the future of DevOps, strategies for building reliable teams, analyzing human error to create better systems, and more.


4 Reasons Cloud-Native Organizations Benefit from Cloud-Native Logging and SIEM

For cloud-native organizations — those begun in the past decade or so — obtaining critical services from other cloud-native companies makes sense. After all, the whole point of being cloud native is to avoid physical infrastructure wherever possible. You want to focus on your business, not managing the systems and infrastructures that support it. That strategy applies to your logging and security information and event management (SIEM) solution, as well.


SRE fundamentals 2021: SLIs vs. SLAs. vs SLOs

A big part of ensuring the availability of your applications is establishing and monitoring service-level metrics—something that our Site Reliability Engineering (SRE) team does every day here at Google Cloud. The end goal of our SRE principles is to improve services and in turn the user experience. The concept of SRE starts with the idea that metrics should be closely tied to business objectives. In addition to business-level SLAs, we also use SLOs and SLIs in SRE planning and practice.


Understanding The AWS Shared Security Model

Whether you are new to AWS or have been to every re:Invent since 2012 you may have questions about cloud security and how it impacts your valuable technology and data. In particular, you might be wondering where AWS’s security responsibilities end and where yours begin? Which parts of the cloud can you rely on Amazon’s security team and technology to keep safe and which parts must you take care of?


SuiteCRM: PHAR deserialization vulnerability to code execution

SuiteCRM is a free and open source Customer Relationship Management application for servers. This advisory details a PHAR deserialization vulnerability that exists in SuiteCRM which could be leveraged by an authenticated administrator to execute commands on the underlying operating system. This issue has been fixed in release 7.11.19. In PHP, PHAR (PHP Archive) files can be used to package PHP applications and PHP libraries into one archive file.

request metrics

Using First Contentful Paint - FCP

First Contentful Paint, or FCP, measures the time take to render the first element of a webpage. It’s a modern, user-centric measurement of how fast users see a response from your website. Here’s everything you need to know about the metric and how to use it. FCP is one of the Core Web Vital performance metrics that measure user’s perceived performance of websites. These metrics are incredibly important to delivering fast user experiences, and avoiding SEO performance penalties.


Ivanti Neurons for Spend Intelligence: SaaS Management

You’re probably familiar with the many benefits of licensing software using a SaaS (Software-as-a-Service) model. The most frequently touted benefit is that you pay only for what you use when you use it. Additionally, you don’t have to worry about upgrading, or server maintenance, or security. That’s all taken care of. However, even using a SaaS model, you still need to monitor and manage costs, which can be a challenge if you are working with several suppliers.


Key benefits of networked testing on real devices

Fast product iteration yields low time-to-market, rapid response to user needs, and faster validation of new features. However, it also leads to tight testing windows. Automating software testing may be an instinctual response to demands for speed, yet striking a balance between automated and manual testing allows for greater control over the end-user experience.


Diagnosing Database Performance Problems When You Aren't a Database Administrator

Deep specialization of IT administrators is a luxury only the largest organizations can typically afford. Smaller organizations rely on IT administrators with a more generalist skill set because they are—by necessity—responsible for a wide array of different technologies, and there simply isn’t time to specialize in the intricacies for any one of them. Yet modern IT is intricate.


Improve Your Customer Operations To Increase Your NPS

If you want to improve your customer operations, your attention must turn to your NPS score. The Net Promoter Score for your organization should never be overlooked. This can provide you with vital insights into how your services are perceived by customers. Those actively attempting to improve their NPS scores should focus on improving customer operations. Those running customer-centric businesses recognize the undeniable importance of operating around their needs.


4 Key Characteristics of Modern Monitoring

Our previous post, “Monitoring for Success: What All SREs Need to Know,” discusses how today’s complex IT environments — virtualization, cloud computing, continuous delivery and integration — coupled with pressures to deploy faster while meeting demands for “always on” customer expectations – have placed greater strains on monitoring teams.


OnPage Recognized in Gartner's Latest Report on CC&C Systems

Gartner’s latest “Quick Answer” report discusses how clinical communication and collaboration (CC&C) systems can enhance pandemic-related provider and patient engagement. Modern healthcare delivery organizations (HDO) invest in CC&C solutions to simplify communication among care teams consisting of physicians, nurses and critical support personnel. The OnPage team is pleased to be recognized as a vendor in Gartner’s latest CC&C publication.

Digital Experience Monitoring: Evolution of End User Experience Management

End-User Experience Management (EUEM) is evolving post-Covid-19. Businesses are now moving towards phase 4 of the Covid-19 timeline. This includes understanding remote worker behavior and preparing for the new normal. Technology and IT leaders are increasingly using data to measure the employee experience. According to Forrester, 64% of technology leaders will invest in data and analytics technology to improve remote worker experience.

How to secure your CI pipeline

Many enterprises still struggle to get security right. To protect their business, it is critical they focus on security during the entire infrastructure and application lifecycle, including continuous integration (CI). Developers are becoming more autonomous as they transition to a DevOps way of working, with more people requiring access to production systems.

The maturity of public transport APIs 2019

Take a view into the universe of realtime transport APIs in 2019. How do they stack up against realtime expectations? The report looks at ten cities across the globe, scoring and ranking them on ten indicators of maturity. Learn what the pioneers are doing, what those just starting on their Realtime API journeys can do better, and find actionable recommendations for your own Realtime API program.

Mobile Gaming: how to give customers the optimum online experience

Online gamers have the most demanding realtime expectations. Mobile gaming now the largest sector of app store purchases, accounting for 42% of a $109 billion marketplace. It's vital that game developers offer a level of mobile performance that delivers an optimum realtime experience for every user. This white paper highlights some of the UX issues that can undermine your company's ability to do this effectively.

5 Elements of Workplace Safety from Healthcare Leaders

As COVID-19 vaccinations continue to roll out, organizations across industries prepare to return employees to the workplace. It’s a journey fraught with anxieties, uncertainty, and unknowns. In a recent poll of Appian webinar participants, a mere 17% reported that their companies feel fully prepared to reopen facilities, and only 51% said they felt even “somewhat” prepared. The good news is that a safe return to the workplace is not uncharted territory.


SLA Compliance: The Service Desk & ITSM Metric Explained

IT solutions are either utilized as a service or procured from third-party vendors by organizations of all types and sizes. This enables organizations to gain access to reliable IT technologies without having to internally build, operate, or manage the underlying systems. As a result of this, both the organization and the solutions provider sign a service-level agreement (SLA), which commits the vendor to deliver services that meet the established performance requirements.


Mastercard Reduces MTTR and Improves Query Processing with Unravel Data

Mastercard is one of the world’s top payment processing platforms, with more than 700 million cards in use worldwide. In the US, nearly 40% of American adults hold a Mastercard-branded card. And the company is going from strength to strength; despite a dip in valuation of more than a third when the pandemic hit, the company has doubled in value three times in the last nine years, recently reaching a market capitalization of more than $350B dollars.


Unravel Data Featured in CRN's 2021 Big Data 100 List

In a press release delivered today, Unravel Data announced its appearance on CRN’s Big Data 100 list for 2021. Unravel’s entry appears in the Data Management and Integration category. Also featured in this category are other rising stars such as Confluent, Fivetran, Immuta, and Okera, all of whom spoke at new industry conference DataOps Unleashed, held in March.


Introducing Browser Logger - Unlocking the Power of Frontend Logs

Modern web applications are more reliant on the frontend than ever before. While there are many benefits to this approach, one downside is that developers can lose visibility into issues when things go wrong. When the application experience is degraded, engineers are left waiting for users to report issues and share browser logs. Otherwise, they might be left in the dark and unaware that any issues exist in the first place.


Clearing IT bottlenecks with citizen developers

“I can clear your IT bottlenecks” is all it took. When my colleague approached me and asked if my organization would be interested in participating in the citizen developer pilot project, I signed on right away. After all, who wouldn’t want to clear their backlog? [Learn more about ServiceNow citizen developers at Knowledge 2021.] As the director of IT customer success, I lead teams that help deliver transformation initiatives at scale. Fulfilling business needs is also my priority.


"Reverse ETL" with Keboola

TL;DR: Yes, you can do it. And no, you don’t need a separate tool for it. “Reverse ETL” is a fairly recent addition to the data engineer’s dictionary. While you can read articles upon articles about it (there’s a pretty good ‘primer’ in the Memory Leak blog), it can be summarized as being the art and science of taking data from your data warehouse and sending it somewhere other than BI - generally into other tools and systems where it becomes operational.


Quantifying the value of multi-cloud deployment strategies with CDP Public Cloud

In this article, I will be focusing on the contribution that a multi-cloud strategy has towards these value drivers, and address a question that I regularly get from clients: Is there a quantifiable benefit to a multi-cloud deployment? That question is typically being asked when I explain the ability to leverage container technology that offers a consistent deployment environment across multiple clouds and form factors (public, private, or hybrid cloud).


Website downtime: the cost, the impact, and the solution

Unplanned downtime is the hardest situation to prepare for as it could happen at any time. The only way that you can plan for that eventuality is by having a website monitoring solution in place that can alert you as soon as your website goes down. If you’re the first to know, then it makes it easier for you to do something about it before your customers start reacting, especially on social media.


18 Customer satisfaction survey questions you should be asking (plus a downloadable template!)

Customer Satisfaction Score (CSAT) is one of the most widely used customer service metrics. Companies send short CSAT surveys after a support interaction—but these are tied to your customers’ most recent interaction with your company and can be skewed if they had an issue or poor experience. And because CSAT surveys are kept short to make it easy for customers to respond, they don’t tell you why customers feel the way they do.


New Features: Heroku Errors and a Magic Dashboard

We have been collecting Logplex data for our Heroku customers for a while now. With that data we create Magic Dashboards for Postgres and Redis integrations, and track Heroku Host Metrics. Starting today, we also extract error incidents from Heroku Logplex data and provide you with a magic dashboard for Heroku status codes.


Ritual's formula for a 360 view of customer acquisition data

At Ritual, we’ve re-imagined multivitamins — bringing high-quality nutrients to our customers and helping them make healthy habits a daily ritual. Those core beliefs and our use of data have helped us thrive in a crowded market. In a recent webinar, I joined my colleague Kira Furuichi, Manager of Data & Analytics, to share how Looker has supported customer acquisition and provided cross-team perspectives and insights that have helped us get ahead.


Using Distributed Tracing in Microservices Architecture

With the rise of microservices based cloud applications & its corresponding complexities, the need for observability is greater than ever. This blog looks into the what-why of distributed tracing along with few best practices to adopt for the same in microservices architecture. Distributed tracing for Microservices architecture is an emerging concept that is gaining momentum across internet-based business organizations.


Unravel the hidden mysteries of your cluster with the new Kubernetes Dashboards

One of the greatest challenges you may face when creating Kubernetes dashboards is getting the full picture of your cluster. Kubernetes is the de-facto standard for container orchestration, but it also has a very steep learning curve. We, at Sysdig, use Kubernetes ourselves, and also help hundreds of customers dealing with their clusters every day. We are happy to share all that expertise with you in the Kubernetes Dashboards.


Top 10 DevSecOps best practices for building secure software

Ready to transition your organization to DevSecOps but unsure of where to begin? Get started with our top 10 DevSecOps best practices. By: Sneha Kokil, associate principal consultant, and Arvind Balaji, associate principal consultant, at Synopsys. While the software industry celebrates a decade of DevOps, there’s an increasing drive toward adopting DevSecOps and making security a part of software from early on.

Ask SME Anything: What are the major transformations behind SASE architecture?

In this episode of Ask SME (Subject Matter Expert) Anything, Netskope’s Michael Ferguson explains the origin of SASE and how it is changing the way we look at data and cloud security. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Loadero quickstart tutorial. Part 1. Creating an account and a first project.

Are you ready to start creating cloud-hosted tests for your web application? This video shows how to set up a new account and a project to handle your performance and load tests. Follow the steps described and you will be ready to start working on your first test in a matter of minutes.

Level Up Test Automation With Zephyr Scale

With the ever-increasing demand to deploy high quality and reliable software faster, automation has become an integral part of modern software development. By seamlessly integrating your existing test automation efforts with Zephyr Scale, you can benefit from faster releases, tighter collaboration, and better visibility of your testing processes. Read on to discover why and how you can unify test management and automation in a single tool with Zephyr Scale.


Querying a petabyte of cloud storage in 10 minutes

Elastic's new frozen data tier decouples compute from storage and leverages low-cost object stores such as Google Cloud Storage, Azure Blob Storage, or Amazon S3 to directly power searches. It provides unlimited scaling of storage while preserving the ability to efficiently query the data without any need to rehydrate it first, making it easier and cheaper to manage data at scale.


What is Microsoft Power Automate Desktop? (Benefits Included)

In order to avoid the repetitive tasks performed over the desktop, Microsoft has developed an extended service, the Power Automate Desktop. It has been recently announced by Microsoft, which has been made available to Windows 10 users. It is a new low-code Robotic process automation that enables business empowerment to automate those tasks that are repetitive and other manual tasks to focus better on higher-value work and to establish more in their corresponding areas of work.


How to automate your web testing on real mobile and desktop browsers

In the good old days when we were using a basic phone, the web application used to run on only a desktop. Mobile phones were not so evolved to run a web application in the browser. But today, each of us uses a mobile phone for running web applications and websites. When we are talking about web testing, we mean web applications and website testing in web browsers. Here, we are dealing with the web-based programs accessed by multiple users at a time.


Identifying Software Bugs - Part 2

In the last article, we talked about some basic types of software bugs and how to find them. Every software project has gotten a bug at some point in its development, and every software developer has had to debug a project at some point in their career. Some of these bugs are so common that fixing them is seen as a standard procedure of every software development process. But not all bugs fall in this category; some are elusive and can take weeks to find and finally fix.


ICYMI: How Honeycomb Can Help You Achieve the Deployment Part of CI/CD

In case you missed it, this webinar includes code walkthroughs that help you to add observability to your pipelines (using a free Honeycomb account!) so that you and your team can speed up your deployments to prod. This is also a risk-free way to get started with observability if your team isn’t quite yet ready to change your production apps.


Cybersecurity is Fundamental for Modernizing Government

Digital transformation is a strategic initiative of the federal government and has been for years, but adequate funding has never been appropriated. Digital transformation is essential within all areas of government, to deliver services faster, more reliably, and securely. In order to keep up with the global expansion of digitalization, government agencies must modernize their IT and security infrastructure.

Kubernetes Ingress 101: Services, Ingresses, Load Balancers, and Certificate Management

In this video, Oleg, CTO at Kublr, will explain the basics of Kubernetes (K8s) Ingress traffic management functionality and how it can be used to simplify managing applications across different environments – in the cloud or on premise. Oleg will use a demo environment with clusters in different clouds to show K8s Ingress in practice.

Self-Care Tips for IT Pros: Invest in Sleep (And a Good Chair)

As an IT pro, you are your most valuable asset. Obviously, if you aren’t taking care of yourself, how can you be expected to perform with typical sustained, easy awesomeness? Are you able to extricate your IT self from the myriad reactive activities central to IT roles? It’s easy to proclaim taking care of yourself should always be your number one priority.


Domain-agnostic and here to stay: Gartner outlines the current state and future of AIOps

Coined by Gartner in 2016, the term ‘AIOps’ refers to the combining of big data AI and machine learning to automate and improve IT operations processes. Back then, this very broad definition led to some confusion, with different IT vendors characterizing AIOps differently, depending on what they were actually offering.


Pull Requests for Infrastructure Access

Making frequent changes to cloud applications running in production is the de-facto standard. To minimize errors, engineers use CI/CD automation, techniques like code reviews, green-blue deployments and others. Git pull requests often serve as a foundational component for triggering code reviews, Slack notifications, and subsequent automation such as testing and deployments. This automated process enforces peer reviews and creates enough visibility to minimize human error.


OnPage Showcased as One of Massachusetts' Top Messaging and Communication Companies

Cutting-edge messaging systems simplify communication and collaboration for organizations with complex communication needs. These systems are equipped with secure mobile messaging and a full suite of automation capabilities that can route notifications and voice calls across on-call teams. These platforms simplify on-call management through digital on-call schedules and escalation policies.


What Are Microservices and Why Use Them?

Microservices are the future of software development. This approach serves as a server-side solution to development where services remain connected but work independently from each other. More developers are using microservices to improve performance, precision, and productivity, and analytical tools provide them with valuable insights about performance and service levels.


Confessions of a Digital Security and Fraud Director

What’s the point of collecting a lot of data if you don’t have the tools and power to analyze it? In this Log’s Honest Truth podcast, presented in partnership with ITSP Magazine, Devo’s VP of Customer Success, Jill Orhun, discusses the confessions of “Mr. V,” a digital security and fraud director. His face and voice are disguised, but there’s no disguising his frustrations. Listen to the podcast. “Mr.


Device management blind to 125 percent increase in financial sector phishing attacks

As guardians of valuable monetary assets and highly sensitive data, financial institutions are the perfect target for cybercriminals. According to IBM, the financial services sector was the number one target of cyberattacks in 2020 among all industries. This means these organizations continue to be challenged and invest heavily in both people and technology to make sure they can withstand attacks of any type.


Register to the Qovery v2 beta now!

When we launched Qovery in January 2020, our product was still a prototype, and we onboarded 53 developers to help them deploy their apps in the cloud. At the time, we were only 2 on the team, and our first employee (Patryk Jeziorowski) decided to join us after being one of our first users. 18 months later, 3004 developers from more than 110 countries use Qovery to deploy their apps on their AWS and Digital Ocean account.

An interview with Lightstep + Simplebet

Listen and ask questions as two observability experts discuss their trade. Simplebet is a sports technology and betting company focused on unlocking a new type of sports betting called Micro-Markets. In this live interview, we will talk to Simplebet about the observability challenges they faced, the steps they took to overcome them, and how understanding change is now setting their business up for success.

Future of Data Meetup: Continuous SQL With SQL Stream Builder

Continuous SQL is using Structured Query Language (SQL) to create computations against unbounded streams of data, and show the results in a persistent storage. The result stored in a persistent storage can be connected to other applications to have an analytical visualization of your data. Compared to traditional SQL, in Continuous SQL the data has a start, but no end. This means that queries continuously process results to a sink or other target types. When you define your job in SQL, the SQL statement is interpreted and validated against a schema. After the statement is executed, the results that match the criteria are continuously returned.

Work Modes for the Future: Ensuring Dutonians and Customers Thrive

At PagerDuty, we’ve been on a journey to reimagine work for many months now, culminating in the launch of OneDuty—our vision for the new world of work—last year. We have dedicated OneDuty workstreams helping shape this evolution to ensure we’re taking a holistic approach. This includes rethinking where we work.


Run Codefresh pipelines on a Bottlerocket Kubernetes cluster

In August 2020, Amazon announced Bottlerocket OS, a new open source Linux distribution that is built specifically for running container workloads. It comes out of the box with security hardening and support for transactional updates, allowing for greater ease in automating operating system updates, maintaining security compliance and reducing operational costs. Bottlerocket is designed to be able to run anywhere and, at launch, has a pre-built variant for Amazon EKS.


MongoDB vs. MySQL: Detailed Comparison of Performance and Speed

MongoDB and MySQL are similar is some ways, but they also have some obvious differences. Perhaps the most obvious one is that MongoDB is a NoSQL database, while MySQL only responds to commands written in SQL. Potential users may want to examine MongoDB vs. MySQL in the areas of performance and speed. The following article will help you understand the differences, as well as the pros and cons of each database.


Splunk SOAR Playbooks: Suspicious Email Domain Enrichment

Despite the myriad pathways to initial access on our networks, phishing remains the single most popular technique for attackers. The open nature of email and our reliance on it for communication make it difficult for defenders to classify messages, so it is no surprise that suspicious email investigation is a top use case for automation. Today, we are releasing a new community playbook for Splunk SOAR (previously Splunk Phantom) to help enrich suspicious email events.


Monitor your Google serverless applications with Datadog

Google Cloud Platform is growing quickly, providing solutions for everything from cloud storage to managed Kubernetes to serverless computing. Since Google App Engine launched in 2008, Google’s suite of serverless products has expanded to help enterprises accelerate application development without having to manage or scale their own infrastructure.


Detect application abuse and fraud with Datadog

Protecting your applications from abuse of functionality requires understanding which application features and workflows may be misused as well as the ability to quickly identify potential threats to your services. This visibility is particularly critical in cases where an adversary finds and exploits a vulnerability—such as inadequate authentication controls—to commit fraud.

Sponsored Post

A guide to single-page application performance

Single-page applications (SPAs) present a unique approach to building web applications. They help to increase development velocity and can present big performance wins when it comes to delivering a fast and seamless user experience. Monitoring SPAs for performance still comes with a unique set of challenges, like choosing the most impactful metrics, gaining visibility into app performance over time, and knowing what metrics you can get from the browser. The main benefit of using SPAs is that a page does not need to reload when the content on the page changes. However, this feature, and the fact the page does not reload, is what makes it hard to monitor SPA performance.


Automatically create and manage Kubernetes alerts with Datadog

Kubernetes enables teams to deploy and manage their own services, but this can lead to gaps in visibility as different teams create systems with varying configurations and resources. Without an established method for provisioning infrastructure, keeping track of these services becomes more challenging. Implementing infrastructure as code solves this problem by optimizing the process for provisioning and updating production-ready resources.


Kubernetes monitoring and troubleshooting made simple

Infrastructure monitoring was difficult enough when entire businesses ran off a few bare metal servers in a dusty, forgotten closet. Other IT infrastructure monitoring tools fell short, unable to provide complete and granular-enough metrics in real time, even when we were only dealing with a handful of systems responsible for running every part of the application stack.


Adding free and open Elastic APM as part of your Elastic Observability deployment

In a recent post we showed you how to get started with the free and open tier of Elastic Observability. Today we'll walk through what you need to do to expand your deployment so you can start gathering metrics from application performance monitoring (APM), or "tracing" data in your observability cluster, for free.


Why SOX Compliance is Required

The Sarbanes-Oxley Act is a federal law that applies to all publicly traded businesses in the United States. It imposes sweeping corporate governance standards on those businesses, to improve accountability in the boardroom and senior management ranks and to make corporate financial statements more reliable.


What are the best multi-browser testing tools?

When we write scripts for one browser, they may not necessarily run on all browsers. It’s a no-brainer. And, we all know that a few browsers can limit certain features. For instance, if we design features that run on Safari on Mac OS, those features may not function across other browsers. To ensure the features run uniformly across various browsers and OS versions that our users have, we should perform multi-browser testing.


Creating a Business Process and adding it to Dashboard

In this blogpost I will introduce, how to create a business process from monitored hosts and services and how to add them to dashboards. Business Process module is an interesting module in Icinga Web 2. It allows you to visualise and monitor hierarchical business processes based on any or all objects monitored by Icinga. We can create custom business process and trigger notifications at process or sub-process level.


The Value of Ingesting Firewall Logs

In this article, we are going to explore the process of ingesting logs into your data lake, and the value of importing your firewall logs into Coralogix. To understand the value of the firewall logs, we must first understand what data is being exported. A typical layer 3 firewall will export the source IP address, destination IP address, ports and the action for example allow or deny. A layer 7 firewall will add more metadata to the logs including application, user, location, and more.


COVID-19 and Poor Software Quality - What You Need to Know

The Consortium for Information & Software Quality (CISQ) recently released a report about the cost of poor quality software (CPSQ) in the US in 2020. Reading between the lines, we can see how the COVID-19 crisis contributed to making this problem even worse. This past January, CISQ released The Cost of Poor Quality Software in the US: A 2020 Report and presented a webinar covering the key findings.


The Top Networking Certifications Guide for 2021

The technology industry is predicted to reach a $5 trillion valuation in 2021, an additional 4% growth over 2020. This steady growth of the industry has, unsurprisingly, led to an increase in the number of jobs in networking and IT. As the last year has shown, when an enterprise is forced to switch work models to a remote or distributed approach, they need network specialists to set up and maintain the necessary infrastructure.

Highly available Kubernetes in IoT: MicroK8s on RaspberryPi

Learn how to set up a Pi-Hole instance with a single command and a cluster of Raspberry Pis on MicroK8s. High availability, load balancing and Kubernetes configuration included. The Raspberry Pi 4 brings the graphics, RAM and connectivity needed for a Linux workstation, so why not use a cluster to set up your own Pi-Hole, the open source network-level ad blocker that acts as a DNS sinkhole or DHCP server.

Perspectives from the federal public sector: Enable mission success with Elastic

After a year of accelerated change in the federal industry, the Federal Public Sector event focused on the progress you’ve made, the trends demanding your attention, and the Elastic capabilities that continue to guide federal agencies, offices, and departments towards a search-enabled future. With a theme of Accelerate the mission.


How we built a serverless "Stonks" checker API for Wall Street Bets

A while ago, a merry bunch on Reddit at the subreddit r/WallStreetsBets (WSB) took on Wall Street. Ironically, through an app called Robinhood. As Alanis Morisette would say, “A little too ironic, don’t ya think?” You had to be in there and in the know at the right time to benefit from the situation. That’s why we built a serverless API to keep track of all the hot and trending stock chats on WSB, that will notify you when the next GME is about to blow up.


Automatic WildFly Clustering in Managed Domain Mode and Scaling inside Containers

Nowadays it’s easy to get up and running WildFly standalone server in a container. But what if you need to enable clustering in Managed Domain mode which is one of the key features of Jakarta EE in general. That is not so easy task. Some people claim it’s nearly impossible in the cloud-native world, because Jakarta EE clustering was designed before the containers era.


Find out how your marketing stacks up with Braze Benchmarks

Data-driven marketing is a must in today’s competitive landscape. Over the past decade, consumers have come to expect personalized, relevant, and timely messaging from the brands they love. However, merely creating personalized campaigns based on your company’s own real-time data doesn’t cut it anymore. You need to evaluate how consumers are reacting to those campaigns, iterate, and then optimize your customer engagement.

From Distributed Tracing to APM: Taking OpenTelemetry & Jaeger Up a Level

It’s no secret that Jaeger and OpenTelemetry are known and loved by the open source community — and for good reason. As part of the Cloud Native Computing Foundation (CNCF), they offer one the most popular open source distributed tracing solutions out there as well as standardization for all telemetry data types.


Data Breach Response and Investigation: 7 Steps for Efficient Remediation

A data breach is one of the biggest threats to an organization. It can harm an organization’s reputation and entail huge financial losses. According to the Cost of a Data Breach Report 2020 by IBM [PDF], the average cost of a data breach is estimated at $3.86 million. Thus, preventing data breaches and investigating them in a timely manner are among the most sensitive pain points when it comes to an organization’s cybersecurity.

How Data Affects Healthcare | Rise of The Data Cloud | Snowflake

Data driven healthcare, anonymized data hackathons in a digital data sandbox, how to leverage the power of data for good, compute on demand, how the pandemic has affected digital adoption and how shifting to the cloud impacts patients are just some of the topics being covered in today's episode of Snowflake's Rise of the Data Cloud. Join us as Ashok Chennuru, Chief Data and Analytics Officer at Anthem gives us a peek into the world of AI and healthcare.
super monitoring

8 Best Tools to Write Robots.txt File Successfully

Robots.txt file is one of several text files. Website owners develop this to instruct Google and other search engines about how they will crawl on their website pages. This file tells the search engine not where to and where to not go on a website. Google describes robots.txt as being primarily used to manage crawler traffic into a website and keep a website page away from Google, although this will depend on the type of file that it is.


5 Things Every MSP Should Know About Data Governance

For a managed service provider (MSP), answering questions about data governance—specifically data security and privacy—is a vital part of the job. Understanding the complexities of content management systems, automation, and more ensures you are at the top of the data security field. Maintaining file and data security is a fact of life—usually by force of law. However, it’s a subject not many of your clients will ever fully understand.


Measuring User Experience with Web Vitals

Top of search for you means top of mind for your customers. And with Google’s upcoming Page Experience update to Web Vitals taking place in a few weeks, now’s the right time to optimize your user experience. But before you can optimize your user’s experience, you need to be able to measure it. We’re kicking off Measurement May by breaking down breaking down how Google uses Web Vitals data — and how you can instrument that data with Sentry.


Introducing Apache Kafka & Event-Driven Architecture Support in ReadyAPI

In 2006, SoapUI was developed with a singular goal: create a simple, open-source SOAP API testing tool. Since then, developers have contributed code and provided valuable feedback to help SmartBear transform SoapUI into ReadyAPI, the most powerful API testing platform on the market.


3 Realistic Ways to Drive Better Networking-Security Team Collaboration

The success of a Secure Access Service Edge (SASE) architecture depends on how well networking and security teams, and the products and services they manage, converge into a shared set of priorities tied to business objectives. Unfortunately, new research from Censuswide confirms this network-security team collaboration is still strained—if not downright combative—at a majority of enterprises.

OverOps and CloudBees Panel Discussion: 4 BIG Software App Challenges For FinServ

In this panel discussion, Bob Kemper, VP of Worldwide Engineering at OverOps, and Anders Wallgren, VP of Technology Strategy at CloudBees, explored four BIG challenges facing financial services software applications: MTTI and MTTR, Avoiding Downtime, Speed and Stability, and Distributed and Partner/External workforce challenges.

Automating and Governing AI over Production Data on Azure - MLOPs Live #14 w/Microsoft

Many enterprises today face numerous challenges around handling data for AI/ML. They find themselves having to manually extract datasets from a variety of sources, which wastes time and resources. In this session, we discuss end-to-end automation of the production pipeline and how to govern AI in an automated way. We touch upon setting up a feedback loop, generating explainable AI and doing all of this — at scale.

Industrializing Enterprise AI with the Right Platform - MLOps Live #9 - With NVIDIA

We discuss how enterprises need a platform that brings together tools to streamline data science workflow with leading edge infrastructure that can tackle the most complex ML models — one that can bring innovative concepts into production sooner, integrated within your existing IT/DevOps-grounded approach.

Simplifying Deployment of ML in Federated Cloud and Edge Environments - MLOPs Live #12 - with AWS

We discuss some common applications for machine learning at the edge and the main challenges associated with deploying distributed cloud and edge applications. We then wrap up the session with a live demo showing how to run a distributed cloud or edge application on Amazon Cloud and Outposts with the Iguazio Data Science Platform.

How Feature Stores Accelerate & Simplify Deployment of AI to Production MLOPs Live #13

The breakdown:

00:00 - Intro
02:15 - MLOps Overview
05:03 - Feature Engineering
07:44 - MLOps Workflow
10:44 - Solution: Feature Store
14:25 - Feature Store Competitive Landscape
17:03 - Features of a Feature Store
21:01 - CTO: Feature Store Sneakpeak
25:55 - Python Code example
27:57 - ML Pipeline example
30:07 - Covid-19 Patient Deterioration
33:26 - LIVE DEMO
52:45 - QA


How to search logs in Loki without worrying about the case

Whether it’s during an incident to find the root cause of the problem or during development to troubleshoot what your code is doing, at some point you’ll have an issue that requires you to search for the proverbial needle in your haystack of logs. Loki’s main use case is to search logs within your system. The best way to do this is to use LogQL’s line filters. However, most operators are case sensitive.


Why Experience Level Agreements for Microsoft 365 are Becoming a Business Expectation

When it comes to business, having a productive IT team means enhanced productivity. Understanding that productivity is a direct result of a good user experience is crucial. In this blog, we will examine what constitutes a good user experience and how experience level agreements for Microsoft 365 are becoming a business expectation. An effective Experience Level Agreement is a combination of different data sources.


The 5 communication styles customer service agents need to know

As a customer service agent, being a great communicator means everything. But your ability to communicate well goes beyond listening to what your customers and team members say. You also have to recognize how they’re expressing themselves and adapt your responses accordingly. Understanding the various communication styles can help you improve your relationships with customers and colleagues alike.

DeveloperWeek 2021: From Ticket-Time to Real-Time

From Ticket-Time to Real-Time: Enabling Developers to Run What They Build, presented by Damon Edwards at Developer Week 2021. The DevOps movement has been undeniably pulling Developers into Operations. “Shift left” and “You build it, you run it” have become familiar rallying cries. But how do you actually enable developers to participate in Operations when so many policies, processes, and tools were designed to keep them out?

The fastest SQL Change Automation, Azure DevOps and AzureSQL DB pipeline

Is it possible to set up an end-to-end deployment pipeline from Dev through to Production in Azure DevOps, with SQL Change Automation and Azure SQL DB in just 10 minutes? Join Chris Unwin, a Redgate Solution Engineer, as they try to break the record for setting up a migrations-first pipeline with SQL Change Automation from Dev to Continuous Integration and finally, deployment.

Rappi Relies on Splunk Observability Cloud to Meet its 30-Minute Guarantee

Hear from Rappi’s EVP Engineering, Alejandro Comisario about how as one of the largest technology startups in Latin America, the on-demand delivery service relies on the Splunk Observability Cloud for real-time, end-to-end visibility across its complex backend system of 1k+ microservices. Since COVID-19 Rappi has grown 300%, relying on Splunk’s real-time observability to eliminate app issues for customers and stay on top of its infrastructure, applications, and overall business. With Splunk APM, Rappi now has in-depth insights into service behavior and directed troubleshooting, bringing developers’ mean-time-to-resolution (MTTR) down by 90+%.

Embedded analytics trends for building your data strategy

The importance of data and analytics as a key to overcoming the kinds of shocks that companies experienced in the past year is undeniable. As we lean into the digital future and look to build more resilient businesses and economies, embedded analytics will play a crucial role by empowering people to find analytics insights in the contexts where they are most useful, and in a fashion natural to their decision making processes. With that in mind, we’ve identified seven embedded analytics trends for you to consider while building your data strategy.

3 Key Features Every Service Desk Needs

Modern enterprises must work to ensure their organization is focused on making employees feel heard and valued, and a key way to do this is through strong IT service management. We’ve said it before, but it bears repeating—today’s employees expect a similar service experience in the workplace that they encounter in their daily lives.


Snyk uncovers malicious code activities in open source supply chain security on the npm registry

Open source helps developers build faster. But who’s making sure these open source dependencies (sometimes years out of development) stay secure? In a recent npm security research activity, Snyk uncovered a total of 8 npm packages which matched a specific malicious code vector of attack. This specific attack vector of the malicious packages included packages which had pre/post install scripts, which allowed them to run arbitrary commands when installed.


Straight Talk, No Chaser: How to Jumpstart Your Hyperautomation Journey, Part 2

Hyperautomation is about making humans more human. So said automation expert Arjun Devadas in the first episode of this two-part post on hyperautomation. (Read part one here). Devadas—who serves as Senior Vice President, Professional Services & Operations, Americas at Vuram, a hyperautomation services company—debunked a few myths and spilled some pragmatic tea on how to get the most out of your hyperautomation journey.

Datadog on Security and Compliance

At Datadog, customer trust and data security are of the utmost importance. As a high growth company, navigating the tradeoffs of security and development agility are especially critical. Our customers expect us to continually improve our platform, while providing a compliant, secure environment for their most critical data. Balance is key to rolling out features rapidly and keeping systems secure.

APIOps for Standardization Without Hindrance (Destination: Scale)

Typically, there are two options to ensuring APIs have the right governance: manual checks or long documentation (or both). There is now a third option in APIOps — integrating your GitOps process with the API lifecycle, automating the enforcement of API standards from design time. This ensures API security, quality, consistency and resiliency across distributed teams at scale, therefore improving productivity for developers and operators whilst reducing risk overall.

5 Tips on Avoiding FTP Security Issues

Flat files are files that contain a representation of a database (aptly named flat file databases), usually in plain text with no markup. CSV files, which separate data fields using comma delimiters, are one common and well-known type of flat file; other types include XML and JSON. Thanks to their simple architecture and lightweight footprint, flat files are a popular choice for representing and storing information.


Fresh Springtime Product Updates: D2iQ Kommander 1.4 and D2iQ Konvoy 1.8 Are GA!

It’s that time again: the latest versions of D2iQ Konvoy and D2iQ Kommander have just been made generally available and the D2iQ Kubernetes Platform (DKP) has some powerful new features. As noted with our last update, DKP is the leading independent Kubernetes platform for enterprise grade production at scale and Konvoy and Kommander are the reason why. You can learn more about Konvoy here, Kommander here, and our general approach here.

Sponsored Post

Challenges of Running Services With K8s Reliably

Kubernetes (K8s) is a container orchestration platform that facilitates workloads for applications or services in a scalable manner. Out of the box and only in a favourable path, K8s is a wonderful platform that magically deploys and manages workloads and restart-services when a service is not ready or is unhealthy. K8s works behind the scenes, though there are many hidden caveats in terms of making sure the platform stays stable and unfettered.
Sponsored Post

Supporting Remote Workers During a Pandemic

Working from home is no longer an option but a necessity. Millions of Americans are now part of this "work from home" experiment triggered by Covid-19. There may be no turning back as employees and businesses choose this new emerging model. Remote workers are likely here to stay. According to a Gartner 2020 survey, 82% of business leaders surveyed plan to allow their employees to work remotely for part of the time and half of them intend to allow their employees to work remotely in the future.

Civo official launch!

Countdown to our official production launch! We'll be giving you a behind the scenes look at how we build and provision a new CivoStack region - our custom Kubernetes platform based on K3s. Including a specially recorded time-lapse build of our latest location. Featuring an introduction from our CEO Mark Boost, and Director of Innovation Dinesh Majrekar who will run you through our zero-touch region configuration.

Six AWS Lambda Cost Optimization Strategies That Work

In 2021 it’s common practice for businesses to use a pay-as-you-go/use pricing model. It’s no different with Amazon. It’s also the primary reason why this article is such an important read for all those looking to reduce their AWS Lambda costs. In this article, we will go over six actionable strategies to optimize the cost relating to our AWS Lambda usage. One of the main reasons for choosing to move into the cloud is the ability to reduce costs.


New Advanced AlienApps for Fortinet

Here at AT&T Cybersecurity, we feel strongly that security should fit into your business, not the other way around. We lower the friction security brings to day-to-day operations through automating the essential security operations such as detection and response. By integrating different security products together to form a consolidated security architecture, companies can be protected with less effort.


Reciprocity Experiences Record-Breaking Results in First Quarter 2021

SAN FRANCISCO – May 4, 2021 First Quarter 2021 Highlights Reciprocity, a leader in information security risk and compliance with its ZenGRC platform, today announced the company saw outstanding results in the first quarter of 2021, achieving new records across its go-to-market initiatives, coming off an unprecedented 2020. Last year the management of risk and compliance became a strategic imperative and top board-level concern.


Securing AWS Fargate workloads: Meeting File Integrity Monitoring (FIM) requirements

Securing AWS Fargate serverless workloads can be tricky as AWS does not provide much detail about the internal workings. After all… it’s not your business, AWS manages the scaling of underlying resources for you. :) While the security and stability of Fargate’s system is an inherent feature, Fargate follows a shared responsibility model, where you still have to take care of securing those parts specific to your application..

eg innovations

10 Tools and Techniques to Test Your IT Infrastructure Resilience

Many of our customers are large enterprises with critical highly-available and secure infrastructures. This means that they spend (as do we) a lot of time proactively investigating and stress-testing systems, indeed we and many other vendors also provide tools within our products to assist in “kicking the tyres”. However small or large your enterprise is though, it’s a methodology and mindset that you can embrace with plenty of free and open-source tools out there to assist you.


Why Your Organization Needs to Embrace APIs

Like most organizations today, you’re probably looking to optimize your business model through increased technology adoption. The more successful digital transformation projects look at changing business trends and seek to incorporate those trends within their own specific environment. Similarly, as API technology grows, promising new functionalities and integrations, enterprises should aim to embrace the utility of APIs within their wider technology strategy.

Secure container orchestration at the edge

The cloud-native way of building software allows for consistency across developer environments and massive scalability of application deployments. Both these attributes are useful for edge, but create new challenges related to security and resilience. Watch this demo to see how Canonical’s modular technology stack addresses these challenges by using well-known cloud primitives.

DevOps vs. Agile

DevOps is a term for, “a cross-disciplinary practice dedicated to the study of building, evolving and operating, rapidly-changing resilient systems at scale.” (Jez Humble) There is no wall between development and operations so they work simultaneously and without silos. The system focuses on uniting the developmental and operations teams in a continuous process. Agile is a software development strategy that focuses on responding to change with cross-functional team communication.


Kong Configurations Using Terraform via GitOps Model

As organizations adopt a microservices architecture, API gateway usage has increased. Kong Gateway is one of the promising API gateways in the market. It has both OSS and enterprise support, releases multiple features and is easy to use. Kong Admin API helps administrators configure the system easily, but it’s still error-prone. That’s because the user has to hit many curl calls for creating all the configs. When numerous folks are managing the system, this becomes difficult.


The ultimate Google Algorithm update checklist for your website

As we are all well aware, this month Google will be updating its algorithm with the aim of improving the user experience. With these changes, however, it’s reported that many of the top-ranking websites will be affected, meaning they need to take action now to ensure all of the hard SEO work they’ve done is not lost.


Amazon ECS vs. EKS (vs. Fargate): Which One Is Best For You?

AWS provides a number of useful services for managing and deploying containers, three among them being Amazon Elastic Compute (ECS), Elastic Kubernetes Service (EKS), and Fargate. Making the right choice between these services is not always easy because, while they might look similar on the surface (and are all equally popular), they each have unique characteristics, advantages, and disadvantages.

Kong Konnect: Maximize Service Reuse, Observability and Manageability

Developer teams need to move faster than ever today and reusing services is a great driver for agility. In this tutorial, you'll learn how to use ServiceHub to enable development teams to search, discover and consume existing services. You'll also learn about Runtime Manager and Vitals for operational metrics of deployed services.

Take your mobile monitoring to the next level

While there’s room for debate in what constitutes sufficient monitoring for a mobile app, it’s no question that if you wait long enough for users to report issues, then soon you will have no users. For most mobile development teams, you are not measured against how many features you deliver or bugs you fix, but by how successful your app is and how much value it delivers to users. As a result, you need to know where the app is providing a subpar experience and why.


Understanding the many facets of observability

The concept of observability goes back many, many years. Engineers used observability to understand the complex analog systems that were built to send rockets into space and to predict and understand failures. Today, DevOps, ITOps, and SecOps use observability in much the same way—to predict and understand system failures. Still, observability is a complex concept that can be difficult to grasp.


Open Policy Agent: The Top 5 Kubernetes Admission Control Policies

Kubernetes developers and platform engineers are typically under a metric ton of pressure to keep app deployments humming at a brisk pace. With the scale and power of Kubernetes, this can feel daunting. Maybe you’re a retailer launching a new e-commerce feature for a huge sale. Maybe you’re a bank that’s scaling a finance app worldwide. In either case, compromises always get made in the interest of speed and schedules.


Low-Code Automation, Pop-Culture Icons, and Keeping up with Post-COVID Risk, Part 2

When the COVID-19 crisis hit, guidelines for responding to a global pandemic probably weren't in your company’s disaster recovery playbook. But that probably changed after the pandemic fired up a remote-work revolution that has also accelerated business process automation across industries. Yes, we’re almost on the other side of the pandemic. But future crises are unavoidable. And the next one could be worse than the one we’re experiencing now.


Choosing the Best AWS Serverless Computing Solution

Serverless computing is becoming increasingly popular in software development due to its flexibility of development and the ability it affords to test out and run solutions with minimal overhead cost. Vendors like AWS provide various tools that enable businesses to develop and deploy solutions without investing in or setting up hardware infrastructures. In this post, we’ll cover the many different services that AWS provides for supporting serverless computing.


Managing Users and Groups with SCIM in the JFrog Platform

When your organization becomes bigger, managing the users and groups lifecycle becomes a significant challenge. Your company grows rapidly, hiring new employees, and giving them access to more and more applications that your organization uses. This means that there are many employee-related actions that need to be taken when an employee changes their team, role, leaves temporarily or permanently (otherwise you may end up with operational, security or compliance issues).


Fixing Flaky Tests: The Fast Lane to Success

You’ve implemented a test suite into your pipeline for a good reason—to create the best possible product, improve user satisfaction, and debug issues quickly. But what can you do when your test suite seems like it’s getting in the way of your CI/CD pipeline and stopping you from your ultimate goal of speeding new releases out the door? Flaky tests are tests that fail or succeed seemingly randomly when executed on the exact same code. The frustration is obvious.


An Overview of the Cost Savings and Business Benefits with Auvik

If you’re an Auvik user, you’ve likely come to realize our software can provide value to your business in more ways than one. From automating tedious and repetitive tasks like documentation and config backup, to cutting down on troubleshooting time, Auvik’s cloud-based network monitoring and management system gives you true network visibility and control.


GitHub Security Code Scanning: Secure your open source dependencies

We are happy to announce Snyk Open Source support for GitHub Security Code Scanning, enabling you to automatically scan your open source dependencies for security vulnerabilities and license issues, as well as view results directly from within GitHub’s Security tab! A key ingredient of Snyk’s developer-first approach is integrating Snyk’s security data into the exact same processes that developers are using, whether this is within a developer’s IDE or a Git-based workflow.


DevSecOps at scale and speed with Intelligent Orchestration

AppSec shouldn’t compromise velocity. Learn how Intelligent Orchestration optimizes AppSec testing while removing complexity from DevOps toolchains. To stay competitive, organizations are embracing digital transformation and innovating at record speed. In order to achieve this, they’re embracing agility through processes such as DevOps, site reliability engineering, GitOps, and more.


1+1 Is Not Always Two!

Today marks a milestone day for Diyotta. I am quite thrilled to share that Diyotta is joining forces with ThoughtSpot! Together, we’ll accelerate development of the Modern Analytics Cloud and put cutting-edge innovations from across the entire cloud landscape in the hands of every employee. This is a massive win, not only for the industry, but for our customers, and of course, our team. ‍When I look at a merger, there are a few questions I always ask first...


What is the API Economy?

APIs are everywhere you look. As the building blocks of most digital transformation strategies, they’ve helped to lay the groundwork for integrating apps and services and can be key in modernizing legacy systems prevalent throughout most organizations. But APIs are more than just middleware. By leveraging them effectively as software components, you can open your business to new functionalities, opportunities, and revenue streams.


Improving Customer Experience with APIs

Between smartphones, social media, and a growing work from home lifestyle, people are constantly connected to the internet. The new customer experience strategy is to create an immersive digital experience. Reaching new customers and nurturing existing ones by immersing them in your content is the goal, but it takes serious planning and implementation. Not only do you need to know where to reach your customers first, but you need to anticipate and follow their moves.

Datadog Live Containers - Kubernetes Resources

Datadog Live Containers provides multidimensional, real-time visibility into Kubernetes workloads, from Deployments and ReplicaSets down to individual Containers. Using Datadog's curated metrics, teams can track the health and performance of their Kubernetes resources in the appropriate context and surface critical information about every layer of their Cluster.

Grifols: Creating Flexibility and Speed through a Unified Data System

Bio pharmaceutical company Grifols is a global leader in producing plasma-derived medicines and transfusion medicine. The COVID-19 pandemic heightened the importance of their work and they needed a flexible, paperless, and unified techincal solution in place. See why they chose Appian for their control management system, and how they've reduced processing times in order to serve patients better.

AWS Fargate runtime security - Implementing File Integrity Monitoring with Sysdig

Thanks to serverless you can focus on your apps, instead of your infrastructure. Take AWS Fargate as an example. A service where you can deploy containers as Tasks, without worrying what physical machine they run on. However, without access to the host How can you detect suspicious activity? Like, file changes on your Fargate tasks? Sysdig provides runtime detection and response to secure Fargate serverless containers.

Get started with distributed tracing and Grafana Tempo using foobar, a demo written in Python

Daniel is a Site Reliability Engineer at He’s especially interested in observability, distributed systems, and open source. During his free time, he helps maintain Grafana Tempo, an easy-to-use, high-scale distributed tracing backend. Distributed tracing is a way to track the path of requests through the application. It’s especially useful when you’re working on a microservice architecture.


Ritual's top 3 tips for nurturing a strong data culture

If you haven’t given much thought to your daily multivitamin, now might be a good time. At Ritual, we’ve re-imagined multivitamins — bringing high-quality nutrients to our customers and helping them make healthy habits a daily ritual (does it get more convenient than vitamins mailed directly to your door?). One of the ways we’re leading the pack is through our commitment to creating and sustaining a data-driven culture.


Barracuda CloudGen Access + Mattermost deliver Zero Trust security for messaging, devices, and access

Barracuda CloudGen Access, the new standard for Zero Trust remote access, and Mattermost, a messaging platform designed for enterprises with high privacy and security needs, have partnered to deliver the most rigorous remote access security for enterprise messaging. In this post we’ll look at how one next-generation investment service firm relies on the CloudGen Access and Mattermost solution to protect customer assets, personal information and corporate intellectual property.


New: Data scientists, run transformations and model data in R!

We’re happy to announce that we added R to our selection of transformation and workspace backends in our freemium accounts. Access a wide variety of statistical methods offered by R and model data straight from Keboola. No more context switching and working in a few different tools. Start modeling data and running transformations in R. Create a free account and take Keboola for a spin. R transformations complement Python and SQL where computations or other operations are too difficult.


Streaming Market Data with Flink SQL Part I: Streaming VWAP

Speed matters in financial markets. Whether the goal is to maximize alpha or minimize exposure, financial technologists invest heavily in having the most up-to-date insights on the state of the market and where it is going. Event-driven and streaming architectures enable complex processing on market events as they happen, making them a natural fit for financial market applications.

Dynamic Service Graph | Tigera - Long

Downtime is expensive and applications are a challenge to troubleshoot across a dynamic, distributed environment consisting of Kubernetes clusters. While development teams and service owners typically understand the microservices they are deploying, it’s often difficult to get a complete, shared view of dependencies and how all the services are communicating with each other across a cluster. Limited observability makes it extremely difficult to troubleshoot end-to-end connectivity issues which can impact application deployment.

Application Layer Observability | Tigera - Long

The majority of operational problems inherent to deploying microservices in a distributed architecture are linked to two areas: networking and observability. At the application layer (Layer 7), the need to understand all aspects associated with service-to-service communication within the cluster becomes paramount. Service-to-service network traffic at this layer is often using HTTP. DevOps teams struggle with these questions: Where is monitoring needed? How can I understand the impact of issues and effectively troubleshoot? And how can I effectively protect application-layer data?

DNS Dashboard | Tigera - Long

While it’s an essential part of Kubernetes, DNS is also a common source of outages and issues in Kubernetes clusters. Debugging and troubleshooting DNS issues in Kubernetes environments is not a trivial task given the limited amount of information Kubernetes provides for DNS queries. The DNS Dashboard in Calico Enterprise and Calico CLoud helps Kubernetes teams more quickly confirm or eliminate DNS as the root cause for microservice and application connectivity issues.

Splunk Observability Cloud: Cutting through the complexity of modern applications

As infrastructure modernizes, it becomes more complex and more difficult to monitor and operate. To truly understand what your systems are doing, you need full-stack, end-to-end observability. We built Splunk Observability Cloud to eliminate your blind spots and go from alert to problem resolution in seconds–not hours. Splunk Observability Cloud provides one unified experience for seamless monitoring, troubleshooting, and resolution across any stack, at any scale.

Splunk Log Observer: Log analysis built for DevOps

Log analysis is a key part of getting answers from your stack, and Splunk Log Observer, part of the Splunk Observability Cloud, is built for fast, powerful log analysis. Trust the industry-leading expert on logs to help you draw insights fast from any volume of data, in real-time, without having to write any queries by hand.

Splunk Digital Experience Monitoring: Real insights into real user experience

Great user experience and web performance are essential for modern applications. Time spent waiting leads customers to leave. To keep users happy and revenue flowing, you need to know what's happening from the user's perspective. Splunk Digital Experience Monitoring (RUM & Synthetics) helps you see how your users really experience your site. As part of Splunk Observability Cloud, Digital Experience Monitoring gives you an end-to-end look at how your application is performing.

Splunk APM maximizes performance by seeing everything in your application.

Innovate faster in the cloud and elevate your user experiences with Splunk APM. Built for the cloud-native enterprise, Splunk APM uses all your data in NoSample^TM^ full fidelity for you to act on your data in seconds. Free your code and future-proof your applications today with Splunk APM. Get a free trial as part of Splunk Observability Cloud today.

What is Enterprise Architecture & How to Develop .Net Based Enterprise Architecture?

Developing a holistic enterprise architecture is the first step to acquiring a wholesome grip over the evolution and management of an organization. Enterprise architecture enhances Business Process Improvement and significantly optimizes costs by standardizing technology – two of the most crucial factors that influence the ROI of an organization. The enormous efficiency and cost-savings, that enterprise architecture brings about, have strengthened the belief in enterprise architecture today.


Secure Session Transfer Between Web Apps on Different Domains

Writing a web application that supports securely logging into a website and managing your credentials is a surprisingly difficult task. You have to develop a way to manage sessions, understand how browsers store state (cookies), learn a cryptographically safe password storing technique (like bcrypt), all the while making sure you mitigate common web security vulnerabilities like XSS and CSRF.


Elevate your ecommerce business with Zendesk integrations

Consumers around the world have changed their shopping habits over the past year, with e-commerce seeing unprecedented growth. In fact, research by McKinsey shows that 10 years of ecommerce adoption was compressed into just three months in 2020. Ecommerce is positioned to keep growing for the next five years and beyond, with new brands looking for ways to set themselves apart. One of the best ways to differentiate in the competitive ecommerce world is to offer a better digital customer experience.


Kubernetes: Weighing Advantages and Disadvantages

Kubernetes is one of the current leading technologies. Its adoption has seen tremendous growth in the past few years. The concept of containers is a paradigm that appears to be the predominant medium of software development and deployment in the coming future. Containers help maintain consistency across various platforms, as they pack an application with its dependencies to help move it from one platform to another.

Announcing Ribbon Voice Sync for Regional and Rural Service Providers

Regional and rural providers are challenged every day to keep their network together. Time, obsolescence, razor-thin margins, and changing customer expectations are conspiring to pull it apart. Watch on-demand to learn how Ribbon is synchronizing multiple elements of our portfolio into a new and better solution for regional and rural providers.

Failover Conf follow-up: Your team and culture questions answered!

Thank you all for joining us last week for Failover Conf 2! We had a great turnout this year, with over 1,800 participants, 20 sponsors, and 9 amazing sessions. After more than a year of virtual events and video calls, we know that Zoom fatigue is real. We tried to make this event different by finding new ways to bring the community together and thinking of fun new ways to shake up the conference formula.


Give Monitoring a Shot

If you hang out around a particular segment of the SolarWinds® crowd, you’re likely to hear the story of how monitoring helped one former Head Geek™ score front row tickets to Aerosmith. This is not that story. This story was, however, inspired by that story. The original story involved the aforementioned Head Geek, Destiny Bertucci, using SolarWinds Web Performance Monitor (WPM) to monitor the ticket sales website.


Deloitte Tech Trends and Appian

Every year Deloitte comes out with its annual Tech Trends, which provide “insights and inspiration for the digital journey ahead.” They aim to identify opportunities that are likely to transform businesses over the next 18-24 months. This year we couldn’t help but picture the important role that Appian can play in helping our customers capitalize on these trends. Let’s discuss two of these trends.


Lookout Named Best Mobile Security Solution by the SC Awards

For the last 25 years, SC Media’s SC Awards program recognizes the people, products and companies forging the cybersecurity industry’s future and advancing the cause of safe and secure commerce and communications. I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile Security Solution of 2021.


Quick Demo: Ivanti UEM for Mobile - checkra1n Jailbreak Update for iOS 14.5

The checkm8 vulnerability and the updated checkra1n jailbreak tool are the gifts that keep on giving for Apple devices. Using Ivanti UEM for Mobile and Mobile Threat Defense, you can protect your iPhone 5S through iPhone X, iPad 5th through 7th generations, and iPad Pro 2nd generation, Apple TV 4 and 4K, and iPods up to 7th generation devices.


Latest Instana OpenShift Operator Automatically Collects OpenTelemetry on Red Hat OpenShift

Instana’s Enterprise Observability platform handles the unique needs of Cloud-Native Applications. Even before Instana became an IBM company, Instana was optimized to work with Red Hat’s OpenShift Container Platform. Instana is available on OperatorHub and Red Hat Marketplace, packaged as an Operator for OpenShift that we whimsically call the Instana OpenShift Kubernetes Operator.


Fivetran Launches Support for New Databricks + GCP Offering

Businesses can now use Fivetran with the Lakehouse Platform on Google Cloud. We are excited to launch Fivetran support for a newly available solution: Databricks on Google Cloud. We’ve partnered with both Databricks and Google Cloud for many years now, and understand the unique value they each deliver to Fivetran customers, so it was a priority for us to support their joint effort.


Launching Argo CD Autopilot: An Opinionated Way to Manage Your Applications Across Environments Using Gitops at Scale

Argo CD has been skyrocketing in popularity with the CNCF China survey naming Argo as a top CI/CD tool for its power as a deployment automation tool. And it’s no wonder, GitOps is a faster, safer, and more scalable way to do continuous delivery. Most of our own users are embracing GitOps to manage infrastructure and applications at scale in gaming, finance, defense, media, and other industries.


3 Major Ways To Improve AWS Lambda Performance

This piece was originally three different blogs but is now one. In this piece, we lay out three ways you can improve your AWS Lambda performance. So much has been written about Lambda cold starts. It’s easily one of the most talked-about and yet, misunderstood topics when it comes to Lambda. Depending on who you talk to, you will likely get different advice on how best to reduce cold starts.


The new normal is actually very normal: Punctuated equilibrium, security cycle theory, and the "New Normal"

In 2020, the world was hit with an unexpected pandemic that changed much of life as many had come to know it. Virtually overnight, masks were required, employees were working remotely, children were home from school, and businesses were locked down to stop the spread of Covid19. In reading the news and social media the term “The New Normal” has taken front and center as the image that is being promoted.


How AppSec has evolved in 2021: Reddit's perspective

As organizations continue to rely on software for core business processes, application security is an ever-critical consideration. Snyk recently held a roundtable with Reddit to discuss application security in 2021. In this post, we’ll recap the discussion between Guy Podjarny, President & Co-Founder of Snyk, and Spencer Koch, Security Wizard at Reddit.


How to Improve First Contentful Paint

Chances are, you've run a PageSpeed Insights test and noticed "First Contentful Paint" as one of the first numbers in the report. I've covered most of the metrics before in my article on Understanding the Page Speed Metrics in Google Lighthouse, but in this article I wanted to dive deeply into First Contentful Paint - particularly what it is, what a good score is, and how to improve. Table of Contents

Getting Started with Kong Konnect in 10 Minutes

In this Kong Konnect tutorial, you'll learn how to get started with Konnect and manage your API ecosystem from a single, easy-to-use interface. We'll cover how to use Konnect Runtime Manager to set up your own Kong Gateway instance in Docker. Then we'll walk through how you can expose, secure and manage your first service using the Konnect ServiceHub. Lastly, we'll publish that API to our developer portal and show how you can share that documentation with your users and developers all within Konnect.

Modernizing the Digital Customer Journey

In these changing times, global organizations continue to execute against their strategic goals to increase revenues, lower costs, and grow their business. According to IDC, digital transformation projects are accelerating – global spending on digital transformation technologies and services is forecast to grow 10.4% in 2020 to $1.3 trillion. A vast majority of digital transformation projects are focused on improving the digital customer experience. Why?


15 signs your vendor has been breached in 2021

The Solarwinds supply chain attack has made the danger of third-party breaches very clear. Businesses globally are realizing that their vendors may not be as secure as they originally thought. The concerning truth about vendor relationships is that you can never be confident of a prospective vendor's cybersecurity. In fact, onboarding new third-party vendors increase your digital risk and the likelihood of becoming victim to a third-party breach.


OpenTelemetry Trace 1.0 is now available

For decades, application development and operations teams have struggled with the best way to generate, collect, and analyze telemetry data from systems and apps. In 2010, we discussed our approach to telemetry and tracing in the Dapper papers, which eventually spawned the open-source OpenCensus project, which merged with OpenTracing to become OpenTelemetry.


Challenges of mobile test automation and how to tackle them?

We, engineers, love automation! We love it so much that we devise new ways all the time to incorporate automation in each and every field of software development. Today, automation is like the fuel that keeps the project going and helps us finish within deadlines and allotted budget. But automation is most needed to manage the responsibility of something that is 14.9 billion in number and has become the part and parcel of our lives; the mobile phone. Mobile applications are taking the world by storm.


Monitor these Metrics to Keep your Servers Controlled

If we look at server definition, it is a piece of computer software or hardware that provides functionality to other devices or programs called clients. System administrators often come up with a common question over the performance of a server – Why is my server down? If server monitoring and management are inefficient, it often makes it very difficult to correctly analyze complex and unpredictable information in a data center. It’s hard to find a reason for server outage.


5 fixes for the customer experience quandary

Customers expect products and services to work. When they don’t, customers want fast, permanent solutions. But delivering against that expectation is easier said than done. Multiple barriers stand in the way of your organization delivering the seamless experiences customers expect. Let’s explore five ways to improve customer service.


Driving Agility and Scalability through Smart Data

Last year presented business and organizational challenges that hadn’t been seen in a century and the troubling fact is that the challenges applied pains and gains unequally across industry segments. While brick-and-mortar retail was crushed a year ago with mandated store closures, digital commerce retailers realized ten years of digital sales penetration in only three months.


Biden on cyber security after 100 days: A good start, but now comes the hard part

Cyber security experts weigh in on what we’ve learned about President Biden’s cyber security strategy in his first 100 days in office. President Joe Biden declared in mid-December, more than a month before he took office, that cyber security would be a “top priority” of his administration. It should be. The digital world, as we are all now reminded daily, has a direct impact on the real world, for better and worse.


ClearML hits 1.0

May 3rd 2021 – With over 11 man-years of working, and tinkering, long into the night, I am pleased to announce we have hit version 1.0. Following quickly after the release of ClearML 0.17.5, we added the last remaining features we felt 1.0 needed. Namely multi-model support, as well as improved batch operations. With these in place, the choice was clear. The next version released should be the baseline moving forward.


Three New Supply Chain Attack Methods You Should Be Aware Of

Another day, another supply chain attack. No sooner did we recover from the SolarWinds breach, than we found ourselves reeling from a new ClickStudio attack. That’s why we’ve decided to launch this new series, fondly named The Source, to provide you with the latest news and updates on supply chain security. On this installment of ‘The Source’, get to know the red hot supply chain attack methods du jour.

OpenTelemetry with and Lightstep

A short demo on how to use OpenTelemetry with and Lightstep. Learn more at Lightstep’s observability platform is the easiest way for developers and SREs to monitor health and respond to changes in cloud-native applications. Powered by cutting-edge distributed tracing and a groundbreaking metrics database, and built by the team that launched observability at Google, Lightstep’s Change Intelligence provides actionable insights to help teams answer the question “What caused that change?”

Announcing HAProxy Kubernetes Ingress Controller 1.6

We’re proud to announce the release version 1.6 of the HAProxy Kubernetes Ingress Controller. This version provides the ability to add raw configuration snippets to HAProxy frontends, allows for ACL/Map files to be managed through a ConfigMap, and enables complex routing decisions to be made based on anything found within the request headers or metadata.