Chestnuts roasting on an open fire. Jack Frost turning noses blue. Yuletide carols being sung by a choir, and folks predicting twenty twenty-two.
We are excited to announce the launch of Speedscale CLI, a free observability tool that inspects, detects and maps API calls on local applications or containers. The offering underscores the importance of continued and proactive API testing to quickly detect and debug defects within a shifting array of upstream and downstream interdependencies.
Powered by the Dart language, Flutter is one of the fastest-growing cross-platform programming frameworks in the world. Since its release in 2017 it has been empowering developers to build mobile apps that work seamlessly across iOS and Android with a single code-base. If you're a Flutter developer, you'll already know the importance of building better quality software, faster - after all, it was made for that very reason. That's why today, Raygun is proud to bring you Flutter support Crash Reporting. This highly requested release gives you complete visibility into the health of your Flutter applications, with rich diagnostics that take you to the root cause of errors and crashes.
As CVE-2021-44228, a.k.a "Log4Shell" or Apache Log4j Remote Code Execution vulnerability continues to send shockwaves across the world of software, many security vendors and practitioners are rushing to provide recommendations on dealing with the crisis. If you need immediate help mitigating the impact of Log4shell, we're here for that. But the goal of this post is to look forward. This isn't the first and won't be the last high-impact vulnerability to be uncovered. So it's worth preparing your organization for the next one, so that you can respond faster, mitigate and remediate sooner - and have fewer weekends like the last one.
Complex enterprises have an integration infrastructure (i2) layer that connects technologies and applications across cloud, data center, virtualized systems, mainframe, edge computing, etc. The i2 layer includes a core middleware application (such as IBM MQ) along with many other "integration" technologies, such as MFT (managed file transfer), IoT, REST APIs, DataPower Gateway, and other messaging technologies (i.e., Kafka, TIBCO EMS, IBM ACE, IBM Integration Bus (IIB) and more).
Application Performance Management (APM) measures how a SaaS or Web application performs on the backend (for Devops). End-User Experience Management (EUEM) focuses on user behavior within those applications. Network Performance Monitoring and Diagnostics (NPMD) collects network telemetry to facilitate performance degradation. DEM combines all these tools to holistically look at the entire digital journey and see how each dependency drives successful experiences for customers and employees.
Just when the Microsoft Exchange exploit CVE-2021-26855 thought it would win the “Exploit of the year” award, it got unseated by the – still evolving – Log4J exploit just weeks before the end of the year! Had somebody asked Sysadmins in November what Log4J was then I suspect that the majority would have had no idea. It seems that the biggest challenge the Log4J exploit poses for Sysadmins is simply the fact that nobody knows all the places where Log4J is being used.