Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Security vulnerabilities on the Data Distribution Service (DDS)

If you are currently running the Robot Operating System 2 (ROS 2), this piece is especially relevant to the security of your robots. A few weeks ago, a group of security researchers reported 13 security vulnerabilities affecting some of the most used implementations of DDS, the default middleware used by ROS 2.

The EPC-U3233 by Advantech gets Ubuntu certified to accelerate AIoT Applications

Canonical and Advantech have collaborated to help enterprises accelerate Edge AIoT Applications with Ubuntu 20.04 LTS certified on the EPC-U3233, powered by an 8th Gen Intel® Core™ i series processor. This compact fanless embedded PC facilitates data-intensive computing in IoT edge applications.

Principles of Software Testing: Software Testing Life Cycle

Over the last several decades, there has been a shift in the competency of software testing. Currently, testing does not include notifying the developer of any flaws found. It has a broad scope and is a phase that must be completed from the very beginning of a project’s development. The testing life cycle of an application has become more process-oriented and diverse due to agile. Typically, the SDLC is the only thing an organization focuses its attention on.

Citrix Provisioning Services Monitoring

Bottlenecks and performance issues in the PVS servers might cause long boot times and the inaccessibility of desktops and applications. Monitoring of PVS servers and their performance is therefore essential. The keys to proactively identifying PVS problems are in-depth visibility of key performance indicators of the server operating system (MEM, IOPS), the infrastructure (PVS services, PVS streaming errors), and the underlying component layers (PVS sites, vDisks, target devices, etc.).

The Log4j Log4Shell vulnerability: Overview, detection, and remediation

On December 9, 2021, a critical vulnerability in the popular Log4j Java logging library was disclosed and nicknamed Log4Shell. The vulnerability is tracked as CVE-2021-44228 and is a remote code execution vulnerability that can give an attacker full control of any impacted system. In this blog post, we will: We will also look at how to leverage Datadog to protect your infrastructure and applications.

Log4j gets added to the code "wall of shame."

It seems that every few weeks, we are alerted to a new significant security issue within one of the plethoras of code elements that are widely used. The same pundits discuss the same range of concerns with open-sourced code each time. The list of “usual suspects” is long, and I know I could add at least 20 additional “reasons” to this list without thinking about it too hard. I’m not sure that open-sourced code is riskier than proprietary developed code. There I said it.

You can now monitor the health of your application and server

We're proud to announce that we have added a major new feature to Oh Dear: Application Health monitoring. Using Oh Dear, you can now monitor various aspects of your application and server. This way, you could get alerts when: You can monitor any aspect of your app that you want.

Get Started with the Public Beta for Unified Dashboards

During Logz.io’s ScaleUp 2021 user conference, we announced that Unified Dashboards were coming to you soon. And now it’s finally here for anyone to try during the Public Beta. Unified Dashboards will allow Logz.io customers to analyze and filter their logs, metrics, and traces side-by-side on a single monitoring dashboard. Check out our recent blog to learn about why we built Unified Dashboards and the value they bring to customers.