Operations | Monitoring | ITSM | DevOps | Cloud

Combine ITSM and ITOM to make your business more resilient

A combined ITSM and ITOM approach can make your business more resilient and proactive in three ways. We’ll start with a stat that most anyone will appreciate: In the average enterprise, about 60% of incidents are generated by machines (servers, storage, network routers, etc.) instead of people, ServiceNow research finds.

It's a wonderful workflow

Every business has a CEO. And especially in today’s environment, most CEOs face challenges. Business continuity, employee productivity, customer service, to name a few. If they didn’t know it before, COVID has made CEOs realize that outdated, offline processes are slowing them down, frustrating employees and customers, and costing them too much. With winter approaching in half the world, one could say CEOs feel they’re being left out in the cold.

Welcome to Raygun APM: A quick-start guide for new and returning customers

Welcome to Raygun APM. Raygun’s modern Application Performance Monitoring (APM) beats traditional solutions by providing actionable, developer-level insights into server-side performance issues. In this article, you’ll learn how to set up Raygun APM to be the most effective, plus a few key features that we recommend.

6 ways to use analytics to deliver an exceptional end-user experience: Part 2

Welcome to the second part of our three-part blog series on leveraging analytics to deliver an exceptional end-user experience. In the last part, we discussed two key points: how to gauge the effectiveness of your support forms using analytics, and how to pick the right metrics that focus on customer satisfaction. In this part, we’ll discuss the next two ways analytics can help you deliver an exceptional end-user experience.

Secure your infrastructure in real time with Datadog Runtime Security

From containerized workloads to microservice architectures, developers are rapidly adopting new technology that allows organizations to scale their products at unprecedented rates. In order to make sense of these complex deployments, many teams are abstracting applications away from the environments in which they run. Because of this trade-off, developers and security teams lose the access to the unified context from infrastructure to application needed to fully secure their services.

Using Github Actions to Run Django Tests

I recently found out Travis CI is ending its free-for-opensource offering, and looked at the alternatives. I recently got badly burned by giving an external CI service access to my repositories, so I am now wary of giving any service any access to important accounts. Github Actions, being a part of Github, therefore looked attractive to me. I had no experience with Github Actions going in. I have now spent maybe 4 hours total tinkering with it.

Zoom into Kinsing

The Kinsing attack has recently been reported by security researchers, and it is well known for targeting misconfigured cloud native environments. It is also known for its comprehensive attack patterns, as well as defense evasion schemes. A misconfigured host or cluster could be exploited to run any container desired by the attacker. That would cause outages on your service or be used to perform lateral movement to other services, compromising your data.

8 Common Elasticsearch Configuration Mistakes That You Might Have Made

Elasticsearch was designed to allow its users to get up and running quickly, without having to understand all of its inner workings. However, more often than not, it’s only a matter of time before you run into configuration troubles. Elasticsearch is open-source software that indexes and stores information in a NoSQL database and is based on the Lucene search engine. Elasticsearch is also part of the ELK Stack.

Get ServiceNow data alongside SCOM, Pingdom and more

For those on an ITIL journey, ServiceNow appears to be the service to beat. ServiceNow has tremendous flexibility and thousands of different workflows to support your business. And if you’re using SCOM to populate your CMDB, you’re leaps and bounds ahead of the average organization. Sadly, that flexibility comes with the cost of being stuck inside of the ServiceNow web interface.

How Private Connectivity Can Eliminate The Fallacies Of Distributed Computing

In the first of our new technical blogs, Solution Architect Cameron Parry explains how network and cloud architects can effectively use Console Connect within their hybrid and multi-cloud environments. More than 20 years ago, Peter Deutsch and James Gosling outlined the eight fallacies of distributed computing.