Operations | Monitoring | ITSM | DevOps | Cloud

Deadman Alerts with the Python Processing Engine

Sometimes silence isn’t golden; it’s a red flag. Whether you’re monitoring IoT sensors, system logs, or application metrics, missing data can be just as critical as abnormal data. Without visibility into these gaps, you risk overlooking potential failures, security threats, or operational inefficiencies. In time series workflows, detecting silence is often the first sign of trouble—whether it’s a network issue, device failure, sensor failure, or stalled process.

Calico Open Source 3.30: Exploring the Goldmane API for custom Kubernetes Network Observability

Kubernetes is built on the foundation of APIs and abstraction, and Calico leverages its extensibility to deliver network security and observability in both its commercial and open source versions. APIs are the special sauce that help automate and operationalize your Kubernetes platforms as part of a CI/CD pipeline and other GitOps workflows. Calico OSS 3.30, introduces numerous battle-tested observability and security tools from our commercial editions. This includes the following key features.

TCP Monitoring With AppNeta: Why Expanded Support is a Game Changer

Broadcom continues to expand the capabilities of AppNeta by Broadcom, offering ongoing enhancements in features and value. With the introduction of TCP protocol support, users can now achieve more streamlined setup processes and deeper visibility into modern network paths. These enhancements help eliminate blind spots and improve monitoring accuracy across complex network environments. Review this post to learn more about these valuable new capabilities.

Observability: It's Every Engineer's Job, Not Just Ops' Problem

For years, organizations have used the term “observability” as an evolution of monitoring, a discipline practiced by operations teams to understand whether production software was working. I’ve been annoyed by this—not because it’s philosophically wrong, but because it diminishes the importance of observability as a generalized software engineering practice.

Elastic extends production-ready AI capabilities for all!

Elastic Security is making your organization safer with general availability of our favorite AI features. Elastic Security is announcing the general availability (GA) of two of our most widely deployed generative artificial intelligence (GenAI) capabilities: Attack Discovery, launched in May, and Automatic Import, launched in August. Elastic’s AI-driven security analytics are providing immense value to many organizations.

The timeline to fully automated incident response

We speak to engineering teams every day, and everybody knows AI is the future. Some tell us they’re massively accelerated by Claude, or that they’re rebuilding their product, team and ways of working. Cursor and Lovable have announced they’re building the last piece of software. Should we give in to the vibes? Embrace exponentials, and forget that the code even exists? The reality is that things will still go wrong. They always do, at least from time to time.

Are You a Hospital Leader Who's Wondering What More You Can Do Right Now to Make Life (and Work) Better for People?

It was cold. The sun was bright in the sky, and there was an almost magical mist surrounding the trees. The smoking haze and sun distorts the colours of vegetation. I could see pinks amongst the green foliage and dark wood. The ground was hard and frosty, so I treaded carefully to avoid trips and falls. My golden labrador puppy chased my elderly mutt without a care in the world, clumsily tripping over in the ice and rolling a few times in the dirt, then bouncing back up with doggy joy.

How Sentry's AI Autofix Changed my Mind About AI Assistants

Blockchain, IoT, Big Data. If you’ve been around in tech for a while, you know that these kinds of buzzwords come and go: they make a splash going in and fizzle out over time. Seeing many of them come and go over the years has made me skeptical. What are they trying to sell us this time? Some might call it getting grumpy; others might call it becoming an enterprise architect. So you’ll have to forgive me for thinking AI agents seemed like just another buzzword.

What Is Synthetic Data? A Tech-Savvy Guide to Using Synthetic Data

Synthetic data is gaining attention as artificial intelligence (AI) continues to evolve. But what exactly is it, and why is it so important today? At a high level, synthetic data refers to data that's generated by algorithms or mathematical models. It is not data collected from the real world.

How to Justify Switching Network Management Solutions to Your Leadership Team

Switching network management solutions can be a scary proposition, even when the system you have isn’t working well. After all, network management is the cornerstone of visibility, security, and IT operations, and if something is working “well enough” today, then leadership can be change-averse. However, sticking with a network management platform that isn’t a good fit for your environment can lead to waste, administrative overhead, visibility gaps, and reduced network reliability.