Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Incident Response Plans: The Complete Guide To Creating & Maintaining IRPs

Speedily minimizing the negative impact of an information security incident is a fundamental element of information security management. The risks — loss of credibility in the eyes of users and other stakeholders, loss of business revenue and critical data, potential regulatory penalties — can significantly jeopardize your organization’s mission and objectives.

Observability and Telecommunications Network Management [Part 1]

The border between the management of telecommunications networks and the services that they support and the management of IT infrastructures and the applications that they support has always been a porous one. One might say that they are like two dialects of the same language rather than different languages. Nonetheless, these areas, whether characterised by technology or practice, are different and have, for the most part, been served by different vendors and products.

Data Architecture for Business Data & AI Projects

Like physical architecture, the architecture running your business data — any and compute-intensive AI projects — is important. This data architecture governs a very important part of your business: how well users can translate raw information into real knowledge and actionable insights. Today, your data architecture is getting perhaps more attention than ever before. And that’s all thanks to usable AIs that now exist.

How To Set Up Monitoring for Your Hybrid Environment

The modern IT landscape consists of many distributed systems, which can pose a challenge if you are responsible for the end-to-end performance of these systems. As a platform engineer today, that is exactly what the job requires. You must juggle between dozens of tools to meet SLAs. This is why a modern solution is needed to bridge the gap between disjointed infrastructure and application stacks…and this is why the Splunk Observability platform was born.

How to Monitor Your Hybrid Applications Without Toil

About seventy-two percent of businesses operate in a hybrid IT environment, mixing their cloud-based services with traditional on-premises infrastructure. These hybrid environments offer many benefits, from scale, speed, and flexibility to security, cost savings, and control, blending the best of both worlds.

The Importance of Traces for Modern APM [Part 2]

In part 1, we looked at how the design plan of traditional monitoring technologies depended heavily on properties of the systems that were intended to monitor and then showed how those properties began to be undermined by an increase in complexity, an increase which can ultimately be captured by the concept of entropy. In this part, we will explore how increased entropy forces us to rethink what is required for monitoring.

Shadow IT & How To Manage It Today

In the business world, shadow IT is a controversial topic. Gartner defines Shadow IT as any IT devices, software and services that are used outside or beyond the ownership or control of IT departments/ organizations. This includes: In a standard work environment, the IT department would be responsible for providing whatever IT solutions and work tools were needed across all business functions.