Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How to Optimize Your WordPress Site for Speed

Site speed is critical to providing an optimal user experience and Google rankings. WordPress is an optimal platform for websites because of its flexibility. About 33% of all websites are built on it. Because of its popularity, there are a variety of technologies, frameworks and plugins available to site owners. While the flexibility is great, it also provides an overwhelming number of choices.

How to Filter Uptime.com Traffic From Google Analytics

Uptime.com checks can send more than a thousand visits to a URL each day as it monitors infrastructure metrics. Checks record load times and tell administrators which elements are causing slowness. Basic HTTPS checks are the most common, checking for outages and recording downtime or providing technical data to fix them.

Avoid Prolonged Downtime With a Website Backup and Recovery Plan

Website downtime is inevitable. Extreme weather, equipment upgrades, or major site updates are all ripe conditions for downtime. However, there’s always a problem we don’t see coming. A website backup and recovery plan is essential to keep unplanned downtime from severely impacting your business. If you already have a plan, use this guide to revise or make changes to your existing one.

Website Security: Web Monitoring Tips for Keeping Your Site Safe

With the constant threat of DDoS, DNS attacks, malware, and data breaches; website security is a top priority for today’s tech teams. You’ve taken the appropriate measures. Your domain uses HTTP/S, SSL encryption, and is locked up tight. Or is it? In 2018, Symantec reported over 70 million records were leaked or stolen because of misconfigured S3 buckets.

Why API Monitoring is Crucial to Your Business

In today’s interconnected world, API monitoring is vital. Businesses rely on data in everyday operations, and often rely on Web APIs to send and access data. But if an API is down, slow or not behaving as expected, it can severely impact business operations. Whether you’re an API provider or rely on third-party APIs, continually monitoring your API environment lets you know when there’s a problem.

Creating a Project Post Mortem | The Why's and How's of Finishing Projects

A project post mortem is a lethal-sounding term that seeks to answer the question: did this project work? Was it worth the investment and the time, and if it wasn’t can you learn from it? As the term implies, the project must be “no more” or “ceased to be” or “bereft of life.” Creating this document requires a time investment, and it’s tempting to just move onto the next project.

Escalations and Maintenance Windows Are Critical to Downtime Response

Uptime.com includes several advanced check options to provide the flexibility organizations need in creating a response plan to downtime. Maintenance and planned downtime for patches and updates don’t typically create severe downtime events. With escalations, teams have an automated alert system that contacts designated senior-level personnel with relevant technical data.

10 Tips for a Smooth Transaction Check

A Transaction Check is designed to run through a specific set of instructions and test certain elements on your site. The check interacts with clickable objects or text fields, and can test important elements like: Shopping carts, Login forms, and Landing pages. Before you begin configuration of a check, it’s helpful to run through this list of potential items you need.

8 Ecommerce Site Testing Best Practices

Ecommerce companies completely dependent on the internet for revenue experience increased pressure to provide an always-available, always-working shopping experience for customers. Nasdaq puts estimates for ecommerce-facilitated transactions to be up to 95% by the year 2040. During Black Friday through Cyber Monday 2018, Shopify reported their merchants sold up to $37 million per hour through their ecommerce platform.

DNS Hijacking: What You Need to Know

Crashed websites and slow loading pages can be devastating for any site owner. But there’s another type of threat that often goes undetected. A report published by FireEye on Thursday details a particular type of DNS hijacking that allows hackers to easily steal information. These attacks have been going on for approximately two years and involve three different methods that compromise websites without alarming users.