Operations | Monitoring | ITSM | DevOps | Cloud

7 Considerations for Campus IT During the '20-'21 School Year

When COVID-19 hit in the spring and schools quickly transitioned to remote learning, we saw in real-time how important IT departments in education are. It was IT’s quick thinking that helped administrators, teachers, and students continue in their learning environments. Now that the ‘20-’21 school year is ramping up, it’s important that IT leaders in education continue on the path to success and plan for the expected and unexpected.

10 Helm Tutorials to Start your Kubernetes Journey

The growth of Kubernetes has been stellar and K8s applications have grown in importance and complexity. Today, even configuring a single application can require creating many interdependent K8s sources that each depend on writing a detailed YAML manifest file. With this in mind, Helm as a package manager for Kubernetes is a major way users can make their K8s configurations reusable.

How a Financial Services Leader Gained Visibility with DEM

Maintaining digital performance has always been a tough balancing act for the Financial Services industry. Every transaction must be encrypted and secured; customer data must be stored safely without the risk of a breach. Security is given the highest priority, the additional processes in the service delivery chain can tax performance. Financial service providers must go the extra mile to ensure their network is resilient with high performance, availability, reliability, and reachability.

Threat hunting capture the flag with Elastic Security: BSides 2020

Last month, members of the Elastic Security team hosted a threat hunting capture the flag (CTF) event at BSides SATX. We provided the community with an environment to learn and practice threat hunting with our team, and cultivated new relationships with attendees. By sharing information with security practitioners, we can help prepare them to defend their organization’s data from attack through knowledge transfer.

Detecting Windows Persistence

Persistence is effectively the ability of the attacker to maintain access to a compromised host through intermittent network access, system reboots, and (to a certain degree) remediation activities. The ability of an attacker to compromise a system or network and successfully carry out their objectives typically relies on their ability to maintain some sort of persistence on the target system/network.

What is PostgreSQL, and why do developers love it?

(Want your cloud apps managed? Reach out to Canonical now. You can also watch our webinar on why you should get your apps managed, and get your application reviewed by our app engineers.) PostgreSQL solves the problem of extensibility, in complex cloud environments. This statement is often thrown around, but why is it true? Should next-generation cloud-infrastructure still use it? Is it still relevant in an era of big data?

End-to-End Java Observability in 5 Simple Steps

Java is one of the most popular, flexible and useful programming languages with a very vibrant community to support it. Many of our customers use Java to create amazing applications, it’s an application on a single VM, or based on microservices running on Kubernetes. Naturally, we made it simple to understand the performance of Java-based applications using SignalFx Microservices APM.

5 tips to avoid cyberattacks on EdTech platforms

As the COVID-19 pandemic rages on, many educational institutions have been forced to shift their on-campus classes to online classes. Various EdTech platforms have also launched free classes that have prompted students to try their hands on digital education. With more students turning to online learning than ever, these platforms have emerged as a lucrative target for cybercriminals.