Operations | Monitoring | ITSM | DevOps | Cloud

Personal Information Security and OnPage's Commitment to User Privacy

When making purchasing decisions, organizations must consider a vendor’s product pricing, promised benefits and level of customer service. Thorough vendor evaluation tends to result in successful investments, allowing organizations to reap the benefits of their newly acquired products without buyer’s remorse. Unfortunately, some buyers dismiss the importance of personal information security and how the vendor promises to protect user data.

Complete Guide to Lambda Triggers and Design Patterns (Part 1)

A while ago, we covered the invocation (trigger) methods supported by Lambda and the integrations available with the AWS catalog. Now we’re launching a series of articles to correlate these integration possibilities with common serverless architectural patterns (covered by this literature review). In Part I, we will cover the Orchestration & Aggregation category. Subscribe to our newsletter and stay tuned for the next parts of the series.

How to Run a Successful Remote SaaS Operations Team

This article was originally published in New Stack. More and more companies have gone remote with surprising benefits — a trend that has been building for years. A survey by Global Workplace Analytics and FlexJobs indicates that remote work has grown 91% over the last 10 years, and 159% over the last 15 years. The COVID-19 pandemic has elevated the relevance of remote work (including remote IT operations) to a new level.

Managing IT Risk When Everyone's Working Remote

Cybersecurity has always been an evolving challenge for IT teams—even before the pandemic and subsequent mass exodus to the home office. At the Protect & Streamline Summit for IT Leaders, experts from the IT and cybersecurity space came together to share advice for IT leaders scrambling to contend with a new set of business risks. Read on for key takeaways or access all session recordings for a deeper dive.

Defense in depth: DoublePulsar

Unless you’ve been living under a rock you are probably familiar with the recent Shadow Brokers data dump of the Equation Group tools. In that release a precision SMB backdoor was included called Double Pulsar. This backdoor is implemented by exploiting the recently patched Windows vulnerability: CVE-2017-0143. For detection, we are going to first focus on the backdoor portion of the implant, hunting for traces left behind on the network.

Integrating a Cloudsmith Repository and a Buildkite pipeline

At Cloudsmith, you will often hear us refer to our mantra of “Automate Everything”. It a quest that we never deviate from, and we believe that anything that can be automated, should be automated. With that in mind, we would like to show you how simple it is to integrate a Cloudsmith repository with your Buildkite pipeline, and automate the pushing of your build artifacts into your own private repository for further CI/CD steps or even as a source for your global distribution needs.

Eureka! Nexthink Shines Light on What Users Really Think About IT

Digital Experience firm analyzes employee sentiment on the IT service they’re receiving IT experience management software company Nexthink is revving its efforts to help companies measure and improve how employees feel about their IT environments with a new release of its platform.

Hybrid Working Environments and the Impact on IT Effectiveness

Over the past few months, many organizations have transitioned their employees from mostly onsite to fully remote work environments. Now we’re entering into a phase where roughly 30% of the workforce will soon head back to the office, while the rest continue to work from home.

IT's Lifeline - Digital Experience Management for Modern Work

As odd as it might sound, I think these past few months have done a lot of good for IT, and following the recent news from Nexthink last week, I actually feel optimistic for many enterprises out there that might be struggling. Hear me out. Right now, there are millions of people working in new, flexible work environments that didn’t even exist six months ago.

What the Cloud Native Revolution Means for Log Management

This was originally posted on The New Stack. Once upon a time, log management was relatively straightforward. The volume, types, and structures of logs were simple and manageable. However, over the past few years, all of this simplicity has gone out the window. Thanks to the shift toward cloud native technologies—such as loosely coupled services, microservices architectures, and technologies like containers and Kubernetes—the log management strategies of the past no longer suffice.