Operations | Monitoring | ITSM | DevOps | Cloud

What Causes Website Downtime?

We’ve all experienced websites which are unreliable, and appear to be offline when we need to access them. Perhaps you have had a similar experience with your own website, and know how damaging downtime can be to your bottom line and to your brand image. Whether a website is ‘down’ for an extended period of time, or for a matter of minutes, it can be extremely frustrating for anyone who is trying to access the site in that period.

Top 11 Digital Tools to Boost Your Productivity

As far as productivity is concerned, you cannot afford to stay complacent. That is because, without productivity, it is not possible to thrive in this age of stiff competition. Today, you have numerous things to do, perform multitasking to stay ahead of the competition and if you haven’t done so yet, your business will take a backseat.

So How Are Developers Feeling During the COVID Health Crisis? We Decided to Ask...

As a developer-focused company, InfluxData is always interested in how the community is doing. During the first two weeks of April, we conducted an online survey to find out how developers are handling life and work during the COVID-19 pandemic. A total of 324 self-identified software developers/engineers from across the world responded (46% from North America, 44% from Europe, 9% from South America, and 1% from Africa) to share their feelings during this unprecedented global event.

Getting Started with Citrix in Splunk - [Part 1]

With most of the world on lockdown due to the COVID-19 virus, many aspects of IT services and digital transformation have been put into the fast lane. There are reports of massive surges in the use of tools such as Zoom, Microsoft Office 365, etc. in order to communicate and collaborate. At the same time organizations are required to scale up access to their internal applications.

Ransomware: How to Combat a Growing Threat to Your Organization

Ransomware is a serious threat to institutions of all kinds, resulting in mounting costs for organizations that must literally pay ransom to regain access to their essential systems. A ransomware attack takes place when a cybercriminal denies an organization access to the data it needs to conduct business, usually by encrypting the data with a secret key. The attacker then offers to reveal the encryption key in exchange for a payment. The payment can vary in amount or kind.

Keep Calm And Carry On Your Business Services

Businesses who operate along supply chains, like manufacturers, distributors, and retailers, have innovative systems and processes for predicting demand and keeping consumers satisfied. Until a crisis hits. When demand for essential SKUs spikes due to panic buying and fear-based hoarding, organizations in essential consumer categories can find themselves forced to make critical decisions without reliable information to base them on, significantly increasing their risk exposure.

Monitor application health with the new response codes tab in RUM

In this release, we’re bringing an all-new section to Real User Monitoring to provide another way for you to monitor application health; the Response Codes tab. Real User Monitoring now tracks the response codes from XHR/AJAX calls made in your web application using the JavaScript provider. You can now: Stacked view of your application’s response codes This feature brings vital insight into the health of your applications so you can deliver the software experiences your customers deserve.

Ruby performance tips - how to optimize code from the ground up

Over the last few years, more developers have taken Ruby as their staple programming language. Who can blame them? It certainly has a lot of appealing features. For one, the syntax is easy to read and debug. A default MVC architecture within most Ruby frameworks is another alluring factor that may have had you using it as well.

March 2020 Outage Report

It’s pretty safe to say that March was the month where everything changed for most of us. By now, enough has been said on coronavirus and we need not add to the pile. Our concern remains continuous uptime, and reporting on outages as teachable moments. During this time of heightened tensions, let’s take a few moments to do some post mortem work and see what we can learn from March’s outages.

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities helps secure databases. The database security can further be reinforced by carefully configuring the authentication and authorization mechanisms for database accesses. In this blog, we’ll briefly explain the various authorization and authentication mechanisms of SQL Server and some best practices you can follow.