Operations | Monitoring | ITSM | DevOps | Cloud

TraceExporter for VS Code

Percepio TraceExporter for VS Code makes it easy to export Percepio TraceRecorder snapshots during your debug session and open them directly in Percepio Tracealyzer. This is applicable for embedded systems based on Zephyr, FreeRTOS, SafeRTOS, Cesium, ThreadX or PX5, or using TraceRecorder’s “Bare Metal” option. The extension is currently provided in a Beta version as a downloadable.vsix file.

Why Residential ISP ICMP Blocking Makes Remote Worker Monitoring Impossible (And What to Do About It)

When your company’s help desk receives fifteen "my connection is slow" tickets from remote employees in a single morning. Your network monitoring dashboard shows everything green; VPN concentrators running smoothly, bandwidth usage normal, no alerts. Yet employees can't get their work done. You try to ping their home routers. Nothing. Attempt a traceroute to diagnose the path. It dies at the ISP edge. Check your SNMP queries. They never make it past the residential gateway.

8 Best AIOps Tools for Modern IT Teams in 2026

IT operations teams deal with growing system volume, faster release cycles, and tighter service expectations. Traditional monitoring tools generate large alert volumes, yet teams still spend hours sorting signal from noise under pressure. Manual triage slows response time, while disconnected tools stretch incident handling and service recovery.

VirtualMetric DataStream + Google SecOps Integration: Pre-Ingest UDM Normalization at Scale

Google SecOps (formerly Chronicle) is widely used for large-scale security analytics, long-term telemetry retention, and detection across diverse environments. Its Unified Data Model (UDM) enables correlation across sources and supports analytics that operate over long time horizons. To take full advantage of these capabilities, security data must arrive in a consistent and well-structured UDM format. In practice, this is rarely the case.

Instrumenting Code Using Prism and the Ruby Abstract Syntax Tree

A repository for this article can be found here.‍ When most developers think about request tracing, they picture instrumentation hooks inside familiar libraries. This allows us to track familiar metrics we see in application performance monitoring (APM) tools such as the duration of an HTTP call or how long a database query takes. But what if you could go deeper and instrument your own Ruby code automatically, without sprinkling timing calls everywhere?

Chrysalis Backdoor: What You Need to Know - and How Progress Flowmon Threat Briefing Helps You Stay Ahead

A newly analyzed threat, Chrysalis, is a sophisticated backdoor attributed to the Chinese APT group Lotus Blossom. The malware employs advanced evasion techniques including heavy obfuscation, API hashing, dynamic DNS resolution, custom encryption and stealthy C2 communication disguised as legitimate traffic.

Key Takeaways From the 2025 Gartner Market Guide for Event Intelligence Solutions

The 2025 Gartner Market Guide for Event Intelligence Solutions reflects a shift in how IT operations leaders evaluate AI-driven technologies. As AI hype gives way to more practical evaluation, we are seeing a natural departure from broad promises about AI capabilities toward clearly defined use cases and outcomes.

Using Meraki and Megaport Virtual Edge for Multicloud Networking

SD-WAN with Megaport SDCI is now generally available. Here’s how you can use them to optimize your network’s middle mile. Building on our successful collaboration with Cisco Catalyst SD-WAN (formerly Viptela) and Cisco Secure Firewall Threat Defense Virtual, Megaport is thrilled to announce the general availability of our integration with Cisco Meraki.