Operations | Monitoring | ITSM | DevOps | Cloud

Modernizing Government Technology: How Federal Agencies Are Progressing on Technology Transformations

When the U.S. Congress passed the Modernizing Government Technology Act (MGT) of 2017 as part of the 2018 National Defense Authorization Act, it established both funding and a process intended to help bring aging federal IT systems and infrastructure up-to-date with state-of-the-art technologies common in the private sector. According to the legislation, the goals of MGT are to.

API performance testing with k6

Performance testing measures how well systems perform when subjected to various workloads. The key qualities being tested are stability and responsiveness. Performance testing shows the robustness and reliability of systems in general, along with the specific potential breaking points. In this tutorial, you will use k6 to do load testing on a simple API hosted on the Heroku platform. Then you will learn how to interpret the results obtained from the tests.

What Are the Best Practices for Inventory Auditing?

Usually, audits are a long procedure. It might take days or months to complete the audit process. However, still, there is no surety that the audit is done with full efficiency because some assets have gone to some other locations. But audit is performed to get deep analytics of finance-related information. Not just that it also provides several other crucial information as well related to assets & inventories. An audit is helpful in maintaining & following compliance as per the rules and regulations.

Why Heroku and AWS have failed to serve modern developers?

Heroku Vs. AWS remains a long and persistent debate among developers. Both platforms have strengths and weaknesses. Over the last 10 years, Heroku and AWS played a huge role in the cloud hosting and software development industry, by significantly unlocking productivity in a way that it has never been reached before. They are the platforms behind most of the successes from the last decade. However, we are in 2022 and it still looks like if we (developers) were in 2010 to deploy our apps in the cloud.

A Complete Introduction to SQL Server Transactions

One of the most fundamental concepts in any relational database management system (RDBMS), such as SQL Server, is the transaction. During my consulting career, I've seen many performance problems caused by developers not understanding how transactions work in SQL Server. In this tutorial, I'll explain what transactions are, why they're necessary, and how they work in SQL Server.

No Internet? No Problem. Use Xray with an Air Gap - Part II

With software supply chain attacks on the rise, implementing DevSecOps best practices in an air gapped environment is a must. In an effort to secure an organization’s internal network, there is an increasing trend of separating the internal network from the external one. Essentially creating an enclosed and disconnected environment from the public internet. An air gapped solution provides stricter security requirements, but that’s not enough.

9 Types of Phishing and Ransomware Attacks-And How to Identify Them

Cyberattacks have become more pervasive globally, evolving quickly in sophistication and scale, and are now more lucrative than ever for cybercriminals. Not only has The Everywhere Workplace extended the cyber risk and threat landscape—especially for data privacy and its protection—but a lot of Agile software developers, many of whom lack any DevSecOps process, are publishing untested or poorly tested software that can be exploited as zero-days by criminal gangs.

Wisdom of the Crowds: The Value of User Sentiment Observability

What’s the first thing most people do when they’re unhappy with a business? Take to social media to complain about it. Observing those comments – otherwise known as “user sentiment observability” – gives you a head’s up as to when problems become big enough to impact user experience. How can you monitor that voice of the customer? And why is it important to do so? Let’s take a deeper look at the issues.

Why you need network monitoring?

Network monitoring is a continious analysis of a network to detect and correct any performance issues. Network monitoring involves collecting network statistics to determine the quality of services offered by the network. With tools like Icinga, it’s possible to monitor hardware and software in your network. Espacially in the pandemic when many employees work from home, it’s good to have a tool which checks the network permanently.