The Checkly team is continually working to improve our platform to meet—and exceed—the current and future monitoring needs of our customers, and we’re thrilled to share another batch of new product features and enhancements during Checkly Launch Week 2.
Checkly is the synthetic monitoring platform that scales. A core part of the Checkly platform is our monitoring as code workflow, which just got a massive boost with the launch of our TS/JS native Checkly CLI which is now in beta!
Railway passengers may think of trains simply as a way to get from one place to another, but at Siemens Mobility — a rail transportation company dedicated to delivering sustainable, smart transport — they are that and much more. Siemens Mobility works with more than 3,000 partners, and its customers include Eurostar and Trans Pennine Express. In the U.K., Siemens Mobility maintains about 500 train units and logs 65 million passenger miles per year.
PALO ALTO, Calif., February 27, 2023 (Newswire.com) – Uptime.com, the market leader in uptime and website monitoring, expects the industry to focus on the consumption and usage of products and services to improve efficiency and optimization in 2023.
At incident.io, we deal with small incidents all the time—we auto-create them from PagerDuty on every new error, so we get several of these a day. As a team, we’ve mastered tackling these small incidents since we practice responding to them so often. However, like most companies, we’re less familiar with larger and more severe incidents—like the kind that affect our whole product, or a part of our infrastructure such as our database, or event handling.
We're excited to announce a new partnership between Cloud 66 and Google Cloud! This partnership provides our customers with a comprehensive and integrated cloud solution, combining the power and flexibility of Google Cloud with the ease of use and comprehensive tooling of Cloud 66.
In this blog post, we’ll demonstrate how to use Cribl Search for anomaly detection by finding statistical outliers in host CPU usage. By monitoring the “CPU Busy” metric, we can identify unusual spikes that may indicate malware penetration or high load/limiting conditions on customer-facing hosts. The best part? This simple but powerful analytic is easily adaptable to other metrics, making it a versatile tool for any data-driven organization.