Operations | Monitoring | ITSM | DevOps | Cloud

Getting Started with Python and Geo-Temporal Analysis

This article was originally published in The New Stack and is reposted here with permission. Working with geo-temporal data can be difficult. In addition to the challenges often associated with time-series analysis, like large volumes of data that you want real-time access to, working with latitude and longitude often involves trigonometry because you have to account for the curvature of the Earth. That’s computationally expensive. It can drive costs up and slow down programs.

What can Elastic Synthetics tell us about Kibana Dashboards?

I like to leverage our technologies to ensure our products have a pleasant user experience. Elastic Synthetics enables you to configure it in an out-of-the-box experience directly through your Elastic Cloud deployment without the need to install anything! It also works across the globe with multiple locations you can choose from. Ever wondered how fast your web service is when accessed from Japan, Germany, or the eastern U.S.? Now you can do this by simply clicking on a checkbox.

On Building a Platform Team

It may surprise you to hear, but Honeycomb doesn’t currently have a platform team. We have a platform org, and my title is Director of Platform Engineering. We have engineers doing platform work. And, we even have an SRE team and a core services team. But a platform team? Nope. I’ve been thinking about what it might mean to build a platform team up from scratch—a situation some of you may also be in—and it led me to asking crucial questions. What should such a team own?

ITSM Statistics: The 2023 State of ITSM Process Adoption

Whether you know it or not, it’s quite possible that your organization has an IT Service Management approach. After all, every business wants to have the right capabilities to deliver value to its customers. But is it too possible? What’s the state of ITSM process adoption? That’s what we’re about to find out! In H1 2022, AXELOS created an IT Service Management (ITSM) Benchmarking Report for its myAXELOS subscribers.

Confidential computing in public clouds: isolation and remote attestation explained

In the first part of this blog series, we discussed the run-time (in)security challenge, which can leave your code and data vulnerable to attacks by both the privileged system software of the public cloud infrastructure, as well as its administrators. We also introduced the concept of trusted execution environments and confidential computing, (CC), as a paradigm to address this challenge.

Tales from the Kernel Parameter Side

Users live in the sunlit world of what they believe to be reality. But, there is, unseen by most, an underworld. A place that is just as real, but not as brightly lit. The Kernel Parameter side (apologies to George Romero). Kernel parameters aren’t really that scary in actuality, but they can be a dark and cobweb-filled corner of the Linux world. Kernel parameters are the means by which we can pass parameters to the Linux (or Unix-like) kernel to control how that it behaves.

incident.fm, post-incident processes, and Crocs

As usual, it’s been all systems go at incident.io this month. New joiners, new features and new swag (yes, you heard right!). But most excitingly, we launched our new podcast this week. We had a blast recording it - we hope you enjoy listening to it just as much. Here’s a round-up of some of this month's highlights…

Customers Demand Interoperability and Open Standards Are the Key

When I speak with customers, especially chief information security officers (CISOs), one of their most consistent requests is that they want interoperability. They want the software they buy to work with the software they have and plan to buy in the future. Nearly every organization, certainly every enterprise company, has an installed base of hardware and software representing a significant investment in time and money.