Operations | Monitoring | ITSM | DevOps | Cloud

Nastel Recognized as Leader in Integration Infrastructure Management & Transaction Observability by GigaOm

“Nastel is uniquely placed when it comes to understanding the configuration information and message content of messaging middleware and integration infrastructure” — Saurabh Sharma, GigaOm Nastel Technologies, the world’s #1 i2M (Integration Infrastructure Management) company, today announced that it has been rated as a leader in GigaOm’s new Integration Infrastructure Management & Transaction Observability Sonar Report.

Best practices for effective asset tagging in 2022

When your company has hundreds or even thousands of physical assets, it’s essential to know where these assets are located and their operational status. Otherwise, you have to deal with outages and compliance issues that can create drastic business implications. From computer monitors to industrial equipment, tracking and controlling your assets with asset tags is critical to your company’s bottom line.

How to get One-click SCOM Root Cause Analysis

SCOM has incredible powers, but it’s not always easy to find the root cause of issues fast. And you definitely don’t get one-click SCOM root cause analysis. We’ve all been there. A business-critical server goes down and you don’t know why. Let’s imagine you had a dashboard showing the health statuses of all your server groups and you notice that the United States is showing as critical.

API Security - Threats & Best Practices

An API is an interface that allows other software programs to access and execute software programs. Software programs exchange data and communicate via this code. Communicating between products and services without requiring users to understand how they work. Social networks, games, database systems, and devices use web APIs to connect with applications.

Personally Identifiable Information (PII) - A Beginner's Guide

PII stand for Personally Identifiable Information, so protecting Personally Identifiable Information (PII) is a top priority for companies small and large, as well as government agencies. Companies are amassing increasing amounts of data on their employees, customers, and partners, making PII security more important than ever. It's critical to understand what PII is and how to protect it. Personal information can be divided into two categories.

elmah.io launches two GitHub Actions in the GitHub Marketplace

While developing the ecosystem around the elmah.io API and App Store, we see an increasing interest and adoption of GitHub and the services around it. We have a range of integrations with GitHub that I’ll introduce you to later in this document. But first of all, I’m happy to announce that elmah.io has been chosen as a GitHub Technology Partner to build integrations in the Marketplace and extend developer capabilities. elmah.io integrates with GitHub in two ways.

Announcing HAProxy Data Plane API 2.6

In HAProxy Data Plane API version 2.6, we continued the effort of expanding support for HAProxy configuration keywords, as this has been the priority with this release cycle, and it will be in the next one too to meet our goal of achieving complete feature parity with both the HAProxy configuration and Runtime API. This will enable you to use HAProxy Data Plane API for configuring HAProxy without any gaps in functionality.