Operations | Monitoring | ITSM | DevOps | Cloud

Centralized Log Management for Reporting Compliance to Management

It’s 3pm on a Wednesday, and you’re really just done with the week already. You hear that “ping” from your Slack and know that you set notifications for direct messages only, which means, ugh, you have to pay attention to this one. It’s your boss, and she’s telling you to check your email. Then you see it, the dreaded audit documentation request. This will take you the rest of today and most of tomorrow.

What Is Telemetry and Why Is It Important?

Properly leveraging telemetry is a true game-changer for any IT department looking to optimize and stabilize its systems. Telemetry provides the first step to answering the all-important question, “What’s happening in my network?” It’s your eye into the inner workings of your system, giving you a view into how different components are performing.

How Sumo SREs manage and monitor SLOs as Code with OpenSLO

At Nobl9’s annual SLOconf—the first conference dedicated to helping SREs quantify the reliability of their applications through service level objectives (SLOs)—Sumo Logic shared our contribution of slogen to the OpenSLO community, as well as our commitment to OpenSLO as an emerging standard for expressing SLOs as Code. slogen is an open source, SLO-as-code CLI tool based on the OpenSLO specification.

Improve Performance in your iOS Applications - Part 2

The performance of your iOS app is crucial when building and publishing it for any number of users. Your users expect it to be delightful, fast and responsive, so if your app seems sluggish or unresponsive, it will affect your reviews and you might lose valuable users. While solving this for your apps, it’s easy to overlook the influence of the choices made on performance throughout development.

How to Move Ahead of the Three Pillars of Observability

The acceleration in digitalization, also due to the pandemic, has brought an organization’s business and IT teams and strategic goals closer together than ever before. Chief Information Officers (CIOs) have existed since the early 1980s and, until recently, their typical role was primarily focused on managing the technology infrastructure. But in a post-pandemic world, that role is now expanding beyond traditional IT responsibilities.

What Are the Main Benefits of ITIL 4?

Over the past decade, global spending on digital transformation has steadily increased. With the global pandemic and the subsequent shift to remote work and focus on online business, organizations have realized the importance of going digital and presenting a digital interface for both employees and clients. In fact, the total global spending on digital transformation is projected to reach 1.8 trillion US dollars in 2022 and 2.8 trillion USD by 2025.

Building a Stack Overflow browser as a VS extension

I have been writing a couple of integration with the Stack Overflow API for both the elmah.io app and some public exceptions pages that we launched recently (like System.DivideByZeroException). For this post, I want to show you how to pull data from Stack Overflow with C#. For demo purposes (and TBH because I wanted to play more with Visual Studio extensions), the sample code for this post will end out in a small Visual Studio extension (VSIX).

A practical approach to Active Directory Domain Services, Part 5: Replication in Active Directory

This blog series on Active Directory Domain Services (AD DS) is designed to help you gain a good working knowledge of what Active Directory (AD) is. Each successive blog sheds light on some aspects of AD. All blogs are curated to include the right mix of AD theoretical basics along with some valuable hands-on exercises. Through the earlier parts of the blog series, it has become clear that AD DS installed in a Windows environment opens up a host of benefits to organizations.

What Should I Know About Defending IoT Attack Surfaces?

The Internet of Things needs to be part of the overall corporate information security policy to prevent adversaries from using these devices as an entry point. There are several reasons why it’s critical for organizations to defend their IoT attack surface, most importantly being that IoT devices are powerful systems containing compute, storage, and networking that threat actors view as the easiest way to breach an organization or enable exploits.