Operations | Monitoring | ITSM | DevOps | Cloud

Compliance Monitoring: Leveraging Online Tools to Ensure Compliance in Regulated Industries

Compliance departments are beginning to turn to website monitoring tools to help bolster their compliance monitoring efforts as it’s become increasingly difficult for these firms to remain compliant with industry regulations in recent years. Firms operating in highly regulated / legacy industries suddenly find themselves more vulnerable than ever to fines and penalties from regulators.

Ahrefs: Helping Companies Understand their Competition Better

Being touted as one of the top names in the search engine optimization market, Ahrefs has been steadily climbing up the ranks. The company has now emerged as one of the top crawlers on the market. The Singapore based company believes in creating valuable and easy-to-use products which will help their clients always stay one step ahead.

The Anatomy of a Serverless App

Serverless has, for the last year or so, felt like an easy term to define: code run in a highly managed environment with (almost) no configuration of the underlying computer layer done by your team. Fair enough, but what is is a serverless application? A Lambda isn’t an app by itself, heck, it can’t even communicate with the world outside of Amazon Web Services (AWS) by itself, so there must be more to a serverless app than that.

Dashbird becomes AWS Advanced Technology Partner

It’s the celebration time of the year! Dashbird is now an official Amazon Web Services (AWS) Advanced Technology Partner (APN). Our team has demonstrated that we can build a strong, secure and reliable AWS-based business that can benefit Amazon Web Services users. The new partner status is recognition of Dashbird ability to help companies to better monitor and troubleshoot their Lambdas by providing state of the art solution for serverless observability.

Thwart password spray attacks to secure employee access to cloud apps

Chances are you’ve heard of traditional credential-based attacks on Active Directory (AD) and cloud applications—brute force attacks, dictionary attacks, and keylogging, to name a few. There’s now another attack type you should familiarize yourself with: password spray attacks. In this blog, we’ll analyze why you should be wary of them and the best way to tackle them.

Achieving Full Stack Automation Through Kubernetes

The open source revolution is back in full swing with the rise of Kubernetes. Flexibility and agility are the key factors to making the most of the cloud, multicloud, or hybrid cloud era. Kubernetes makes that easier by granting DevOps teams greater control across their infrastructure. But easier does not necessarily mean easy — there are still hurdles to overcome.

6 myths and facts about deep learning

Despite decades of development, deep learning has been boosted by the increasing processing power of computers and the immense amount of data available, which has allowed it to obtain some achievements that were unthinkable years ago. Deep learning is at the heart of what we know today as artificial intelligence. However, like everything that is talked about a lot, deep learning has formed a series of myths that do not always obey reality.