Operations | Monitoring | ITSM | DevOps | Cloud

Resultful web push notifications campaigns with PushPushGo

Marketing automation for most people probably regards e-mail marketing. But the newsletter is not the only way to use automatic actions for better timing and personalization. Among them, we can list web push notifications – messages that show up when an Internet user visits browser (not necessarily a particular page).

Centralized Logging - Knowing When Less is More

A lot of firms collect massive amounts of data every day (up to billions of events) to improve their security efforts, enhance their business intelligence, and refine their marketing strategies. Their log storage drives are so big that some of them even brag about the size, to show their public and clients how advanced their technologies are.

10 Tech Blogs to Bookmark in 2019

The fact that you’re reading this suggests that you like to keep on top of what’s new in tech. With anything and everything now being considered “newsworthy”, it can be hard to filter out the articles that are actually relevant to your interests. That’s why if you’re keen to keep yourself up-to-date on the upcoming digital trends and gadgets of 2019, we suggest bookmarking some of these blogs so that all of your desired reading is just a click away.

Use Case Focused Elasticsearch Online Training Classes to Fit Your Exact Needs

We’ve been working with Elasticsearch since its inception, either with clients on consulting for Elasticsearch products and Elasticsearch production support, or by building our own hosted log management solution. For the last 4 years, we’ve also been sharing our knowledge through Elasticsearch training classes. In 2018, we had remote public training classes on a fixed quarterly schedule, so you can more easily plan your learning time and budget.

Error Monitoring In Zend 3

Zend Framework 3 is a free and open-source PHP framework. It uses a model-view-controller (MVC) pattern which makes its structure consistent and maintainable. It also accesses the database in an object-oriented way. Instead of directly interacting with the database using SQL queries, you can use doctrine object-relational mapping (ORM) to manage the structure and relationships of your data. This makes code easier to write and maintain.

The role of SIEM in PCI DSS compliance

Studies have shown a direct correlation between data breaches and non-compliance. This isn’t to say that compliant companies never get breached, but to reinforce the importance of incident detection and response. Businesses have begun to realize the devastating consequences of data breaches—their finances and reputation are at stake, so many have been taking steps over the last few years to comply with the PCI DSS. The main goal is often an emphasis on achieving continuous compliance.

Adding CVE scanning to a CI/CD pipeline

A Docker image contains an application and all its dependencies. As it also contains the numerous binaries and libraries of an OS, it’s important to make sure no vulnerabilities exist in its root filesystem, or at least no critical or major ones. Scanning an image within a CI/CD pipeline can ensure this additional level of security.