Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How to Configure a Multicast Linux Network

In a world where consumer-level computing technology has been largely dominated by Windows, many users remain unaware of the need for administrators to configure and maintain network hardware and environments based on the Linux operating system. But Linux in its various distributions and the Unix operating system from which they derive have for decades provided the backbone for the core systems that make consumer-level computing and indeed many aspects of daily life possible.

NiCE Linux Power MP 1.00 released

Speed up your IBM Power servers like never before. In IBM Power System environments, processing time is costly and is measured in work units. A CPU hog on any Linux server can become expensive. Under-provisioned systems react slowly on queries from business applications, which then cause undesired end user or processing delays. As IBM Power servers typically run business critical workloads, response time and availability is key.

Types of DNS Attacks and How Application Monitoring Can Help

DNS, the Domain Name Service, is the Internet service that translates IP addresses into hostnames, and visa versa. It enables you to type www.exoprise.com in a browser, or send an email to someone at that domain, and have your request actually go to 35.172.52.247. As a vital part of the Internet infrastructure, DNS attacks can have a serious impact on your online operations, including access to your website and email.

Announcing the latest dashboard enhancements

When we first released our custom dashboard over a year ago, we had the needs of our customers in mind. The customizable tiles go a long way in ensuring that the dashboard meets your data display needs while being easy to use. We’re always improving the Raygun dashboard—here’s the latest from the app team.

Automate Tasks with AWS Systems Manager and Opsgenie Actions: A Use Case

Opsgenie Actions enable you to automate manual, repetitive tasks so that your resources are freed up to concentrate on higher-value work. This blog post is the first in a series of use cases in which we discuss how Opsgenie works with various third-party automation platforms to automate these traditionally manual tasks—right from the Opsgenie console or mobile app— to reduce interruptions for your on-call responders, and ultimately help your bottom line.

SIEM vs. Security Analytics

SIEM has been with us for almost two decades now and is seen as a proven approach to dealing with potential threats as well as actual attacks on business critical systems. But today, it is becoming clear that changes in IT infrastructure and deployment practices are giving rise to new challenges that cannot be met by existing SIEM platforms.

Apply for Sentry's Open Source Grant

Work should be fun. Sometimes it’s not, especially when your full-time job isn’t aligned with something you care about — like open source. Contributing to open source full-time is an opportunity not available to everyone. We’d like to change that with the Sentry Open Source Grant, which offers funding to an individual dedicated to working on an open source project for three months.