Graylog Illuminate: The Story
Graylog is an advanced log management system, capable of ingesting all of your corporate logs into a central repository for easy searching and analysis of your data.
Graylog is an advanced log management system, capable of ingesting all of your corporate logs into a central repository for easy searching and analysis of your data.
Microsoft Azure customers worldwide now gain access to HackerBay’s Fyipe to take advantage of the scalability, reliability, and agility of Azure to drive application development and shape business strategies.
Energy storage and sustainability are big issues in Hawaii, where oil tankers are shipped in everyday, just to keep the lights on. Resiliency in the energy grid, due to threat of natural disaster, is critical. Energy storage is needed to manage how much solar energy is coming into the market or into the grid. Properly managing the power entering the grid is vital for grid stability since Hawaii has intermittent energy that floods the grid.
Elastic is prepping for Elasticsearch 8.0, but in the meantime is rolling out upgrades and features with Elasticsearch 7.7. The new version introduces asynchronous search as well as changes with Elasticsearch clusters, mapping, SQL enhancements, snapshots and machine learning. This post will cover just a few of the highlights of the new release. Besides asynchronous search, ES 7.7 also introduces multi-class classification, reduced heap usage, inference time features, and better password security.
Introduction One of the SRE team’s goals at Moogsoft is to make sure our feature teams have an easy path from local code changes to production. Changes rolling out to production mean new features, bug fixes, optimizations, and more, which translates into value added for our customers. In short, at Moogsoft we are all about making sure our product is continually evolving, and one way the SRE group helps is by building shared Jenkins functionality our engineers understand and can use quickly.
The trend of working from home has hit the ground running, and businesses have turned to strategies and tools that will ensure a no-plummet productive environment. There are two major forks in the road when it comes to provisioning remote endpoints—users can use their own devices, or the company can hand over corporate-owned devices.
Creating security policies for the devices connected to your network is critical to ensuring that company data is safe. This is especially true as companies adopt a bring-your-own-device model and allow more personal phones, tablets, and laptops to connect to internal services. These devices, or endpoints, introduce unique vulnerabilities that can expose sensitive data if they are not monitored.
In today’s ever-changing world of DevOps, it is essential to follow best practices. That goes for security, access control, resource limits, etc. One of the most important things in the world of DevOps is continuous integration and continuous delivery, or CI/CD. Continuous integration is a crucial part of an efficient deployment. We are all guilty of repeating manual steps over and over again – especially when it comes to node configuration.
ITOM or IT Operations Management is an umbrella term that covers all activities involved in the setup, design, configuration, deployment, and maintenance of the infrastructure that supports business services in an organization. Simply put, ITOM is how the IT landscape is managed in your company. From network security, configuration, and monitoring to devices, applications, and personnel, ITOM is what keeps your IT going. Generally, ITOM leverages several tools to manage these activities individually.
There has been a lingering perception that Java applications are slower than applications written in other languages. So, if performance is important for your application, you should not be considering Java as the programming language to use. This perception was true about 20 years ago, when Java was initially used for developing applications. In the early Java implementations, it took a long time for the Java Virtual Machine (JVM) to start.