Operations | Monitoring | ITSM | DevOps | Cloud

Identify, Track, and Fix Issues Faster with Sentry

Modern software applications are capable tools with a wide range of functionalities. The most popular software applications existing today haven’t achieved the pinnacle of success without many bumps along the way. Developing software is difficult and you need to ensure your development doesn’t collapse under the weight of unexpected errors. This is where error tracking software comes into picture.

Advanced ASP.NET Trace Viewer - WebForms, MVC, Web API, WCF

Software is a complex thing. As soon as you deploy an application to production—especially when you don’t have any control over the environment it’s running on—anything could happen. You’ve created this “monster” and set if free. It’s now free from your control. How do you tame this beast before it creates havoc? The first step is to trace its steps (no pun intended).

Top 8 Tools Every Blockchain Developer Should Know About

While Blockchain technology offers unprecedented security solution and information sharing solution, it remained as of now mostly limited to the cryptocurrencies. While cryptocurrencies made Blockchain their core technology strength, other industries remained mostly silent bystanders.

Improving our broken links checker & mixed content reporting

We're excited to announce that we've shipped some nice improvements to our broken links & mixed content checks. These checks both make use of the crawler that powers those features. When we first launched Oh Dear!, we decided to limit the crawls to the first 1.000 unique pages we find. This was mostly a protection for infinite loops, since those are really hard to detect.

Best Practices for Automating Monitoring

Developer teams and even operational teams often ignore monitoring applications. Deadlines, inexperience, company culture, and management can lead to poor or neglected monitoring inside developing platforms. Automating all monitoring tasks is an excellent way to avoid this scenario. Automation leads to lower costs, less time spent solving issues, and more efficient teams.

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to their use, or rather misuse, of legitimate credentials, machines, and access privileges. Traditional SIEM solutions use simple rule-based alerting to detect potential insider threats, which cannot analyze user behavior or detect any anomalies therein.