Operations | Monitoring | ITSM | DevOps | Cloud

Real User Monitoring vs Synthetic Monitoring Comparison: What Should You Use? | Sematext

What is a real user monitoring tool? and what is a synthetic tool? Which monitoring tool do you really need? In this comparison video, we will look at the pros and cons of monitoring your site with synthetic vs. real user monitoring tools. Ultimately, we will see that these two technologies work together to ensure that your website runs well and is optimized for the end-user.

mooving to... Practical Post-Mortems | Thomas Duran, Senior Manager of Productivity, from Panther

Post-mortems are a common practice amongst many organizations, but not everyone knows how to make the most out of an incident. Thomas Duran, Senior Manager of Productivity, from Panther joins us to discuss how to leverage post-mortems to effectively learn from failure.

Overview of Check Types

00:26 Web Checks

00:31 HTTP(S) Check

01:13 Transaction Check

01:45 API Check

02:38 RUM Check

03:12 Malware and Virus Checks

03:37 SSL Check

04:00 Network Checks

04:04 WHOIS/Domain Expiry Check

04:19 DNS Check

04:43 Ping (ICMP) Check

04:59 NTP Check

05:22 SSH Check

05:34 TCP/UDP Port Checks

05:54 Email Checks

05:59 IMAP, POP, SMTP and Domain Blacklist Checks

06:37 Custom Checks