The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.
In the internet ecosystem of increasingly intertwined applications, when one application wants to perform some action on another application on the behalf of a user, a need arises of how to do this without sharing the password of one application to another. A common example of this is sign-in with Facebook by apps that want to post something on your timeline or want to access your Google Drive.
GrafanaCONline wrapped up last Friday, and we were thrilled to have so many of you join the sessions over the past three weeks. Thank you for tuning in, asking questions, chatting on Slack, and generally making our reimagined conference a success.
We are pleased to announce that all users can now benefit from having their stacks hosted on NVMe (Non-Volatile Memory Express) SSDs. NVMe is one of the newest high-performance networking technologies changing the landscape of scalable infrastructure and assisting in decreasing infrastructure costs on a revolutionary scale.
Citrix announced EOL for their SBC/ VDI SCOM MPs. We understand that a transition to an alternative solution takes some effort. Especially during these extraordinary times. To support a smooth transition we offer 30% discount for a 1-year subscription on MetrixInsight for CVAD SCOM MP during June, July and August 2020 for all Citrix CVA(D) Premium license customers.
What has become a typical theme in the arena of Information Technology are the concerns around managing costs associated with these systems. Whether it be the capital and operating expenditures associated with the data center, or the ongoing costs associated with everyday management and maintenance, most organizations want better control over what seems to be an ever-growing IT budget.
At LogicMonitor, we deal primarily with large quantities of time series data. Customer devices are monitored at regular intervals and data points are provided to our agentless application to be processed and interpreted. Recently, we’ve endeavored to expand the presence of machine learning in our application to enhance anomaly detection.