Operations | Monitoring | ITSM | DevOps | Cloud

Catchpoint

The Power of Synthetic Data to Drive Accurate AI and Data Models

We live in a data-rich world - every click, swipe, like, share, and purchase online generates data points companies use to optimize offerings. However, even vast real-world data has limitations in developing robust artificial intelligence (AI) and data models, particularly with regard to AIOps (Artificial Intelligence for IT Operations). Enter synthetic data.

2024 SRE Report Insights: The Critical Role of Third-Party Monitoring in SRE

The 2024 SRE Report highlights a pivotal shift in how organizations approach the reliability and monitoring of their services, especially those that extend beyond their direct control. According to the report, 64% of organizations now recognize the importance of monitoring productivity or experience-disrupting endpoints, even beyond their physical control.

Traceroute InSession: A traceroute tool for modern networks

This is a follow-up to our previously published post announcing Traceroute InSession, where we provided extensive technical details about how it works. In this series, we explore the challenges InSession addresses within modern networks and compare it to other traceroute variants. At Catchpoint, we pride ourselves on being traceroute experts. Why? We’ve run over 15 billion traceroutes over the last 15 years and more than 3 billion in 2023 alone!

How to Propagate OpenTelemetry Trace Headers Over AWS Kinesis: Part 2

In the first article of our series, we explored the importance of trace headers and the complexities involved in their propagation. Now, we shift from theory to practice. This second installment will take you through a hands-on baseline scenario and our initial strategy of propagating the OpenTelemetry trace context in AWS Kinesis by using the PartitionKey parameter.

How to Propagate OpenTelemetry Trace Headers Over AWS Kinesis: Part 1

Welcome to our series on navigating the complexities of trace header propagation with OpenTelemetry in AWS Kinesis. In this 3-part exploration, we'll dive into the critical role of trace headers in distributed systems, discuss the unique challenges presented by AWS Kinesis, and explore innovative solutions that keep your data tracking robust and consistent.

The cost of inaction: A CIO's primer on why investing in Internet Performance Monitoring can't wait

When John Wanamaker famously declared, “When a customer enters my store, forget me. He is king,” he unknowingly coined a mantra that remains as relevant today as it was in the 1900s. This philosophy, rooted in the customer service ideologies of his time, holds true not just for brick-and-mortar stores but also for eCommerce.

Mastering IPM: Key Takeaways from our Best Practices Series

As we conclude our Mastering IPM blog series, it's time to reflect on the wealth of insights we shared. From delving into the critical layers of the Internet Stack to navigating the intricacies of data analysis, each installment has provided valuable perspectives on optimizing digital experiences through Internet Performance Monitoring (IPM). Now, let's distill the key takeaways from the series.

Master Class: Monitoring from Your Users Perspective

Over the past decade, not only has the Internet and the World Wide Web evolved, but also the way websites & applications are developed and experienced by end users. From monolithic to microservice-based structures and from data centers to cloud computing, we’ve come a long way. We’re living in the era of the end-user experience. It’s never been easier for a customer to find another solution if your business isn’t meeting their expectations.

DNS Security: Fortifying the Core of Internet Infrastructure

In an era marked by escalating cyber threats, Domain Name System (DNS) infrastructure security has become a key concern for IT organizations worldwide. Attacks related to DNS infrastructure, such as DNS hijacking, DNS tunneling, and DNS amplification, are on the rise. Many organizations find themselves questioning the robustness of their DNS security protocols.