Operations | Monitoring | ITSM | DevOps | Cloud

Reported vulnerability in Evernote Web Clipper exposes browsing data of millions of users

A critical vulnerability in Evernote’s Web Clipper Chrome extension recently allowed hackers to steal data present in active web sessions. Web Clipper, an extension that allows users to save screenshots of webpages, emails, images, articles, etc., had a vulnerability that provided hackers with easy access to the websites accessed by its 4.5 million users before it was fixed on May 31, 2019.

How to Troubleshoot Java CPU Usage Issues

If you have deployed a Java application in production, you’ve probably encountered a situation where the application suddenly starts to take up a large amount of CPU. When this happens, application response becomes sluggish and users begin to complain about slow response. Often the solution to this problem is to restart the application and, lo and behold, the problem goes away – only to reappear a few days later.

How to improve AWS Lambda Cold Start performance

One of the great promises of serverless has always been that it would free developers to focus on writing code without having to give too much consideration to the underlying infrastructure. But the advantages presented by the instantly, infinitely scalable nature of serverless come with limitations and unique considerations that you need to take into account.

Listen to a Recorded Incident Response Call

The PagerDuty Incident Response Process is a detailed document that provides a framework for how to structure your incident response process. But sometimes it helps to understand how these seemingly abstract concepts play out during real-world scenarios. You can now hear an incident call recording that’s based on a real PagerDuty incident. Due to the nature of incident response practices, the process guide we publish is filled with very explicit details regarding a variety of situations.

4 Ways to Reinvest Found Money from Your Cloud Bill

These days, a major part of most IT budgets is the cloud bill. But unlike server-bound infrastructure budgeting, cloud bills can be unpredictable and highly variable from month to month. However, if organizations embrace cloud cost optimization to regulate cloud bills and avoid surprises, they’ll find themselves with considerable found money that can be reinvested into other areas.

DevOps Monitoring, Development, Security and Operations: DevSecOpsMon

In the 20th century we were programmers. In the 21st century, developers. With the massification of telecommunications worldwide, operators began to help us in our work. That’s where the term DevOps (“developers” and “operations”) arose, which implies the concept of collaboration of both teams. But since change is the only constant, other practical considerations have forced us to see the entire forest instead of just a few trees.