Operations | Monitoring | ITSM | DevOps | Cloud

What to Expect When Budgeting for Patch Management?

Keeping your business safe from online cyberthreats is now more important than ever before. Did you know that each year, companies face increased risks of cyberattacks? With the growing number of data breaches, having strong patch management in place is not just recommended — it's crucial. So, how much does it really cost to keep your security robust with effective patch management? Let's take a closer look at this critical issue.

The NuGet packages we use to build elmah.io revisited

Four years ago, I wrote the blog post The NuGet packages we use to build elmah.io. Since then, we have made several changes to our tech stack as well as upgraded to recent versions of.NET. For this post, I'll update you on the packages we use as of writing this post. I hope you will find some inspiration in seeing how a system like elmah.io is built.

The Power of Structured Logging: Why It Matters in Modern Development

Structured logging has emerged as a crucial aspect of modern application development and monitoring. Unlike traditional logging, structured logging organizes log data into a defined format, often in JSON or XML, making it easier to parse, search, and analyse. This practice simplifies troubleshooting, enhances observability, and supports seamless integration with monitoring tools.

Inside Perspectives: What does AI mean for Redgate?

Jeff Foster, Director of Technology & Innovation at Redgate, explains how Redgate is approaching the AI revolution. As we celebrate Redgate’s 25th anniversary, it’s a great time to reflect on how far we’ve come and where we’re headed. Our longstanding mantra has been “ingeniously simple” software – tools that empower users to accomplish tasks they might not have thought possible.

Future-Proof Your IT: Understanding Self-Healing IT Infrastructure

In today’s fast-paced, always-on digital environment, businesses can’t afford downtime or disruptions in IT operations. This is where self-healing IT infrastructure comes into play. Designed to proactively detect, diagnose, and resolve issues without manual intervention, self-healing systems are revolutionizing the way IT teams manage operations. But what exactly is self-healing IT infrastructure, and why does it matter? Let’s dive in.

Restructuring How We Think About Alerts

Back in Alerts Are Fundamentally Messy, I made the point that the events we monitor are often fuzzy and uncertain. To make a distinction between what is valid or invalid as an event, context is needed, and since context doesn’t tend to exist within a metric, humans go around and validate alerts to add it. As such, humans are part of the alerting loop, and alerts can be framed as devices used to redirect our attention. In this post, I want to drive this concept a bit further.

FinOps for Engineers

FinOps for engineers is gaining more and more ground in the cloud computing sphere. As organizations move toward cloud models, managing the costs associated with them becomes an increasingly important factor, if not the most important. FinOps focuses on optimizing the use of cloud resources. Therefore, FinOps for engineers means that they not only design necessary solutions but also warn about the economic impact.

Top 10 Modern Observability Best Practices

In the realm of modern software development practices, observability is no longer an optional add-on. It is a mission-critical capability. Like how control theory revolutionized industrial systems, and quality assurance redefined manufacturing processes, observability transforms the software systems and their development processes in many ways inspired by the brick-and-mortar industries. This post explores the best practices in modern observability to help you leverage its full potential.

IoT Monitoring: Why It Matters and How to Do It Right?

The Internet of Things (IoT) is no longer a futuristic concept—it’s a reality that’s transforming industries, businesses, and everyday life. With billions of connected devices generating vast amounts of data, managing and monitoring these devices effectively has become a critical task for businesses seeking to optimize operations, enhance security, and ensure seamless performance.