Operations | Monitoring | ITSM | DevOps | Cloud

Blog

What Is Identity & Access Management and What Does It Mean for You?

Identity & Access Management (IAM) is the central administration of identities and access rights in a company. Authentication and authorization are essential components with which identities are managed and access rights for linked solutions, systems, applications and resources are controlled. It may sound complicated, but this can be easily explained using a practical example.

CIO Insights: The New Normal and Automation

As I wrote in a previous blog post, the world has undergone massive changes that have created chaos for CIOs as they struggle to ensure operational continuity, including when in scenarios where things change in an unprecedented fashion overnight. What does operational continuity look like as the world moves forward in the paradigm of the new normal? In the previous blog post, I highlighted some significant paradigm shifts the new normal will include, with an intensified focus on these key areas.

SysAdmin Day 2020: Business as Usual During the "New Different"

I’m not going to even try to pretend SysAdmin Day arrives this year under conditions anyone would call “business as usual.” I’m going to avoid the cliched and empty platitudes of “the new normal,” “unprecedented times,” and “focusing on what matters.” I’m also going to avoid needlessly reminding you how much your company, coworkers, family, and friends rely on you because of your technical knowledge and expertise.

Monitoring for Citrix Digital Workspaces

eG Innovations has been a Citrix partner since 2003. Those were the days when Citrix’s messaging was around “access”. Thin client computing and then server-based computing were the hot topics. Discussions around the efficiency of RDP and ICA ruled and Citrix Resource Manager was the best way to monitor a Citrix server. What was then Citrix MetaFrame soon became Citrix Presentation Server, then Citrix XenApp, and now Citrix Virtual Apps.

Kubernetes Security Best Practices You Must Know

Kubernetes (k8s) enables you to efficiently orchestrate container management, in the cloud or on-premises. As a whole, k8s provides many benefits, including features for self-healing, automated rollouts and rollbacks, load distribution, and scalability. However, k8s is a highly complex platform and requires extensive configuration.

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, and Elon Musk.

Instrument your Python applications with Datadog and OpenTelemetry

If you are familiar with OpenTracing and OpenCensus, then you have probably already heard of the OpenTelemetry project. OpenTelemetry merges the OpenTracing and OpenCensus projects to provide a standard collection of APIs, libraries, and other tools to capture distributed request traces and metrics from applications and easily export them to third-party monitoring platforms.

Distributed tracing analysis backend that fits your needs

I am spending a considerable amount of time recently on distributed tracing topics. In my previous blog, I discussed different pros and cons of various approaches to collecting distributed tracing data. Right now I would like to draw your attention to the analysis back-end: what does it take to be good at analyzing transaction traces?

What's New: Updates to Visibility Console, Event Intelligence, Analytics, and More!

We’re excited to announce a new set of product updates and enhancements to the PagerDuty platform! PagerDuty partners with organizations to help teams create efficiencies across IT organizations and protect customer relationships. These updates will help further improve your team’s ability to manage and reduce noise, automate critical response workflows, and quickly mobilize a response in order to mitigate disruptions across your digital operations when seconds matter.