Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Understanding a release-first approach to software supply chain management

For anyone involved in software development, the “infinity loop” is synonymous with DevOps — and rightfully so. We know that software is rarely in a static state for very long. Continuous updates are required to meet the demands of users and to deliver more value, faster than the competition.

The Foundation of Cloud Optimization - Cloud Tagging Strategy

Cloud Tagging should be automated, not left to humans. Optimization in the cloud is actually really simple. Here’s how we get our customers thinking differently which in turn makes them successful. “To your developers the cloud is like a candy store is to a kid where all the candy is free”. Just as parents need to teach their kids the value of money, you need to teach your developers the value of cloud spend.

GitKraken Client and HIPAA: The Ultimate Guide for Software Developers in Healthcare

In the rapidly evolving world of healthcare technology, the Health Insurance Portability and Accountability Act (HIPAA) stands as a beacon of data privacy and security. For software developers operating in this domain, understanding and adhering to HIPAA isn’t just a regulatory mandate—it’s a commitment to patient trust and safety. With the increasing reliance on version control systems in software development, choosing the right Git client becomes paramount.

Deleting Fields from Logs: Why Less is Often More

Logs serve as an invaluable resource for monitoring system health, debugging issues, and maintaining security. But as our applications grow more complex, the volume of logs they generate is increasing exponentially. While logs are crucial, not all log data is equally valuable. With the surge in volume, costs associated with storing and analyzing logs are skyrocketing, impacting both performance and cost. The need for effective log management is more urgent than ever.

The Fatal Unconnectedness of Incumbents from Customers: The Tale of a Race Against the Clock

This tale is based on an actual event that happened to one of our Cribl Search customers. It highlights a massive gap between the urgent needs of modern businesses and the outdated, draconian terms dictated by traditional SIEM vendors. While the events are real, a touch of dramatization was added for the fun of it. Why not?

August Product Updates for Sentry

During the month of August we dropped heaps of new features across the entire Sentry platform. From identifying user frustration through rage and dead clicks to expanding front end Profiling support, your Sentry Dev Team has skipped their summer vacations (well, kinda…) and been hard at work delivering more capabilities to help you better deal with application errors and performance issues.

Breaking Through the Threshold: Leveling up ITSI Adaptive Thresholding with Splunk AI

Adaptive thresholding is a key capability in Splunk IT Service Intelligence (ITSI) that enables customers to dynamically monitor the status of their key performance indicators (KPIs) and derive meaningful service insights and alerts.

How to Securely Wipe a Windows Hard Drive with PowerShell

In today's era of data security, the proper disposal of data on hard drives is crucial. For IT professionals and Managed Service Providers (MSPs), having reliable tools for these tasks is essential. In this blog post, we're diving into the details of a versatile PowerShell script designed for secure and efficient disk wiping. We'll also provide essential tips to ensure its successful execution and data removal.