Operations | Monitoring | ITSM | DevOps | Cloud

Our Take on The New Stack's Guide to Serverless Technologies

We have read with great interest the recently released The New Stack ebook entitled: Guide to Serverless Technologies. It is a great report with great insights! We encourage you to read it as well (it's free!). We have recently closed our own survey and are tabulating the results and have seen many similarities and some differences in the responses. Weighing in on the findings of the New Stack survey in advance of releasing our report, we wanted to comment on three key themes from this eBook…

Level Up With Derived Columns: Wibbly-Wobbly Timey-Wimey Manipulation

When we released derived columns last year, we already knew they were a powerful way to manipulate and explore data in Honeycomb, but we didn’t realize just how many different ways folks could use them. We use them all the time to improve our perspective when looking at data as we use Honeycomb internally, so we decided to share. So, in this series, Honeycombers share their favorite derived column use cases and explain how to achieve them.

Improving Hospital Workflow with OnPage Alerting

At many points in a hospital’s functioning, workflow touches the outcome. The problem facing much of healthcare though is that the established workflow for alerting and messaging physicians is broken. What are ways for improving scheduling doctors? What are the potential impacts from improvement?

The Challenge Facing Compliance Officers in the Financial Services Sector

Compliance is a major challenge for firms operating in highly regulated industries that rely on external networks of agents or affiliates to sell and/or promote their products. In wealth management, insurance, and lending industries, regulations stipulate that any “content” that is publicly accessible is considered to be advertising and as such, subject to strict compliance oversight.

Improving the Signal-to-Noise Ratio in Threat Detection

Companies are generating massive amounts of data every minute. It’s impossible, unrealistic, and cost-prohibitive for analysts to spot every threat. That’s why even though breaches are in decline year over year, the first quarter of 2018 saw 686 breaches that exposed 1.4 billion records through hacking, skimming, inadvertent Internet disclosure, phishing, and malware.

Introducing "HTTP Method Selection"

Uptime Robot sends HEAD requests for HTTP monitors and GET request for keyword monitors by default (and, this is a good default setting for most monitors). So, here comes the HTTP method selection which enables us to choose the method, send the parameters to be sent (if needed) and also decide if the data will be sent as JSON or not.