Operations | Monitoring | ITSM | DevOps | Cloud

%term

Monitoring Security Vulnerabilities in Your Cloud Vendors

If you manage applications running on cloud platforms, you likely depend on multiple cloud vendors and services. These could be infrastructure providers like AWS, GCP or Azure. A vulnerability in any of these services could potentially impact your applications and your users. A cloud platform has many moving parts, many of which are dependent on other third-party providers.

When to Buy Tech Products Online

Can you believe that Amazon launched 30 years ago? It was one of the earliest e-commerce ventures on the then-nascent Internet. Born as an online bookstore, the company has more recently transformed the world by making goods and services easily accessible to anyone with a computer or smartphone – and inspiring others to do the same. What made Amazon different from traditional brick-and-mortar stores wasn’t just that you could buy online.

AWS microservices overview

With the nearly unmatched reliability and scalability offered by the 12-factor application design pattern, microservice-based designs have become a fundamental architectural pattern for modern applications. A whole industry of cloud providers has sprung up to offer management of the sophisticated middleware and infrastructure services that make this possible. Amazon Web Services (AWS) is among the largest of them.

AWS EKS: Architecture and Monitoring

AWS Elastic Container Service for Kubernetes (EKS) is a managed service ideal for large clusters of nodes running heavy and variable workloads. Because of how account permissions work in AWS, EKS's architecture is unusual and creates slight differences in your monitoring strategy. Overall, it's still the same Kubernetes you know and love.

NinjaOne Wins in the 2024 SDC Awards

NinjaOne is excited to announce that we were named a 2-time winner in the SDC 2024 awards! This year, NinjaOne was named the Winner in the Service category and the Digital Transformation category. The SDC Awards recognize and reward leaders in innovation, expertise, and success of the IT industry. They focus on the products and services that are the foundation for digital transformation.

Creating the Foundation to Unlock the Opportunity with AI

The third article in our Data Economy series examines what it takes to unlock the opportunities with AI. Based on some of the key findings of our own research ‘Predicting the Data and AI Revolution’ and exclusive insights provided by leaders in the data economy, this piece explores how organizations are currently using AI.

What Is Cloud Infrastructure?

We all know that testing new ideas on physical IT infrastructure requires a massive upfront cost. That's why businesses adopt cloud infrastructure setups. These setups offer on-demand resources, which allow you to start new projects and pay for only what you use. This eliminates the need for expensive hardware and maintenance, enabling flexibility that organizations require.

Introduction to the OpenTelemetry Sum Connector

When you have a piece of data tucked into your logs or span tags, how do you dig for that bounty of insight today? Commonly this sort of data will be numeric, like a purchase total or number of units. Wouldn’t it be nice to easily turn that data into a metric timeseries? The Sum Connector in OpenTelemetry does just that, allowing you to create sums from attributes attached to logs, spans, span events, and even data points!

Indicators of Compromise (IoCs): An Introductory Guide

To confirm cyberattack occurrences and build or enhance cyber-defense strategies, threat intelligence teams use a lot of information, including Indicators of Compromise (IoCs). These IoCs are actually forensic data that are critical in: The relevance of IoCs cannot be downplayed, but they're not all that’s needed in building an effective cybersecurity strategy. In this article, we’ll explore indicators of compromise, their types, and their relevance to threat intelligence teams.