Operations | Monitoring | ITSM | DevOps | Cloud

Serverless Architecture Conference 2019 - Serverless Hits the Big Time in Berlin

I never thought that this would be my life. For more than a year, I’ve been talking to individual customers and getting inspired by their stories, challenges, and goals. Now, I have the spectacular opportunity to meet entire conference rooms of people who are excited to hear about my story, challenges, and goals. This is my time to give back to the types of users who have inspired me ever since I entered the serverless space.

A Breakdown of Language Analyzers for Elasticsearch

Any search engine needs to be be able to parse language. As the field of natural language processing (NLP) has grown, specific text analysis has been applied to stop words and tokenizing (or marking) them by part of speech. In Elasticsearch (and elsewhere), the most attention has been paid to English, although the ELK stack has built-in support for 34 languages as of this writing.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.

Loki Reaches GA with v1.0.0 Release

Today is an exciting day for Loki, as we have decided it’s time for Loki to graduate out of beta and into a 1.0.0 GA release! It’s been just about a year since we announced Loki at KubeCon + CloudNativeCon North America in Seattle, and in that time over 137 contributors have made more than 1,000 contributions. Here’s a look at where the project is today.

Account Takeover IS Your Problem

Phishing and malware are scary enough, but the number-one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why? Because it’s so easy. Data breaches happen almost constantly, and credentials get leaked. At the same time, people are prone to reuse the same few passwords across all their accounts. These two facts spell trouble, as it’s almost impossible for an IT professional to know if working credentials to their company email or CRM are floating around the dark web. Almost impossible that is, until now.

JavaScript Errors: An Exceptional History - Part II

Hello again! Welcome to the finalé of a two-part series of posts on errors in JavaScript. Last time, we took a look into the history of errors in JavaScript — how JavaScript shipped without runtime exceptions, how error handling mechanisms were later added both to the fledgeling web browsers of the day and to the ECMAScript spec, and how they future efforts to standardise these features would be connected to the politics of the browser wars of the late 90’s and 2000’s.