Operations | Monitoring | ITSM | DevOps | Cloud

uptime

Creating a Project Post Mortem | The Why's and How's of Finishing Projects

A project post mortem is a lethal-sounding term that seeks to answer the question: did this project work? Was it worth the investment and the time, and if it wasn’t can you learn from it? As the term implies, the project must be “no more” or “ceased to be” or “bereft of life.” Creating this document requires a time investment, and it’s tempting to just move onto the next project.

Escalations and Maintenance Windows Are Critical to Downtime Response

Uptime.com includes several advanced check options to provide the flexibility organizations need in creating a response plan to downtime. Maintenance and planned downtime for patches and updates don’t typically create severe downtime events. With escalations, teams have an automated alert system that contacts designated senior-level personnel with relevant technical data.

10 Tips for a Smooth Transaction Check

A Transaction Check is designed to run through a specific set of instructions and test certain elements on your site. The check interacts with clickable objects or text fields, and can test important elements like: Shopping carts, Login forms, and Landing pages. Before you begin configuration of a check, it’s helpful to run through this list of potential items you need.

8 Ecommerce Site Testing Best Practices

Ecommerce companies completely dependent on the internet for revenue experience increased pressure to provide an always-available, always-working shopping experience for customers. Nasdaq puts estimates for ecommerce-facilitated transactions to be up to 95% by the year 2040. During Black Friday through Cyber Monday 2018, Shopify reported their merchants sold up to $37 million per hour through their ecommerce platform.

DNS Hijacking: What You Need to Know

Crashed websites and slow loading pages can be devastating for any site owner. But there’s another type of threat that often goes undetected. A report published by FireEye on Thursday details a particular type of DNS hijacking that allows hackers to easily steal information. These attacks have been going on for approximately two years and involve three different methods that compromise websites without alarming users.

Using AWS or Azure? Why You Need a Website Monitoring Service

Already have a monitoring service with your current host? Does your plan include Amazon CloudWatch, Azure Monitor or another proprietary monitoring tool? You might want to check the fine print. These services often provide internal web monitoring only. While they may check HTTP availability from locations outside their network, HTTP checks alone are not sufficient.

5 Steps to Prepare Your Web Infrastructure for 2019

At least 10 major data breaches occurred in 2018 including Facebook, Google Plus, WordPress, and healthcare sectors. The surge in breaches proves we need to do a better job detecting foul play. User data and our own IP are crucial assets to safeguard in this environment. We also observed major downtime incidents from companies like Facebook and Microsoft.

Domain Blacklists: How to Check and Remove Your Site

Are website visitors experiencing problems with accessing your website or email? Your domain may be blacklisted. If your website isn’t available, blacklists can wreak havoc on your web traffic potentially resulting in lost revenue. It’s crucial to remedy the problem immediately. Uptime.com includes a Domain Blacklist Check to continually monitor your site for issues.

2018 Website Outages: Key Lessons from Popular Website Downtime

Now that companies depend on the cloud for access to key services and business operations, downtime has a larger impact on productivity. Uptime is just as critical to small businesses as it is to major ecommerce retailers on Black Friday. Even the public relies on various services like Alexa and email to be available throughout the day. Looking at major outages over the past year provides insight into how companies prepare to handle these events.