Operations | Monitoring | ITSM | DevOps | Cloud

Advanced alerting and anywhere alert management for Azure Monitor

Have you ever wanted to get important alerts from Azure Monitor notified on your smartphone and have all the important details of the problem at your fingertips? Have you ever missed the option to easily change the status of alerts from Azure Monitor in the Azure smartphone app? Ever missed a push notification because there was no persistent and advanced alerting? Then this article is for you.

IBM Expands IBM Cloud Paks Offering with LogDNA

IBM recently announced an expanded Cloud Paks offering with LogDNA. With this offering, developers and engineering teams can easily aggregate and search huge volumes of data from any source to gain real-time insights on their applications. LogDNA is now offered by IBM and deployable on-premise or multi-cloud with all IBM Cloud Paks including Cloud Pak for Applications, Cloud Pak for Data, Cloud Pak for Integration, Cloud Pak for Multi-cloud Management, and Cloud Pak for Automation.

Serverless Architecture Conference 2019 - Serverless Hits the Big Time in Berlin

I never thought that this would be my life. For more than a year, I’ve been talking to individual customers and getting inspired by their stories, challenges, and goals. Now, I have the spectacular opportunity to meet entire conference rooms of people who are excited to hear about my story, challenges, and goals. This is my time to give back to the types of users who have inspired me ever since I entered the serverless space.

A Breakdown of Language Analyzers for Elasticsearch

Any search engine needs to be be able to parse language. As the field of natural language processing (NLP) has grown, specific text analysis has been applied to stop words and tokenizing (or marking) them by part of speech. In Elasticsearch (and elsewhere), the most attention has been paid to English, although the ELK stack has built-in support for 34 languages as of this writing.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.

Loki Reaches GA with v1.0.0 Release

Today is an exciting day for Loki, as we have decided it’s time for Loki to graduate out of beta and into a 1.0.0 GA release! It’s been just about a year since we announced Loki at KubeCon + CloudNativeCon North America in Seattle, and in that time over 137 contributors have made more than 1,000 contributions. Here’s a look at where the project is today.

Account Takeover IS Your Problem

Phishing and malware are scary enough, but the number-one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why? Because it’s so easy. Data breaches happen almost constantly, and credentials get leaked. At the same time, people are prone to reuse the same few passwords across all their accounts. These two facts spell trouble, as it’s almost impossible for an IT professional to know if working credentials to their company email or CRM are floating around the dark web. Almost impossible that is, until now.