Operations | Monitoring | ITSM | DevOps | Cloud

Apache Kafka Tutorial - Use Cases & Challenges Logging at Scale

Organizations that handle logging at scale eventually run into the same problem: too many events are being generated, and logging components can’t keep up. Even with persistent queues and other mitigating features enabled, there’s simply not enough of a buffer between log generators and log ingesters to handle the volume of log lines coming in.

Building Slack Bots for Fun: A Serverless Release Gong

We have a running joke at Stackery regarding our tiny little gong that’s used to mark the occasion when we get a new customer. And while I’m all about the sales team celebrating their successes (albeit with a far-too-small gong), I felt like the dev team needed its own way to commemorate major product releases and iterations.

10 Things You Should Avoid in B2B Marketing

As you know, B2B marketing refers to the techniques and practices used by companies to sell their product or services to other organizations and businesses rather than individuals. The most essential thing in B2B marketing is to reach out to the right customers and influence them to purchase. However, in achieving this, there are some pitfalls you would want to avoid.

Using t2.unlimited to Increase Packet Limitations

I set out to find a credit mechanism or hard-coded limit in packets per second in AWS EC2. After all my findings set out in this series so far, I had one more test to perform around t2.unlimited. I wanted to see how “unlimited” it is and the difference it makes in packet throughput on capable instance types. This post is about my findings.

Building a resilient cybersecurity strategy for 2019 - Part 1

This ManageEngine Webinar series introduces industry best practices required to be followed in 2019. The importance of privileged access to critical information and data loss prevention (DLP) against insider threats will be discussed. It will also highlight the rising significance of Unified Endpoint Security and Management, trends in Log Management, compliance standards.

Building a resilient cybersecurity strategy for 2019 - Part 2

This ManageEngine Webinar series introduces industry best practices required to be followed in 2019. The importance of privileged access to critical information and data loss prevention (DLP) against insider threats will be discussed. It will also highlight the rising significance of Unified Endpoint Security and Management, trends in Log Management, compliance standards.