Operations | Monitoring | ITSM | DevOps | Cloud

The One Thing Most Engineers Don't Understand (But Should)

How can engineering teams have a bigger impact on the bottom line? By thinking beyond code. Most engineers love to build and solve problems. But in a business, building for the sake of building isn’t enough. Even the cleanest code is just an expensive distraction if it doesn’t move the needle.

Diagnosing ActiveMQ broker performance issues with log analysis

Apache ActiveMQ is a widely used message broker that enables seamless communication between distributed applications. However, as the volume of messages increases, performance bottlenecks can arise, leading to slow message processing, high latency, broker crashes, and out of memory (OOM) errors. One of the most critical issues affecting ActiveMQ is OOM errors, which occur when the broker exceeds its allocated heap memory. This can result in service failures, message loss, and prolonged downtime.

How to leverage AI to enhance network monitoring in retail: A CXO's guide

The retail industry has evolved into a mix of physical stores, e-commerce, digital payments, and omnichannel interactions. Now, GenAI has been added to this mix, which changes how people shop, how retailers operate, and how employees work. While this shift creates opportunities for retailers of all sizes, it also presents serious challenges in maintaining network performance and staying compliant with industry regulations.

Diagnosing and resolving the 500 internal server error with Apache and Tomcat logs

The dreaded 500 internal server error is a common challenge for web administrators, often signaling a disruption in server operations. Diagnosing the root cause requires in-depth visibility into both web server and application behavior. In this blog, we’ll explore how log management tools simplify the diagnosis and resolution of 500 errors by leveraging insights from both Apache and Tomcat logs.

Getting started with Snyk dashboards

If you are involved in software development you will probably be aware of the ever-growing menace of supply chain attacks. These are attempts by attackers to insert malicious code into code libraries which might be downloaded or referenced by developers. Many modern frameworks can install hundreds or even thousands of dependencies, so the potential attack surface can be huge. As well as code libraries, attackers can also attempt to conceal malware in sources such as Docker images or CDNs.

Getting started with Postgres dashboards

In the last few years, Postgres has experienced a meteoric rise in popularity. A relational database that not long ago was relatively unknown outside of academic circles has now eclipsed MySql as the most popular database for developers in the most recent StackOverflow user survey. Why has it achieved such impressive popularity with developers?

Scale Time Series Workloads on AWS: Introducing Amazon Timestream for InfluxDB Read Replicas

The world runs in real-time. From industrial automation and IoT monitoring to AI-powered analytics, developers rely on time series data to power critical systems and make split-second decisions. But as workloads grow, so do the challenges: keeping queries fast, ensuring high availability, and scaling efficiently without adding operational complexity. Not having to worry about operational overhead enables companies to focus on deriving value from their data.

How are your staff using AI? Why you need a company AI policy

As generative AI tools like ChatGPT and Gemini continue to revolutionize the way we work, offering benefits such as increased efficiency and productivity, their adoption has seen a significant surge in workplaces throughout 2024, with 75% of employees globally reporting that they used AI tools at work, according to Gartner.

RFID vs. Barcode Scanning for Inventory Management: Which One Fits Your Business Best?

When it comes to inventory management, businesses are constantly searching for efficient, reliable, and cost-effective solutions. Two of the most popular tracking technologies are RFID tags and barcode scanners. Both have revolutionized data capture and inventory tracking, but they serve different business needs. In this article, we’ll explore the key differences between RFID technology and barcode technology, their advantages, and how to choose the best solution for your operations.