Operations | Monitoring | ITSM | DevOps | Cloud

Technology

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

Five worthy reads: AI and ML: Keys to the next layer of endpoint protection

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about why incorporating AI into your UEM strategy may be inevitable.

What is an API for? Let's find out all about it

So, when someone talks to you about APIs, do you still think it refers to Blas’ inseparable partner in Sesame Street? then you may have a little problem with technology. No one will ever mess with you again for this. But you must be careful. The explanation will be as educational and entertaining as those of the mythical Epi and Blas. Therefore, let’s answer this question: What is an api for?

How Sentry Thrives as an Open Source Software Company

When I tell people that Sentry is open source, they nod, understanding that this is known to be a good, noble thing. Then, they have questions. Many questions. “You mean open core?” they ask. No. Open source. “So you sell professional services?” No. Head scratching, then a pause. “Then… how do you make money?”

Why API Monitoring is Crucial to Your Business

In today’s interconnected world, API monitoring is vital. Businesses rely on data in everyday operations, and often rely on Web APIs to send and access data. But if an API is down, slow or not behaving as expected, it can severely impact business operations. Whether you’re an API provider or rely on third-party APIs, continually monitoring your API environment lets you know when there’s a problem.

Browser Automation: Using the Gmail API to Retrieve MFA Codes

In a separate article, we introduced the concept of performing synthetic transactions with LogicMonitor to ensure website services are up and running correctly. It may be necessary to authenticate with a website before you can fully monitor it, and authentication may require presenting an MFA code that has been delivered via email. Let’s take this a step further and incorporate an MFA (Multifactor Authentication) Challenge.

Tracking insider threats with AI

If you thought masked hackers in dark rooms spreading malware were your only security concern, think again. In its Insider Threat Report for 2018, Crowd Research Partners brought to light that almost 90 percent of organizations find themselves vulnerable to insider threats. What’s worse is that 50 percent of these organizations experienced an insider attack in 2018.