Welcome!


From the Blogosphere

Certainly, enterprises feel the pressure to transition their networks to next generation architectures like SDN to brace the coming storm that is an app economy. Service providers could provide valuable advice to them on how to do that, if they could yell loud enough over the thunderou...
I just recently wrote a blog about BOTs causing unwanted traffic on our servers. Right after I wrote this blog I was notified about yet another “interesting” and unusual load behavior on our download page which is used by customers to download latest product versions and updates. If y...
As co-founder of Logentries I am often asked - "Why Logs?" And I have to admit, upon first impression, ‘log management and analytics' does not seem like the sexiest space :). However at Logentries we are here to redefine that space, to provide a solution to access, manage and understa...
If you're an executive that's concerned about the high-cost of proprietary software, you're not alone. If your IT team pushes back whenever Line of Business leaders ask them for feature enhancements that goes beyond the limits of the commercial software packages they've licensed, then ...
While some might still be focused on SDN with an OpenFlow-style twist, 30% of the organizations in our survey this summer (report forth coming, I promise!) were looking at SDN to improve time to market. Of those, 73% considered an API-enabled infrastructure to be important to very impo...

UPDATE (9/28/2014): Our security team indicates that we're now seeing the majority of attempted exploits of Shellshock coming in through input paramters. They've provided ASM signatures to mitigate and recommend customers use these signatures to protect their applications. Y...

One of the most common questions we get asked by customers is: “What’s the best way to log my data?” My answer is always: "log using JSON format wherever possible.” The next question we often get asked – (but not as much)… Yeah JSON, …Hmmm, what is JSON again? So JSON is: S...

This past March, Oracle released their most anticipated version in almost decade, Java 8. The latest version had a growing buzz since it had been announced, and companies of all sizes were eager to upgrade. Our partner, Typesafe conducted a Java 8 adoption survey of 2,800 developers...

Amazon is indisputably the biggest name in cloud service providers. They have built up a strong market presence primarily on the argument that access to cheap compute and storage resources is attractive to companies looking to shed IT costs as they move from on-premises solutions to th...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
Log analysis is a simple and cool way to add oversight to your orchestration environments. While scripting your infrastructure is a powerful tool, using it alone is a quick-hit device. But wait, there is more! You don’t even have to create the scripts manually; there are tools ou...
We're working hard in the Logentries towers to integrate our continuous delivery tools, so we can identify and track issues as easily as possible. This saves us time that we can spend on important things like adding new features (or playing pool!). We use a lot of tools to manage our...
Skytap recently announced the availability of a Docker template in the Skytap Cloud Public Template Library. Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. This new template allows you to easily experiment with or deploy Docke...
Tactics without strategy are dangerous. ~ Robert Leonhard

In the new b...
You can then easily piece together full transaction traces by ordering all method calls by sequence number. Further analysis can be applied to this information for a number of purposes. For example, by analysing the transactions, developers can easily construct design diagrams that can...
As a lifelong word junkie, I can honestly say that I’ve never seen more debate, argument, and failure to reach an agreed upon definition of a word than we’re seeing over the word “DevOps.” And while it can be frustrating to find a definition that works for you, and not be swayed by the...
Executives charged with building business-driven applications have an extremely challenging task ahead of them. However, the cavalry has arrived with useful tools and strategies built specifically to keep modern applications working efficiently. We partnered with Gigaom Research to ca...
Inarguably, the pressure is on "the network" to get in gear, so to speak, and address how fast its services can be up and running. Software-defined architectures like cloud and SDN have arisen in response to this pressure, attempting to provide the means by which critical network servi...
If the existing system does fifteen things, write down the major tasks of that system and divide them into as many verticals as necessary to describe the broad functional areas that require attention. If the replacement is intended to be a custom-developed, on-premises system, it’s per...
Last week Ivan Pepelnjak wrote an article about the failure domains of controller based network architectures. At the core of SDN solutions is the concept of a controller, which in most cases lives outside the network devices themselves. A controller as a central entity controlling the...
The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those credentials and thwart the increasingly complex authentication process that guards financial ...
In 2013, the National Football League struck a landmark deal with Microsoft that gives Xbox users exclusive interactive access to games each week and requires coaches and coordinators to use Surface tablets on the sidelines. The deal is worth a staggering $400 million over the next fiv...
When we are deciding between public or private cloud implementation there are some capabilities we need to take into consideration and security is one of the top ones. Other characteristics like integration with existing systems, costs and management are also important. Looking at the...
We recently released AWS CloudTrail integration with Logentries – and not surprisingly we’ve seen a significant uptick in adoption as one of our most popular integrations. My job as director of customer success is to make things as simple for our customers as possible. One question tha...
In today’s post in the modernizing your infrastructure with Hybrid Cloud series, I am going to talk about Hyper-V over SMB, which we introduced in Windows Server 2012. It is also important to note that you can use storage spaces to house your SMB share that Hyper-V will leveraged. In...
Some don’t know but “yes” there is a past for the Internet of Things. What’s really interesting is what the future looks like. Just imagine the Internet of Things in the year 2025. Can you?
On August 28th, Samsung and LG announced their latest generation of smartwatches in separate press releases. The Samsung report flaunts its Gear S, a smartwatch with a curved screen that measures a full two-inches long. Capabilities of the watch include providing notifications from soc...
In today’s software-defined business era, uptime and availability are key to the business survival. The application is the business. However, ensuring proper application performance remains a daunting task for their production environments, where do you start? Enter Business Transacti...
Last week I was both learning and speaking at the The Internet of @ThingsExpo in New York City. I taught a session on the subject of IoT, Code Halos and Digital Transformation Strategies. Then I had the privilege of interviewing Microsoft's mobile and IoT guru Nick Landry (Twitter @Act...
In June I was presenting at the ThingsExpo conference  at the Javits Center in New York City. During my talk I was demonstrating how to integrate consumer devices into a business workflow. In particular, I was doing live measuring of my own blood pressure to show how to integrate consu...
I came across a very interesting story posted at the Reviewed.com. Website in the section covering home oven reviews. The headline read “The Smart Home Dominates the Internet of Things.” The story, based on a recent report published by Appinions, a market research firm, stated that whi...
The evolution of JavaScript and HTML 5 to support a genuine component based framework (Web Components) with the necessary tools to deliver something close to a native experience including genuine realtime networking (UDP using WebRTC). HTML5 is evolving to offer built in templating sup...
Google has created what it calls a “Matrix-style,” virtual version of California’s road system that it’s been using to test self-driving cars before sending them out onto the actual road, according to the Guardian. Google is apparently so thrilled with its simulation that it asked Cali...
Elasticity is hailed as one of the biggest benefits of cloud and software-defined architectures. It's more efficient than traditional scalability models that only went one direction: up. It's based on the premise that wasting money and resources all the time just to ensure capacity on ...
As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. Mobile application developers are working with a massive variety...
This tutorial is primarily for the students in my 420-517 Software Development Project course at Dawson College. It explains how to set up a workspace in Eclipse for this course. These instructions are important because Eclipse stores workspace specific settings in the workspace itself...
If you listen to the persistent murmur in the market surrounding the Internet of Things right now, you'd believe that it's all about sensors. Sensors and big data. Sensors that monitor everything from entertainment habits to health status to more mundane environmental data about your h...
So far, 2014 has turned into a banner year for CIOs that have invested the time and effort to plan for hybrid cloud services, while building strong strategic relationships with their Line of Business leadership. Their approved capital investment budget spend is on-track and operational...
IT systems will need to adapt, and evolving — or simply adding on to the existing relational database management system architecture — isn’t going to cut it. What does this mean, if not Hadoop or in-memory as the end-all, be-all? TechTarget writer Nicole Laskowski sums it up nicely: Ar...
Internet of Things is the current hip phrase of technology evangelists, geeks and all kinds of clairvoyants. If, according to tech blogs and websites, 2013 was the year of big data, then 2014 certainly is the year of Internet of Things. New projects, big funding rounds, the general hyp...