3 Predictions for Development in the Age of Serverless Computing

Probably the biggest change that has happened in my lifetime of programming is the transformation from  creating code that is meant to run on known, tangible hardware to making code that runs on the Cloud. We’ve gone from server based… Read More

Tagged with: ,
Posted in Cloud, DevOps, Scripts, Uncategorized

Java 8 – Lazy argument evaluation

Overview
“I will always choose a lazy person to do a difficult job. Because he will find an easy way to do it” – Bill Gates
Lazy evaluation is an evaluation strategy which delays the evaluation of an expression until… Read More

Tagged with: , , ,
Posted in Application Performance Monitoring, Development, Java, Tips & Tricks

Logs To Understand User Activity and Behavior

Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all… Read More

Tagged with: , , ,
Posted in Log Analysis, Security

The Value of Correlation IDs

In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests… Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, Development, Log Analysis, Log Management, Server monitoring, Web

The Generosity of Thought: Caring and Sharing in the Open Source Community

I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory.
The Backstory
I’ve been using Open Source Software (OSS) for a while now. I started with the big ones,… Read More

Posted in Uncategorized

Solving the expression problem

If you look at any OO-based codebase of a nontrivial size, you’ll [hopefully] find well understood behavior formalized and encapsulated through the effective use of polymorphism- either via interfaces which decouple calling code from a types’ implementation, or via sub… Read More

Tagged with: , , ,
Posted in Development

Using Log Data as Forensic Evidence

Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security

Node.js as a Proxy to Logentries.com

Logging from the client side of a web application can seem like a challenge.  The web browser exposes everything to the user.  There is no way to hide anything delivered to the client from prying eyes, including your log token… Read More

Tagged with: , , , , ,
Posted in Application Performance Monitoring, Development, DevOps, How To, JavaScript, Log Management, Logentries, Scripts, Web

Goodbye to the VCR: Rewinding Down Memory Lane

The VHS tape was a thing of a magic that is alien in the world of on-demand media.  It represented a promise of entertainment. A promise only realized when loading the tape into the player and pressing the play button.… Read More

Tagged with:
Posted in Uncategorized

Widely-used Android App Leaks MS Exchange Credentials

In October, Rapid7 researchers uncovered a significant vulnerability in the Nine mobile application for Android. Baldly stated, this app leaks Microsoft Exchange user credentials, plus mail envelopes and attachments, mailbox synchronization data, caleandar entries and tasks to attackers. It has… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Logentries, Monitoring, Security

Subscribe to the Blog

Categories

Archives