article thumbnail

Dynatrace simplifies OpenTelemetry metric collection for context-aware AI analytics

Dynatrace

Second, embracing the complexity of OpenTelemetry signal collection must come with a guaranteed payoff: gaining analytical insights and causal relationships that improve business performance. The missed SLO can be analytically explored and improved using Davis insights on an out-of-the-box Kubernetes workload overview.

Analytics 280
article thumbnail

Dynatrace and Red Hat expand enterprise observability to edge computing

Dynatrace

As an example, many retailers already leverage containerized workloads in-store to enhance customer experiences using video analytics or streamline inventory management using RFID tracking for improved security. In this case, Davis finds that a Java Spring Micrometer metric called Failed deliveries is highly correlated with CPU spikes.

Retail 258
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Log auditing and log forensics benefit from converging observability and security data

Dynatrace

Log auditing is a cybersecurity practice that involves examining logs generated by various applications, computer systems, and network devices to identify and analyze security-related events. for example, collate which and how many Java applications were attacked) Did we lose any critical data?

Analytics 185
article thumbnail

Understand and replay Android app crashes with Session Replay

Dynatrace

If you want an improved playback experience, we recommend that you capture custom events through the Session Replay API. Another nifty Session Replay feature is the ability to capture custom events—events that are not typically captured by default—irrespective of whether the codebase is Java or Kotlin. Get started.

article thumbnail

Black Hat 2023: Pairing causal AI and generative AI for cybersecurity threats

Dynatrace

Learn more about securing modern applications and infrastructure and how to integrate security analytics into your DevSecOps initiative with the following resources. As security teams seek to understand malicious events, the importance of unified observability in context compounds.

DevOps 185
article thumbnail

Data Reprocessing Pipeline in Asset Management Platform @Netflix

The Netflix TechBlog

Production Use Cases Real-Time APIs (backed by the Cassandra database) for asset metadata access don’t fit analytics use cases by data science or machine learning teams. After reading the asset ids using one of the ways, an event is created per asset id to be processed synchronously or asynchronously based on the use case.

Media 237
article thumbnail

How Dynatrace uses Dynatrace to combat the Log4j vulnerability (Log4Shell)

Dynatrace

Log4Shell is a software vulnerability in Apache Log4j 2 , a popular Java library for logging information in applications. Using details provided by Dynatrace on suspicious events, we performed an extensive analysis of logs for the past weeks to ensure there were no successful attacks on this vulnerability.