Logentries is a software as a service provider for log management and intelligence, based in Boston, Massachusetts and Dublin, Ireland. Logentries collects and analyzes data found within log files, in real-time with a cloud-delivered approach. Logentries has more than 25,000 users.

Wikipedia
Logentries
Logentries
Blog Post
  • Last time we talked about how to prepare for an audit. In this installment we’ll cover what to do once the audit begins. Let’s assume that you’re pretty well prepared. You’ve done your homework and know pretty much what to expect. So, everything’s good, right? Well, even though you’ve taken

Logentries
Logentries
Blog Post
  • Background This blog will give an overview of Software Defined Networks (SDN), present some suggestions for logging in an SDN and finally present an overview of some research work we are doing on SDN logging. If we consider a Software Defined Network (SDN) paradigm is a racetrack, SDN controllers are

Logentries
Logentries
Blog Post
  • I would like to clarify something immediately with this post.  Its title does not contain the number 7, nor does it talk about effectiveness.  That was intentional.  I have no interest in trying to piggy-back on Stephen Covey’s book title to earn clicks, which would make this post a dime a

Logentries
Logentries
Blog Post
  • Have you found that your organization is developing new applications that are cloud-based, but unable to move away from some established legacy systems? You aren’t alone. This legacy/cloud hybrid environment is far more common than you would expect. And when you look at the history behind these apps it does

Logentries
Logentries
Blog Post
  • Sooner or later, your organization will likely be the subject of an IT audit. But as ominous as that sounds, it doesn’t have to be something to dread. If you’re a network administrator, you’ll have a specific role in an audit. Since audits are rarely small projects, you’ll likely be

Logentries
Logentries
Blog Post
  • Systems of all kinds create log data constantly and voluminously. In searching out the most compelling reasons to dig into and analyze such data, we compiled a list of seven reasons that usually drive such activity. In this blog post we tackle the first of those 7, which include: System

Logentries
Logentries
Blog Post
  • I work as a consultant in the software industry.  This work affords me the opportunity to see and interact with many different teams and thus to observe prevailing trends.  Among these teams, the attitude toward logging tends to be one of resigned diligence. That is, many developers view application logging

Logentries
Logentries
Blog Post
  • Telephone systems were the Internet before there was an Internet. Think about it. By 1920 millions of people were exchanging data on a worldwide network using a device that connected on demand. Sounds like the Internet to me. But unlike the current day Internet, the telephone system cost money to

Logentries
Logentries
Blog Post
  • Introducing Visual Search In our never-ending effort to help you wrangle your infrastructure, we are constantly improving and adding new functionality to Logentries.  In that spirit, today we are happy to announce Visual Search. Visual Search is truly a one of a kind feature, it makes the whole process of an

Logentries
Logentries
Blog Post

New blog articles detected.

  • 5 Rules of Pair Programming Etiquette

    I like Pair Programming. I’ve been doing it episodically for about 10 years. Whenever I’ve pair programmed, at the end of a session, I’ve always walked away a better developer than when I started. However, the practice can be expensive when the pair doing the programming are not efficient. When a

  • 3 Predictions for Development in the Age of Serverless Computing

    Probably the biggest change that has happened in my lifetime of programming is the transformation from  creating code that is meant to run on known, tangible hardware to making code that runs on the Cloud. We’ve gone from server based computing to the serverless environment. The transformation has brought us

  • Java 8 – Lazy argument evaluation

    Overview “I will always choose a lazy person to do a difficult job. Because he will find an easy way to do it” – Bill Gates Lazy evaluation is an evaluation strategy which delays the evaluation of an expression until its value is needed. The opposite of this is eager

  • Logs To Understand User Activity and Behavior

    Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all kinds of information, too, including client or workstation activity, network

  • The Value of Correlation IDs

    In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests from the starting domain to others. For example, you send a

  • The Generosity of Thought: Caring and Sharing in the Open Source Community

    I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory. The Backstory I’ve been using Open Source Software (OSS) for a while now. I started with the big ones, Apache, Maven, MySQL, etc…. But, as time went on and

  • Solving the expression problem

    If you look at any OO-based codebase of a nontrivial size, you’ll [hopefully] find well understood behavior formalized and encapsulated through the effective use of polymorphism- either via interfaces which decouple calling code from a types’ implementation, or via sub typing to share code common to multiple types. To take

  • Using Log Data as Forensic Evidence

    Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or incident has occurred, log data can also provide information about

  • Node.js as a Proxy to Logentries.com

    Logging from the client side of a web application can seem like a challenge.  The web browser exposes everything to the user.  There is no way to hide anything delivered to the client from prying eyes, including your log token to your Logentries log.  There is no reliable way to

  • Goodbye to the VCR: Rewinding Down Memory Lane

    The VHS tape was a thing of a magic that is alien in the world of on-demand media.  It represented a promise of entertainment. A promise only realized when loading the tape into the player and pressing the play button. There was an air of excitement around every video, and

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.