Logentries is a software as a service provider for log management and intelligence, based in Boston, Massachusetts and Dublin, Ireland. Logentries collects and analyzes data found within log files, in real-time with a cloud-delivered approach. Logentries has more than 25,000 users.

Wikipedia
Logentries
Logentries
Blog Post

New blog articles detected.

  • Network Administrator’s Guide to Surviving an Audit: During the Audit
    Last time we talked about how to prepare for an audit. In this installment we’ll cover what to do once the audit begins. Let’s assume that you’re pretty well prepared. You’ve done your homework and know pretty much what to expect. So, everything’s good, right? Well, even though you’ve taken
Logentries
Logentries
Blog Post

New blog articles detected.

  • Logging in a Software Defined Network
    Background This blog will give an overview of Software Defined Networks (SDN), present some suggestions for logging in an SDN and finally present an overview of some research work we are doing on SDN logging. If we consider a Software Defined Network (SDN) paradigm is a racetrack, SDN controllers are
Logentries
Logentries
Blog Post

New blog articles detected.

  • Habits that Pay Off for Programmers
    I would like to clarify something immediately with this post.  Its title does not contain the number 7, nor does it talk about effectiveness.  That was intentional.  I have no interest in trying to piggy-back on Stephen Covey’s book title to earn clicks, which would make this post a dime a
Logentries
Logentries
Blog Post

New blog articles detected.

  • Legacy apps in the data center, today’s apps in the cloud
    Have you found that your organization is developing new applications that are cloud-based, but unable to move away from some established legacy systems? You aren’t alone. This legacy/cloud hybrid environment is far more common than you would expect. And when you look at the history behind these apps it does
Logentries
Logentries
Blog Post

New blog articles detected.

  • Network Administrator’s Guide to Surviving an Audit: Preparation
    Sooner or later, your organization will likely be the subject of an IT audit. But as ominous as that sounds, it doesn’t have to be something to dread. If you’re a network administrator, you’ll have a specific role in an audit. Since audits are rarely small projects, you’ll likely be
Logentries
Logentries
Blog Post

New blog articles detected.

  • Log Analysis for System Troubleshooting
    Systems of all kinds create log data constantly and voluminously. In searching out the most compelling reasons to dig into and analyze such data, we compiled a list of seven reasons that usually drive such activity. In this blog post we tackle the first of those 7, which include: System
Logentries
Logentries
Blog Post

New blog articles detected.

  • Logging for Fun: Things You’d Never Thought to Log
    I work as a consultant in the software industry.  This work affords me the opportunity to see and interact with many different teams and thus to observe prevailing trends.  Among these teams, the attitude toward logging tends to be one of resigned diligence. That is, many developers view application logging
Logentries
Logentries
Blog Post

New blog articles detected.

  • Roots and Culture: Logging and the Telephone Bill
    Telephone systems were the Internet before there was an Internet. Think about it. By 1920 millions of people were exchanging data on a worldwide network using a device that connected on demand. Sounds like the Internet to me. But unlike the current day Internet, the telephone system cost money to
Logentries
Logentries
Blog Post

New blog articles detected.

  • Never type a search query again!
    Introducing Visual Search In our never-ending effort to help you wrangle your infrastructure, we are constantly improving and adding new functionality to Logentries.  In that spirit, today we are happy to announce Visual Search. Visual Search is truly a one of a kind feature, it makes the whole process of an
Logentries
Logentries
Blog Post

New blog articles detected.

  • 5 Rules of Pair Programming Etiquette
    I like Pair Programming. I’ve been doing it episodically for about 10 years. Whenever I’ve pair programmed, at the end of a session, I’ve always walked away a better developer than when I started. However, the practice can be expensive when the pair doing the programming are not efficient. When a
  • 3 Predictions for Development in the Age of Serverless Computing
    Probably the biggest change that has happened in my lifetime of programming is the transformation from  creating code that is meant to run on known, tangible hardware to making code that runs on the Cloud. We’ve gone from server based computing to the serverless environment. The transformation has brought us
  • Java 8 – Lazy argument evaluation
    Overview “I will always choose a lazy person to do a difficult job. Because he will find an easy way to do it” – Bill Gates Lazy evaluation is an evaluation strategy which delays the evaluation of an expression until its value is needed. The opposite of this is eager
  • Logs To Understand User Activity and Behavior
    Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all kinds of information, too, including client or workstation activity, network
  • The Value of Correlation IDs
    In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests from the starting domain to others. For example, you send a
  • The Generosity of Thought: Caring and Sharing in the Open Source Community
    I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory. The Backstory I’ve been using Open Source Software (OSS) for a while now. I started with the big ones, Apache, Maven, MySQL, etc…. But, as time went on and
  • Solving the expression problem
    If you look at any OO-based codebase of a nontrivial size, you’ll [hopefully] find well understood behavior formalized and encapsulated through the effective use of polymorphism- either via interfaces which decouple calling code from a types’ implementation, or via sub typing to share code common to multiple types. To take
  • Using Log Data as Forensic Evidence
    Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or incident has occurred, log data can also provide information about
  • Node.js as a Proxy to Logentries.com
    Logging from the client side of a web application can seem like a challenge.  The web browser exposes everything to the user.  There is no way to hide anything delivered to the client from prying eyes, including your log token to your Logentries log.  There is no reliable way to
  • Goodbye to the VCR: Rewinding Down Memory Lane
    The VHS tape was a thing of a magic that is alien in the world of on-demand media.  It represented a promise of entertainment. A promise only realized when loading the tape into the player and pressing the play button. There was an air of excitement around every video, and

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.