Below, we’ve lassoed the posts you need to read from us. Check out what our authors are writing about in this week’s digest.

How to Monitor Your Apache Logs

Logs are important. One use case can be to check traffic volume. Knowing your website traffic can be helpful, as it gives you information to help you decide whether to scale your website hosting resources. You can use these logs to optimize your website and improve its performance because users love fast websites and hate slow ones. So how can you monitor your Apache logs? Mathews Musukuma’s post on Loggly’s blog might give you some answers.

Remote Pair Programming: A Developer’s Getting-Started Guide

A programmer, Hollywood tells us, is a wizard. They live alone, they’re very prickly, and you can never understand them. Reality tells us something else altogether. Programming is actually a very social job! The average programmer spends time reviewing their teammates’ code and contributing to planning meetings. And for those trickiest tickets? Many developers don’t turn off the lights and turn up the music. Instead, they reach out to a teammate and hop into a pair programming session. This is where pair programming comes up. Find out more about it from Eric Boersma on CoScreen’s blog.

SQL Injection, Explained: What It Is and How to Prevent It

Many people today might consider SQL injections a thing of the past. In truth, they’re anything but. For instance, 70% of the security exploit attempts to Rails apps analyzed in the Sqreen’s State of Application Security Report were SQL injections. This finding shows that even a robust framework such as Ruby on Rails—which counts as a tried and true ORM in the form of Active Record—is not a silver bullet when it comes to SQL injections. SQL injection is still top of the list of most common security threats to web apps, and it has been there for quite a while. What are organizations supposed to do to avoid this problem, then? Find out the answer from Carlos Schults on Sqreen’s blog.

Many—maybe most?—organizations treat their logging approach as a mere troubleshooting mechanism, failing to realize the tremendous opportunities that lie dormant in their log files. At the same time, their competitors may have realized the importance of techniques such as log analysis long ago and are already reaping the benefits. Guess who has more chances of remaining competitive in the dog-eat-dog tech world we live in? However, there’s no need to despair if your organization belongs to the former group: you can still make up lost ground. And this post is here to help you. Learn more from Carlos Schults on Scalyr’s blog.

We also updated a post on iOS logging this week. Apple’s mobile platform is ubiquitous, with iPhones, iPads, and iPad minis coming in first or second in phone and tablet sales. Find out more about iOS logging on Scalyr’s blog.