Operations | Monitoring | ITSM | DevOps | Cloud

Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

AWS vs Azure: Choosing the Best Cloud Provider for Your Needs

AWS and Azure are two big names in the cloud world. If you have already invested in Microsoft technologies, you might prefer Azure over AWS. However, it is not as simple as that. Many factors are involved in this decision, including the type of service, pricing model, geographical area, your existing technology, etc. In this article, we will compare all the major cloud service categories of AWS and Azure and will compare both companies in detail.

Demystifying Cloud and Cloud-Native Observability

In the ever-evolving and fast-changing landscape of cloud computing and modern software development, achieving 360-degree visibility into your critical business services, applications and infrastructure is essential. This is where observability comes into play. Observability, especially in a cloud-based or cloud-native environment, has become a critical aspect of maintaining and optimizing complex systems and services.

Adopt a 'GDPR everywhere' strategy

Companies used to have an easier time complying with regulations, but compliance has really never been a straightforward endeavor. In the past, there was one set of rules for businesses to obey, the local rules in the place where companies do business. If the business expanded into new parts of the world, they would have to comply with new rules, but these would apply only to those new territories. The global economy means an end to this approach.

Staying Ahead of the Curve: Understanding the Latest Data Storage Technologies

Hey there! In this tech-savvy world, data storage technologies are evolving faster than ever. From floppy disks to cloud storage, how we keep our precious data safe has come a long way. But with buzzwords like "NVMe," "SSD," and "object storage" floating around, it's easy to feel lost. Don't worry, though. I've got your back! Let's dive into the world of data storage tech and figure out what's hot and what's not.

Logic App Best Practices, Tips, and Tricks: #37 How to get distinct values from an array?

Welcome again to another Logic Apps Best Practices, Tips, and Tricks. In my previous blog posts, I discussed some of the essential best practices you should have while working with the Azure Logic App. Today, I will speak about another helpful Best Practice, Tips, and Tricks that you must consider while designing your business processes (Logic Apps): How do we get distinct values from an array or repeating structure?

Eliminate scaling lag without overprovisioning Kubernetes

Let’s get right to the point: most Kubernetes workloads are underutilizing CPU and memory, with 49% of containers using less CPU than their defined requests. Although Kubernetes provides users with the ability to define resource guidelines for containers based on CPU and memory needs, it can be difficult to define and maintain these resource requirements for dynamic applications, especially in fast scaling scenarios.

[Webinar] End-to-end Azure observability: The complete essentials of Azure monitoring

As your business expands, you need to scale your infrastructure accordingly. And with the complexity of modern cloud infrastructures, it's crucial to have a comprehensive observability strategy in place. Discover ways to achieve operational excellence throughout your Azure infrastructure with our webinar.

Google Photos vs. iCloud: What's The Best Way to Store Photos?

Whether you’re a professional photographer, hobbyist, or just want to take a quick snapshot of a hilarious cat, we all have the power to take beautiful pictures straight from our smartphones, thanks to the power of technology. Fortunately, we don’t have to worry about waiting weeks for our photos to be developed and organizing them effectively in photo albums because we have many photo storage apps and services to help us store our precious memories quickly and securely.

Enhance your cloud security with MITRE ATT&CK and Sumo Logic Cloud SIEM

As cloud applications and services gain prominence amongst organizations, adversaries are evolving their toolset to target these cloud networks. The surge in remote work and teleconferencing presents unprecedented opportunities for nefarious activities. Enter the MITRE ATT&CK Framework, also known as a MITRE ATT&CK Matrix—a treasure trove for defending cloud infrastructure and on-premises infrastructure against the newest adversary tactics, techniques, and procedures (TTPs).