Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The Three Ways of DevOps Governance

In this blog post, I take a look at modern IT governance by applying the classic “Three Ways” of DevOps principles originally introduced by Gene Kim in his seminal 2012 article. “We assert that the Three Ways describe the values and philosophies that frame the processes, procedures, practices of DevOps, as well as the prescriptive steps.” Here’s a quick reminder of the three ways set out by Gene: For Gene, all DevOps patterns can be derived from these three principles.

Network Observability 101: A Primer

In today's digital-first landscape, maintaining the health and performance of your network is critical for the seamless operation of your business and its services. To that end, network observability has emerged as a key concept and discipline in ensuring the robustness and performance of networks. But what is network observability?

5 Ways AIOps Monitoring Benefits EUC Environments

The adoption of AIOps monitoring technologies has been somewhat slower in EUC than many other areas of IT. The legacy VDI and DaaS vendor tools set expectations low for many. It is still relatively common for us to come across potential customers who are using legacy tools and manually exporting 6 months of data into an excel spreadsheet to try and work out average and peak usage of resources such as CPU to then manually calculate alert thresholds.

Top 9 Benefits of Remote Network Monitoring

Are you relying on outdated manual methods to monitor your network? Struggling to keep up with the increasing complexity of your IT infrastructure? Being constantly reactive to network problems instead of proactive in preventing them? If you answered yes to any of these questions, then you’re putting your business at risk. But don’t worry, there’s a way out — Remote Network Monitoring.

Five reasons why every CIO should consider Kubernetes

You should read this if you are an executive (CIO/CISO/CxO) or IT professional seeking to understand various Kubernetes business use cases. You’ll address topics like: Many enterprises adopting a multi-cloud strategy and breaking up their monolithic code realize that container management platforms like Kubernetes are the first step to building scalable modern applications.

Navigating the Global Cybersecurity Talent Shortage

In an age where technology is central to most of our lives, data security is more important than ever. As we produce ever more data, consumers and organizations become more vulnerable to cyberattack; the demand for cybersecurity talent has increased accordingly, leaving a talent gap within the industry.

The Future of IT Asset Management: 9 ITAM Trends For 2024

Your IT Asset Management (ITAM) practice is not immune from the current corporate focus on IT optimization, that includes both asset utilization and ITAM operations. This, along with increasing technology complexities on the radar, are influencing many of the ITAM trends for 2024. So, where is everything heading towards?

Failure Flags helps build testable, reliable software-without touching infrastructure

Building provably reliable systems means building testable systems. Testing for failure conditions is the only way to reliably root out issues before they impact customers. However, most current Chaos Engineering and resilience testing is focused on the underlying infrastructure. This helps identify potentially catastrophic failures, but misses the more frequent failures that still significantly impact customer experience.

The Advent of Monitoring, Day 4: Solving E2E Testing Challenges With Checkly's PWT Garbage Collector

This is the fourth part of our 12-day Advent of Monitoring series. In this series, Checkly's engineers will share practical monitoring tips from their own experience. One challenge in conducting end-to-end (E2E) testing is managing the artifacts created during the process. These artifacts are necessary for asserting specific functionalities.