Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Announcing Lightrun Cloud: Shifting Left Observability, One Developer at a Time

We’re proud to announce the general availability of Lightrun Cloud – a completely free and self-service version of the Lightrun platform. We consider Lightrun Cloud to be a major milestone in our constant journey to empower developers with better observability tooling and welcome you to sign up for a free account.

Environment variables and Secrets - The Future of Qovery - Week #6

During the next five weeks, our team will work to improve the overall experience of Qovery. We gathered all your feedback (thank you to our wonderful community 🙏), and we decided to make significant changes to make Qovery a better place to deploy and manage your apps. This series will reveal all the changes and features you will get in the next major release of Qovery. Let's go!

Workflow Efficiency Through Workflow Management (Full Guide)

Workflow efficiency has never been more important. As the COVID-19 pandemic tightens purse strings across the globe, organizations of all sizes are looking to get more done with less. Workflows are a vital asset to any organization. It has been found that approximately three hours of every eight-hour workday is wasted on irrelevant or personal tasks.

Five worthy reads: Location intelligence-the key to next-level data utilization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience.

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack. Hackers gained access to the video feed of at least 15 thousand cameras deployed across various locations and exposed the inner workings of hospitals, clinics, and mental health institutions; banks; police departments; prisons; schools; and companies like Tesla and Cloudflare.

Self-hosting software & why it may be worth considering again now

Not all industries are the same in terms of the sensitivity of data they handle. And as you mature as a company, you need to be more careful of how you handle your critical data. With the advent of modern cloud native technologies & Kubernetes, on-prem software is more viable now.

Maximizing VMware Performance and Memory Utilization

VMware is one of the top virtualization software that allows you to create virtual machines and make the best use of your resources. One of the major focuses of virtualization solutions is to enable optimized use of resources like memory and computing power, but overcommitting your hypervisor towards greedy resource management can lead to severe degradation in the overall performance.

Top 20 DevOps Blogs to Keep Your Eye on in 2021

The process of developing software applications has evolved over the years. DevOps has taken over the world, and more and more companies are starting to adopt the DevOps culture in their process. DevOps is a practice of operations where engineering teams work together through the entire software development cycle. It includes functions from development to testing and deployment to production support. Because of that, DevOps has become popular in the industry.

How to build insightful M365 Analytics Dashboards with SquaredUp and Microsoft Graph API (Part 2)

In the last blog post, I walked you through how to connect to the Microsoft Graph API so you can start pulling in the M365 analytics to create a dashboard in SquaredUp. In this blog post, I’ll walk you through exactly how to create this dashboard. This dashboard will allow you to monitor key metrics for Microsoft 365 SharePoint, Exchange Online, and Teams so you can be proactive in assigning storage.

Mitigating CVE-2021-20291: DoS affecting CRI-O and Podman

The CVE-2021-20291 medium-level vulnerability has been found in containers/storage Go library, leading to Denial of Service (DoS) when vulnerable container engines pull an injected image from a registry. The container engines affected are: Any containerized infrastructure that relies on these vulnerable container engines are affected as well, including Kubernetes and OpenShift.