Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The Difference Between IaaS, Paas, and SaaS

An ever-increasing number of organizations are working in the cloud. It depends on their business model what cloud delivery model they use. The three most common deployment models for cloud services are software-as-a-service (SaaS), platform-as-a-service (PaaS) and infrastructure-as-a-Service (IaaS). Here, we explain the differences between these cloud delivery models and what you need to consider when choosing the right model for your organization.

Serverless Logging Performance - Part 1

When thinking about serverless applications, one thing that comes to mind immediately is efficiency. Running code that gets the job done as swiftly and efficiently as possible means you spend less money, which means good coding practices suddenly directly impact your bottom line. How does logging play into this, though? Every logging action your application takes is within the scope of that same performance evaluation.

New Contact Tracing App and Health Screening Features Help Bring Employees Back to the Workplace Safely

Uber, Coca Cola European Partners, State of North Carolina, BankUnited, and AmeriGas Using ServiceNow Safe Workplace Apps to Make Returning to Work, Work for Everyone In only four weeks since the initial release of ServiceNow’s Safe Workplace apps, close to 400 customers worldwide have implemented over 1,600 app installations to manage the safe return of their employees.

Automating Storage Forecasting Using a Time Series Database Puts the Future in Customers' Hands Today

When the stakes are high, every decision is only as good as the information behind it. With the right information, enterprises and vital sectors can confidently make informed decisions. Data becomes a foundation for action — and a source of differentiation. But how do you store the relentless influx of data — especially since data storage costs, amplified by the risk of data loss, are among the top hurdles facing organizations today?

SQL Server, Part 4: Understanding built-in SQL Server principals

In the previous blog in this series, we discussed the principle of least privilege, and the importance of assigning bare minimum privileges to users and systems at database or server levels. However, there are certain built-in principals in your database that possess all permissions in SQL Server. If an attacker managed to get hold of one of these principals, the database could be easily exploited and damaged.

Best practices for creating end-to-end tests

Browser (or UI) tests are a key part of end-to-end (E2E) testing. They are critical for monitoring key application workflows—such as creating a new account or adding items to a cart—and ensuring that customers using your application don’t run into broken functionalities. But browser tests can be difficult to create and maintain. They take time to implement, and configurations for executing tests become more complex as your infrastructure grows.

Unlock the flexibility and financial benefits of Azure VMs with Site24x7

Virtual machines (VMs) are one of the on-demand, scalable computing resources that Microsoft Azure offers. They enable streamlined allocation of resources in backup, disaster recovery, and deployment environments. A VM is typically chosen when you need more control over your computing environment. However, Azure VMs come with the challenge of simultaneously monitoring them across multiple environments when the VMs are spread unevenly, with some being overutilized and others underutilized.

Qovery and the Twelve-Factor App methodology

The Twelve-Factor App methodology is a methodology for building platform-agnostic and resilient applications. It was introduced by Adam Wiggins while working at Heroku in 2011. Nearly 10 years later, this methodology is still considered by the developer community as an excellent practice to follow when building an application. In this article, we will see step by step how Qovery respects and improves the 12-factor methodology. Here we go.