Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Robotics pages on Ubuntu: bridging the gap

Today, 10/04/2020, new robotics pages went live on ubuntu.com. We want to show our involvement, our stance and our support for ROS and robotics. These three pages cover what we do in the robotics space, Canonical’s involvement with ROS and Open Robotics, and the relevance of community in the field of robotics. Our intention is to be another entry point for new users to involve themselves and to enable them to build robots with ROs on Ubuntu.

Universal security and network monitoring rules for everyday use

It’s no secret that information threats appear in numbers nowadays. It may be time to refresh some typical rules, tested by years of practice worldwide, to make your monitoring setups as up-to-date as possible. None of these rules are cast in iron; they are all flexible enough to adapt to any given environment. What matters is underlying idea; the implementation is what makes them suitable for custom needs.

AIOps Without Training is Just...Ops

Algorithms are at the heart of the technologies we use in virtually every facet of our daily lives — formulas and processes that help us connect, solve problems and accomplish amazing things. Things like better speech recognition and landing an autonomous rocket on a drone ship, or giving us really great Netflix recommendations. But an algorithm is just a set of rules or a set of tasks to perform given a certain input.

IT Service Management Trends to Watch Out for in 2020

ITSM is a hot topic for people who manage IT infrastructure. There are new developments coming out every few months that tend to show where the industry is headed. ‘Automation’ has been all the craze for the past few years, yet it is still quite relevant even today. Then there is ‘digital transformation’, another significant industry jargon that gets thrown around a lot. Last year was all about the release of ‘ITIL V4’ – a major step towards the future.

How to effectively manage your AWS costs

Often, when companies are new to Amazon Web Services (AWS), they aren’t focused much on the cost. They’re more likely fixated on taking advantage of the scalability and flexibility offered by the cloud. As a company’s AWS cloud infrastructure grows, it will find that its cloud costs grow as well. As the number of AWS accounts increases over time, there’s a higher chance of overspending on unnecessary cloud resources.

Monitoring critical business applications while working remotely

With a huge number of employees around the globe working remotely during the COVID-19 pandemic, delivering uninterrupted business services to customers has become a major challenge. This requires strict monitoring of all critical business applications in order to accommodate an increased amount of requests, which can cause a critical downtime if not monitored appropriately.

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of creating and enforcing a solid cybersecurity strategy for employees who work remotely.

Rancher 2.4 Enhances Security with CIS Benchmark Scanning

Editor’s note: Rancher Labs’ William Jimenez provides an introduction to CIS Scan. Then Saiyam Pathak takes over with a hands-on demo. Cluster security is critical to any successful Kubernetes strategy. Recent research by AimPoint revealed that 44 percent of respondents had delayed application production due to security concerns around Kubernetes containers. Yet securing Kubernetes is a complex machine with many moving parts, integrations and knobs and levers.