Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Teams V2 Synthetics and Real-User Monitoring Support

With the release of Microsoft Teams 2.0 and the Classic Teams client nearing its EOL (end of life), we were eager to explore the changes that Teams 2.0 brought about. Today we will look into the new features and architecture of Teams 2.0 as well as provide insight into the changes and improvements to the CloudReady Teams Messaging and Teams AV sensors.

What Developers Should Know about Observability

Peter is a serial entrepreneur and co-founder of Percona, FerretDB, and other tech companies. As a leading expert in open-source strategy and database optimization, Peter has applied his technical knowledge and entrepreneurial drive to contribute as a board member and advisor to several open-source startups. His insights into performance optimization and system reliability play a crucial role in shaping Coroot’s functionality.

Investing in Logistics: Identifying Disruption to Stay Ahead of the Pack

Tony Palcheck has been identifying consumer and commercial business trends and investing in technologies that either drive or benefit from those trends for over 20 years. He remembers the days when GPS and Wi-Fi were ideas on a PowerPoint slide – and watching them become mainstream technologies across industries that help improve our everyday lives. And he’s proud to have been at the forefront of many smart, innovative technology ideas ever since as a corporate venture capitalist.

How Meta and Google use AI to improve incident response

The world population in 2024 is approximately 8.12 billion people. Of these, 4.3 billion people use Google regularly, while 3.74 billion are active users on Meta's platforms. Any disturbance involving these tech giants will surely make headlines, as seen in the recent Google’s Unisuper incident. The scale of these tech companies brings fascinating challenges in every aspect of their operations, including incident response.

Monitoring the Impossible - Synthetic Monitoring for 2FA, Virtual Desktops & Windows

In the recent past, it's evident that most people use mobile apps and the web to access various services. Unlike a few decades ago, a simple touch of a button via mobile devices can complete a financial transaction automatically. Consumers need to create accounts using their credentials and passwords then use these details to complete different actions like making account updates and processing transactions.

Leveraging observability to improve digital resilience

With increasing competition and a digitizing landscape, small and medium enterprises (SMEs) in Australia are being forced to level up their game using AI and modernization. This means eventually relying on cloud and AI integration to ensure agility and responsiveness. The diversity of applications and the complexity of tech architecture pose challenges like increasing costs, security risks, and scalability challenges.

Enhancing Security Best Practices: Lessons from Puppet's Proactive Approach to GitHub Repository Management

As a part of Perforce, we are committed to maintaining the highest standards of security for our products and our customers. Recently, we had the opportunity to further strengthen our security practices thanks to valuable input from an independent security researcher. This experience has not only reinforced our robust security protocols but also provided insights that we're eager to share with the wider tech community.

VM Configuration: Using IaC to Stand Up Consistent Virtual Machines & Cut Down on Complexity

Configuring virtual machines (VMs) is an important task for any organization. Users across departments depend on sysadmins, engineers, and the rest of the IT ops and infrastructure teams to get VMs secured and ready to use, whether you’re spinning one up for a quick test, a new database server, or standing up a whole fleet of dev-ready machines. That need for variability AND consistency can also make VM configuration one of the most tedious sysadmin tasks, especially at enterprise scale.

Uncomplicate SLOs to Deliver Digitally Resilient Systems and Better Customer Experiences

If your organization has an observability practice, it’s likely that the end goal was to increase system reliability and customer satisfaction. But balancing reliability needs with the need to innovate to meet ever-increasing customer expectations remains a challenge for most.