Last week I talked in depth about control planes and the differences between EKS and Cycle. In this weeks blog we'll dive into what it takes to spin up a cluster and get things rolling.
The In-process model of running Azure Functions is being retired in favor of the Isolated model in two years. A lot of components on elmah.io are running on Azure Functions. To ensure we are running on the most modern and supported platform (also in two years), we have spent quite some time migrating from In-process to Isolated functions. In this post, I'll share both a checklist to help you do the same as well as some of the lessons learned we had during the migration.
Effective March 12, 2024, Google replaced the First Input Delay (FID) metric with Interaction to Next Paint (INP) as a part of its Core Web Vitals. This change marks a significant shift in how web interactivity is measured, reflecting a more comprehensive view of user experience. This blog explores INP, strategies for optimization, and asks if FID is still a valuable metric.
Discovery sources periodically run network analyses to identify devices in your IT environment, ensuring your asset inventory is updated and reliable. It is a fundamental function of any robust IT Asset Management (ITAM) tool. For this reason, we are eager to announce that InvGate Insight now integrates with VMWare! This means that now you can automatically discover and integrate ESXis and vCenters and incorporate them into your inventory without the need to download an individual agent on each one.
Canonical’s Managed Solutions team is proud to announce Firefighting Support, a new service for organisations that manage their infrastructure by themselves but need experts on call for troubleshooting needs. Firefighting Support provides managed-service-level support to customers who graduate away from fully managed services or are under security regulations too stringent to grant environment access to a third-party.
Learn how Megaport’s investment in one of Australia’s fastest-growing economies will transform the connectivity landscape. Adelaide, Australia is already known for great food, proximity to world-famous wineries, and a laidback lifestyle. But recently there has been an increased focus on business, with South Australia currently the fastest-growing economy of any Aussie state.
Malicious code, also known as malware, is any piece of software that deliberately damages your systems or causes them to malfunction (as opposed to a software bug that may unintentionally do these things). The reasons for this may be simple mischievousness, curiosity, or a proof of skill for bragging rights.
When mobile devices first made their way into the workplace decades ago, mobile device management (MDM) provided device-level control and security. As mobile technology advanced, enterprise mobility management (EMM) grew out of MDM to include mobile application management (MAM), mobile content management (MCM) and identity and access management (IAM). Today, EMM gives you a comprehensive approach to managing the various usage and security aspects of mobile devices in the workplace.
Network mapping is the process of exploring, identifying, cataloging, and then visually representing all of the devices (both real and virtual, local and remote) connected to your network. This vital documentation task should be performed regularly to ensure that you have a clear picture of your network and security landscape, so that you can quickly identify and fix issues.
When you hear the word "cloud storage," what company comes to mind? Internxt! Right? No, you usually think of Google Drive and Dropbox. Why? Because they are huge and old, and they spend millions (maybe billions) trying to ensure you never forget who they are. So which one of the old tech nobility is better? Is Google Drive or Dropbox cheaper? Which one is the better option for you? Or is there a better and more private cloud alternative you should choose instead?