Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Discover 7 New Major Features on Qovery

I'm thrilled to unveil a suite of groundbreaking features that we've introduced over the past four months at Qovery. Our commitment to enhancing your development and deployment experience continues to be our driving force. Recently, we shared these updates during our exhilarating public demo day, which you can watch here. Let's dive into the features that are set to redefine your interaction with Qovery.

AI Explainer: Continuous Space

I wrote a previous blog post, "AI Explainer: What's Our Vector, Victor?," to scratch the surface on vector databases, which play a crucial role in supporting applications in machine learning, information retrieval and similarity search across diverse domains. From that blog arose the topic of embeddings, which I addressed in a subsequent post, "AI Explainer: Demystifying Embeddings." In explaining embeddings, the notion of continuous space was presented, which is the topic of this blog.

Fixing Slowdowns: The Story of E-Banking System's Quick Recovery

In the world of digital banking, maintaining a seamless and efficient online experience is paramount. However, even the most robust systems can encounter issues that disrupt service and degrade performance. Let us delve into a recent incident that impacted eBanking services of one of our customers, highlighting the criticality of database management and the steps taken to resolve the issue.

How Human Error Relates to Cybersecurity Risks

In the digital age, the threat of cybersecurity breaches looms larger than ever. Inadvertent actions, such as clicking on phishing links, falling victim to social engineering tactics, using weak passwords, or neglecting essential security practices, contribute significantly to cybersecurity risks. These actions create openings for cybercriminals to exploit, leading to unauthorized access and data breaches.

What Is WAF? Web Application Firewall Defined

The rapid evolution of technology has given rise to sophisticated cyber threats that can exploit vulnerabilities in web applications. Cybercriminals continually devise new methods to compromise data integrity, confidentiality, and availability. To counter these threats, organizations must adopt advanced security measures that go beyond traditional security protocols.

Server Management with Windows Admin Center

Windows server management is complex, and when your servers are running in different locations — on-premises, in a distributed network, in Azure, virtually, or in a hosted environment — it gets more complicated. You can simplify server management with Microsoft’s Windows Admin Center, which makes it easier to manage servers, wherever they are, from a single interface.

BYOD Security Guide: Top Threats & Best Practices

Bring Your Own Device (BYOD) is a policy allowing employees to use their personal devices for work-related activities. It is an approach that promotes flexibility and efficiency and has gained widespread adoption in recent years. The BYOD policy framework outlines guidelines and rules governing the use of personal devices in a professional setting, and its significance lies in establishing boundaries that balance the benefits of flexibility with the need for security and data protection.

Bridging The Gap: The Marketing Hype vs. The Reality of AI in IT

Let's cut through the AI fantasy. You've read the headlines: artificial intelligence is the new electricity, the magic wand transforming businesses overnight. But in my experience working with many clients with InvGate, I've gained some valuable insights. Turns out it’s not all smoke and mirrors. Let's dive into the real story of AI in business, far from the echo chamber of Silicon Valley buzzwords and closer to the tangible reality of everyday corporate life.

4 Hurdles of Multi-Repo Management (and How to Solve Them)

First, let’s break down the differences between mono and multi-repo setups. Mono-repos are exactly what they sound like – singular repositories that hold everything in one place. Multi-repos, however, can scatter the landscape, resulting in separate repos that are all still part of the larger ecosystem. While this approach offers flexibility, it can also make projects way harder to manage.

Network Monitoring Tools Explained

Ensuring the reliability and performance of your network is essential for success in the modern software industry. In this article, you’ll learn about the basics of network monitoring and get an overview of some of the most popular tools used for network monitoring. Whether you’re managing a sprawling enterprise network or your home lab, understanding and deploying the right tools can mean the difference between smooth sailing and unforeseen downtime.