Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

JFrog & Qwak: Accelerating Models Into Production - The DevOps Way

We are collectively thrilled to share some exciting news: Qwak will be joining the JFrog family! Nearly four years ago, Qwak was founded with the vision to empower Machine Learning (ML) engineers to drive real impact with their ML-based products and achieve meaningful business results. Our mission has always been to accelerate, scale, and secure the delivery of ML applications.
Sponsored Post

How AI and ML Are Revolutionizing Incident Management in IT Ops

In today’s digital landscape, IT operations face unique challenges and pressures unlike those of the past. Currently, the cost of a service failure for medium and large enterprises is estimated to exceed $100,000 per hour. At present high incident management costs, coupled with the impact on customer satisfaction, present significant challenges for enterprises. To resolve this challenge AI and ML assists in enhancing the overall management of incidents and reducing response times.

Top 5 reasons to use Ubuntu for your AI/ML projects

For 20 years, Ubuntu has been at the cutting edge of technology. Pioneers looking to innovate new technologies and ideas choose Ubuntu as the medium to do it, whether they’re building devices for space, deploying a fleet of robots or building up financial infrastructure. The rise of machine learning is no exception and has encouraged people to develop their models on Ubuntu at different scales.

Accelerating Innovation with MLOps Mastery

Machine Learning Operations (MLOps) is a methodology that combines machine learning (ML) with the principles of DevOps to streamline the development, deployment, and management of ML models. It addresses the unique challenges associated with operationalising ML, such as model versioning, reproducibility, and scalability.

The strata of data: Accessing the gold in human information

I married into a family of geologists and rock and gem enthusiasts, and that bit of serendipity has added immensely to my life. Whenever we go on family hike excursions, I learn so much more about the landscape than I could have ever hoped to from my own educational path, and as a bonus my home gets adorned with tastefully and expertly chosen specimens from around the world.

How, and Why, We Applied Machine Learning to Cove Continuity, Part 2

If you haven’t already read part 1, click here to do that first. If you look at the screenshots, they’re actually quite simple to understand. Anyone can easily identify whether the OS booted successfully at first glance. Look at the following examples and you’ll see what I mean : So, rather than the existing deterministic method, which relied on indirect evidence, we opted to use machine learning and neural networks to analyze and classify screenshots like a human being.

Ways to Build Cybersecurity Resilience: Defending Against New Threats

In today's digital age, where cyber threats loom larger and more complex than ever, building cybersecurity resilience isn't just advisable-it's imperative. Each day, new vulnerabilities are discovered and exploited by cybercriminals who are becoming increasingly sophisticated in their methods. This reality makes it crucial for both individuals and organizations to fortify their cyber defenses to protect sensitive data and maintain business continuity.

How, and why, we applied machine learning to Cove Continuity, part 1

Over the next three blogs, I want to explain how we used machine learning to increase Cove Continuity boot-check accuracy to 99%. Cove Continuity offers the ability to restore source (protected) servers/workstations to virtual machines (VMs) in Hyper-V, ESXi, or Azure. After a VM is restored, Cove performs a boot-check test to prove that the system was properly restored.

Harnessing Technology for Seamless Mortgage Lender Discovery

In an era where digital solutions are at the forefront of transforming industries, the mortgage sector stands as a prime example of this revolutionary change. The complexity of selecting the perfect mortgage lender can overwhelm potential homebuyers, yet, technology simplifies this process, offering streamlined, efficient methods for comparison and selection.

An overview of machine learning security risks

Data is at the heart of all machine learning (ML) initiatives – and bad actors know it. As AI continues to occupy the limelight of modern tech discourse, ML systems are becoming increasingly attractive targets for attack. With the Identity Theft Resource Center reporting a 72% spike in data breaches in 2023, it’s critical to take the proper precautions to ensure your ML projects don’t provide a back door to your data.