Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Key Challenges of Database Cloud Migration

As we shift enterprise computing to the cloud, the need for database migration increases—but with this comes the inherent challenges of migration and the need to plan. Moving to the cloud can come with more risks and obstacles than migrating a database within a data center or from one on-premises data center to another. If a business isn’t fully prepared to migrate, they’re almost certain to run into issues.

SaaS vs. PaaS vs. IaaS: What's the Difference?

Every service you acquire to use temporarily and let go of when you’re done can use the “as a service” suffix. A cab is a vehicle as a service. Rather than buying a car, you merely pay to have another person’s car move you from one point to the next. IT services embody the same model. Browser-based text editors alleviate the need to install fully-fledged word processors on computers.

AI on premise: benefits and a predictive-modeling use case

Running an Artificial Intelligence (AI) infrastructure on premise has major challenges like high capex and requires internal expertise. It can provide a lot of benefits for organisations that want to establish an AI strategy. The solution outlined in this post illustrates the power and the utility of the universal Operator Lifecycle Manager (OLM) using Juju, a universal OLM, to create and manage on premise AI infrastructure.

Analytics-Based Investigation and Automated Response with AWS + Splunk Security Solutions

Organizations are migrating an increasing amount of their infrastructure into the cloud. The cloud provides organizations with a number of benefits like greater scalability, improved reliability and faster time to value. However, these potential benefits can be offset if security is an afterthought.

Consumer broadband takes center stage - are CSPs ready?

It could be argued that consumer broadband networks have historically been poor neighbours of business networks, with CSPs investing more funds in providing better SLAs to their higher paying business customers. But like it did for many of our pre-set ideas, the pandemic turned the tables around for broadband priority. Forced work from home policies, remote learning, and quarantines have effectively turned consumer broadband into business/educational/health broadband services for many.

Secure Kubernetes by default with support for GKE Shielded Nodes on Ocean

Security remains a consistent priority for cloud providers to ensure that customers are always protected, data is secure and applications are safe. Users of Google Kubernetes Engine (GKE) are provided with ways to maintain the integrity of the compute instances that applications are running on top of.

IAM Policy Basics and Best Practices

One of the most powerful aspects of AWS is their Identity and Access Management (IAM) service. The obvious aspect of its power is that it controls who can do what with all the resources inside your AWS account. But the non-obvious side is how configurable it is. You can encode permissions that are so finely grained that a Lambda Function could, for example, be given just enough permissions to be able to read one attribute from one record for the current user of a DynamoDB Table.