Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Planning for Cloud Migration as a Permanent Condition

When you complete your big cloud migration project, by all means celebrate, but don’t party too hard. The job’s not done. Digital transformation is never finished. Technology will progress. Customer expectations will evolve. The competition will advance. And your business must grow. This means that the transition to hybrid and multi-cloud is not a one-time event—it’s an ongoing process.

DockerHub vs Cloudsmith Private Docker Registry

We’re a little late to the party. Fashionably late. By now the world knows that DockerHub has removed the free, untraceable goodness of anonymous pulls. How dare they? How dare they build a revolutionary technology, open-source it and give it away for free at a substantial cost to themselves. It’s worth calculating what a couple of petabytes of CloudFront bandwidth would cost, even with a substantial discount. It’s mind-blowing.

Best 5 Tools for Node.js Monitoring

Application developers are turning to Node.js as one of the most popularly used Javascript frameworks for microservice development. Node.js tops the list of most utilized frameworks amongst the developers worldwide in 2020 by 51.4 percent. With the increasing demand for Node.js technology, it has become crucial to monitor the performance of the applications, servers, and other metrics.

Exploring ROS 2 Kubernetes configurations

Kubernetes and robotics make a great match. However, as we have seen, robots running ROS 2 can be tricky to set up on Kubernetes. This blog series has explored running ROS 2 on Kubernetes, set up a simple talker and listener, and distributed that demo across three machines. The configurations presented may not quite fit your implementation, and you may want to dig a bit deeper into network traffic when troubleshooting.

How to Estimate Any Website Traffic with These 3 Tools

While there are several different ways to measure the success of a site: one core metric is its traffic. Knowing how well your site performs compared to other sites is crucial in understanding how successful you have been in your efforts against competitors. This is possible if you know how much traffic your competitors are generating. Along with this, some competitor intelligence tools hand over the full list of keywords that bring traffic to a site.

Introducing: Alert Response as Code

Alert Response as Code is Interlink’s software-based, programmatic model for identifying incident alerts and driving an automated response. IT teams can automate the triggering of recovery processes that would otherwise involve running individual, manual steps across multiple applications, devices and operating systems.

Your re:Invent 2020 Schedule

re:Invent 2020 is here and while you don't have to find Galileo 601 or Hall G it can still be a lot to manage. Our team combed through the massive re:Invent schedule to bring you the the most important sessions related to serverless, architecture, and DevOps. In addition to the Serverless Track and the Keynotes we recommend these particular sessions. If you need help putting your schedule together we love Cloud Pegboard!

How Accenture drives digital transformation at speed with the Now Platform

Accenture is renowned as a global leader in technology consulting and outsourcing, with 500,000 employees serving clients from a range of industries, across 51 countries. The organisation uses the Now Platform to transform how it gets work done and is also a long-standing partner. At Knowledge 20, Accenture was named ServiceNow’s Global Partner of the Year.

InfluxDB Cloud is on AWS US East

We’d like to let you know that InfluxDB Cloud is now on AWS US East, also called us-east-1, based in northern Virginia. This is our third AWS region, after initially launching InfluxDB Cloud in AWS Oregon and later AWS Frankfurt. This brings InfluxDB Cloud’s effortless scaling, flexible usage-based pricing, AWS marketplace integration, and a broad range of AWS connectivity points to customers that want to manage their time series data in the eastern United States.

How to Define Your Security Posture, and Why it Matters

Not only do cybersecurity organizations need to deliver the level of security required to protect corporate assets, they also need to align with the strategic goals and objectives of the business. By defining, establishing and managing your organization's cybersecurity posture, you can deliver the results needed for the business to be successful.