Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

GitHub Plugin 2.0 release

We’re excited to announce the release of GitHub Plugin version 2.0, which adds some new features that increase productivity and reduce the need to context switch between Mattermost and GitHub. As usual, our open source community members have played a key role in developing all of these features and I’d like to say “Thank You!” for their help. Our GitHub plugin is one of the most popular integrations on Mattermost and we use it every day as part of our development process.

6 Questions to Jumpstart Your IT Asset Management Strategy

IT asset management (ITAM) is a hot topic of 2020. Like almost everything else, managing lifecycle costs and minimizing risks has been a bit more complicated in recent months given the sudden shift to remote work and assets leaving the traditional workplace. It begs the question: are you maximizing the value from your current ITAM strategy? Let’s dive into this handy checklist of questions to help you answer the question above.

Get Around Docker Hub Download Limits: JFrog Artifactory

You may have heard the latest Docker announcement about the new rate limits for container image pulls. Starting November 1st, Docker will start to limit Docker Hub usage based on your subscription level and block pull requests that exceed imposed limits. Not only that, Docker has also put in place a new retention policy, six months for free accounts, for inactive images (originally slated for November 1, this policy has been delayed to mid-2021 due to community feedback).

The Industry is Driving Toward a 14-Day SLA on Vulnerability Remediation. What's Holding You Back?

Threat actors can move pretty fast. There are untold numbers of adversaries operating in the shadows looking for the next vulnerability they can exploit. Sometimes they find a vulnerability that hasn’t been identified by white-hat researchers or the vendors—resulting in a zero-day exploit—but most often they watch for public disclosures and updates from vendors to identify changes that have occurred in code.

Event in Review: MIT Sloan CIO Digital Learning Series - MIT Digital Transformation Insights

The final episode in the MIT Sloan School of Management CIO Symposium series took place on 14th October and ended with a focus on digital transformation, offered by a diverse set of business leaders across a range of industries. The previous two episodes focussed on the shift in workplace and how enterprises are handling the new normal.

Delivering Always-On Digital Experiences in Retail

How is it already near the end of October? We know our retailer customers have been heads-down thinking about code freezes and hypercare during the high season as we approach the holidays. Disruption and pivoting quickly to meet changing customer expectations is nothing new to the retail industry.

The Ultimate Guide to AWS Step Functions

The use of serverless computing has become a must nowadays, and some of you may already know a thing or two about Amazon Web Services like Lambda Functions, Step Functions, and other services AWS provides. However, if this is the first time you hear about them – fantastic! In this article, we’ll discuss AWS Step Functions, what they are used for, how to use them, and the advantages or disadvantages that they bring.

Build a Raspberry Pi Desktop with an Ubuntu heart

On the 22nd October 2020, Canonical released an Ubuntu Desktop image optimised for the Raspberry Pi. The Raspberry Pi Foundation’s 4GB and 8GB boards work out of the box with everything users expect from an Ubuntu Desktop. It is our honour to contribute an optimised Ubuntu Desktop image to the Raspberry Pi Foundation’s mission to put the power of computing into people’s hands all over the world.

How to Leverage File Monitoring as an Effective Breach Detection Tool

One thing that all organizations of any size need to realize is that data breaches only occur when there are not sufficient breach detection tools in place. Simply having a data loss prevention system does nothing unless you are actively using it to identify and stop a data breach from occurring. This is not to say that even with the best secure data solutions that your data is not at risk. Hackers are constantly evolving and adapting their methods, so you should never rest on your laurels.