Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Featured Post

7 Misconceptions of DevOps Debunked

There's no shortage of posts explaining what DevOps is - from articles that use acronyms like CALMS (Culture, Automation, Learning, Measurement and Sharing) to more thorough explanations that use the traditional division of business change analysis into "people, process, and tools." But there's another way to answer the question, "What is DevOps?" by defining not what DevOps is, but rather about what DevOps is not.

Best practices for tagging your infrastructure and applications

Most modern platforms like AWS and Kubernetes create dynamic environments by quickly spinning up instances or containers with significantly shorter lifespans than physical hosts. In these environments, where large-scale applications can be distributed across multiple ephemeral containers or instances, tagging is essential to monitoring services and underlying infrastructure.

Top Five Website Trends for 2020

The new year is fast approaching, and many of us will make resolutions in preparation for 2020. As you make your own personal pledge to change an undesired trait or behavior, or to accomplish a personal improvement goal, take a closer look at some of the changes you can make on the business side of things. Perhaps your organization’s websites could use some improvements of their own.

Getting Started with Kubernetes using MicroK8s

Single-node deployments of Kubernetes are more common than what one would expect. In some scenarios, single-node clusters make much more sense. For development purposes or testing, there’s no need to deploy a full-blown production-grade cluster. Single-node deployments are also handy for appliances and IoT applications since they have a much smaller footprint. Enter MicroK8s, a tool by Canonical that enables you to easily deploy a lightweight single-node cluster in your local environment.

Understanding Java Garbage Collection Logging: What Are GC Logs and How To Analyze Them

When working with Java or any other JVM-based programming language we get certain functionalities for free. One of those functionalities is clearing the memory. If you’ve ever used languages like C/C++ you probably remember functions like malloc, calloc, realloc and free. We needed to take care of the assignment of each byte in memory and take care of releasing the assigned memory when it was no longer needed.

Why Troubleshooting Tools are Important to Any Citrix Upgrade

The Extended Support end-date for XenApp 6.5 is just under two months away, so the remaining customers, which I expect to be a fair few, should be on their migration journey to the Flexcast Management Architecture versions of Virtual Apps and Desktops 7. We should take a moment to firstly identify the different types of customers and where they are on their Citrix Virtual Apps and Desktops journey.

What meetings reveal about your company culture

Want to get a quick read on your company culture? Just look at your meetings. It’s all there: interpersonal relationships, power dynamics, team camaraderie. For many organizations, meetings are a reflection of the company’s broader processes and health. It’s no surprise, then, that the most effective teams have transformed meetings into a force for alignment, engagement, and efficiency. At Hugo, we’ve seen this firsthand.

Top 20 Developer Tools for 2020

When it comes to the most popular technologies, we look to Stack Overflow’s Developer Survey 2019 to find the answers. JavaScript continues to be the most commonly used programming language for 7 years in a row, while Python is the fastest growing. If you want to find out what tools these developers are using, that’s where our survey comes in. For the fourth year in a row, Axosoft asked our global community of software developers to tweet their top 5 #MustHaveDevTools.

Critical Security Patch in Git and GitKraken

On 12-10-2019, Git released patch v2.24.1 to address several common vulnerabilities and exposures, or CVE. For those unfamiliar with what CVE is, it is a dictionary that provides definitions for publicly disclosed cybersecurity vulnerabilities and exposures. These security issues could allow complete takeover of a computer through the use of various git commands. They can affect all Git and GitKraken users, especially those that have exposure to lots of obscure public repos.