Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Configurable Ruby Modules: The Module Builder Pattern

In this post, we’ll explore how to create Ruby modules that are configurable by users of our code — a pattern that allows gem authors to add more flexibility to their libraries. Most Ruby developers are familiar with using modules to share behavior. After all, this is one of their main use cases, according to the documentation.

On-call doesn't have to be stressfull

“Being on-call is a critical duty that many operations and engineering teams must undertake to keep their services reliable and available. However, there are several pitfalls in the organization of on-call rotations and responsibilities that can lead to serious consequences for the services and the teams if not avoided.

5 Useful Content Optimization Tools for SEO

When it comes to running a website, one of the hardest things to accomplish is a high SEO ranking. Understandably, this is also the most important thing in terms of your website’s success. In order to get your website out there for people to find, you need to impress Google and its algorithms. This goes beyond just picking a great design or publishing a nice written piece or two.

Use SNMP to monitor whatever you need

SNMP (Simple Network Management Protocol) is a popular protocol family, supported by majority of network devices, as well as available for every more or less popular operating system. One of most useful features of modern SNMP servers implementations is user-defined extensions. Simply put, one can instruct SNMP server to hold data returned by any user-defined action (such as output printed by a script or program). That can be used to use SNMP as container protocol, to deliver whatever data you need.

How to Prevent a Content Theft from Your Website

Web content is being stolen, and that’s a trend. In 2013, Google employee Matt Cutts said that 30% of content on the Internet is plagiarism. 6 years have passed, and the situation has not improved. Despite the emergence of a new source determination algorithm in Google, hundreds of thousands of users copy other people's photos, videos, and texts to present them as their own. We’ll tell you how to protect content from theft and adequately respond to plagiarism.

The Age of Service Mesh

You have built a massively successful system. The users just can't get enough and request new features. Your developers crank out new services on a regular basis. Your DevOps/SRE team configures and scale your Kubernetes cluster (or clusters). As the system becomes more complicated and sophisticated you realize that there are common themes that repeat across all your services.