Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

SCOMathon 2020 Can virtual events actually be better than face-to-face ones?

The short answer is “yes they can” but let me elaborate. In 2009 I joined the team behind Mobile World Congress, an event brand that hosts over 100k attendees in Barcelona, 75k in Shanghai and 22k in Los Angeles. I spent the next 9 years with the GSM Association, owner of Mobile World Congress, and Global Expansion Summit organizing over 50 large scale events across all 5 continents.

Power your Puppet reports with PowerBI in 10 minutes

Every Puppet practitioner can appreciate the wealth of information stored inside PuppetDB. Although Puppet Enterprise console offers some insights into the data, we sometimes need rich dashboards, possibilities to correlate data about facts, nodes and reports and drill-down features. In short, we wish there were a way to unleash the full power of PuppetDB data to create situational awareness about our estate. This article will show that PowerBI is a very powerful companion to PuppetDB.

Building more reliable financial systems with Chaos Engineering

The financial services industry has built in more capital buffers to prevent market shocks from bringing another economic collapse. In addition to these financial controls, many banks and personal trading platforms have begun building resiliency into information technology shocks. Despite these new precautions, we’re still seeing outages today, preventing customers from depositing and withdrawing their money, completing transactions, and executing trades during key events.

Change Templates: Your Roadmap for Necessary IT Changes

For some, change is something to look forward to. For others, it may be scary and anxiety-inducing. If the latter describes your organization, it may be time to rethink your change management practice. Changes are necessary in ITSM. Whether standard or an emergency, if IT changes are not successful, the business could suffer in the long run. Performing changes allows IT pros and business leaders to be proactive when risks arise to minimize disruption and keep employees engaged in the work that counts.

Power Up Helm Charts: Using Kustomize to Manage Kubernetes Deployments

Operations teams need to automate deployment of applications, and Helm is the industry-standard solution for deploying to Kubernetes. Like many software vendors, we provide Helm charts for installing Artifactory and other JFrog DevOps platform products, designed for the standard/recommended configurations most teams will need. These templates provide customers a limited set of configuration options.

The Need for 'Real ISP' Visibility in your DEM Strategy

Recently, one of my buddies moved to a new apartment. As an extreme binge-watcher, he tried all different combinations for positioning his 65-inch 4K TV and leather recliner in almost every single sq. ft of the living room. The only flexibility he did not have was in choosing an Internet Service Provider (ISP) for his new house. As a backend dev professional, it did not even matter to him as long as he was getting a 150Mbps internet connection.

Creating a host through the Icinga 2 API

Learning about the Icinga API can be an eye opening moment for some, and lead to a path of automation and configuration management. But where to start? Well, you can always check out the Icinga API documentation for that. But today, I have an idea for you – I’ll show you how to create a host through the Icinga 2 API.

macOS vs. Windows - What kernels tell you about security events: Part 1

How would you compare the Windows and macOS operating systems? In what ways are they similar? Why do they each take different approaches to solving the same problem? For the last 19 years I've developed security software for Windows. Recently, I’ve started implementing similar features on macOS. Since then, people have asked me questions like this. The more experience I gained on these two operating systems, the more I realized they’re very different.