Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Demystifying Blockchain: Understanding Its Role in Securing Digital Transactions

Blockchain technology, first introduced as the underlying framework for Bitcoin, has emerged as a key innovator in digital security and transactional integrity. This article explores blockchain's fundamental mechanics, its role in enhancing digital trust, its diverse applications, and its future prospects.

Developers Call for Full-Stack Observability as Pressure Mounts to Accelerate Release Velocity and Deliver Seamless and Secure Digital Experiences

Cisco has unveiled findings from a survey that details how software developers are spending more than 57% of their time being dragged into 'war rooms' to solve application performance issues, rather than investing their time developing new, cutting-edge software applications as part of their organisation's innovation strategy.

Embedded Open Source Summit 2024 Recap

April marked the return of the Embedded Open-Source Summit, this year in Seattle. I was lucky enough to be able to attend and split my time between the Memfault booth in the exposition hall and many of the captivating presentations. Since the videos have just been published on the the Linux Foundation’s YouTube account, we thought it would be a good time to highlight some of the talks and give you a quick summary which will, hopefully, inspire you to go watch them!

Use Grafana Alloy to collect Azure metrics with less hassle

Are you using the Azure metrics exporter to ship telemetry data to Grafana Cloud? Are you overwhelmed with the amount of configuration and complexity necessary to avoid being rate limited? Well, did you know that with Grafana Alloy, our distribution of the OpenTelemetry Collector with built-in Prometheus pipelines and support for metrics, logs, traces, and profiles, you can now: Let’s look at how these two features can reduce the complexity of your Alloy configuration.

Why business continuity belongs in the cloud?

Resilience in today’s liquid business environment demands flexibility. The term “observability” replaces monitoring, reflecting the need to adapt and be agile in the face of challenges. The key is to dissolve operations into the cloud, integrating tools and operational expertise for effective resilience. I remember that when I started my professional career (in a bank) one of the first tasks I was handled was to secure an email server exposed to the internet.

Elastic's RAG-based AI Assistant: Analyze application issues with LLMs and private GitHub issues

As an SRE, analyzing applications is more complex than ever. Not only do you have to ensure the application is running optimally to ensure great customer experiences, but you must also understand the inner workings in some cases to help troubleshoot. Analyzing issues in a production-based service is a team sport. It takes the SRE, DevOps, development, and support to get to the root cause and potentially remediate. If it's impacting, then it's even worse because there is a race against time.

Sentry on Sentry: How Metrics saved us $160K

If you know me, you know I care about fast code. Recently, I ran a simple query that revealed that we spend almost $160k a year on one task. Luckily, we launched the Metrics beta back in March. Over the last month or so, 10 of us Sentry engineers collaborated across many functions to leverage Metrics to track custom data points and pinpoint the issue leading to this ridiculous ingestion cost.

Your DevOps Checklist: 7 Software Deployment Best Practices

Failures and bugs are all too common during software deployment, even with the best development teams. Following software deployment best practices helps you increase efficiency, improve security, and bring products to market faster. This article combines the seven most valuable practices your team can start implementing today.

What is Early Launch Anti Malware? An Overview

In an era dominated by digital advancements, cybersecurity has become the cornerstone of technological integrity and trust. The pivotal role of cybersecurity in today’s digital landscape is exemplified by the exponential rise in cyber threats—ranging from ransomware to sophisticated phishing attacks—that demand increasingly robust defensive mechanisms.