Operations | Monitoring | ITSM | DevOps | Cloud

%term

Tame Your Telemetry: Introducing the Honeycomb Telemetry Pipeline

Observability means you know what’s happening in your software systems, because they tell you. They tell you with telemetry: data emitted just for the people developing and operating the software. You already have telemetry–every log is a data point about something that happened. Structured logs or trace spans are even better, containing many pieces of data correlated in the same record. But you want to start from what you have, then improve it as you improve the software.

Re-evaluating your VMware infrastructure strategy? 3 Ways to maximize your savings with NetApp and Azure

Since its acquisition of VMware, Broadcom has made significant changes to their licensing model, which have had an impact on many customers’ licensing costs. These changes have disrupted, and in some cases, completely upended VMware customers’ existing platform strategy, becoming a forcing function for them to carefully assess the potential risks to the business and the future impact they may have on their VMware infrastructure platforms.

Transform and enrich your logs at query time with Calculated Fields

As the number of distinct sources generating logs across systems and applications grows, teams face the challenge of normalizing log data at scale. This challenge can manifest when you’re simply looking to leverage logs “off-the-shelf” for investigations, dashboards, or reports–especially when you don’t control the content and structure of certain logs (like those collected from third-party applications and platforms).

Streamlining Enterprise Migration with Squadcast

Migrating your enterprise incident management system can be a daunting process, but with the right tools and support, it doesn’t have to be. Squadcast’s comprehensive migration solutions ensure a seamless transition with minimal disruption to your operations. This webinar is designed to walk you through the essential steps for a successful migration, showcasing how our personalized approach and expert support can help you take control of your incident management.

Looking to the edge to secure the legal industry

The 2023 National Cyber Security Centre (NCSC) report into the UK legal sector warns that a failure to: “maintain appropriate cyber security measures… can have exceptionally negative consequences for a legal practice and its clients". Current figures cite that 65% of UK law firms have been victims of cyber incidents . Elsewhere, another report revealed that 72% - almost three-quarters - of UK-headquartered law firms have at least one employee password on the dark web.

Local presence today, global potential tomorrow: using colocation to access an ecosystem that drives growth

In an era where modern commerce is inseparable from technology, digital transformation has become crucial for businesses to survive and thrive in all markets. Scotland has led the way in understanding the impact of this shift. In August 2023, the Independent Expert Group (IEG) on Unlocking the Value of Data delivered its report to the Digital Directorate, covering private sector use of public sector personal data.

Device Management Remote Control is for Remotely Controlling

The title seems obvious enough, but if there weren’t a story behind it, this blog wouldn’t be necessary. How do you use remote control to keep your mobile deployments operating at peak performance? It turns out that the answers vary across organizations. The most common and expected purpose is to troubleshoot malfunctioning devices or apps. When a mobile worker is idle, it costs your business money.

How OnlineOrNot more than halved its AWS bill

Chances are, you've heard one of the main promises of serverless compute: "you only pay for what you use". While convenient when starting a new project, once you start to get continuous usage on that compute, you start to realize you're paying a hefty premium for that convenience. If you're using AWS Lambda like I am, chances are that "for what you use" part isn't completely true either.

Unleash new ways of working with flexible, cost-effective VDI

For years, virtual desktop infrastructure (VDI) has helped power the most complex IT environments—and the technology is still relevant today. After all, VDI allows employees to access their work applications and data across any device, anywhere. And the growth of 5G networked edge computing means that VDI workloads can soon be optimised for even greater flexibility, security and cost savings. But what’s the right way to deploy VDI in the cloud era?

Imagining the future of Cybersecurity

October 2024 marks the 20th anniversary of Ubuntu. The cybersecurity landscape has significantly shifted since 2004. If you have been following the Ubuntu Security Team’s special three-part series podcast that we put out to mark Cybersecurity Awareness Month, you will have listened to us talk about significant moments that have shaped the industry, as well as what our recommendations to stay safe are.