Operations | Monitoring | ITSM | DevOps | Cloud

%term

ZSB Series Mobile App Overview | Zebra

Watch this video to learn how easy it is to navigate around the ZSB Series mobile app. Learn how to log in, understand your Home screen, access and customize your label designs, add printers, manage notifications, and adjust printer settings. You’ll also discover how to personalize your workspace and ensure a seamless experience across different devices.

Bloom filter changes for Grafana Loki (Loki Community Call Sep 2024)

In this Community Call, Senior Software Engineer Christian Haudum talks to us about bloom filter changes for Grafana Loki, including the deprecation of the bloom compactor and a pivot towards creating bloom filters for structured metadata. Bloom filters are a probabilistic data structure that we're using to improve query performance in Loki. Community Calls are monthly meetings that are open to everyone interested in the development of Loki. They are an opportunity for software engineers working on Loki to discuss new features as well as for open-source users of Loki to ask questions.

Using LLMs for Automated IT Incident Management

Large language models are algorithms designed to understand, generate, and manipulate human language. State-of-the-art large language models include OpenAI’s GPT-4o, Anthropic Claude Sonnet 3.5, and Meta LLaMA 3.1. They are built using neural networks with billions or even trillions of parameters. They are trained on vast datasets that can include text from the internet, books, code, and other information sources.

What Is Network Monitoring?

Network monitoring is a critical component of the modern IT industry. With a comprehensive network health and performance perspective, enterprise IT can proactively identify and fix possible issues, ensuring optimal network operation and reducing downtime. Unchecked, network failures can cause significant disruptions in business operations, lost productivity, and financial losses.

Security by Default: The Crucial Complement to Secure by Design

Legacy cybersecurity systems – many designed over a decade ago – fail to account for the new breed of attacker capabilities and vulnerabilities – nor for the reliance on human configuration that is the Achilles heel of so much software. This new reality is being answered with the software development concept called security by default, a necessary complement to the principles of Secure by Design set forth by the U.S. Cybersecurity & Infrastructure Security Agency (CISA).

Feature Friday #27: Multiple outcomes

When promises are actuated, a class can be defined based on its result. For example, if a promise modifies a file’s content, you could define a class that indicates it has been repaired. However, did you know that promises can have multiple outcomes concurrently? That’s right! Native promises (but not custom promises) can have multiple outcomes. For example, a promise can be both kept and repaired at the same time. Let’s take a look.

5 Essential Questions for Developing an Effective AVD Monitoring Strategy

Is your AVD monitoring strategy truly effective? As organizations increasingly adopt Azure Virtual Desktop (AVD) to support remote work, ensuring a seamless and secure user experience becomes a priority. A robust AVD monitoring, and observability strategy is essential to achieve this, allowing you to maintain performance, security, and user satisfaction across your virtual desktops and apps. But where do you start?

What Is FileVault Disk Encryption & How Does it Work?

FileVault disk encryption is the macOS feature that encrypts data on Mac computers. Encrypting the data on your devices means that your password is required to read it, so if the device is lost or stolen, it is protected. This is vital for protecting the privacy of individuals and the operational data of businesses and organizations. This article explains FileVault, the importance of disk encryption for individuals and organizations, and how to enable FileVault.