Operations | Monitoring | ITSM | DevOps | Cloud

%term

What is Fleet Management in Telemetry?

Fleet management is a derivative term. Originally used in the automotive industry, it’s now used in a span of domains. It’s being used in data telemetry since the introduction of OpAmp, which is a part of the Open Telemetry project. Now, fleet management has broader implications. It simplifies telemetry data collection by automating agent deployment, and configuration, and providing insights into the real-time health and performance of your sprawling agent infrastructure.

SD-WAN: Dead or Different?

The rapid evolution of work models and security requirements has prompted questions about the relevance of Software-Defined Wide Area Network (SD-WAN) technology. In their insightful report, ‘Is SD-WAN Dead?’ Jonathan Forest and Andrew Lerner of Gartner explore these dynamics, concluding that while SD-WAN is far from obsolete, its role is shifting.

Fundamentals of a Successful Logging and Observability Strategy

Your team is responsible for ensuring the reliability and performance of your organization’s critical applications and infrastructure. What keeps you up at night? Your applications are more complex, distributed and cloud-native than ever, meaning that understanding what’s happening under the hood has never been more complex than it is now. Is it system bugs, or data bottlenecks? Chasing alerts for latency or service degradation that may or may not be business-critical?

DevFinOps: What it is and why it matters

DevFinOps presents a paradigm where cost responsibility is linked with development and operations. This system is particularly good if you work in Cloud environments. Introducing of FinOps or the Finance + DevOps practices into the development cycle could supply your business with hidden cost-saving possibilities.

Software Deployment Best Practices for Modern Engineering Teams

Adopting best practices for software deployment is essential to maintaining a high standard of quality, minimizing downtime, and ensuring that your applications meet user expectations. Here are five best practices to help you deploy your software more securely and reliably.

Improving documentation with content reuse

Anyone who’s worked in a customer-facing role knows the pressure to find the correct answers quickly. Emotions are high when something is broken, or there’s an outage. The customer is angry. You’re stressed. And your boss is watching and wondering why the problem hasn’t been fixed. You need to troubleshoot quickly and provide the right information ASAP. As a support professional, you want to give customers and stakeholders the best possible experience.

How To Identify Requests as Part of an End-To-End Tracing Strategy

Tracing follows requests as they move through an entire network, from the initial client request to the final response. In financial services, end-to-end tracing is essential for maintaining robust security, ensuring comprehensive observability of system operations, and understanding chains of events in case of issues or anomalies.

How Ubuntu keeps you secure with KEV prioritisation

The Known Exploited Vulnerabilities Catalog (KEV) is a database published by the US Cybersecurity and Infrastructure Security Agency (CISA) that serves as a reference to help organisations better manage vulnerabilities and keep pace with threat activity. Since its first publication in 2021, it has gone beyond its US federal agency scope and has been adopted by various organisations across the globe as guidance for their vulnerability management prioritisation frameworks.