Operations | Monitoring | ITSM | DevOps | Cloud

%term

Free App Makes It Simple for You to Setup and Connect Android Mobile Devices to Your Zebra Printers

If you use Zebra desktop, industrial, or mobile printers, you’re going to want to download the free Zebra Print App from the Google Play Store on all your Android mobile devices today. Why? Because this is the app that’s going to help you instantly get your Zebra printers connected and secured on your network. It’s also the app that’s going to make it super simple for your frontline workers to print labels, PDFs, pictures, and other media from their Android mobile devices.

Policy Management - The Key to Unlocking a Secure Software Supply Chain

During this pre-KubeCon online event, we will tackle the big questions that should be at the center of conversation at this year's event. If over 90% of software deployed is open-source; It's time for engineering leaders to make their IDP tooling bets. KubeCon is the opportunity to answer these big questions and share ideas. Don’t miss this opportunity to learn from the leading minds in the software supply chain management about the most pressing questions in the industry today ahead of the only event that matters.

Find and query application errors in Honeybadger Insights

Join Honeybadger cofounder Ben Curtis as he uses Honeybadger to find and query for application errors in Honeybadger Insights. Honeybadger Insights is a new full-stack logging, observability, and performance monitoring tool from Honeybadger.io. Gain insights into your errors, application logs, and other event streams with a powerful query language and ready-made dashboards.

Coffee chat with Aaron Bertrand

On this episode of Simple Talks, Louis hangs out with Aaron Bertrand and talks hockey, curling, football, hybrid cars and even some technology. One of the big (non-sports) themes of the episode is that Aaron is a problem-solver and is interested in how issues can be overcome with technology - even if his focus now and in the conceivable future is being a top-level expert with some of the aspects of SQL Server.

A Taste of Observability - Embrace the Cloud With OpenTelemetry

Join Splunk Observability expert Kirk O'Quinn and Monster CICD Lead Graham Bucknell for a conversation on OpenTelemetry (OTel), a powerful open-source project that is transforming how we monitor and trace applications. In this informative session, we will delve into the world of Otel, exploring its history, its roadmap and we will discuss lessons, and success/failures of “Companies” journey to OpenTelemetry.

How to work with multiple data sources in Grafana dashboards: best practices to get started

Grafana dashboards enable you to visualize and correlate data from a wide range of sources. With a centralized view of your data, you can troubleshoot faster, make better decisions, and streamline monitoring. But for those of you ramping up with Grafana, you might have a few questions about how, exactly, to create these rich dashboards featuring data from disparate sources, or even how to incorporate multiple queries from a single source into your visualization.

Building Trust for Enhanced Customer Engagement

Building Trust for Enhanced Customer Engagement The Power of Trust: Discover why building trust with partners is essential for boosting customer engagement. Centralized Renewals Management: Learn how a centralized renewals team can effectively manage renewals and create tech refresh opportunities. Engaging All Customers: Explore why vendors excel with major clients but struggle with smaller customers, and how to bridge this gap.

How to Get Visibility of Your True Attack Surface

Mastering Your Attack Surface: A Deep Dive into ESM! Understanding Your Attack Surface: Explore the concept of an attack surface, including managed, third-party, and unknown assets. Learn about the challenges customers face in complex IT environments, from rising cyber threats to compliance requirements. The Rise of ESM Tools: Discover why the use of External Security Management (ESM) tools is growing due to increased cyber attack awareness. Implementing ESM.