Operations | Monitoring | ITSM | DevOps | Cloud

%term

Open source cybersecurity: Zero trust and confidential computing

What is the Zero Trust model in Cybersecurity? Watch the video as Ijlal Loutfi, Product Manager at Canonical, explains what Zero Trust is and why confidential computing is essential to safeguard systems against cyber attacks and vulnerabilities. Ijlal also discusses the technology that allows AI workloads to run in a confidential way. Stay tuned to our social media pages as we share educational materials to help your organizations stay secure this Month.

Top 5 IT outages detected by StatusGator

StatusGator is the world’s best status page aggregator: We aggregate the status of thousands of cloud services and hosted applications from their official status pages. But everyone knows official status pages are often behind and in those critical moments before the status page is updated, you might be thinking “Is it just me? Or is it really down?” StatusGator’s Early Warning Signals solves that by alerting you before providers even acknowledge the incident.

Introducing pipe syntax in BigQuery and Cloud Logging

Writing complex SQL queries can be challenging, but BigQuery's new pipe syntax offers a more intuitive way to structure your code. Learn how pipe syntax simplifies both exploratory analysis and complex log analytics tasks, helping you gain insights faster. Watch along and discover how to leverage pipe syntax in BigQuery for a more efficient analytics experience.

What's new in .NET 9: Cryptography improvements

.NET 9 is releasing in mid-November 2024. Like every.NET version, this introduces several important features and enhancements aligning developers with an ever-changing development ecosystem. In this blog series, I will explore critical updates in different areas of.NET. For today's post, I'll present some improvements to Cryptography.

The Importance of Application Control

In today's digital age, organizations face a constant barrage of cyber threats, with unauthorized applications posing a significant risk to their security and operations. Traditional security measures are no longer sufficient to protect against the sophisticated attacks that target vulnerabilities within applications and endpoints.

Azure Cost Management Per Department: Optimizing Cloud Spending using Turbo360

Cloud adoption is growing rapidly, and businesses are increasingly using platforms like Azure to run their services. However, managing costs efficiently is crucial to prevent overspending. By tracking costs per department, you ensure that each team is accountable for its cloud spending, making optimization and budgeting more effective. In this article, we’ll explore how to track and allocate Azure costs per department, ensuring your organization optimizes its cloud budget.

Visualize Atlassian Statuspage, Cloudflare, and Netlify data: what's new in Grafana Enterprise data source plugins

As part of our big tent philosophy here at Grafana Labs, we believe you should be able to access and derive meaningful insights from your data, regardless of where that data lives. One of the ways we stay true to that philosophy is through our Enterprise data sources.

Getting Started with Kafka, Telegraf, and InfluxDB v3

In the world of smart gardening, keeping track of environmental conditions like humidity, temperature, wind, and soil moisture is key to ensuring your plants thrive. But how do you bring all this data together in an efficient and scalable way? Enter the powerful trio of Kafka, Telegraf, and InfluxDB Cloud v3.

Getting Started with Bytewax and InfluxDB

In this tutorial, we’ll explore how Bytewax can seamlessly integrate with InfluxDB to tackle a common challenge: downsampling. Whether you’re dealing with IoT data, DevOps monitoring, or any time series metrics, downsampling (or materialized views) is your key to managing your time series data for long-term storage without losing essential trends. Bytewax is an open source Python framework for building highly scalable dataflows to process any data stream.