Operations | Monitoring | ITSM | DevOps | Cloud

Blog

LaaS (Language as a Service) With Duolingo

欢迎! [Huānyíng] In Mandarin, this means “welcome,” the first Chinese phrase I ever learned as a Mandarin Language Minor in college. It took me two weeks to understand the tonal variations, one week to memorize and properly execute the written stroke pattern, and another week to hone the ability to say it with confidence to my teacher (aka 老师 [Lǎoshī]).

Elastic on Elastic: Embracing our own technology

When making investments in our tech stack, we tend to have doubts about companies that don’t use their own products and services. At Elastic, we deploy the full suite of our technology across the enterprise. We do so because our technology not only works, but it makes us more efficient and flexible on so many levels. And it can do the same for you and your business, too.

How To Get The Most Out Of The Linux Screen Command

If you’re logging onto a service or running remote command line operations over a network link via the Secure Shell (SSH) protocol, the last thing you need is for your session to be cut off by a faulty connection. This scenario is all too common – but for Linux users, the Screen utility can prevent it from occurring.

DevOps Metrics: 7 KPIs to Evaluate Your Team's Maturity

Measuring the maturity of your DevOps team might sound difficult, but it isn’t at all. Simple key performance indicators (KPIs), such as the deployment success rate or mean time between failure, give a good indication of the maturity of your DevOps team. By “mature,” I mean that your team consistently and smoothly operates at a high level and can deploy several times a day with very little risk.

Don't Let DevOps be Your Trojan Horse

Don’t let the title mislead you, we love DevOps here at Cycle. Without proper DevOps processes, building and scaling cloud-based applications can become a nightmare for maintainability. A proper DevOps plan brings together an organization’s developers, QA support, and operations teams to pursue the goal of delivering software more predictably. An admirable goal for any team and something that can be immensely helpful for even small teams to become more efficient.

Why Transaction Tracing is Critical for Monitoring Microservices

Teams switching from a monolithic application architecture to microservices often face a jarring realization: their time-tested troubleshooting techniques don’t work as effectively. A microservice consists of many independent, distributed, and ephemeral services with varying capabilities for monitoring and logging. Techniques such as stack traces are effective troubleshooting tools in monoliths, but only paint a small portion of the big picture in a microservice-based application.

IT Security: Thought Leaders' Predictions for 2020

Chris Goettl is many things to many people. Family man. Homebrewer. PC gamer. Hockey player. And IT security guru and thought leader. As Director of Product Management, Security, at Ivanti, Chris is a highly sought-after expert for his insights into how organizations can strengthen their enterprise IT security in an increasingly demanding environment. Chris hosts a monthly webinar focusing on Patch Tuesday and security vulnerabilities, and frequently blogs about security topics.

Top Kubernetes Tutorials & Resources for All Levels

If you are a developer who uses containers, chances are you and your team have heard about Kubernetes. At its core, Kubernetes is a container operating system for the web, but has grown to be much more. Sure, Kubernetes can manage your containers, network traffic, and bring up a crashed ad, but it has also become a widely adopted platform with a growing community.

CVE-2020-0601 - How to operationalize the handling of vulnerabilities in your SOC

Software vulnerabilities are part of our lives in a digitalized world. If anything is certain, it’s that we will continue to see vulnerabilities in software code! Recently the CVE-2020-0601 vulnerability, also known as CurveBall or “Windows CryptoAPI Spoofing Vulnerability”, was discovered, reported by the NSA and made headlines. The NSA even shared a Cybersecurity Advisory on the topic. Anthony previously talked about it from a public sector and Vulnerability Scanner angle.