Operations | Monitoring | ITSM | DevOps | Cloud

%term

Ubuntu powers Azure's confidential AI offering

Microsoft Azure has announced the general availability of their confidential virtual machines (VMs) with NVIDIA H100 Tensor Core GPUs, powered by Ubuntu. This offering combines the hardware-based protection of AMD EPYC processors with NVIDIA’s latest GPU technology to enable secure and high-performance AI workloads in the cloud. Combining these technologies allows sensitive sectors to unlock AI adoption through addressing previous concerns of critical data privacy.

Launching Your Ubuntu Confidential VM with Intel TDX on Google Cloud: A Guide to Enhanced Security

In the world of cloud computing, we rely on abstraction layers to manage complex systems. While this simplifies development, it also creates vulnerabilities for sensitive data. Traditionally, privileged software within the cloud has access to your data, and could pose a significant security risk, if not managed properly. But there’s a new way to protect your data: confidential computing.

Infrastructure and Observability as Code | An Introduction

In this video I will introduce you to the concept of Observability as Code and what that looks like in Splunk Observability Cloud. I’ll first discuss the issues you might encounter managing infrastructure manually, and then define Infrastructure as Code so that you have a better understanding of the motivation behind Observability as Code. We’ll briefly introduce Terraform and then I’ll discuss the benefits of implementing Observability as Code using Splunk’s Terraform provider in Splunk Observability Cloud.

Elevating SolarWinds Observability for Hybrid IT Environments

Exciting times here at SolarWinds. We’re uniting our Self-Hosted and SaaS observability offerings under a single umbrella, SolarWinds Observability, and announcing a host of enhancements that will allow us to go even further to meet our customers' hybrid IT needs. Let’s take a look at what’s in store.

When SSL Issues aren't just about SSL: A deep dive into the TIBCO Mashery outage

On October 1, 2024, TIBCO Mashery, an enterprise API management platform leveraged by some of the world’s most recognizable brands, experienced a significant outage. At around 7:10 AM ET, users began encountering SSL connection errors that appeared straightforward at first glance.

5 Azure Optimizations That Make Cloud Cost Savings Simple

As both the State Of FinOps 2024 and the State Of Cloud Costs In 2024 indicate, reducing cloud waste remains a top priority for cloud-driven organizations. Cloud spenders care more than ever about cost efficiency — and CloudZero is working tirelessly to make cloud savings simpler. To this end, we’re proud to announce that we’ve added a suite of automated Azure optimizations to our already robust library of automated Insights.

What is an SNMP trap? A complete overview

SHARE Simple Network Management Protocol (SNMP) traps are messages sent by SNMP devices that notify network monitoring systems about device events or significant status changes. At LogicMonitor, our view on SNMP has evolved over the years. While we have often favored other logging methods that offered more insights and were considered easier to analyze in the past, we recognize that SNMP traps remain an essential tool in network management.

Using Honeycomb for Frontend Observability to Improve Honeycomb

Recently, we announced the launch of Honeycomb for Frontend Observability, our new solution that helps frontend developers move from traditional monitoring to observability. What this means in practice is that frontend developers are no longer limited to a metrics view of their app that can only be disaggregated in a few dimensions. Now, they can enjoy the full power of observability, where their app collects a broad set of data as traces to enable much richer analysis of the state of a web service.

How Does Metadata Improve Data Quality? All You Need to Know

Businesses rely heavily on accurate, reliable data to inform their decisions. As the volume and complexity of data continue to grow, ensuring data quality has become a significant challenge. This is where metadata steps in. By providing essential context, metadata enhances our understanding of the data we work with, ultimately improving its quality. Maybe you are wondering how does metadata improve data quality.

How Does Granular Recovery Technology Work?

Data loss can be a nightmare for businesses, especially when critical information is at risk. But there's good news—granular recovery technology is here to help! This advanced recovery method allows you to retrieve specific files, emails, or database entries without restoring the entire system. It’s a game-changer, especially in IT Service Management (ITSM) environments where precision and efficiency matter.