Operations | Monitoring | ITSM | DevOps | Cloud

%term

Azure Storage Pricing 101 - Guide to Blob, Cold & File Storage Costs

Microsoft Azure storage pricing can be confusing. With cloud storage-specific tiers, reservations, time lengths, and other cost considerations, starting monthly budget calculations can be more than intimidating—especially since you’ll also want to watch out for any extra provider-specific fees. We’ll break things down so you can easily calculate your Azure storage pricing.

What you need to know about regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387)

On 1 July 2024 we released a fix for the high-impact CVE-2024-6387 vulnerability, nicknamed regreSSHion, as part of the coordinated release date (CRD). Discovered and responsibly disclosed by Qualys, the unauthenticated, network-exploitable remote code execution flaw affects the OpenSSH server daemon (sshd) starting with version 8.5p1 and before 9.8p1.

What is a Knowledge Manager?

A Knowledge Manager is the person who makes sure valuable information is captured, stored and accessible across the organization. This article looks at the responsibilities, challenges and job market for Knowledge Managers, and how they work within an ITIL (Information Technology Infrastructure Library) framework, and what their role is in creating a knowledge based business.

Entry Level IT Jobs: Roles to Start Your Career

Embarking on a new career path in information technology (IT) is both thrilling and daunting. With the rapid pace of technological advancement, the demand for skilled IT professionals continues to soar. For those just stepping into the professional world, finding the right entry-level IT job can set the foundation for a rewarding and progressive career.

3 Reasons to Migrate from Beanstalk to EKS

While AWS Elastic Beanstalk (EB) offers a convenient way to deploy applications, some limitations in customization and control can become a bottleneck for growing businesses. As the need for scalability, flexibility, and fine-grained management increases, Amazon Elastic Kubernetes Service (EKS) emerges as a compelling alternative.

ScienceLogic Wins "AI Breakthrough Award" for Best AIOps Platform

ScienceLogic, a leader in automated IT infrastructure monitoring and AIOps, has won the “Best AIOps Platform” award in the seventh annual AI Breakthrough Awards! Run by Tech Breakthrough, a leading market intelligence and recognition platform for today’s most competitive global technology markets, the awards highlight some of the world’s most innovative artificial intelligence (AI) companies, technologies, and products.

The Hater's Guide to Dealing with Generative AI

Generative AI is having a bit of a moment—well, maybe more than just a bit. It’s an exciting time to be alive for a lot of people. But what if you see stories detailing a six month old AI firm with no revenue seeking a $2 billion valuation and feel something other than excitement in the pit of your stomach? Phillip Carter has an answer for you in his recent talk at Monitorama 2024. As he puts it, “you can keep being a hater, but you can also be super useful, too!”

Security Best Practices for Your Node.js Application

The widespread adoption of Node.js continues to grow, making it a prime target for XSS, DoS, and brute force attacks. Therefore, protecting your Node application from possible vulnerabilities and threats is crucial. In this guide, we'll uncover common security threats and explore best practices for preventing them. You don't have to be a cybersecurity expert to implement fundamental security measures for your Node.js application. So, are you ready? Let's go!