Operations | Monitoring | ITSM | DevOps | Cloud

%term

Experience Collaborative Dev with Codezero

In this workshop, John Poyser of CodeZero delves into the challenges of Kubernetes and how CodeZero's platform can simplify your development workflow. Watch as John provides a comprehensive live demo, shares insightful use cases, and presents a compelling case study from Civo, demonstrating the practical benefits and enhanced collaboration that CodeZero facilitates.

Lessons learned after migrating Azure Functions to Isolated Functions on .NET 8

The In-process model of running Azure Functions is being retired in favor of the Isolated model in two years. A lot of components on elmah.io are running on Azure Functions. To ensure we are running on the most modern and supported platform (also in two years), we have spent quite some time migrating from In-process to Isolated functions. In this post, I'll share both a checklist to help you do the same as well as some of the lessons learned we had during the migration.

How to optimize for Google's new Core Web Vital INP

Effective March 12, 2024, Google replaced the First Input Delay (FID) metric with Interaction to Next Paint (INP) as a part of its Core Web Vitals. This change marks a significant shift in how web interactivity is measured, reflecting a more comprehensive view of user experience. This blog explores INP, strategies for optimization, and asks if FID is still a valuable metric.

Add a New Discovery Source For Virtual Machines With InvGate Insight's VMWare Integration

Discovery sources periodically run network analyses to identify devices in your IT environment, ensuring your asset inventory is updated and reliable. It is a fundamental function of any robust IT Asset Management (ITAM) tool. For this reason, we are eager to announce that InvGate Insight now integrates with VMWare! This means that now you can automatically discover and integrate ESXis and vCenters and incorporate them into your inventory without the need to download an individual agent on each one.

Introducing Firefighting Support

Canonical’s Managed Solutions team is proud to announce Firefighting Support, a new service for organisations that manage their infrastructure by themselves but need experts on call for troubleshooting needs. Firefighting Support provides managed-service-level support to customers who graduate away from fully managed services or are under security regulations too stringent to grant environment access to a third-party.

The ABC's of UEM: Understanding the Best Fit for Your Business

Exploring UEM: A Panel Discussion on Modern Device Management IT professionals from various industries delve into the significance of Unified Endpoint Management (UEM) as a business tool. They discuss its key capabilities such as device management, security, and unified endpoint experience. The conversation also covers metrics for UEM program effectiveness, the shift from traditional to modern device management, and the role of AI in UEM. The panel emphasizes the importance of UEM in enhancing business operations and user experiences.

Practical Demo: Harnessing the Power of #AI and #Automation

Harnessing the Power of AI and Automation This webinar delves into the adoption of generative AI and its role in ITSM, decision making, user experience transformation, ticket classification, self-healing, and virtual agents. It also covers incident summarization, knowledge article generation, and the AI Configuration Hub. The benefits of AI and automation, such as improved data accuracy, analyst productivity, and employee experience, are highlighted.

Megaport Enhancing Connectivity in Adelaide

Learn how Megaport’s investment in one of Australia’s fastest-growing economies will transform the connectivity landscape. Adelaide, Australia is already known for great food, proximity to world-famous wineries, and a laidback lifestyle. But recently there has been an increased focus on business, with South Australia currently the fastest-growing economy of any Aussie state.

How To Protect Against Malicious Code

Malicious code, also known as malware, is any piece of software that deliberately damages your systems or causes them to malfunction (as opposed to a software bug that may unintentionally do these things). The reasons for this may be simple mischievousness, curiosity, or a proof of skill for bragging rights.

Exploring Enterprise Mobility Management (EMM)

When mobile devices first made their way into the workplace decades ago, mobile device management (MDM) provided device-level control and security. As mobile technology advanced, enterprise mobility management (EMM) grew out of MDM to include mobile application management (MAM), mobile content management (MCM) and identity and access management (IAM). Today, EMM gives you a comprehensive approach to managing the various usage and security aspects of mobile devices in the workplace.