Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

Snooze your alert policies in Cloud Monitoring

Does your development team want to snooze alerts during non-business hours? Or proactively prevent the creation of expected alerts for an upcoming expected maintenance window? Cloud Alerting in Google's Cloud operations suite now supports the ability to snooze alert policies for a given period of time. You can create a Snooze by providing specific alert policies and a time period. During this window, if the alert policy is violated, no incidents or notifications are created.

Intelligent Instance Selection for Your Kubernetes Workloads

Picking the right AWS instance is challenging because you have to match the ever-changing resource usage patterns of your apps with the 500+ AWS instance types, and the result is over-provisioning and waste. Nearly one-third of businesses exceed their cloud budgets by as much as 40%, in part due to poorly sized instances.

Why devops needs a better approach to cloud networking

A full-stack networking platform with machine learning, autonomous capabilities, and multicloud support allows devops engineers to focus on what matters most—building applications. The promise of digital transformation is enabling businesses to magnify competitive advantages, create new revenue streams, and improve customer experiences.

Migrating from VMware to an open-source private cloud in financial services

This is part one of a two part blog series on open source based private cloud for financial services. This blog describes the need for a cost-effective private cloud to execute a successful hybrid cloud strategy. It also shares a comparison between proprietary and open source based private cloud platforms.

3 Must-Use Strategies To Make Better SaaS Pricing Decisions

You work hard to deliver a great product to your target market. Yet, when it’s time to price your worth, it’s challenging to set a fair pricing strategy, model, or amount. This anxiety is understandable. If you charge too much, you could lose potential and existing customers. If you are a start-up, this bad first impression can be detrimental to your growth. For larger businesses, some customers may feel you are losing touch and switch to newer or veteran competitors.

Understanding Cloud Services: IaaS, SaaS, and PaaS

Cloud services have skyrocketed in popularity in the past few years, providing a vast array of resources as well as a cost-effective path for the migration from on-premises servers to the cloud. In fact, cloud services are handling all the computing needs of many businesses. It’s very likely you’re already using cloud services and will continue to use more as time goes on.

Cycle Podcast | EP 15 | Darren Shepherd | The State of Running Containers in the Wild

In this episode, Jake Warner chats with Darren Shepherd, co-founder of Rancher Labs, and more recently, Acorn.io. Together, Darren and Jake, discuss the current ecosystem around container orchestration and dive into some of the flaws that exist with how applications are packaged and deployed today. Darren has spent his career writing orchestration systems, first in the IaaS space and then Docker and Kubernetes. He is best known for co-founding Rancher Labs and creating such projects as Rancher, Longhorn, k3s, and many others.

Why a big bang approach is the wrong cloud strategy

Despite all the hype from the big cloud providers the truth is that most organisations rely on hybrid infrastructures now and will do so for the foreseeable future. Typically, this includes on-premises infrastructure and at least two public cloud providers. This is not a step on a journey to being 100 per cent cloud, it is the strategic destination many have chosen.

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.