Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Incident severity: why you need it and how to ensure it's set

Defined severity levels quickly get responders and stakeholders on the same page on the impact of the incident, and they set expectations for the level of response effort — both of which help you fix the problem faster. But sometimes, for whatever reason, a severity level just doesn’t get set. Maybe there’s confusion around what severity level to use. Or maybe you have a low barrier to declaration and your responders just need a little nudge.

Azure File Storage: A Detailed Examination of NFS and SMB Shares

Azure File Storage, a component of Microsoft Azure’s broader cloud services, is a managed file storage service for the cloud. Its fundamental design is to create, manage, and share file systems securely and easily using standard protocols supported by most operating systems. It offers fully managed file shares in the cloud accessible via the industry-standard Server Message Block (SMB) and Network File System (NFS) protocols.

Demystifying System Center Virtual Machine Manager (SCVMM)

As the digital world continues to evolve, the realm of virtualization is gaining increasing traction. At the heart of this evolution is the System Center Virtual Machine Manager (SCVMM), a pivotal component of Microsoft’s System Center suite. By providing comprehensive management capabilities for virtualized datacenter environments, SCVMM presents a modern solution for today’s complex IT infrastructures.

Densify Talks, Automated Cloud Instance Selection with Josh Hilliker from Intel

On this episode of Densify Talks, Josh and Andrew discuss automated instance selection and the importance of letting machines make the resource decisions as cloud environments scale. Speaking from the perspective of a hardware manufacturer, Josh offers unique insight into some of the criteria that affect the performance and cost of hosting apps in the cloud, and how to leverage “optimization as code” to automate the optimization process.

Don't waste time on irrelevant false positive alerts in your source code

Are you tired of using security tools that generate endless results, making it impossible to identify actual risks? Do you struggle with inefficient prioritization due to a lack of context, making the process of assessing and remediating vulnerabilities a time-consuming nightmare? Look no further than JFrog’s Contextual Analysis, available as part of the “jf audit” command in the JFrog CLI.

Logic App Best Practices, Tips, and Tricks: #36 How to process an Array or a single object JSON structure in the same manner

Today I will speak about another helpful Best Practice, Tips, and Tricks that you must consider while designing your business processes (Logic Apps): How to process an Array or a single object JSON structure in the same manner.

Kubernetes Optimization: Focus on the Highest Impact Actions

The ’80-20’ Rule Applied to Kubernetes Optimization. Watch this 20-min session to hear Densify’s experts discuss strategies for optimizing Kubernetes environments while minimizing the required work. During this session Densify will present an analysis of a large scale Kubernetes environment showing how 80% of optimization savings can be achieved by focusing on 20% of the container deployments.

Extending your SaaS with PaaS-hosted applications

In today's rapidly changing technology landscape, businesses need to adapt and evolve to stay competitive. One trend that has gained momentum is the shift from Platform as a Service (PaaS) to Software as a Service (SaaS) models. This article will discuss the challenges and opportunities PaaS vendors face when moving to a SaaS model and how Upsun can help in this transition.

7 Essential Factors for a Successful Cloud Migration: A Non-Technical Guide

Are you looking to modernize and migrate your data but have questions about the complex organizational challenges? We recently hosted the webinar: Overcoming Organizational Challenges in Data Modernization and Cloud Migration: A Guide for Senior IT Leaders.

8 Common Uses of VPN in 2023: How People Leverage Its Benefits

Explores the capabilities of a virtual private network (VPN) - a versatile tool that is surprisingly user-friendly. Whether it's for individuals or businesses, VPNs offer a multitude of advantages. Users can securely navigate activities such as traveling, using public Wi-Fi, sharing sensitive information, and unlocking entertainment options on Netflix, all with the assistance of a VPN. This comprehensive guide provides valuable insights into effective VPN usage and highlights the numerous benefits it offers. It caters to personal and corporate scenarios alike.