Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Mastering Azure Storage: Best Practices for Security, Performance, and Cost Optimization

Azure Storage is a cloud-based service that provides scalable, secure and highly available data storage solutions for applications running in the cloud. It offers different types of storage options like Blob storage, Queue storage, Table storage and File storage. Blob storage is used to store unstructured data like images, videos, audios and documents while Queue storage helps in building scalable applications with loosely coupled architecture.

Business benefits of artificial intelligence in retail

The retail industry is going through a period of major upheaval. AI is transforming the landscape at a rapid pace. Grand View Research evaluated the market value at USD 5.79 billion in 2021 and this is expected to grow at a 23.9% compound annual growth rate (CAGR) from 2022 to 2030. For retailers, this translates into a need to adapt to an entirely new paradigm of customer expectations.

Using PostgreSQL advisory locks to avoid race conditions

The first moments of incident response can be among the most crucial, which in turn can also make them among the most stressful. There are many ways to ensure incidents are kicked off smoothly, but a recent focus of ours was to ensure they could be kicked off quickly. After all, the faster you're able to start mitigating your incident, the more successful you'll be!

How to Show Reliability Results to Your Organization

Building momentum for a reliability program can be tough. Improving reliability takes time, effort, and resources. But when everything from launching new features to improving security demands those same resources, it can be a struggle to get the buy-in you need to address reliability risks. And it makes sense! If a team spends time patching a known security bug or creating a new feature, they have a clear demonstration of the value created.

Zero trust security for CI/CD pipelines

The zero trust security model is an approach to network security that enforces strict access controls and authentication at every stage of the software development lifecycle. It treats every user, device, and transaction as a security risk and uses the principle of least privilege to restrict access to sensitive resources and minimize the potential attack surface.

Overcoming Complexity: Part II

This is the second in a three-part series on Taming Complexity for Competitive Advantage. Part I of this series discusses the need to develop orchestration strategies to deal with the complexities of integrating cross-domain infrastructure. In part II, we introduce the temporal element of change, including the integration technology journeys brought on by mergers and acquisitions.