Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Continuous Training and Deployment for Machine Learning (ML) at the Edge

Running machine learning (ML) inference in Edge devices close to where the data is generated offers several important advantages over running inference remotely in the cloud. These include real-time processing, lower cost, the ability to work without connectivity and with increased privacy.

Infrastructure as Code (IaC) vs. Infrastructure as a Service (IaaS)

The heart of any software development operation is infrastructure. This combination of virtual and physical assets ensures that the flow, storage, processing, and analysis of data remains efficient and as seamless as possible. When it comes to selecting a model for managing and deploying infrastructure, IT managers typically have two choices: infrastructure as code (IAC) or infrastructure as a service (IaaS).

Stream application logs into Cloud Logging

Do you have workloads that generate logs inside your Google Compute Engine (GCE) instances? Would you like to troubleshoot your application directly from Google Cloud Platform? Then check out this video to learn how to install and configure the Ops Agent to stream any third party application log into Cloud Logging.

Building World Class Solutions Together

With the launch of the Cycle Partner Program, we are committing to making it easier for companies to work with Cycle by creating more transparent and predictable relationships, offering training, resources, incentives, and benefits, some of which will roll out over time as the program evolves. Interested in partnering with Cycle? Contact our partner lead to schedule a meeting.

Announcing HIPAA compliance for Upsun

If you’ve worked with us before, you know we take security seriously. We take measures necessary to safeguard your sensitive and personally identifiable information and comply with a variety of compliance standards. These include maintaining best security practices and aligning with regulations such as SOC-2, PCI-DSS, and GDPR.