Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Devops Best Practices for Observability

Imagine one night you receive a notification from your team member that a critical production problem has caused chaos in your application. There is a sudden drop in sales as customers are unable to access the application and reporting issues relating to the same. Now, when you reach the office to fix the issue, you demand the team to run through all the files.

A look into Ubuntu Core 24: Your first Linux-powered Matter device

Welcome to this blog series which explores innovative uses of Ubuntu Core. Throughout this series, Canonical’s Engineers will show what you can build with this Core 24 release, highlighting the features and tools available to you. In this third blog, Farshid Tavakolizadeh, engineering manager from our Industrial team, will show you how to build a Matter lighting device with a Raspberry Pi.

Cloud Hosting vs Shared Hosting

When you want to host your website, you have many choices. Two common choices are cloud hosting and shared hosting. In this article, we'll compare these two hosting types, looking at their performance, security, reliability, scalability, and flexibility. By understanding the differences between cloud hosting and shared hosting, you can choose the best option for your website's needs.

Application Observability And Its Role In Modern Software Development

Over the last few decades, software systems have grown complex due to the emergence of cloud-native architectures and multi-cloud environments. On the one hand, this makes it difficult to detect issues faster in the deployed application. It also requires intricate coordination between development, DevOps, and SRE teams, as they are also expected to speed up the whole software delivery process.

Effective Observability for MLOps Pipelines at Scale with Rishit Dagli

Join Rishit Dagli as he explores effective observability for ML pipelines at scale. Learn about the critical differences between observability and monitoring in ML applications, common challenges like distribution shifts, and feedback loops. Rishit demonstrates practical methods for logging and interpreting various metrics to maintain model performance and reliability.

Harnessing AI for Cybersecurity: Beating AI Attackers at Their Own Game

In the rapidly evolving landscape of cybersecurity, AI-powered attackers are becoming increasingly sophisticated. To counter these threats, organizations must adopt advanced security technologies that leverage AI technology as part of a multi-layered approach to security.

Building a Docker Swarm on AWS EC2: A Step-by-Step Guide

In today's tutorial, we're diving into the world of container orchestration by setting up a Docker Swarm on AWS EC2 instances. Docker Swarm allows you to manage a cluster of Docker hosts as a single virtual system, making it easier to deploy and scale your containerized applications. By leveraging the power of AWS EC2, we'll walk through each step to get your Swarm up and running smoothly.

Mastering the Sev0

Remind yourself of the worst incident your organization has faced. If you’re lucky it might have been your entire service being offline for a period of time. Less lucky, and perhaps you encountered something affecting the sensitive data your organization is the custodian of. Whilst uncommon, incidents of this severity happen to every organization at some point. This criticality of situation is what many refer to as a Sev0, the most severe of incidents.