Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

The ultimate guide to on-call schedules

An Ultimate Guide to on-call schedules? You might think this sounds overly grandiose for what’s essentially putting people into a list and rotating through them. But you’d be flat-out wrong. Getting your on-call setup correct is as real and as important as it gets, and getting things wrong can lead to prolonged incidents, burnt out employees, and damaged company reputation.

What does SLO stand for? A complete guide to Service Level Objectives (SLOs)

The world of tech is full of acronyms. SLOs are one of those that everyone talks about, but maybe not everyone fully gets. Whether you're nodding along in meetings or just hearing “SLO” for the first time, we’ve got you covered. In this post, we’ll break down what Service Level Objectives (SLOs) actually are, why they matter, and how they can help keep your systems (and your sanity) in check.

Executives, Here's What Your Network Team Wants You to Know

Understanding and aligning to the needs of your network team can unlock a more profitable, efficient, and sustainable business. Network and IT teams are part of the success of your organization. They keep your critical applications running smoothly and protect your data from threats, all while flying under the radar.

Securing External Sharing in SharePoint Online

In today’s interconnected business world, external collaboration is essential. SharePoint Online provides the flexibility to share documents with external partners, clients, and vendors, but this can also expose organizations to data security risks. Securing external sharing while ensuring smooth collaboration is key to maintaining trust and protecting sensitive information. Here’s how you can achieve that balance.

Auto scaling beyond the basics: Fine-tuning AWS Auto Scaling groups

AWS Auto scaling Auto scaling is a powerful feature that allows your cloud infrastructure to dynamically adjust capacity based on demand, optimizing both performance and cost. However, to truly harness the power of Auto Scaling groups in AWS, you need to move beyond basic setup and dive into fine-tuning with advanced monitoring. This blog will guide you through advanced strategies for optimizing your AWS auto scaling using enhanced monitoring functionalities.

The Ultimate Guide to a Smooth Dev Environment Setup: Tips and Best Practices

Setting up a development environment can be challenging, especially for new developers or those adapting to new developer tools. A well-configured environment is crucial for efficient coding, testing, and debugging, enhancing productivity and minimizing errors. This guide will walk you through everything you need to know, from the basics to advanced customizations for different operating systems.

The Role of Technology in Enhancing Incident Response Call Etiquette

The interconnectedness of today's business environment has significantly heightened the complexity of incident response (IR). The need for immediate action, precise communication, and real-time collaboration is more critical than ever. However, beyond the technical precision required in solving problems, there lies an often overlooked aspect of effective IR management: the etiquette of incident response calls.

Autoscaling in Cloud Computing

Autoscaling in cloud computing is the ability of a system to adjust its resources in response to changes in demand automatically. This guarantees that applications always have the resources they need to perform optimally, even during periods of high traffic. Autoscaling eliminates manual intervention, allowing your dev team time to focus on your product. All major cloud providers like AWS, Azure, and Google Cloud Platform offer robust autoscaling solutions with many features and capabilities.

Understand how the Cyber Resilience Act will impact device manufacturers

The Cyber Resilience Act (CRA) is a European Union legislation that will enter into force in 2027. Its overall goal is to make devices safer by implementing more rigorous cybersecurity, documentation, and vulnerability reporting requirements for the IT industry. The CRA is especially relevant for device manufacturers, who will need to ensure devices are secure throughout the product lifecycle.