Operations | Monitoring | ITSM | DevOps | Cloud

Best SQL Server ODBC Drivers 2026

Most database problems get blamed on queries, schemas, or infrastructure, and rarely on SQL Server ODBC drivers. Fair enough, those components often break. But in many cases, the real culprit is the connection layer itself. Poor drivers can lead to security gaps, performance hits, cloud connection struggles, Unicode issues, or incompatibility across platforms and modern SQL Server versions.

Freshping is retiring-ensure your monitoring remains uninterrupted

Freshping has announced that it will retire its service on March 6, prompting many organizations to reassess how they maintain uptime visibility. When monitoring stops, it doesn't mean your issues stop too; it’s a period of forced blindness. This sunsetting period exposes a core vulnerability: Digital visibility is only as strong as the platform supporting it.

How to Relocate IT Assets With InvGate

IT asset relocation is the process of moving technology resources from one place or person to another, with zero gaps in custody, security, or records. Why does this matter? Because every move introduces risk. Without a clear asset relocation process, devices can go missing, records get outdated, and even chain of custody can become unreliable or fragmented, making it harder to prove who was responsible for the asset at each stage of its movement.

DNS blocklist monitoring now available to all Oh Dear users

Your domain is on a spam blocklist. Password reset emails aren't arriving, order confirmations land in spam, and customers are complaining that "your site doesn't work." By the time you hear about it, the damage has been building for days. We've shipped DNS blocklist monitoring to catch this early. Oh Dear now checks your domain against 11 major blocklists and notifies you the moment you're listed, with direct links to get removed.

A 4-Month Bug Fixed in <10 Minutes with Olly

In today’s highly interconnected systems, the subtle relationships between services are rarely obvious. Modern, complex architectures generate telemetry that functions less as “flashing signs” and more as faint “breadcrumbs” to be followed across a vast network of signals. In 2025, about two-thirds of outages involved third-party systems like cloud platforms and APIs.

The limits of MCP and how Olly surpasses them

Model Context Protocol (MCP) servers act as adapter layers between clients and AI based workloads. MCP installation into an IDE, such as Cursor, brings a wealth of information directly into the developers primary tool, minimizing context switching and, especially in the world of observability, bringing telemetry closer to the code. MCP is not without its limits. These limits initially seem trivial, but in time, some of the inherent limitations to a basic MCP implementation become apparent.

How likely is a man-in-the-middle attack?

Security vendors love the man-in-the-middle attack. It’s the boogeyman of every TLS marketing page. Some shadowy figure intercepting your traffic, reading your secrets, stealing your data. A man-in-the-middle attack is when an attacker positions themselves between two parties on a network to intercept the traffic flowing between them. In the context of TLS, that means an attacker who can present a valid certificate can read everything in plaintext and proxy it on to the real server.

When AI Writes the Code, Who Keeps Production Running?

The production environment has become a minefield of code nobody really understands. Here’s what’s happening: Development teams are using Claude Code, Cursor, and GitHub Copilot to ship features at 10x their previous velocity. Product managers are ecstatic. Business stakeholders are thrilled. And somewhere in a war room at 2:17 AM, an SRE is staring at a stack trace for code that was AI-generated three weeks ago, trying to figure out why the payment service just fell over.

Database Cost Management: How To Control Rising Database Spend

According to CloudZero’s Cloud Economics Pulse, databases are often among the largest and most persistent cloud cost categories. Database costs are notoriously difficult to predict and control. Unlike stateless infrastructure that scales predictably with traffic, databases run continuously and expand behind the scenes, causing costs to rise even when usage appears stable. Because databases run continuously and expand behind the scenes, costs can rise even when usage appears stable.

Using Core Web Vitals in Honeycomb Frontend Telemetry

Google's Core Web Vitals (CWVs) measurements have been used by web administrators and SREs to review frontend application performance metrics, and have been factored into Google's page rankings since 2021. They are also used in Google Analytics, which crawls websites and evaluates performance metrics over a period of multiple days, and with various frontends (desktop web, mobile web, etc.) to establish how well a website performs in production.