Operations | Monitoring | ITSM | DevOps | Cloud

Bloated software: The real killjoy of modern workplace technology

Bloatware, or as we affectionately call it, junkware, has always been a problem for businesses across the globe. These unused and hidden programs that never see the light of day on our smartphones and laptops and yet take up all the space and cripple the performance of the devices are costing businesses billions of dollars every year.

Uptime.com's Guide to Weathering Outage Season

It’s already been a stormy quarter with notable outages exceeding 240 hours. This spring saw two substantial cloud provider outages between Atlassian’s 9 day outage and shorter outages with CloudFlare. As reliance on cloud-based tools and services increases you should be asking, what are the best ways to monitor your site and make sure the data you’re reporting accurately reflects your site’s downtime and SLAs?

Kubernetes on the Edge: Getting Started with KubeEdge and Kubernetes for Edge Computing

Developers are always trying to improve the reliability and performance of their software, while at the same time reducing their own costs when possible. One way to accomplish this is edge computing and it’s gaining rapid adoption across industries. According to Gartner, only 10% of data today is being created and processed outside of traditional data centers.

What Is a Secure SDLC?

The Software Development Lifecycle (SDLC) framework defines the entire process required to plan, design, build, release, maintain and update software applications, including the final stages of replacing and decommissioning an application when needed. A Secure SDLC (SSDC) builds on this process, integrating security at all stages of the lifecycle. When migrating to DevSecOps (collaboration between Development, Security, and Operations teams), teams typically implement an SSDLC.

Processes, forks and executions - part 1

While working on the integration of CFEngine Build into Mission Portal we came to the point where we needed to start executing separate tools from our recently added daemon - cf-reactor. Although it may seem like nothing special, knowing a bit about the process creation and program execution specifics (and having to fight some really hard to solve bugs in the past) we spent a lot of time and effort on this step.

Asset Lifecycle: Definition & Key Stages in 2023

Revenue is a term indispensable in corporate talk. As it’s the largest number on the profit and loss statement for the company, revenue is frequently referred to as “the top line.” And business owners and managers are very attentive to this statistic. Businesses in all asset-intensive industries, particularly the power and utility sectors, are under increasing pressure to deliver better customer service, improve equipment uptime, and advance performance predictability.

Ask Miss O11y: My Manager Won't Let Me Spend Any Time Instrumenting My Code

My organization doesn’t want me spending time on instrumenting my product. What can I do? Thanks for the question! You’ll be relieved to hear that you’re in the majority, and also that there are quick (and easy) steps you can do to prove that instrumenting your code is worthwhile.

10 Customer Tools For Business Consultants

The best customer tools for business consultants can elevate your consulting business and make it more efficient. If you are constantly looking for new ways to drive operational efficiency and streamline your workflows, you need to take some of the tools on our list for a test drive. With an abundance of tools on the market, there is no shortage of options to choose from.

Optimizing Security and Digital Experiences: Why User Experience Monitoring is Key

For just about any organization, there’s a balance that has to be struck between absolute security and absolute convenience. Seemingly, every new innovation that increases convenience also introduces new risks. On the other hand, every safeguard instituted can also create complexity, delays, or in some other way diminish the user experience. Either way, businesses are exposed, whether to the catastrophic consequences of breaches, or of an erosion of user productivity and customer retention.

Stop putting off patching!

Let's face it: no one likes patching. When I was a practitioner, we always put off patching until it was absolutely necessary. Until a business need – such as updating an application version or support ending for a version – arose, we didn't patch because "If it ain't broke, don't fix it." We all know this is a bad practice; let's remind ourselves why. The longer a system goes without being patched, the more changes will accumulate.