Operations | Monitoring | ITSM | DevOps | Cloud

Embedded Linux project: Yocto or Ubuntu Core? [Part IV]

Welcome to the concluding chapter of this journey assessing Yocto and Ubuntu Core for your embedded Linux project. Among the go-to solutions in the industry and benefiting from wide popularity, Yocto enables developers to build a custom embedded Linux distribution from scratch. With extensive control over every stage of compiling and building the target, Yocto provides extreme flexibility to the expert end-user and kernel engineer.

New Active Directory Integration features in Ubuntu 22.04 (part 1)

On April 21 Ubuntu Desktop 22.04 was released with a lot of new, exciting new features for both consumer and enterprise users. Improved Linux Active Directory (AD) integration is historically one of the most requested functionalities by our corporate users, and with 22.04, we decided to act on the feedback and offer a way to natively manage Ubuntu desktops with the same, familiar tools our clients are already using to manage their Windows estate.

Get More Value From Your Logs Without Compromising Costs

Everyone at LogDNA is (unsurprisingly) obsessed with the power of log data. It is the single source of truth for what is happening in your environment and, when used correctly, provides the insights needed to deliver better experiences. Now more than ever, people across various teams understand the value of having easy access to log data within key workflows.

3 Key Benefits to Web Log Analysis

Whether it’s Apache, Nginx, ILS, or anything else, web servers are at the core of online services, and web log analysis can reveal a treasure trove of information. These logs may be hidden away in many files on disk, split by HTTP status code, timestamp, or agent, among other possibilities. Web access logs are typically analyzed to troubleshoot operational issues, but there is so much more insight that you can draw from this data, from SEO to user experience.

7 Cybersecurity Statistics Every SMB and MSP Needs to Know in 2022

Cybersecurity isn’t just at the top of the discussion queue within the IT channel. Businesses and governments worldwide have turned a sharp eye toward rising cyber threats. Many have learned the hard way that small businesses are frequent targets of cyberattacks. The idea of “targeting a victim” itself has come into question, and more realize that widespread, indiscriminate attacks are the status quo.

Deployment-time testing with Grafana k6 and Flagger

When it comes to building and deploying applications, one increasingly popular approach these days is to use microservices in Kubernetes. It provides an easy way to collaborate across organizational boundaries and is a great way to scale. However, it comes with many operational challenges. One big issue is that it’s difficult to test the microservices in real-life scenarios before letting production traffic reach them. But there are ways to get around it.

Lockless code deploys in Puppet Enterprise & Continuous Delivery for PE

Your Puppet Enterprise (PE) installation’s primary job is to compile catalogs and send them to agents to be enforced. When you deploy code, all catalog compilation stops and waits for the code deploy to complete. This impacts performance in any installation, and the impact escalates with more frequent code deployments. Code deployments usually increase when you use Continuous Delivery for Puppet Enterprise, making the impacts of stopped catalog compilations even more apparent.

ServiceNow is again a Magic Quadrant Leader in Enterprise Agile Planning Tools

I’m excited to announce ServiceNow has been recognized as a Leader in the Gartner® Magic Quadrant™ for Enterprise Agile Planning Tools for the second year in a row. This is an extremely important distinction for ServiceNow and our newly named Strategic Portfolio Management (SPM) offering. We believe this recognition reflects our expanded hybrid work management approach, financial management support, and extended integration with third-party tools.