Operations | Monitoring | ITSM | DevOps | Cloud

How to upgrade to SCOM 2022 step-by-step

The long awaited SCOM 2022 is here! If you’d like to know what improvements to expect, check out our blog on SCOM 2022 key highlights. If you’re as excited as we are and would like to proceed with your upgrade, keep reading, this is the detailed step-by-step guide you are looking for. We will take you through the whole process, covering: Stick with us, and by the end of this blog you’ll have successfully upgraded to SCOM 2022!

100% office-based to remote-first: SquaredUp's journey

Back when everyone was talking about the ‘new normal’ and what the future of work would look like post-pandemic, SquaredUp was having a rethink too. SquaredUp has always been a 100%, office-based company with a heart for bringing people together. Richard Benwell, CEO, and the executive team had created a company that is truly fun, collaborative, and integrated, largely based on their drive to keep people connected and build an incredible community – in the office.

The DEX Super-Team: 5 Innovative IT Roles for the Experience-Driven Future

Digital Employee Experience (DEX) is no longer a novel concept. Today’s workplaces are increasingly digital – and a majority of business leaders recognize DEX as a top priority. But many leaders are coming to a new realization: managing DEX is too complex of an undertaking to remain one priority on an IT team’s long checklist. The modern IT department must evolve – and improving experience requires a dedicated set of DEX focused IT roles.

API Testing: An Introduction

Digital businesses are making a radical change in the way they build and deliver software. Gone are the days of apps that rely solely on in-house tools. Rather, today’s apps are increasingly dependent on external APIs and third-party app providers (which, in turn, are reliant on other APIs and apps). While this type of modularity allows for product flexibility and rapid development, it can be difficult to address any issues that arise.

The Future of Monitoring: Turning Unknown Unknowns into Known Knowns

To ascertain risk, national security and intelligence professionals have long used concepts such as known knowns, known unknowns, and unknown unknowns. The idea of unknown unknowns was created in 1955 by American psychologists Joseph Luft (1916–2014) and Harrington Ingham (1916–1995). This concept continues to be used today in risk assessments and is applicable to technology. The unknown unknowns are the threats and potential problems that remain invisible until their impact manifests.

Using OpenID Connect identity tokens to authenticate jobs with cloud providers

Introducing OpenID Connect identity tokens in CircleCI jobs! This token enables your CircleCI jobs to authenticate with cloud providers that support OpenID Connect like AWS, Google Cloud Platform, and Vault. In this blog post, we’ll introduce you to OpenID Connect, explain its usefulness in a CI/CD system, and show how it can be used to authenticate with AWS, letting your CircleCI job securely interact with your AWS account, without any static credentials.

Creating Efficiency for University Operations through Software

University operations play a pivotal role in creating a productive and successful learning environment. These are the foundations upon which the institutions are built. ‍ In order to manage a large number of students, staff, and resources, universities need robust systems that provide real-time data and transparency across all areas of their operations. Universities are complex organizations with a myriad of moving parts. Each university department has its own objectives, budgets, and personnel.

Serverless360 to enable your Security Manager to WAF data

Recently we had an interesting use case from our customer for which Serverless360 mapped a perfect solution. We resolved the issue with the new Log Analytics and Application Insights capabilities from Serverless360. This blog will help you better understand the feature set with a real-time use case.

Data-Aware Security: How to Take a 360 View of Cloud Security

Don’t let your organization fall victim to data exposure; a well-defined strategy will cover all aspects of the cloud shared responsibility model and keep your data secure. Not long ago, security concerns were the number one reason IT executives hesitated to move workloads to the cloud. Much has changed since then. Security is now considered one of the great strengths of both cloud infrastructure and software-as-a-service (SaaS) platforms. But that doesn’t mean total security is assured.

Monitor your gRPC APIs with Datadog Synthetic Monitoring

gRPC is an open source Remote Procedure Call (RPC) framework developed by Google and released in 2016. Although gRPC is still relatively new, large organizations are adopting it in increasing numbers to build APIs to connect complex microservice meshes that use disparate languages and frameworks. gRPC-based APIs can process requests up to seven times faster than REST APIs, and they also allow customers to easily implement SSL authentication, load balancing, and tracing via plug-in libraries.