Operations | Monitoring | ITSM | DevOps | Cloud

Adding value to applications using the software testing life cycle

Software testing is important enough to have its own phase in the software development life cycle (SDLC). The software testing life cycle (STLC) is a step-by-step process that improves the quality of software by applying rigorous planning and analysis to the testing process. Testing is a development tool that adds value to your team’s applications. Embracing testing as a vital component of software development can save you and your team a lot of time debugging and fixing errors in the future.

Tips to implement AIOps the right way in 2022

A lot of things have changed in recent years. From the way of working to executing IT operations, the business strategies have changed overnight with arising advances like Machine Learning, Automation, and Artificial intelligence. The technologies have changed present-day applications and IT operations, and with AI and ML on board, IT industries operate more perplexing undertakings and resolve issues across complex infrastructures.

8 Tips for an Effective Preventive Maintenance Program

Lots of organizations ignore the maintenance of assets but asset maintenance expenses are more compared to regular maintenance in the long run. That is why it is essential to implement a preventive maintenance program. Preventive maintenance program provides several other benefits That we will discuss later but first let us know what preventive maintenance is! So, without wasting any time let us begin.

Learn how to get started with Grafana Cloud, Grafana OnCall, Grafana Tempo, and the Grafana Stack

Are your metrics, logs, and traces playing hard to get in your current observability setup? Feel like your on-call messages are left on read? Is the heatmap between your data sources fizzling out on your dashboard?

Puppet Enterprise installation and self-signed Intermediate CA

This article is about how to install Puppet Enterprise using your own self-signed Intermediate CA (Certificate Authority). In some environments, regulations require you to intercept and inspect all SSL traffic to detect malicious activities that could otherwise masquerade as legitimate encrypted traffic. This requires the ability to decrypt and re-encrypt the stream in real time, which can only be done with the proper certificates installed.

Writing a cfbs module for your custom policy update

I re-stumbled across this mailing list post from Bryan Burke about some policy framework upgrade issues where he also asked about hooking in and customizing the update policy. I thought this sounded like a good opportunity for an example using a cfbs module. So, let’s take a look at making a cfbs module for a custom update policy. As mentioned in the thread there are just a couple of things you need to do in order to hook in and customize the behavior of the update policy.

Surviving the Server Chip Shortage

The global chip shortage, which began in 2020, continues as demand for semiconductor chips continues to far outpace production. Intel CEO Pat Gelsinger recently forecast shortages to be sustained through at least the remainder of 2022. As a result, IT operations teams at almost every company we’ve talked with have felt the crunch in the form of skyrocketing prices and delays of up to a year for procurement of physical servers.

Virtualized Databases: Friend or Foe to Federal IT Pros?

Federal IT pros have historically had limited time and resources; this makes it crucial to find the source of application slowdowns or outages as quickly as possible. Database virtualization can help by allowing IT pros to separate the storage and application layers within the application stack more quickly, providing easier access to root-cause issues. An estimated 70% of databases are virtualized. Yet, the benefits of virtualized databases come with additional challenges.

JFrog Discloses 3 Remote Access Trojans in PyPI

The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling to detect and avert potential software supply chain security threats. After validating the findings, the team reports any security vulnerabilities or malicious packages discovered to repository maintainers and the wider community.