GitOps is one method used by teams to deploy microservices, but challenges usually arise when deploying applications across multiple clusters and environments. For your GitOps initiative to be successful, you should consider implementing an application operating model. In this second workshop we covered.
For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Pieter Vaniperen, Managing Partner at PWV Consultants. Pieter is a veteran software architect and security expert who is an industry authority and influencer providing thought leadership and execution to develop widely adopted processes, methodologies, and technologies that are at the forefront of digital innovation and software development.
Memory management is Java’s strongest suit and one of the many reasons developers choose Java over other platforms and programming languages. On paper, you create objects, and Java deploys its garbage collector to allocate and free up memory. But that’s not to say Java is flawless. As a matter of fact, memory leaks happen and they happen a lot in Java applications. We put together this guide to arm you with the know-how to detect, avoid and fix memory leaks in Java.
We say it all the time: Behind every great experience is a great workflow. But what’s behind a great experience? If you ask ServiceNow’s User Experience (UX) team, it’s software that is user friendly, visually beautiful, empowering, and productivity-boosting; and that people connect with emotionally. That provides, from start to finish, and at every touch point along the way, a fantastic experience.
While SCOM is a valuable monitoring tool, you may also be using a suite of monitoring tools, such as SolarWinds to monitor network devices, VROps to monitor VMware, and Nagios to monitor your Linux devices, as all these tools are best in class. But, you don’t want to be looking in numerous different consoles to gather all your monitoring data!
Bi-directional sync enables data to be sent to and from SCOM and your ITSM tools, in the following ways: a) OUTBOUND Notifications (PUSHES alerts from SCOM to another tool) b) INBOUND Notifications (PULLS updates on alerts into SCOM from another tool) This means you can choose which SCOM alerts to send across to your ITSM tools (Cherwell or ServiceNow), they are then raised as incidents, and then using bi-directional sync, info relating to the incidents is pulled back into SCOM (Incident ID, Configurat
Webhooks allow for communication between services and APIs, which makes them the glue of our interconnected, cloud-based application environment. If you are familiar with APIs, you can learn to use webhooks. CircleCI offers a webhooks feature for our CI/CD platform that lets you subscribe and react to CircleCI events such as workflow and job completed. This tutorial showcases the webhooks feature and gives you steps for getting started.
Over the past 10 years, CircleCI customers have used our platform to customize their software development process. Orbs have helped standardize and scale CI/CD pipelines with reusable packages of configuration. The CircleCI API has allowed users to create robust internal tools for their developers and integrate with other products for more granular monitoring. As of today, CircleCI users have yet another way to react to events and customize their software delivery experience with webhooks.
Speedscale is seeking to cut time and errors out of the Kubernetes and container delivery pipeline with their ability to discover API connections, automatically generate tests and data, replay traffic, and spin up realistic lab environments and reports within the tight time windows of cloud-native development.