Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

On-Call Life: Setting Expectations

Imagine this: You’ve just been offered a new job in tech. Maybe it’s your first job right out of college, and you’ve only heard of being on-call in passing conversations up until this point. Or, perhaps you’ve been in tech your whole life but never had to be on-call until today. Or, maybe you’re contemplating whether on-call is for you because your company is dangling some extra cash (because, who doesn’t like extra money!).

5 Best Wi-Fi Heat Mapping Tools + Guide

Wi-Fi has become an essential component of our daily life, allowing for seamless connectivity between several devices. However, maintaining the best possible Wi-Fi performance and coverage may be difficult, particularly in complicated settings like huge stadiums, universities, and workplaces. Wi-Fi heat mapping is useful in this situation.

Security Best Practices for Your Node.js Application

The widespread adoption of Node.js continues to grow, making it a prime target for XSS, DoS, and brute force attacks. Therefore, protecting your Node application from possible vulnerabilities and threats is crucial. In this guide, we'll uncover common security threats and explore best practices for preventing them. You don't have to be a cybersecurity expert to implement fundamental security measures for your Node.js application. So, are you ready? Let's go!

The Hater's Guide to Dealing with Generative AI

Generative AI is having a bit of a moment—well, maybe more than just a bit. It’s an exciting time to be alive for a lot of people. But what if you see stories detailing a six month old AI firm with no revenue seeking a $2 billion valuation and feel something other than excitement in the pit of your stomach? Phillip Carter has an answer for you in his recent talk at Monitorama 2024. As he puts it, “you can keep being a hater, but you can also be super useful, too!”

3 Reasons to Migrate from Beanstalk to EKS

While AWS Elastic Beanstalk (EB) offers a convenient way to deploy applications, some limitations in customization and control can become a bottleneck for growing businesses. As the need for scalability, flexibility, and fine-grained management increases, Amazon Elastic Kubernetes Service (EKS) emerges as a compelling alternative.

Entry Level IT Jobs: Roles to Start Your Career

Embarking on a new career path in information technology (IT) is both thrilling and daunting. With the rapid pace of technological advancement, the demand for skilled IT professionals continues to soar. For those just stepping into the professional world, finding the right entry-level IT job can set the foundation for a rewarding and progressive career.

What is a Knowledge Manager?

A Knowledge Manager is the person who makes sure valuable information is captured, stored and accessible across the organization. This article looks at the responsibilities, challenges and job market for Knowledge Managers, and how they work within an ITIL (Information Technology Infrastructure Library) framework, and what their role is in creating a knowledge based business.

What you need to know about regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387)

On 1 July 2024 we released a fix for the high-impact CVE-2024-6387 vulnerability, nicknamed regreSSHion, as part of the coordinated release date (CRD). Discovered and responsibly disclosed by Qualys, the unauthenticated, network-exploitable remote code execution flaw affects the OpenSSH server daemon (sshd) starting with version 8.5p1 and before 9.8p1.

Azure Storage Pricing 101 - Guide to Blob, Cold & File Storage Costs

Microsoft Azure storage pricing can be confusing. With cloud storage-specific tiers, reservations, time lengths, and other cost considerations, starting monthly budget calculations can be more than intimidating—especially since you’ll also want to watch out for any extra provider-specific fees. We’ll break things down so you can easily calculate your Azure storage pricing.