Operations | Monitoring | ITSM | DevOps | Cloud

Building and running FIPS containers on Ubuntu

Whether running on the public cloud or a private cloud, the use of containers is ingrained in today’s devops oriented workflows. Having workloads set up to run under the mandated compliance requirements is thus necessary to fully exploit the potential of containers. This article focuses on how to build and run containers that comply with the US and Canada government FIPS140-2 data protection standard.

InfluxDB's Checks and Notifications System

InfluxDB 2.0’s Checks and Notifications system is likely the most powerful and flexible system available for creating alerts based on time series data. To get the most out of the system, it is helpful to understand the different pieces and how they fit together. After reading this article, you should be able to create precise alerting using the InfluxDB 2.0 User Interface (UI), as well as be able to extend and customize the system to suit your specific needs.

Top 3 priorities to enhance customer experience

The retail, banking, telecom, and tech sectors have been trying to prove their love of customer experience (CX) for years. But the COVID-19 pandemic has underscored the need to elevate those vital customer relationships. German shoemaker Adidas is a case in point. In November 2020, it reported strong quarter-over-quarter performance.

Environment variables and Secrets - The Future of Qovery - Week #6

During the next five weeks, our team will work to improve the overall experience of Qovery. We gathered all your feedback (thank you to our wonderful community 🙏), and we decided to make significant changes to make Qovery a better place to deploy and manage your apps. This series will reveal all the changes and features you will get in the next major release of Qovery. Let's go!

Workflow Efficiency Through Workflow Management (Full Guide)

Workflow efficiency has never been more important. As the COVID-19 pandemic tightens purse strings across the globe, organizations of all sizes are looking to get more done with less. Workflows are a vital asset to any organization. It has been found that approximately three hours of every eight-hour workday is wasted on irrelevant or personal tasks.

Five worthy reads: Location intelligence-the key to next-level data utilization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience.

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack. Hackers gained access to the video feed of at least 15 thousand cameras deployed across various locations and exposed the inner workings of hospitals, clinics, and mental health institutions; banks; police departments; prisons; schools; and companies like Tesla and Cloudflare.

Self-hosting software & why it may be worth considering again now

Not all industries are the same in terms of the sensitivity of data they handle. And as you mature as a company, you need to be more careful of how you handle your critical data. With the advent of modern cloud native technologies & Kubernetes, on-prem software is more viable now.

Maximizing VMware Performance and Memory Utilization

VMware is one of the top virtualization software that allows you to create virtual machines and make the best use of your resources. One of the major focuses of virtualization solutions is to enable optimized use of resources like memory and computing power, but overcommitting your hypervisor towards greedy resource management can lead to severe degradation in the overall performance.