Operations | Monitoring | ITSM | DevOps | Cloud

Redefining NetOps: Agent Systems and Practical AI from the ONUG AI in Networking Summit

AI in networking isn’t theoretical anymore. It’s here, reshaping how we operate. At the ONUG AI Networking Summit, we saw firsthand how agent systems are moving from hype to hands-on reality, from secure automation to data-driven root cause analysis. The future of NetOps isn’t dashboards and tickets — it’s intelligent agents, observability, and measurable business outcomes.

Why Your Next ITSM Agent Won't Be Human (and Why That's a Good Thing)

For a very long time now, IT leaders have relied on the “throw more bodies at it” strategy: when ticket volumes rise, headcount follows. That model no longer works. Hybrid work, SaaS sprawl, and cloud complexity have made human-only scaling unsustainable. The enterprises winning today aren’t scaling with headcount. They’re scaling with autonomous ITSM agents: AI-driven specialists that resolve tickets instantly, escalate only when needed, and keep operations running 24/7.

Why Email Servers Get Blacklisted?

An email server gets blacklisted when it's identified as a potential source of spam, malware, or suspicious activity. Blacklists use automated systems and user reports to flag servers that violate mailing or security standards. Once listed, legitimate messages may bounce, land in spam folders, or never reach recipients at all. Understanding why this happens is essential to prevent future listings and protect the sender's reputation.

Artificial Intelligence as a Service AIaaS (AIaaS): What is Cloud AI & How Does it Work?

Today, organizations looking to build AI products and services using large language models (LLMs), agentic AI, and generative AI often start by investing in artificial intelligence as a service (AIaaS), also known as cloud AI. AIaaS provides a scalable, flexible, and cost-effective way for businesses of all sizes to access advanced AI technologies without the need for extensive in-house expertise or infrastructure.

Navigating the geopolitical maze of digital sovereignty at Civo Navigate London 2025

Trust in Big Tech is eroding. Geopolitical tensions are rising. The only predictable thing about the cloud today is that it’s time to re-evaluate everything. At Civo Navigate London 2025, we pulled together a panel of industry experts to cut through the noise and finally define what digital sovereignty means for the UK.

OTel Updates: Consistent Probability Sampling Fixes Fragmented Traces

You're sampling 1% of traces in production. A payment request fails at 3 AM. Logs show an error in order-service, but the full picture isn't there because different services made different sampling decisions. order-service kept the trace; payment-service didn't. So you end up checking logs and timestamps across a few services to piece things together. This happens because the usual probability sampling approach makes a separate choice at each service boundary.

LogicMonitor Is FedRAMP Moderate Authorized: How We Support Federal IT

Federal agencies need observability that doesn’t create new compliance problems. Today, that’s possible. LogicMonitor Envision is now FedRAMP Moderate Authorized with a formal Authorization to Operate (ATO). That means unified, AI-powered visibility across your hybrid infrastructure—on-prem, AWS GovCloud, Azure Government, and edge—without starting your security review from scratch.

Comparing Ways to Connect to AWS

Not sure how to connect to this leading cloud provider? Compare options to pick the best one for your business. Curious about Amazon Web Services (AWS) and the best ways to connect? AWS is a hybrid cloud provider with customized, scalable, cloud-based packages. These encompass: Whether you’re part of a multinational corporation or a small startup, you can choose among various AWS services to meet your needs.

Monitoring Chaos Experiments with New Relic Probe in Harness

New Relic probes in Harness Chaos Engineering let you automatically validate system performance against defined SLOs during chaos experiments, transforming subjective testing into objective, metrics-driven resilience validation. By querying New Relic metrics in real-time and comparing results against your success criteria, you can programmatically verify that your systems maintain acceptable performance levels even under failure conditions.

Zero Trust Access, Simplified: C1 Managed Services + Cisco ZTNA

VPN-for-everything is like handing out master keys at the front desk. Cisco’s ZTNA swaps that for per-app access that feels faster for users and safer for you. C1 designs it for your real world (quirky apps included) and runs it so it stays reliable, predictable, and boring—in the best way.