Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

An Introduction to Open Source Licensing for complete beginners

Open source is one of the most exciting, but often misunderstood, innovations of our modern world. I still remember the first time I installed linux on my laptop, saw the vast array of packages I could install on it, all the utilities and libraries that make it work, all the forum threads filled with advice and debugging and troubleshooting, and I thought: “Wait, all of this is free???” It’s free, you can use it, and it’s awesome.

A comprehensive guide to NIS2 Compliance: Part 3 - Setting the roadmap and demonstrating NIS2 compliance.

In this third and final part of the series, I’ll provide some tips on how to set up your roadmap and effectively demonstrate compliance without overburdening your teams. If you’re just joining the fun now, in our two previous editions we covered who NIS2 applies to and what requirements it sets out. Be sure to have a look at them if you need any additional context.

A comprehensive guide to NIS2 Compliance: Part 2 - Understanding NIS2 requirements

In my previous blog, we ran through what NIS2 is and who it applies to. In this second part of the series, I’ll break down the main requirements you’ll find in NIS2 and help translate them into actionable and practical measures you can take to achieve NIS2 compliance. Join me in this post and start understanding what NIS2 is all about.

A comprehensive guide to NIS2 Compliance: Part 1 - Understanding NIS2 and its scope

The EU NIS2 directive, which calls for strengthening cybersecurity across the European Union, is now active in all member states. Join me for this 3-part blog post series in which I’ll explain what it is, help you understand if it is applicable to your company and how you can become NIS2 compliant.

How to build your first model using DSS

GenAI is everywhere, and it’s changing how we approach technology. If you’ve ever wanted to dive into the world of large language models (LLMs) but felt intimidated, there’s good news! Hugging Face recently launched a self-paced course that’s perfect for beginners and more experienced enthusiasts alike. It’s hands-on, approachable, and designed to work on standard hardware thanks to the small footprint of the models.

Your data applications, contained and maintained

It’s time to stop proclaiming that “cloud native is the future”. Kubernetes has just celebrated its 10 year anniversary, and 76% of respondents to the latest CNCF Annual Survey reported that they have adopted cloud native technologies, like containers, for much or all of their production development and deployment. Cloud native isn’t the future – it’s here and now. Data-intensive workloads are no exception.

What to know when procuring Linux laptops

Technology procurement directly influences business success. The equipment you procure will determine how your teams deliver projects and contribute to your success. So what does being “well-equipped” look like in the world of Linux laptops? In this blog, we’ll lay down the best practices for procurement professionals who have been tasked with procuring Linux laptops.

Building RAG with enterprise open source AI infrastructure

One of the most critical gaps in traditional Large Language Models (LLMs) is that they rely on static knowledge already contained within them. Basically, they might be very good at understanding and responding to prompts, but they often fall short in providing current or highly specific information.

What is RAG?

In a 2020 paper, Patrick Lewis and his research team introduced the term RAG, or retrieval-augmented generation. This technique enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. RAG addresses a gap in traditional Large Language Models (LLMs). While traditional models rely on static knowledge already contained within them, RAG incorporates current information that serves as a reliable source of truth for LLMs.