Operations | Monitoring | ITSM | DevOps | Cloud

How We Used Our Own Platform Capabilities to Prevent Log4j Attacks and Protect Customers

In December, information security researchers discovered a serious vulnerability in the popular open-source logging library, Log4j. If exploited, this vulnerability, known as Log4Shell, could allow malicious attackers to execute code remotely on any targeted computer. Millions of computers use Log4j. According to one study, 93% of all cloud environments are affected by the vulnerability.

Episode 3: Mooving to... Stability: The Role of Catastrophic Failure in Software Design

In this episode of Mooving to… Stability: The Role of Catastrophic Failure in Software Design, we had the opportunity to chat with Jeff Atwood, yes that Jeff Atwood of, Coding Horror, Stack Overflow, and Discourse (Chief Happiness Officer). Jeff started writing 911 software in Boulder, Colorado for a small company, which was a crash-course in writing code for software that has real consequences. With this unique and deep perspective, B.J.

Fran Villalba Segarra, Internxt: "We need an internet that respects the user"

With the introduction of Cloud computing services, let it be the Family photo sharing feature on iPhone or documents on Google Drive, sharing and keeping up-to-date information became easier than ever before. All Cloud-based products require no direct resource management from the user and ultimately create one of the most popular ways to store data whether you’re a scholar writing an essay or a new business owner trying to build an online shop

Your guide to the key steps of capacity planning and management

If you’re going to move assets to Azure – or any public cloud, you’re going to need some help. As a cloud consulting firm with a top-notch infrastructure performance monitoring application, we help enterprises navigate obstacles on the path to the cloud all the time. We’ve also felt the pain of sizing and pricing in our cloud journey, too. That’s why we created Galileo Cloud Compass (or GCC as we sometimes call it).

What is SSE vs SASE, and is SASE Dead?

Gartner introduced a new security architecture called Security Service Edge, or SSE, back in March 2021. Now finally, after a long wait, they’ve just published their first Magic Quadrant for SSE in February 2022. This begs the question, is SASE dead? To answer, we need to look at what is SSE vs SASE, and what are the challenges SSE addresses. For easy reference, Gartner created the following SSE definition.

6 Simple Steps to an Easy Cloud Migration

If you’re going to move assets to Azure – or any public cloud, you’re going to need some help. As a cloud consulting firm with a top-notch infrastructure performance monitoring application, we help enterprises navigate obstacles on the path to the cloud all the time. We’ve also felt the pain of sizing and pricing in our cloud journey, too. That’s why we created Galileo Cloud Compass (or GCC as we sometimes call it).

6 Tips For Choosing A Good IT Consulting Company

In the past couple of years, the hunt for consulting companies has drastically increased, because business owners know how beneficial they can be for their businesses because they always come up with fresh ideas, solutions, and perspectives. Additionally, they are usually capable of giving experts advice when it comes to Human Resources, IT management, and many other fields. That's precisely why it's always recommendable to have a knowledgeable IT consultant by your side.

How AIOps Can Help Retailers Improve the Digital Experience

More than 2.14 billion global consumers are expected to buy goods and services online in 2021, according to Statista. That is up 29% from 1.66 billion digital customers just six years ago. This rapid change in shopping habits is driving retailers’ digital transformations and ever more advanced technologies. Many retailers have begun automating back office functions like claims processing, accounting and inventory management.