Operations | Monitoring | ITSM | DevOps | Cloud

The "Rigged Lottery" - Why IT Surveys Hold EUC Leaders Back

This article originally appeared in VentureBeat. “I feel like my job performance is based on a rigged lottery.” That’s what the Director of End User Computing at a large European bank told me two weeks ago. Every quarter, her company runs an NPS-style survey asking employees about their IT Experience. If you work in a corporate setting, you’ve probably seen these questionnaires before.

Canonical and DFI launch the first Ubuntu certified AMD-based "Industrial Pi"

Canonical and DFI announce that the GHF51 and EC90A-GH, have been certified, based on the latest AMD-based platform. Both offer improved performance, a smaller footprint, and full access to open-source software with Ubuntu and Ubuntu Core. These are part of the first wave of products that passed the Ubuntu IoT hardware certification.

Managing Secrets in the Browser in InfluxDB Cloud

Directly embedding passwords and API keys into the code you write is a bad practice. Of course, everyone knows this, but I’ll be the first to admit that it still happens now and then. In the world of source control and shared codebases, leaking a password can be a huge problem that costs your team time and money. Of course, today many companies leverage a secrets management system to lower the probability of something like this happening.

Keeping afloat during the flood of worker turnover

Almost four million U.S. workers a month are quitting their jobs. More than half of North American employees plan to look for a new position this year. And an alarming percentage of the workforce describe themselves as “burnt out.” Statistics like these are the shadow cast by the looming “talent turnover tsunami.” The pandemic has unmoored millions of people from their familiar patterns both at home and at work.

The employee experience should focus on people, not technology

If there’s one thing 2020 taught us, it’s that it’s worth taking time to adapt technology to suit users, not the other way around. Most of us engage with technology every day. We browse, share, and connect. We enjoy a slick user experience as consumers. But we’re often plagued by inefficient technology in the workplace. At telecom provider Telia Company, we pride ourselves on giving customers next-generation services.

Detect security threats with anomaly detection rules

Securing your environment requires being able to quickly detect abnormal activity that could represent a threat. But today’s modern cloud infrastructure is large, complex, and can generate vast volumes of logs. This makes it difficult to determine what activity is normal and harder to identify anomalous behavior. Now, in addition to threshold and new term –based Threat Detection Rules , Datadog Security Monitoring provides the ability to create anomaly.

Is your CDN provider delivering the best value?

In case you haven’t noticed, video marketing is on fire right now with compelling statistics around this trend hard to ignore. And for good reason — everyone from large enterprises and educational institutions to community groups and entrepreneurs are incorporating richer content into their websites, such as images and videos. Hence, the importance of choosing a high-quality content delivery network (CDN) provider.

5 features you must have in your status page for effective incident communication

Have you been a frustrated customer at the end of the service line waiting to achieve a resolution for your problem? After all the waiting, you'll hear a voice giving you a standard response: your request will be addressed and resolved soon. An incident need not be a harrowing experience, but can be turned into a positive customer experience using customizable and publicly accessible status pages for timely incident communication.