Operations | Monitoring | ITSM | DevOps | Cloud

What Is a CMDB and What Role Does It Play in IT?

Organizations of all sizes have a complex array of hardware, software, staff, and vendors. Each of those assets comes with complex configurations and relationships between them. Visualizing and tracking these configurations and relationships over time is critical to quickly responding to incidents. Plus, it helps inform business decisions, especially regarding future IT components and upgrades.

AWS Summit London - My top 3 sessions

Hi, fellow Qovery readers, Albane here! 👋 To give you a bit of background, I joined Qovery in August 2021, initially as a Product Owner, then moved to a Product Marketing Manager position in March 2022. So yes, I’m all about our product. However, I also spend much time learning about our partner’s products, and that’s why, on April 27, 2022, I spent the day at the ExCel Centre in London to attend the annual AWS Summit.

Proactive Monitoring vs. Reactive Monitoring

Monitoring is a fundamental pillar of modern software development. With the advent of modern software architectures like microservices, the demand for high-performance monitoring and alerting shifted from useful to mandatory. Combine this with an average outage cost of $5,600 per minute, and you’ve got a compelling case for investing in your monitoring capability.

Kubernetes Throttling Doesn't Have To Suck. Let Us Help!

In the Kubernetes (K8s) community, there is a huge misconception about CPU allocation and utilization. Even highly experienced SREs find themselves struggling with the way Kubernetes allocates CPU resources, leading to misconfigured CPU allocations and extremely negative outcomes. For starters, this results in significant quality degradation on important service components, introduced by behind-the-scenes CPU limiting (or throttling).

The MSP Provider's Guide to Getting Hired

In the years that I’ve worked with large technology vendors and an MSP provider, there were a few common denominators between the ones that were successful. Partners that were consistently at the top of the food chain were the ones consistently providing value to their customers in some area other than just one specific product or service that was being offered.

Website downtime: The one where Google Maps went down

March saw many of the big tech companies have technical issues with their products and services. But the biggest one was by far the colossal Google; Google Maps experienced the much dreaded website downtime impacting thousands of users across the globe. It was reported online that Google Maps had suffered a partial outage meaning that many couldn’t access the location tool, but why and more importantly, how?

Best Enterprise Password Managers According to IT Specialists

Even with advances in security practices and technologies, passwords continue to remain a weak point in an organization’s cyber security strategy. Strong passwords are still an essential part of security strategy for most organizations, and poor password hygiene can make their IT network vulnerable. According to the 2021 Verizon data breach investigation report, shared credentials and poor access management practices were among the top reasons for data breaches all over the globe.

Beyond Systems & Processes: ITIL Benefits to Individuals

The benefits of ITIL to a company or organization are widely discussed. This makes sense for the bigger picture, from the perspective of an organization. Smart organizations these days are adapting an ITIL framework to straighten out their IT service management and achieve business goals. However, it’s not so often you hear the question: what are the ITIL benefits to individuals?