Operations | Monitoring | ITSM | DevOps | Cloud

The Truth About "MEH-TRICS"

A long time ago, in a galaxy far, far away, I said a lot of inflammatory things about metrics. “Metrics are shit salad.” “Metrics are simply nerfed dimensions.” “Metrics suck,” “metrics are legacy,” “metrics and time series aggregates will fucking kneecap you.” I cannot tell a lie; Twitter will testify that I’ve spent the past six years ragging on metrics.

How We Used Our Own Platform Capabilities to Prevent Log4j Attacks and Protect Customers

In December, information security researchers discovered a serious vulnerability in the popular open-source logging library, Log4j. If exploited, this vulnerability, known as Log4Shell, could allow malicious attackers to execute code remotely on any targeted computer. Millions of computers use Log4j. According to one study, 93% of all cloud environments are affected by the vulnerability.

Episode 3: Mooving to... Stability: The Role of Catastrophic Failure in Software Design

In this episode of Mooving to… Stability: The Role of Catastrophic Failure in Software Design, we had the opportunity to chat with Jeff Atwood, yes that Jeff Atwood of, Coding Horror, Stack Overflow, and Discourse (Chief Happiness Officer). Jeff started writing 911 software in Boulder, Colorado for a small company, which was a crash-course in writing code for software that has real consequences. With this unique and deep perspective, B.J.

Fran Villalba Segarra, Internxt: "We need an internet that respects the user"

With the introduction of Cloud computing services, let it be the Family photo sharing feature on iPhone or documents on Google Drive, sharing and keeping up-to-date information became easier than ever before. All Cloud-based products require no direct resource management from the user and ultimately create one of the most popular ways to store data whether you’re a scholar writing an essay or a new business owner trying to build an online shop

Your guide to the key steps of capacity planning and management

If you’re going to move assets to Azure – or any public cloud, you’re going to need some help. As a cloud consulting firm with a top-notch infrastructure performance monitoring application, we help enterprises navigate obstacles on the path to the cloud all the time. We’ve also felt the pain of sizing and pricing in our cloud journey, too. That’s why we created Galileo Cloud Compass (or GCC as we sometimes call it).

What is SSE vs SASE, and is SASE Dead?

Gartner introduced a new security architecture called Security Service Edge, or SSE, back in March 2021. Now finally, after a long wait, they’ve just published their first Magic Quadrant for SSE in February 2022. This begs the question, is SASE dead? To answer, we need to look at what is SSE vs SASE, and what are the challenges SSE addresses. For easy reference, Gartner created the following SSE definition.

6 Simple Steps to an Easy Cloud Migration

If you’re going to move assets to Azure – or any public cloud, you’re going to need some help. As a cloud consulting firm with a top-notch infrastructure performance monitoring application, we help enterprises navigate obstacles on the path to the cloud all the time. We’ve also felt the pain of sizing and pricing in our cloud journey, too. That’s why we created Galileo Cloud Compass (or GCC as we sometimes call it).

6 Tips For Choosing A Good IT Consulting Company

In the past couple of years, the hunt for consulting companies has drastically increased, because business owners know how beneficial they can be for their businesses because they always come up with fresh ideas, solutions, and perspectives. Additionally, they are usually capable of giving experts advice when it comes to Human Resources, IT management, and many other fields. That's precisely why it's always recommendable to have a knowledgeable IT consultant by your side.