Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The Advantages of Pluggable Transceivers for all DWDM Solutions

For the first time, the newest generation of high performance optical transceivers are available in a pluggable form factor. Using 5nm-140Gbaud technology, these transceivers deliver blazing fast 1.2T wavelengths for short haul, and 800G over large geographic regions. As pluggables, they are a huge leap over the previous generation of bulky, power-hungry modules that needed integration into line cards.

The Debrief: Stale incident summaries? AI can fix that for you

Incident summaries are the source of truth for responders joining an incident at any point. But the reality is that with so many things happening at once—like needing to respond to the actual incident—updating these summaries can fall by the wayside. Enter, Suggested Summaries, one of our newest features powered by AI. In this episode, you'll hear from Milly, the project lead for Suggested Summaries, to get a peek behind the curtain of this game-changing feature.

Build and test LLM applications with AIConfig and CircleCI

The power of LLMs to solve real-world problems is undeniable, but unfortunately, in some cases, only theoretical. What’s stopping us from getting the most out of OpenAI’s text completion capabilities in production apps? One common problem is the inability to confidently guard against bad outputs in production the way we’re used to doing with non-AI test suites. Let’s go one step deeper. There is no equivalent of code coverage for an LLM.

Crossplane loves Kubernetes as much as we do... But, differently!

Kubernetes has emerged as the de facto orchestrator for deploying and managing containerized applications. Its versatility and robust ecosystem have paved the way for innovative tools that leverage its capabilities, extending its utility beyond mere container orchestration. Among these tools, Crossplane and Qovery stand out for their unique approaches to simplifying cloud resource management.

eBPF: Revolutionizing Observability for DevOps and SRE Teams

Whether you're a system administrator, a developer, or any other DevOps or Site Reliability Engineering (SRE) professional, you know that staying ahead in cloud-native computing is crucial. One way to keep your competitive edge in the technology game is to embrace the benefits of eBPF (Extended Berkeley Packet Filter). On top of advances in security and networking, eBPF-based tools are particularly impacting the observability landscape.

Best practices for creating a reliable on-call rotation

It's fair to say that effectively managing an on-call rota is crucial for ensuring the 'round-the-clock availability of your services. But it's more than that. Spending the time getting your rotas right also empowers and protects the folks who make it all possible: your team. Some best practices for doing this include using software to automate scheduling, setting up teams with clearly defined responsibilities, establishing escalation policies, and defining time limits for issue resolution.

Reducing cloud reliability risks with the AWS Well-Architected Framework

Designing and deploying applications in the cloud can be a labyrinthian exercise. There are dozens of cloud providers, each offering dozens of services, and each of those services has any number of configurations. How are you supposed to architect your systems in a way that gives your customers the best possible experience? AWS recognized this, and in response, they created the AWS Well-Architected Framework (WAF) to guide customers.

Azure Cosmos DB Pricing (2024)

Azure Cosmos DB, a global, multi-model database by Microsoft Azure, ensures globally responsive and scalable applications with low-latency, high-throughput data access. With support for diverse data models, global distribution, flexible consistency models, automatic scaling, and comprehensive SLAs, it’s crucial for modern applications requiring agility, security, and compliance.

Invisible Armor: Cycle's Behind-the-Scenes Update Guards Against Recent "Leaky Vessels" Container Exploit

At Cycle, we understand the paramount importance of security and the challenges that come with maintaining it. That's why we're proud to share how our proactive approach has not only addressed the recent “Leaky Vessels” container exploit, but has done so in a manner entirely transparent to our customers, and in under 4 hours of the vulnerability being made public.