Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Unveailing the ESX API

The VMware ESX API is an essential tool for modern IT professionals tasked with managing VMware vSphere environments. This Application Programming Interface (API) acts as a bridge between the VMware ecosystem and various automation, scripting, and integration solutions, streamlining and enhancing the management of virtual infrastructure. At its core, the ESX API provides a powerful way to interact with the vSphere environment programmatically.

Migrating a BizTalk Request-Response routing solution with LOB Adapters

Welcome again to another BizTalk Server to Azure Integration Services blog post. In my previous blog post, I discussed how you can implement the aggregation mapping pattern inside Logic Apps. Today, I will address a very interesting BizTalk Server topic and how we can redesign our solution to implement the same capabilities inside Azure Integration Services: How you can migrate a BizTalk Server content-based routing solution with LOB Adapters – in this particular case, SQL Server.

6 Essential Components of an Internal Developer Platform

Imagine a scenario where your developers spend less time waiting for resources and approvals, and more time focusing on the core aspects of building exceptional software. This vision becomes reality with the implementation of an internal developer platform (IDP), a revolutionary tool that acts as a catalyst for innovation within your organization.

Releasing IAM EKS User Mapper in open-source

I'm super excited to share something amazing our team at Qovery has been cooking up lately: the IAM EKS User Mapper. This isn't just any tool – it's our answer to a problem we know so many of you face: managing AWS IAM user access to Kubernetes clusters efficiently and securely. It's open-source and available to everyone now on GitHub.

5 Docker Extensions to make your development life easier

Docker has revolutionized the way developers build, ship, and run applications. Its simplicity and efficiency in creating lightweight, portable containers have made it a go-to tool in modern software development. However, enhancing Docker’s capabilities with extensions can significantly boost productivity and simplify complex tasks. Here are five Docker extensions that can make your development life easier.

Learn the Incident Response Life Cycle - Best Practices and Strategies

No company plans for a security breach, major outage, or other cyber incident, but they happen. When an incident occurs, having a standardized, regulated method of managing the fallout is critical. This is where the incident response life cycle comes in ‍

What Is Network Access Control (NAC)? Overview & Implementation

Whether you’re an in-house IT professional or a managed service provider, ensuring the security and integrity of your networks is a crucial part of your bailiwick. In pursuit of greater security, Network Access Control (NAC) serves as a formidable guardian, ready to protect digital assets by regulating who gains entry to a network. Understanding the fundamental concepts and best practices of NAC is essential for any organization that values data security and network integrity.

Ubuntu Summit 2023 Reflections

We have just returned from the stunning city of Riga, where Canonical hosted the Ubuntu Summit 2023, and we are still buzzing with the energy from meeting so many of you. Preparing this event was a team effort. A small team of us have been meeting for months, brainstorming ideas, preparing huge to-do lists, and dividing responsibilities. It was difficult, but also hugely rewarding, and an opportunity many of us felt was a privilege.