Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The only way to measure developer productivity without causing a revolt

In an article titled The Worst Programmer I Know, Dan North, the creator of behavior-driven development, writes about a nearly fired developer he saved from the unemployment line. This developer consistently delivered zero story points, even though delivered story points was the primary metric for developer productivity at their (unnamed) software consultancy.

Cloud backup: improve your disaster recovery plans

Today the lowest cost media per terabyte for backups is still tape, even after factoring in the handling costs of manually loading and unloading tape libraries, and logistics surrounding off-site storage. However, while inexpensive, tapes are inflexible. And when used as an offline solution it can take many hours to retrieve them from offsite storage – not to mention the additional time required to load them into a tape library before a recovery can even start.

Ubuntu Explained: How to ensure security and stability in cloud instances-part 2

You probably know that it is important to apply security updates. You may not be as clear on the details of how to do that. We are going to explain best practices for applying Ubuntu updates to single instances and what the built-in unattended-upgrades tool does and does not do.

Weathering Black Friday and Other Storms Reliably

If you work in eCommerce, you can see the storm on the horizon. Black Friday, the biggest shopping day of the year both online and off, is only a few days away. Your services are going to hit usage spikes you possibly have never seen before. And it will be all aspects of your services pushed to your limit – people won’t just be searching, or just buying, or signing up for programs, they’ll be doing all of these at once. ‍ Most crucially, everyone else is offering deals too.

ISO 27001 Compliance: Everything You Need to Know

Let’s talk about what ISO 27001 compliance means for the tech team. If you’re a CTO, DevOps team lead, or cyber security specialist, you’ll have a lot of plates spinning at any given point in time. You need to ensure and maintain security protocols and compliance without hindering the development team’s ability to test and deploy new code (often at scale). It’s a constant battle to align development speed with governance tasks like audit, compliance, and security.

Engineering-Led Optimization: How To Proactively Manage Cloud Costs Without Slowing Down Innovation

How Engineering-Led Optimization Works Achieve Cloud Efficiency Without Slowing Down Innovation Historically, cloud cost optimization has been the responsibility of finance teams. Engineers have bought what they claim to need to build top-notch software; finance teams have gotten (and paid) the bill; neither has had an in-depth understanding of what the other is doing.

15 Crucial Azure Tools You Need To Know Now

What Does Microsoft Azure Do? Azure Development Tools Azure Cost And Resource Management Tools Azure Security Tools Azure Monitoring And Reporting Tools How To Choose The Best Azure Tools For Your Business View The People, Products, And Processes That Drive Your Cloud Spend With CloudZero Modern cloud environments can be challenging to manage. It doesn’t have to be that way if you use the right tools.

Deploy a containerized .NET Core app to Azure Kubernetes Service (AKS)

Microsoft Azure provides an all-encompassing service that allows you to host Docker containers on the Azure Container Registry (ACR), deploy to a production-ready Kubernetes cluster via the Azure Kubernetes Service (AKS), and more. Using CircleCI, you can automatically deploy updates to your application, providing a safer and more efficient CI/CD process for managing your software. This article shows you how to automate deployments for a.Net application to Azure Kubernetes.

Demystifying FEDRAMP and NIST for Continuous Compliance

Today, federal agencies rely extensively on Cloud-based SaaS applications for everything from payment processing and document management, to data security and employee workflow automation. These tools help departments to function very efficiently, but because they are being used for essential government functions, it’s vital that they are safe and secure. For example, personnel at The Pentagon or The Department of Homeland Security can’t just choose any software vendor in the marketplace.