Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How to Conduct Efficient Code Reviews with GitLens

Code reviews are a massively beneficial way to improve code quality, identify vulnerabilities, and establish coding best practices. According to Microsoft researchers, peer code reviews improve code quality by 15–35%. In addition, according to the Journal of Systems and Software, peer code reviews increase accountability by 30–40%.

What Can Go Wrong for Logistics Companies Without Geofencing?

Logistics does not only involve getting company resources from point A to point B. When a company has a logistics arm, they also need to develop the practice of field service management. This applies to any kind of customer-facing logistics, whether they are service vehicles for on-site support or company cars for client visits. Unfortunately, some organizations are immature when it comes to their field service management, employing only the most bare-bones approach to the discipline.

Practical tips for rightsizing your Kubernetes workloads

When containers and container orchestration were introduced, they opened the possibility of helping companies utilize physical resources like CPU and memory more efficiently. But as more companies and bigger enterprises have adopted Kubernetes, FinOps professionals may wonder why their cloud bills haven’t gone down—or worse, why they have increased.

Automatically Create Incidents from Alerts with Alert Routing

Shouldn’t your alerts be doing more of the work for you? A noisy channel with every alert from hundreds of monitors and microservices is a chaotic place to actually find the incidents that are impacting your customers. And it still requires a heck of a lot of human intervention. We think it’s time for something better. Today we’re releasing Alert Routing: the next phase of worry-free automation from FireHydrant.

Qovery and Doppler Join Forces to Empower Developers with Next-Level Cloud Deployment and Security

I am excited to announce the partnership between Qovery and Doppler. Qovery is an infrastructure automation platform that helps developers deploy their applications more easily, while Doppler is a fully managed SecretOps platform that enables engineering teams to better manage their environment variables and secrets.

Canonical joins the confidential computing consortium

Canonical is committed to enabling Ubuntu users to leverage the strong run-time confidentiality and integrity guarantees that confidential computing provides. That is why we are happy to announce we have joined the confidential computing consortium, a project community at the Linux Foundation that is focused on accelerating the adoption of confidential computing and driving cross-industry collaboration around relevant open source software, standards and tools.

What is Azure Blob Hot Tier Storage?

Microsoft Azure Blob Storage is a scalable, cost-effective, and high-performance cloud storage solution that enables businesses to store massive amounts of unstructured data. With Azure Blob Storage, users can access and manipulate data from anywhere in the world through the Azure Storage REST API or the Storage Client Library. One of the key considerations when using Azure Blob Storage is the choice of storage tier, as it significantly affects cost and performance.

Avoid Downtime with Azure VM Disk Space Alerts: Best Practices

The emergence of cloud computing has led to the rise of independently deployable components that increase the availability of the application. As many organizations move their infrastructure to the cloud, it becomes essential for them to have an Azure VM monitoring tool to process, store, scale, and maintain their applications.

The security challenge facing global IoT projects

Internet of Things (IoT) deployments continue to expand globally, revolutionising the way businesses operate by boosting efficiency and enhancing experiences for customers and employees. But as is the case with many innovations, growth has outpaced security considerations resulting in unforeseen problems emerging as bad actors seek to exploit new vulnerabilities.