Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

DataOps vs. DevOps - Similar or Completely Different?

Over the past several years, there has been a big focus on streamlining infrastructure operations. Many organizations have begun using DevOps principles in their software development and operations activities. We've also seen a new Ops in town recently: DataOps. Good things come from new methods to help teams collaborate across an organization.

Realtime performance alerts for cloud desktops

The thermostat for the first floor of my house is located right behind me in my home office. I probably walk by it a dozen times a day, but I only look at it if I am feeling cold or warm to check to see if the temperature is set to the correct value. In Massachusetts, hot and cold are seasonal but can vary a lot day to day so checking occurs more often than you would think.

A Fully Argo-Based Ecosystem For Continuous Delivery and Deployment

Better DevOps makes for more efficient engineering teams and more reliable releases, and when it comes to DevOps, it doesn’t get better than GitOps. According to DevOps-As-A-Service: One of the many goals of DevOps is to reduce Time To Value (TTV) and to provide faster feedback while enabling developers to easily self-service or not have to engage to get a service at all.

Critical Metrics and Alerts in the Continuous Delivery Process

Continuous delivery is a software development approach in which code changes are automatically staged for production release. A foundation for modern application development, continuous delivery extends continuous integration by automatically deploying code changes to test and production environments after the build phase. When properly implemented, developers have deployable build artifacts that have passed a standardized testing process and can be deployed to environments as needed.

CircleCI Breach: How to Rotate All Stored Secrets ASAP

Yesterday, CircleCI, a Continuous Integration/Continuous Delivery (CI/CD) service, notified the world it had been breached via a critical advisory from its CTO. As a major software delivery pipeline service, CircleCI users store myriad credentials for various services in CircleCI’s “Secrets Store” infrastructure.

Ping Command: A Beginner's Guide

One of the most continually used tools by network administrators is the ping command. Over a half-century has passed since it was unleashed, and unsurprisingly, it has proven effective in troubleshooting networks. Testing the availability of a networking device on a network (mostly computers) can be done by employing the ping command. In order to check the connectivity between hosts and servers, the PING (Packet Internet Groper) command is utilized.

Failure Analysis: Engineering incidents are a bigger problem than you think

Engineering incidents can be quite harmful for companies, both in terms of financial costs and reputational damage. In some cases, engineering incidents can even put people's lives at risk, which can have serious legal and moral implications for the company involved.

Playbooks: A new superpower for designers

From one designer to another, you should know why Playbooks is a fantastic addition to your design tool belt. Playbooks were designed with technical workflows in mind, from incident response to release management, but its flexibility makes it a perfect fit for any repeated process. I love it for creating reusable templates of design checklists and an excellent way to do design review sign-off.