Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Declare early, declare often: why you shouldn't hesitate to raise an incident

My first incident.io-incident happened in my second week here, when I screwed up the process for requesting extra Slack permissions, which made it impossible to install our app for a few minutes. This was a bit embarrassing, but also simple to resolve for someone more familiar with the process, and declaring an incident meant we got there in just a few minutes. Declaring the first incident when you start a new job can be intimidating, but it really shouldn’t be.

Gartner: tips for improving reliability

In their report titled “IT Resilience — 7 Tips for Improving Reliability, Tolerability and Disaster Recovery”, Gartner presents seven strategies for improving the resilience posture of your critical systems. These recommendations range from how to get started, to identifying IT hazards and risks to reliability, to capturing metrics and translating them into business value. In this blog, we’ll take a high-level look at the report and summarize some of its key findings.

Artifactory, Your Swift Package Repository

If you’re looking forward to WWDC 2022 for some exciting Swift news, we have just the thing. JFrog now offers the first and only Swift binary package repository, enabling developers to use JFrog Artifactory for resolving Swift dependencies instead of enterprise source control (Git) systems. Swift developers can benefit from Artifactory’s robust binary management and the ways that it contributes to stable and efficient CI/CD, massive scalability, and securing the software supply chain..

9 Powerful Ways To Align Engineering And Product Teams

One of the best ways to achieve efficient product development is to make sure everyone involved with a project is on the same page, working toward the same ultimate goals. However, this is harder to do than it sounds. Engineering and product teams bring very different priorities to the table, and establishing which priorities to focus on first often becomes a matter of debate.

Getting Your Clouds Under Control: Part 1-FinOps

Given the strategic importance of the cloud and size of cloud expenditures, it’s critical for enterprises to have solid controls in place to manage it all. According to our latest research, however, while most organizations agree with that sentiment, very few have put it into practice. There are distinct but related disciplines that come into play: FinOps and cloud governance. In this two-part series, we explore current state of each.

Introduction to CI/CD

In a business world where time is money and every dollar counts, efficiency and productivity are critical success factors. Continuous Integration (CI)/Continuous Deployment (CD) is a process that helps organizations rapidly release software with confidence The process relies heavily on automation and modern cloud-based services to provide tools for build management, monitoring, testing, and deployment automation.

Data structures for effective Python applications

Because computers rely on data to execute instructions, computing will always entail data interaction. The amount of data can be overwhelming in real world applications, so developers must consistently devise methods to access it quickly and efficiently in a programmatic way. A solid understanding of data structures is a great advantage for teams that specialize in developing tools and systems. Organizing data optimally maximizes efficiency and makes data processing easy and seamless.

DevOps Explained

DevOps is not just one thing, but rather a set of tools and practices that, well, everyone is following, or should be. But, for all of its ever-increasing popularity, few can really explain what DevOps is about without tangling themselves up in jargon. With this guide, we’ll help you navigate the DevOps maze in a way that’s easy, fun, and will hopefully get you going in the quest for more—and better—implementation. Without further ado, here’s DevOps explained!

What Are SSH Keys? An Introduction

SSH or Secure Shell is one of the oldest protocols used in networking for secure encrypted communication between two systems and to remotely manage servers and other systems. Ever since its introduction, they have been adopted by IT teams in organizations all over the world to manage their assets. And SSH keys continue to play a significant role in granting secure access to computer systems, and with the cloud computing boom, they’re playing even more important roles. So what are SSH keys?