Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Confidential Computing and financial services cloud

Cloud computing has been transforming financial IT infrastructure into a utility allowing financial institutions (FIs) to access computing resources on-demand letting FIs offload costs and effort of setting-up and managing their own on-premises infrastructure, improving agility and time to business value. As more and more financial institutions rely on hybrid cloud services, data security in the cloud is a business imperative.

Getting Hands on with Harvester HCI

When I left Red Hat to join SUSE as a Technical Marketing Manager at the end of 2021, I heard about Harvester, a new Hyperconverged Infrastructure (HCI) solution with Kubernetes under the hood. When I started looking at it, I immediately saw use cases where Harvester could really help IT operators and DevOps engineers. There are solutions that offer similar capabilities but there’s nothing else on the market like Harvester.

The top 10 AWS architecture built with Qovery in 2022

We are in May 2022, and hundreds of startups have built their infrastructure on AWS using Qovery. This article will share the 10 best (and fancy) AWS architectures our customers have made. From the most classic architecture to the craziest 🤪 It can give you some ideas. Let's go 🚀

Why and how you should automate database migrations

The desire to release features faster and deliver value to customers sooner is prompting many IT teams to adopt DevOps and Agile practices. By automating parts of the development process where possible and working in shorter cycles to release small changes more often, those teams that do well experience fewer errors and produce higher quality code. All of which is good news, until it comes to the database.

A practical approach to Active Directory Domain Services, Part 4: AD groups and OUs

Active Directory (AD) objects are rarely managed as standalone entities. In Part 3 of this series, we covered practical exercises for creating and managing two of the most critical AD objects, namely users and computers, after setting up a laboratory AD environment on virtual machines. To manage AD effectively, knowledge and practical experience with AD groups and organization units (OUs) is imperative. In this fourth part of our series, we’ll elaborate on this.

Open source solutions that drive logistics sector's digital transformation

As with organisations in many other industries, logistics services are under intense pressure to remain competitive to face severe market disruption. Disruptive innovation has reached this industry, which is currently experiencing strong inflexion points. The logistics sector is being forced to innovate as rapidly and quickly as possible. Therefore, organisations need to stay competitive and drive innovation processes.

Getting Started With Docker Compose and Speedscale CLI

Observability, introspection, logging, and dependency mapping are critical when building APIs. With the advent of microservice architecture, understanding what happens inside your container is vital during development. Speedscale CLI is a container-centric tool that allows you to monitor inbound and outbound traffic. With Speedscale CLI, you can monitor raw requests, latency, encoding, and detected technologies.

11 Tips for Using GitLens in VS Code

GitLens is the number one Git extension for VS Code, helping over 14 million developers unlock the power of Git in their favorite editor! Here are 11 expert tips on how to make the most of using GitLens right now! Optimize your Git experience with VS Code today – install GitLens to enjoy better project history visualization and insights! Install GitLens Free!

Implementing access control policies in CI/CD pipelines

Imagine yourself in this situation: You are a motivated and skilled DevOps or DevEx engineer. You have a plan to implement automated, complete CI/CD pipelines. You know how to do it, and you know how the extra productivity and automation will benefit your team and the whole company. But the project is never approved, because of security concerns. Many organizations, especially those in regulated industries, have strict requirements for releasing their software, and rightfully so.