Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Is Arm the future of cloud computing?

The Arm architecture dates back to Acorn Computers’ BBC Micro in 1981. The BBC Micro was a conventional machine, yet it ran nearly twice as fast as its contemporaries, such as the Apple II. About the same time, research on a microprocessor design based on the Reduced Instruction Set Computer (RISC) demonstrated that simple chip designs could easily outperform the current high-end 32-bit offerings.

The 12 Best AWS Cloud Management Tools - Organized By Category

Organizations of all sizes can take advantage of Amazon Web Service’s cloud computing. AWS provides low-cost cloud storage, nearly unlimited compute resources, and secure remote computing services. Still, many users find AWS confusing. Companies often struggle to understand AWS billing. Aligning cloud spend to actual operational activities for cost allocation is next to impossible. AWS also limits the amount of compute resources you can use based on your location.

Continuous Innovation With D2iQ Kubernetes Platform 2.1

Here at D2iQ, we spend a lot of time listening to our customers, and we welcome any feedback that can make it easier for organizations to get into production at scale with Kubernetes. Today, we’re pleased to announce the general availability of the D2iQ Kubernetes Platform (DKP) version 2.1, including D2iQ Konvoy 2.1 and Kommander 2.1.

Deploying Your App Using Shipa and Azure Pipelines

In this article, you will learn a bit about how you can deploy an app in IaC way to Kubernetes using Shipa and Azure Pipelines. Shipa is a unique product that solves one of the main issues that developers face while developing Cloud Native applications on Kubernetes. The underlying issue of learning Kubernetes in a faster phase is a difficult task for most of the new developers, that is where Shipa comes to the rescue.

How teams are breaking down data silos to improve software delivery

Over the past decade, the software development landscape has shifted dramatically. Long development cycles resulting in big releases are now a thing of the past. Instead, the focus is on delivering value to the customer quickly and efficiently through small releases delivered at a high frequency. This shift is not without its challenges. Increased release velocity means an increased threat to security and reliability. To combat this, teams must collaborate fluidly across the organization.

Security vulnerabilities on the Data Distribution Service (DDS)

If you are currently running the Robot Operating System 2 (ROS 2), this piece is especially relevant to the security of your robots. A few weeks ago, a group of security researchers reported 13 security vulnerabilities affecting some of the most used implementations of DDS, the default middleware used by ROS 2.

The EPC-U3233 by Advantech gets Ubuntu certified to accelerate AIoT Applications

Canonical and Advantech have collaborated to help enterprises accelerate Edge AIoT Applications with Ubuntu 20.04 LTS certified on the EPC-U3233, powered by an 8th Gen Intel® Core™ i series processor. This compact fanless embedded PC facilitates data-intensive computing in IoT edge applications.

The Log4j Log4Shell vulnerability: Overview, detection, and remediation

On December 9, 2021, a critical vulnerability in the popular Log4j Java logging library was disclosed and nicknamed Log4Shell. The vulnerability is tracked as CVE-2021-44228 and is a remote code execution vulnerability that can give an attacker full control of any impacted system. In this blog post, we will: We will also look at how to leverage Datadog to protect your infrastructure and applications.

Podcast: Break Things on Purpose | Mandi Walls, DevOps Advocate at PagerDuty

Take a trip down memory lane with Mandi Walls, to chat about the many changes over the years in chaos engineering and other ares of tech. We’ve also got the new addition to Gremlin’s Developer Advocacy, Julie Gunderson who has joined Jason to chat with their mutual friend. Mandi talks about her previous work alongside Julie, but also the variegated nature of her background in operations and systems administration.