Operations | Monitoring | ITSM | DevOps | Cloud

Virtual Customer Workshop 2023

Last week, we were very excited to host our first ever SquaredUp Virtual Customer Workshop! We’d received so much positive feedback on the intimate in-person workshop we ran in the UK last month that we wanted to extend the invitation worldwide – by recreating the experience virtually. Using the digital conferencing app Gather Town, we were pleased to welcome 23 SquaredUp customers from 12 countries to our virtual “SquaredUp Town”.

Web Management Address Autodetection

The release of 4.1 comes with some exciting updates. Web management address discovery now becomes a breeze with Autodetection. Firmware Updates now support Panduit Gen5 and nVent Enlogic EN2.0 rack PDUs. Not to mention, the Location Layout offers enhanced floor plan visualization with convenient export options. These updates and more provide you with better control and improved visibility.

Kubernetes Configmap: Our Complete Guide

Mastering ConfigMaps in Kubernetes is crucial for anyone looking to streamline their container orchestration processes. This guide dives into the pivotal role of ConfigMaps in Kubernetes, detailing their function in managing non-confidential data as key-value pairs. We will explore their crucial role in decoupling configuration from container images and enhancing adaptability across various environments like development and production.

Troubleshooting End-User Issues With a DEM Tool

In the last decade, businesses have made massive investments in the digital economy with the goal of increasing operational efficiency and improving their customer or end-user experience. However, it isn’t rare for businesses to incur losses due to poor page load speed, failed transactions, or website errors. This is why businesses need to track end-user experience in real time and resolve issues quickly.
Sponsored Post

Unveiling Azure Monitor SCOM Managed Instance

In the ever-evolving landscape of IT operations, the introduction of Azure Monitor SCOM Managed Instance (SCOM MI) stands as a testament to Microsoft's commitment to providing advanced monitoring solutions. This article is a comprehensive exploration of SCOM MI, its journey to General Availability (GA), anticipated features, the seamless integration of NiCE Management Packs, and the positive impact it promises on the world of IT operations.

Advantages and Disadvantages of Web App with Node.js

Node.js, a prominent technology in web app programming, boasts a notable standing in the realm of software development. Originating as a key tool for frontend web development, it has expanded its reach as a significant cross-platform mobile development technology. It serves as the foundational technology for several platforms like Apache Cordova/PhoneGap, React Native, NativeScript, and Appcelerator Titanium.

Best practices for writing clean, maintainable JavaScript

The world’s biggest language comes with a huge collection of conventions and guidelines from the community’s collective wisdom. Following JavaScript best practices can help achieve faster page loads and better performance, improve code readability, and make maintenance and debugging easier. Carefully crafted code can also prevent errors and security issues, especially if it’s complemented with real-time diagnostic tools such as JavaScript error monitoring.

Significance of Website Monitoring for Educational Institutes

We have come a long way from dusty chalkboards and lightbulb-powered overhead projectors. The modern-day educational landscape has dramatically shifted to digital platforms. Students, educators, and staff are dependent on web portals and online services to facilitate learning and administrative tasks. However, a lingering question persists: How resilient and reliable are these platforms?

Azure Key Vault Certificate Expiration Monitoring

Azure Key Vault is a cloud-based service provided by Microsoft Azure for managing and safeguarding cryptographic keys, secrets, and digital certificates used by cloud applications and services. It offers a secure and compliant way to store, manage, and control access to these sensitive pieces of information. Key Vault is designed to help protect the confidentiality and integrity of data, enhance the security of applications, and simplify key management tasks.